Você está na página 1de 64

Project Report

On
COMPUTER NETWORKING
Submitted in partial fulfillment of the requirements
For the award of Degree of
Bachelor of Technology
In
Computer Science and Engineering
Guided by :

Submitted By :

Mr. Jagdish Verma

Jyoti Arora

Junior Engineer

(09010402712)

DMRC, Metro Bhawan

Amity School Of Engineering & Technology,


(Affiliated to GGSIP University, New Delhi 61)
(June-July,2015)

ACKNOWLEDGEMENT
I would like to express my gratitude to all those who gave me the possibility to complete this
project. I want to thank the DMRC, Metro Bhawan for giving me permission to commence this
project in the first instance, to do the necessary research work and to use departmental data. I
have furthermore to thank Mr. Jagdish Verma . His guidance, encouragement, inspiration and
suggestions made the project to be successful.
I am deeply indebted to my supervisor, whose help, stimulating suggestions and encouragement
helped me in all the time in the project.
He has helped me to improve my approach to the subject and broaden my vision too. We
consider it our good fortune and privilege to work under the guidance. It was a pleasure to work
under his guidance. I am very thankful to him.

ii

ABSTRACT
Purpose of this project is to understand the concepts of networking. It included learning the data
flow, components, network topology, network connectivity, transmission medium and network
models.
The project also describes the sites which were visited in that duration. Following activities were
executed at those sites :

Metro Bhawan Connectivity and knowledge about ISP, IPS, Fortinet firewall, cisco
router and switches.
Sarai Metro station networking and knowledge about control rooms, manager rooms,
gang box and penta scanner.
Mewla Maharajpur metro station networking and knowledge about punching RJ45
sockets into CAT 5 cables.
Neelam Chowk Ajronda Metro Station connectivity.
Knowledge about OCC Shastri Park database server and ERP servers.
Understanding the DMRC site office Khyber Pass leased line from Tata.

The entire sets of activities were performed on the respective sites.

ii

TABLE OF CONTENTS

S.No

1.
2.

3.

4.

Title

Page No.

Certificate

(i)

Acknowledgement

(ii)

Abstract

(iii)

List of Figures

(iv)

Company Profile

(v)

Project Details

(vi)

Network Map
Introduction to Networking
2.1
Data Communications
2.2
Components
2.3
Data Flow
Networks
3.1
Network Criteria
3.2
Types of Connection
3.3
Network Topology
3.3.1 Bus topology
3.3.2 Ring topology
3.3.3 Star topology
3.3.4 Mesh topology
3.3.5 Hybrid topology
3.4
Categories of Network
3.4.1 Local Area Network
3.4.2 Wide Area Network
3.4.3 Metropolitan Area Network
3.4.4 Wireless Network
3.5
Network Protocols
Transmission Medium
4.1
Guided Media
4.1.1 Twisted Pair Cable
4.1.2 Coaxial Cable
4.1.3 Fibre Optic Cable
4.2
Unguided Media : Wireless
4.2.1 Radio Waves
ii

1
1
1
2
3
3
3
4
4
5
6
7
8
9
9
10
11
11
12
13
13
13
16
18
20
20

5.
6.

7.

4.2.2 Micro Waves


4.2.3 Infrared Waves
Network Models
5.1
OSI Reference Model
5.2
TCP/IP Reference Model
Site Training
6.1
Metro Bhawan
6.2
Sarai Metro Station
6.3
Mewla Maharajpur Metro Station
6.4
Neelam Chowk Depot
6.5
Shastri Park Operation Control Centre (OCC)
6.6
DMRC Site Vishwavidalaya Metro Station
Conclusion

20
20
21
21
24
27
28
36
39
42
43
47
48

LIST OF FIGURES

S.No

Name

Page No.

Fig 1.

Network Map

Fig 3.3.1

Bus Topology

Fig 3.3.2

Ring Topology

Fig 3.3.3

Star Topology

Fig 3.3.5

Hybrid Topology

Fig 3.4.1

Local Area Network

10

Fig 3.4.2

Wide Area Network

10

Fig 3.4.3

Metropolitan Area Network

11

ii

Fig 3.4.4

Wireless Network

12

Fig 4.1

Transmission Media Category

13

Fig 4.1.1

Twisted Pair Cable

14

Fig 4.1.1

STP and UTP

16

Fig 4.1.2

Coaxial Cable

17

Fig 4.1.3

Fibre Optic Cable

18

Fig 5.1

OSI Model

21

Fig 5.2

TCP/IP Model

25

Fig 6.1

Metro Bhawan Site

28

Fig 6.1.1

Metro Bhawan Connectivity

29

Fig 6.1.2

Metro Bhawan Connectivity

30

Fig 6.1.3

Cisco Router with Fortinet firewall

33

Fig 6.1.4

Switch

34

Fig 6.2.1

Gang Box

36

Fig 6.2.2

Sarai Metro Station Networking

37

Fig 6.2.3

Penta Scanner

38

Fig 6.3.1

Requirements for RJ45

39

Fig 6.3.2

CAT 6 Cable

40

Fig 6.3.3

RJ45

41

Fig 6.3.4

Crimping Tool

41

Fig 6.4

Neelam Chowk Ajronda Topology

42

Fig 6.5.1

OCC Shastri Park

43

Fig 6.5.2

OCC Shastri Park Connectivity

45
ii

Fig 6.5.3

OCC Shastri Park Connectivity

46

Fig 6.6

DMRC Site Office Khyber Pass

47

COMPANY PROFILE

Th
e Delhi

Metro is

a metro system

serving New

Delhi and

its

satellite

cities

of Gurgaon, Noida, Faridabad and Ghaziabad of the National Capital Region in India. Delhi
Metro has been ranked second among 18 international Metro systems in terms of overall
customer satisfaction in an online customer survey. According to a DMRC official, in the survey
conducted among the commuters of those Metro systems by Global Metro Benchmarking

ii

Groups NOVA and Comet, Delhi Metro along with London DLR and Bangkok were the best
three performers in the Net Promoters Score (NPS) category. Delhi Metro is also the world's 13th
largest metro system in terms of length and 15th largest in terms of number of stations. It is a
member of Nova Group of Metros. Delhi Metro is India's third urban mass rapid transport
system (after the Kolkata Metro and Chennai MRTS) and the first modern rapid transit system.
As of July 2015, the network consists of five colour-coded regular lines (Red, Blue, Green,
Yellow, Violet), and a sixth line, the Airport Express, with a total length of 194 kilometres
(121 mi), serving 142 stations (with 6 more Airport Express stations), of which 38 are
underground, five are at-grade, and the rest are elevated. All stations have escalators, elevators,
and tactile tiles to guide the visually impaired from station entrances to trains. It has a
combination

of

elevated,

at-grade,

and

underground

lines,

and

uses

both broad

gauge and standard gauge rolling stock. Four types of rolling stock are used: Mitsubishi Rotem
broad gauge, BombardierMovia, Mitsubishi Rotem standard gauge, and CAF Beasain standard
gauge.
Delhi Metro Rail Corporation Limited (DMRC), a state-owned company with equal equity
participation from Government of India and Government of National Capital Territory of Delhi
built and operates the Delhi Metro. However, the organisation is under administrative control of
Ministry of Urban Development, Government of India. Besides construction and operation of
Delhi Metro, DMRC is also involved in the planning and implementation of metro rail, monorail
and high-speed rail projects in India and providing consultancy services to other metro projects
in the country as well as abroad.
Planning for the metro started in 1984, when the Delhi Development Authority and the Urban
Arts Commission came up with a proposal for developing a multi-modal transport system for the
city. The Government of India and the Government of Delhi jointly set up the Delhi Metro Rail
Corporation (DMRC) registered on 3 May 1995 under The Companies Act, 1956. Construction
started in 1998, and the first section, on the Red Line, opened in 2002, followed by the Yellow
Line in 2004, the Blue Line in 2005, its branch line in 2009, the Green and Violet Lines in 2010,
and the Delhi Airport Metro Express in 2011.

ii

The recently opened Rapid MetroRail Gurgaon, whilst linked to it by the Yellow Line is a
separate metro system (with a different owner/operator than the Delhi Metro), although tickets
from the Delhi Metro can be used in its network.

1.1 Delhi Metro gets UN certificate for preventing carbon emission


Adding yet another feather to its cap, Delhi Metro has become the first rail network in the world
to get a UN certificate for preventing over 90,000 tonnes of carbon dioxide from being released
into

the

atmosphere,

doing

its

bit

to

fight

against

global

warming.

The certification report, given by Germany-based validation organisation TUV NORD which
conducted an audit on behalf of the UN Framework Convention on Climate Change Change
(UNFCCC), found that the DMRC stopped the emission of 90,004 tonnes of carbon dioxide from
2004 to 2007 by adopting regenerative braking systems in the metro trains.
DELHI METRO RAIL CORPORATION Network is a huge organization with lots of
infrastructure. Thus the need arises to synchronize all departments well efficiently and also to
outer environment. This is all done via efficient Networking.

1.2 Future plans of Delhi Metro


With the present metro I and II, running on a successful path, plans have been made for Delhi
Metro Phase 3 that will take the metro around the entire city. The Government has ambitious
plan to extend the service to several parts of the city as there are lots of people who need to
commute to various parts of the city. Being a large city, it is a need of the people of Delhi to have
good transport system. The new Phase III is a 105 km network and most of the plans are now
ready. The plans are to cover Yamuna Vihar-Mukundpur corridor, which will be the longest line
in the Delhi Metro network that will cover around 55.9 kms. The major stations on this route will
be Mukundpur, Rajouri Garden, Dhaula Kaun, Anand Vihar and culminate at Yamuna Vihar.

ii

PROJECT DETAILS
Title of the Project

:
To learn the concepts of networking and to find
the network connectivity from metro bhawan to other
stations.

Project Guide

Mr. Jagdish Verma


Junior Engineer
DMRC Metro Bhawan , New Delhi

Project Starting Date

10th June 2015

Project Ending Date

21st July 2015

ii

Chapter 1
NETWORK MAP

ii

Fig 1. Network map


The Delhi Metro is being built in phases. Phase I completed 58 stations and 65.0 km (40.4 mi) of
route length, of which 13.0 km (8.1 mi) is underground and 52.1 km (32.4 mi) surface or
elevated. The inauguration of the Dwarka- Barakhamba corridor of the Blue Line marked the
completion of Phase I on October 2006. Phase II of the network comprises 124.6 km (77.4 mi) of
route length and 85 stations, and is fully completed, with the first section opened in June 2008
and the last line opened in August 2011. Phase III (103 km, 69 stations) and Phase IV
(113.2 km) are planned to be completed by 2016 and 2021respectively, with the network
spanning 413 km (257 mi) by then.

Chapter 2
INTRODUCTION TO NETWORKING
ii

Networking : A network is a group of two or more computer systems linked together.


Networks exist so that data may be sent from one place to another-the basic concept of data
communications.
Data communications between remote parties can be achieved through a process called
networking, involving the connection of computers, media, and networking devices.

2.1 Data communications


Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
The effectiveness of a data communications system depends on four fundamental characteristics:
delivery, accuracy, timeliness, and jitter.
I.

Delivery. : The system must deliver data to the correct destination. Data must be

II.

received by the intended device or user and only by that device or user.
Accuracy. : The system must deliver the data accurately. Data that have been altered

III.

in transmission and left uncorrected are unusable.


Timeliness. : The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video and audio, timely delivery means delivering data as
they are produced, in the same order that they are produced, and without significant

IV.

delay. This kin d of delivery is called real-time transmission.


Jitter. : Jitter refers to the variation in the packet arrival time. It is the uneven delay in
the delivery of audio or video packets. For example, let us assume that video packets
are sent every 3D ms.

2.2 Components
A data communications system has five components :
I.

Message. : The message is the information (data) to be communicated. Popular forms

II.

of information include text, numbers, pictures, audio, and video.


Sender. : The sender is the device that sends the data message. It can be a computer,

III.

workstation, telephone handset, video camera, and so on.


Receiver. : The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.

ii

IV.

Transmission medium. : The transmission medium is the physical path by which a


message travels from sender to receiver. Some examples of transmission media

V.

include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
Protocol. : A protocol is a set of rules that govern data communications. It represents
an agreement between the communicating devices. Without a protocol, two devices
may be connected but not communicating, just as a person speaking French cannot be
understood by a person who speaks only Japanese.

2.3 Data Flow


Communication between two devices can be simplex, half-duplex, or full-duplex.
Simplex : In simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit; the other can only receive. Keyboards and
traditional monitors are examples of simplex devices.
Half-Duplex : In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice versa. The halfduplex mode is used in cases where there is no need for communication in both directions at the
same time; the entire capacity of the channel can be utilized for each direction.
Full-Duplex : In full-duplex mode, both stations can transmit and receive simultaneously. The
full-duplex mode is used when communication in both directions is required all the time. The
capacity of the channel, however, must be divided between the two directions.

Chapter 3
NETWORKS
A network is a set of devices (often referred to as nodes) connected by communication links. A
node can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network.

ii

3.1 Network Criteria


A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security.
1. Performance : Performance can be measured in many ways, including transit time and
response time. Transit time is the amount of time required for a message to travel from
one device to another. Response time is the elapsed time between an inquiry and a
response. Performance is often evaluated by two networking metrics: throughput and
delay. We often need more throughput and less delay. However, these two criteria are
often contradictory.
2. Reliability : In addition to accuracy of delivery, network reliability is measured by the
frequency of failure, the time it takes a link to recover from a failure, and the network's
robustness in a catastrophe.
3. Security : Network security issues include protecting data from unauthorized access,
protecting data from damage and development, and implementing policies and
procedures for recovery from breaches and data losses.

3.2 Types of Connection


A network is two or more devices connected through links. A link is a communications pathway
that transfers data from one device to another.
For communication to occur, two devices must be connected in some way to the same link at the
same time. There are two possible types of connections: point-to-point and multipoint.
1. Point-to- Point : A point-to-point connection provides a dedicated link between two
devices. The entire capacity of the link is reserved for transmission between those two
devices.
2. Multipoint : A multipoint (also called multidrop) connection is one in which more than
two specific devices share a single link. In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally.

3.3 Network Topology

ii

The term physical topology refers to the way in which a network is laid out physically. Two or
more devices connect to a link; two or more links form a topology. There are four basic
topologies possible: mesh, star, bus, and ring.
3.3.1 Bus Topology :

Figure 3.3.1 Bus topology


3.3.1.1 Features of bus topology :
1.

It transmits data only in one direction.

2.

Every device is connected to a single cable.

3.3.1.2 Advantages of bus topology :


1.

It is cost effective.

2.

Cable required is least compared to other network topology.

3.

Used in small networks.

4.

It is easy to understand.

3.3.1.3 Disadvantages of bus topology :


1.

Cables fails then whole network fails.

2.

If network traffic is heavy or nodes are more the performance of the network decreases.

ii

3.

Cable has a limited length.

4.

It is slower than the ring topology.

3.3.2 Ring Topology


It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.

Figure 3.3.2 Ring topology


3.3.2.1 Feature of Ring Topology :
1.

A number of repeaters are used and the transmission is unidirectional.

2.

Date is transferred in a sequential manner that is bit by bit.

3.3.2.2 Advantages of Ring Topology :


1.

Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.

ii

2.

Cheap to install and expand.

3.3.2.3 Disadvantages of Ring Topology :


1.

Troubleshooting is difficult in ring topology.

2.

Adding or deleting the computers disturbs the network activity.

3.

Failure of one computer disturbs the whole network.

3.3.3 Star Topology :


In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.

Figure 3.3.3 Star topology


3.3.3.1 Features of Star topology :
1.

Every node has its own dedicated connection to the hub.

2.

Acts as a repeater for data flow.

3.

Can be used with twisted pair, Optical Fibre or coaxial cable.

3.3.3.2 Advantages of Star Topology :

ii

1.

Fast performance with few nodes and low network traffic.

2.

Hub can be upgraded easily.

3.

Easy to troubleshoot.

4.

Easy to setup and modify.

5.

Only that node is affected which has failed rest of the nodes can work smoothly.

3.3.3.3 Disadvantages of Star Topology :


1.

Cost of installation is high.

2.

Expensive to use.

3.

If the hub is affected then the whole network is stopped because all the nodes depend on
the hub.

4.

Performance is based on the hub that is it depends on its capacity.

3.3.4 Mesh Topology :


It is a point-to-point connection to other nodes or devices. Traffic is carried only between two
devices or nodes to which it is connected. Mesh has n (n-2)/2 physical channels to link
hn devices.
3.3.4.1 Features of Mesh topology :
1.

Fully connected.

2.

Robust.

3.

Not flexible.

3.3.4.2 Advantages of Mesh Topology :

ii

1.

Each connection can carry its own data load.

2.

It is robust.

3.

Fault is diagnosed easily.

4.

Provides security and privacy.

3.3.4.3 Disadvantages of Mesh Topology :


1.

Installation and configuration is difficult.

2.

Cabling cost is more.

3.

Bulk wiring is required.

3.3.5 Hybrid Topology :


It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).

ii

Figure 3.3.4 Hybrid topology


3.3.5.1 Features of Hybrid Topology :
1.

It is a combination of two or topologies

2.

Inherits the advantages and disadvantages of the topologies included

3.3.5.2 Advantages of Hybrid Topology :


1.

Reliable as Error detecting and troubleshooting is easy.

2.

Effective.

3.

Scalable as size can be increased easily.

ii

4.

Flexible.

3.3.5.3 Disadvantages of Hybrid Topology :


1.

Complex in design.

2.

Costly.

3.4 Categories of Networks


Today when we speak of networks, we are generally referring to two primary categories: localarea networks and wide-area networks. The category into which a network falls is determined by
its size. A LAN normally covers an area less than 2 mi; a WAN can be worldwide. Networks of a
size in between are normally referred to as metropolitanarea networks and span tens of miles.
3.4.1

Local Area Network

A local area network (LAN) is usually privately owned and links the devices in a single
office, building, or campus. Depending on the needs of an organization and the type of
technology used, a LAN can be as simple as two PCs and a printer in someone's home
office; or it can extend throughout a company and include audio and video peripherals.
Currently, LAN size is limited to a few kilometers.
It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory. LANs are used widely as it is easy to design and to troubleshoot.
Personal computers and workstations are connected to each other through LANs. We can
use different types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network
among each other while it can also be as complex as interconnecting an entire
building.LAN networks are also widely used to share resources like printers, shared harddrive etc.

ii

Figure 3.4.1 Local Area Network


3.4.2

Wide Area Network

A wide area network (WAN) provides long-distance transmission of data, image, audio,
and video information over large geographic areas that may comprise a country, a
continent, or even the whole world. In Chapters 17 and 18 we discuss wide-area networks
in greater detail. A WAN can be as complex as the backbones that connect the Internet or
as simple as a dial-up line that connects a home computer to the Internet. We normally
refer to the first as a switched WAN and to the second as a point-to-point WAN.

Figure 3.4.2 Wide Area Network


3.4.3

Metropolitan Area Networks

ii

A metropolitan area network (MAN) is a network with a size between a LAN and a
WAN. It normally covers the area inside a town or a city. It is designed for customers
who need a high-speed connectivity, normally to the Internet, and have endpoints spread
over a city or part of city.
A good example of a MAN is the part of the telephone company network that can
provide a high-speed DSL line to the customer.

Figure 3.4.3 Metropolitan Area Network


3.4.4

Wireless Network

It is the fastest growing segment of computer. They are becoming very important in our daily life
because wind connections are not possible in cars or aeroplane. We can access Internet at any
place avoiding wire related troubles.. These can be used also when the telephone systems gets
destroyed due to some calamity/disaster. WANs are really important now-a-days.

ii

Figure 3.4.4 Wireless Network

3.5 Network Protocols


A protocol defines what is communicated, how it is communicated, and when it is
communicated. The key elements of a protocol are syntax, semantics, and timing.
1. Syntax. The term syntax refers to the structure or format of the data, meaning the order in
which they are presented.
2. Semantics. The word semantics refers to the meaning of each section of bits.
3. Timing. The term timing refers to two characteristics: when data should be sent and how
fast they can be sent.

ii

Chapter 4
TRANSMISSION MEDIUM
A transmission medium can be broadly defined as anything that can carry information from a
source to a destination. For example, the transmission medium for two people having a dinner
conversation is the air. The air can also be used to convey the message in a smoke signal or
semaphore. For a written message, the transmission medium might be a mail carrier, a truck, or
an airplane.
In data communications the definition of the information and the transmission medium is more
specific. The transmission medium is usually free space, metallic cable, or fiber-optic cable. The
information is usually a signal that is the result of a conversion of data from another form.

Figure 4.1 Transmission Media category

4.1 GUIDED MEDIA


Guided media, which are those that provide a conduit from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable.

ii

Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals
in the form of electric current. Optical fiber is a cable that accepts and transports signals in the
form of light.
4.1.1 Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together.

Figure 4.1.1 Twisted Pair cable


One of the wires is used to carry signals to the receiver, and the other is used only as a ground
reference. The receiver uses the difference between the two. In addition to the signal sent by the
sender on one of the wires, interference (noise) and crosstalk may affect both wires and create
unwanted signals.

Unshielded Versus Shielded Twisted-Pair Cable


UTP : It is the most common type of telecommunication when compared with Shielded Twisted
Pair Cable which consists of two conductors usually copper, each with its own colour plastic
insulator. Identification is the reason behind coloured plastic insulation.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11 connector and 4
pair cable useRJ-45 connector.
Advantages :

Installation is easy

ii

Flexible

Cheap

It has high speed capacity,

100 meter limit

Higher grades of UTP are used in LAN technologies like Ethernet.

Disadvantages :

Bandwidth is low when compared with Coaxial Cable

Provides less protection from interference.

STP : This cable has a metal foil or braided-mesh covering which encases each pair of insulated
conductors. Electromagnetic noise penetration is prevented by metal casing. Shielding also
eliminates crosstalk.
It has same attenuation as unshielded twisted pair. It is faster the unshielded and coaxial cable. It
is more expensive than coaxial and unshielded twisted pair.
Advantages :

Easy to install

Performance is adequate

Can be used for Analog or Digital transmission

Increases the signalling rate

Higher capacity than unshielded twisted pair

ii

Eliminates crosstalk

Disadvantages :

Difficult to manufacture

Heavy

Figure 4.1.1 STP & UTP


4.1.2 COAXIAL CABLE
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twistedpair cable,
in part because the two media are constructed quite differently. Instead of having two wires, coax
has a central core conductor of solid or stranded wire (usually copper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a combination of
the two. The outer metallic wrapping serves both as a shield against noise and as the second
conductor, which completes the circuit. This outer conductor is also enclosed in an insulating
sheath, and the whole cable is protected by a plastic cover.

ii

Figure 4.1.2 Coaxial Cable


Advantages :

Bandwidth is high

Used in long distance telephone lines.

Transmits digital signals at a very high rate of 10Mbps.

Much higher noise immunity

Data transmission without distortion.

The can span to longer distance at higher speeds as they have better shielding when
compared to twisted pair cable.

Disadvantages :

Single cable failure can fail the entire network.

Difficult to install and expensive when compared with twisted pair.

ii

If the shield is imperfect, it can lead to grounded loop.

4.1.3 Fiber-Optic Cable


A fiber-optic cable is made of glass or plastic and transmits signals in the form of light. Light
travels in a straight line as long as it is moving through a single uniform substance. If a ray
oflight traveling through one substance suddenly enters another substance (of a different
density), the ray changes direction.

Figure 4.1.3 Fibre optic cable

Propagation Modes

ii

Current technology supports two modes (multimode and single mode) for propagating light
along optical channels, each requiring fiber with different physical characteristics. Multimode
can be implemented in two forms: step-index or graded-index.

Multimode :
Multimode is so named because multiple beams from a light source move through the core in
different paths. In multimode step-index fiber, the density of the core remains constant from the
center to the edges. A beam of light moves through this constant density in a straight line until it
reaches the interface of the core and the cladding. At the interface, there is an abrupt change due
to a lower density; this alters the angle of the beam's motion.

Single mode :
Single-mode uses step-index fiber and a highly focused source of light that limits beams to a
small range of angles, all close to the horizontal. The singlemode fiber itself is manufactured
with a much smaller diameter than that of multimode fiber, and with substantiallY lower density
(index of refraction). The decrease in density results in a critical angle that is close enough to 90
to make the propagation of beams almost horizontal.
Advantages :
1. Higher bandwidth
2. Less signal
3. Immunity to electromagnetic interference.
ii

4. Resistance to corrosive materials.


5. Light weight.
6. Greater immunity to tapping
Disadvantages :
1. Installation and maintenance
2. Unidirectional light propagation.
3. Cost.

4.2 UNGUIDED MEDIA: WIRELESS


Unguided media transport electromagnetic waves without using a physical conductor. This type
of communication is often referred to as wireless communication. Signals are normally broadcast
through free space and thus are available to anyone who has a device capable of receiving them.
4.2.1 Radio Waves
Although there is no clear-cut demarcation between radio waves and microwaves,
electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called
radio waves. Radio waves, for the most part, are omnidirectional. When an antenna transmits
radio waves, they are propagated in all directions. This means that the sending and receiving
antennas do not have to be aligned.
4.2.2 Microwaves
Electromagnetic waves having frequencies between I and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwave waves, they can be
narrowly focused. This means that the sending and receiving antennas need to be aligned. The
unidirectional property has an obvious advantage.
4.2.3 Infrared waves
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770
nm), can be used for short-range communication. Infrared waves, having high frequencies,
cannot penetrate walls. This advantageous characteristic prevents interference between one
system and another; a short-range communication system in one room cannot be affected by

ii

another system in the next room. When we use our infrared remote control, we do not interfere
with the use of the remote by our neighbors.

Chapter 5
NETWORK MODELS

ii

There are two important reference models :


1. OSI reference model.
2. TCP/IP reference model.

5.1 OSI Reference Model


An ISO standard that covers all aspects of network communications is the Open Systems
Interconnection model. It was first introduced in the late 1970s. An open system is a set of
protocols that allows any two different systems to communicate regardless of their underlying
architecture.
The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware and
software.

Figure 5.1 OSI Model


Layered Architecture

ii

The OSI model is composed ofseven ordered layers: physical (layer 1), data link (layer 2),
network (layer 3), transport (layer 4), session (layer 5), presentation (layer 6), and application
(layer 7). The layers involved when a message is sent from device A to device B. As the message
travels from A to B, it may pass through many intermediate nodes. These intermediate nodes
usually involve only the first three layers of the OSI model.
Peer-to-Peer Processes
At the physical layer, communication is direct. Device A sends a stream of bits to device B
(through intermediate nodes). At the higher layers, however, communication must move down
through the layers on device A, over to device B, and then back up through the layers.
Functions of each layers :
1. PHYSICAL LAYER : This layer is responsible for the movement of individual bits form
one node to the next.
The physical layer is also concerned with :
1. Physical Characteristics of interfaces and medium.
2. Representation of bits.
3. Data rate.
4. Synchronization of bits.
5. Transmission mode.
2. DATA LINK LAYER : The data link layer transforms the physical layer, a raw
transmission facility, to a reliable link. It makes the physical layer appear error-free to the
upper layer.
Other responsibilities of the data link layer include the following:

ii

7. Framing.
8. Physical addressing.
9. Flow control.
10. Error control.
3. NETWORK LAYER : The network layer is responsible for the source-to-destination
delivery of a packet, possibly across multiple networks (links). Whereas the data link
layer oversees the delivery of the packet between two systems on the same network
(links), the network layer ensures that each packet gets from its point of origin to its final
destination.
Other responsibilities of the network layer include the following:
11. Logical addressing.
12. Routing.
4. TRANSPORT LAYER : The transport layer is responsible for process-to-process delivery
of the entire message. The transport layer ensures that the whole message arrives intact
and in order, overseeing both error control and flow control at the source-to-destination
level.
Other responsibilities of the transport layer include the following:
1. Service point addressing.
2. Segmentation and reassembly.
3. Connection control.
4. Flow control.
5. Error control.
ii

5. SESSION LAYER: The session layer is the network dialog controller. It establishes,
maintains, and synchronizes the interaction among communicating systems.
Other responsibilities of the session layer include the following:
1. Dialog control.
2. Synchronization.
6. PRESENTATION LAYER : The presentation layer is concerned with the syntax and
semantics of the information exchanged between two systems.
Other responsibilities of the presentation layer include the following:
1. Translation.
2. Encryption.
3. Compression.
7. APPLICATION LAYER : The application layer enables the user, whether human or
software, to access the network. It provides user interfaces and support for services such
as electronic mail, remote file access and transfer, shared database management, and
other types of distributed information services.
Other responsibilities of the application layer include the following:
1. Network virtual terminal.
2. File transfer, access and management.
3. Mail services.
4. Directory services.

5.2 TCP/IP Reference Model :


ii

TCP/IP means transmission control protocol and internet protocol. Protocols are set of rules
which govern every possible communication over the internet. These protocols describe the
movement of data between the host computers or internet. These offer simple naming and
addressing schemes.
TCP/IP that is transmission control protocol and the internet protocol was developed by
Department of Defences Project Research Agency (ARPA, later DARPA) under the project of
network interconnection.

Figure 5.2 TCP/IP Model


Functions of different layers :
1. HOST-TO-NETWORK LAYER:
1. Lowest layer of the all.
2. Protocol is used to connect the host, so that the packets can be sent over it.
ii

3. Varies host to host and network to network.


2. INTERNET LAYER :
1. Selection of a packet switching network which is based on a connectionless
internetwork layer is called a internet layer.
2. It the layer which holds the whole architecture together.
3. It allows the host to insert the packets.
4. It helps the packet to travel independently to the destination.
5. Order in which packets are received is different from the way they are sent.
3. TRANSPORT LAYER :
1. It decides if data transmission should be on parallel path or single path.
2. Functions such as multiplexing, segmenting or splitting on the data done by layer
four that is transport layer.
4. APPLICATION LAYER :
1. Protocols used in this layer are high level protocols such as TELNET, FTP (file
transfer protocol etc).

ii

SITE TRAINING :

1. METRO BHAWAN
2. SARAI METRO STATION

ii

3. MEWLA MAHARAJPUR METRO STATION


4. NEELAM CHOWK AJRONDA METRO STATION
5. SHASTRI PARK OPERATION CONTROL CENTER (OCC)
6. DMRC SITE VISHWAVIDALAYA METRO STATION

SITE 1.
METRO BHAWAN

ii

Figure 6.1 Metro Bhawan

Internet Service Provider :


It refers to a company that provides Internet services, including personal and business access to
the Internet. For a monthly fee, the service provider usually provides a software
package, username, password and access phone number. Equipped with a modem, you can
then log on to the Internet and browse the World Wide Web and USENET, and send and
receive e-mail. For broadband access you typically receive the broadband modem hardware or
pay a monthly fee for this equipment that is added to your ISP account billing.
Airtel provides Fibernet plans of 75 Mbps data line to Delhi Metro bhawan.

ii

How connectivity is done in metro bhawan :

8
7
6
5

ERP SERVER

75 Mbps

Leased Line

TER

G
Metro Bhawan
Connectivity

How connectivity to Metro Bhawan is made


ii

Airtel Box
75 Mbps
Leased
Line

ISP

Router

Firewall

Switch

ii

Fortinet Firewall
Worlds Fastest Firewall : management included
Firewall technologies from Fortinet offer integrated, high-performance protection against today's
wide range of threats targeting your applications, data, and users. In recent massive-scale, realworld testing, the FortiGate 5140B achieved 500 Gbps+ of actual application traffic, making it
the world's fastest firewall.
The FortiGate easily handled 559 Gbps of UDP traffic and 526 Gbps of real-world traffic from
applications such as Facebook, Pandora radio and AOL Instant Messenger. The FortiGate-5140B
performed at speeds three times faster than any competitors' published results. Putting this
performance in context, the FortiGate-5140B can inspect 10,000 iTunes songs every second or
36 Million songs per hour and 228,000 Web pages every second or 821 million pages per hour.
Fortinets High-performance firewall technology is available across the FortiGate family
portfolio, enabled by a combination of Forti ASIC-accelerated stateful inspection processors,
along with and an arsenal of integrated application security engines to quickly identify and block
complex threats.

In Metro Bhawan where firewall is set up there are always 2 Firewall device for

safety and redundancy.


It is used for load sharing.
One is active and another is passive.

Firewall policies:
Firewalls are typically categorized as either Network or Host: a Network Firewall is most
often an appliance attached to a network for the purpose of controlling access to single or
multiple hosts, or subnets; a Host Firewall is most often an application that addresses an
individual host (e.g., personal computer) separately. Both types of firewalls (Network and Host)
can be and often are used jointly.

ii

This policy statement is designed to:

Provide guidance on when firewalls are required or recommended. A Network Firewall is


required in all instances where Sensitive Data is stored or processed; a Host Firewall is
required in all instances where Sensitive Data is stored or processed and the operating
environment supports the implementation. Both the Network and Host Firewalls afford
protection to the same operating environment, and the redundancy of controls (two
separate and distinct firewalls) provides additional security in the event of a compromise
or failure.

Raise awareness on the importance of a properly configured (installed and maintained)


firewall.

Router :
Routers take information that arrives through your broadband signal via a modem, decipher it, and
deliver it to your computer. The router will also choose the best route for the data packet so that you
receive the information quickly.

Router to router configuration :


For home and small business networks, there is sometimes a need to expand network capacity.
Maybe you are adding more computers or other network devices to your office, or perhaps you
would like to improve wireless reception in your basement. A simple way to expand your
network capacity is to connect another router to your current network, expanding the ports
available and the wireless range if your routers are wireless-enabled.
Configuring a Simple Firewall router to firewall
The Cisco 1800 integrated services routers support network traffic filtering by means of access
lists. The router also supports packet inspection and dynamic temporary access lists by means of
Context-Based Access Control (CBAC).

ii

Basic traffic filtering is limited to configured access list implementations that examine packets at
the network layer or, at most, the transport layer, permitting or denying the passage of each
packet through the firewall. However, the use of inspection rules in CBAC allows the creation
and use of dynamic temporary access lists. These dynamic lists allow temporary openings in the
configured access lists at firewall interfaces. These openings are created when traffic for a
specified user session exits the internal network through the firewall. The openings allow
returning traffic for the specified session (that would normally be blocked) back through the
firewall.
Router with firewall configured : Cisco router with Fortinet firewall

Figure 6.1.3
1 - Multiple networked devicesDesktops, laptop PCs, switches
2 - Fast Ethernet LAN interface (the inside interface for NAT)
3 - PPPoE or PPPoA client and firewall implementationCisco 1811/1812 or Cisco
1801/1802/1803 series integrated services router, respectively
4 - Point at which NAT occurs
5 - Protected network
6 - Unprotected network

ii

7 - Fast Ethernet or ATM WAN interface (the outside interface for NAT)

Switch
In a telecommunications network, a switch is a device that channels incoming data from any of
multiple input ports to the specific output port that will take the data toward its intended
destination.

A Switch
Figure 6.1.4
In the traditional circuit-switched telephone network, one or more switches are used to set up a
dedicated though temporary connection or circuit for an exchange between two or more parties.
On an Ethernet local area network (LAN), a switch determines from the physical device (Media
Access Control or MAC) address in each incoming message frame which output port to forward
it to and out of. In a wide area packet-switched network such as the Internet, a switch determines
from the IP address in each packet which output port to use for the next part of its trip to the
intended destination.
In the Open Systems Interconnection (OSI) communications model, a switch performs the Layer
2 or Data-link layer function. It simply looks at each packet or data unit and determines from a
physical address (the "MAC address") which device a data unit is intended for and switches it
out toward that device.
In the simplest networks, a switch is not required for messages that are sent and received within
the network.

ii

Circuit-Switching versus Packet-Switching


A network's paths can be used exclusively for a certain duration by two or more parties and then
switched for use to another set of parties. This type of "switching" is known as circuit-switching
Using packet-switching, all network users can share the same paths at the same time and the
particular route a data unit travels can be varied as conditions change. In packet-switching,
a message is divided into packets, which are units of a certain number of bytes.
OCC OPERATION CONTROL CENTRE
1. Delhi metro bhawan
2. Shastri park
Both have a TER unit. TER unit provides the port address. Occ of Metro bhawan will set up
their fibernets from their port which TER provides and connect it to the port of Shastri parks
metro station. The data transmitted on this is of 100 Mbps.
Occ of shastri park holds line1, line 2, line3/4 while occ of metro bhawan holds the lines 5 and 6.
ESP is located on the 4th floor of metro bhawan. This server room connects the LAN networks to
all the other floors with racks(racks contain 2-3 hubs in it). 3 layer connectivity is present to
reduce the redundancy.
IPS : INTRUSION PREVENTION SYSTEM
Intrusion prevention systems (IPS), also known as intrusion detection and prevention
systems (IDPS), are network security appliances that monitor network and/or system activities
for malicious activity. The main functions of intrusion prevention systems are to identify
malicious activity, log information about this activity, attempt to block/stop it, and report it.
Intrusion prevention systems are considered extensions of intrusion detection systems because
they both monitor network traffic and/or system activities for malicious activity. The main
differences are, unlike intrusion detection systems, intrusion prevention systems are placed inline and are able to actively prevent/block intrusions that are detected. More specifically, IPS can

ii

take such actions as sending an alarm, dropping the malicious packets, resetting the connection
and/or blocking the traffic from the offending IP address.

Site 2
Sarai Metro Station

Each metro station has a control room where a leased line of required bandwidth is given

to the station by the ISP.


There are two important rooms in metro station
SCR-Station Controller Room
SMR- Station Manager Room

There are 13 points where the computer has to be used.


It starts with D1-D13.
Each room has a phase plate labelling D1 to D13

Labellin
g

Gang
Box

Figure 6.2.1
All are connected via CAT 6 Cable.

ii

How Networking is done in Sarai metro station.

FIBCOM
FORTINET
FIREWALLS

ROUTER
ETC

ii

Scanning the Network Cable using Pentascanner

POWE
R

CAT
6

Figure 6.2.3

It checks the total cable length of CAT 5/6 Cables.


ii

It checks any fault in between the cables.


It also checks any cross over connection.

Site 3
Mewla Maharajpur Metro Station

Here we learned how to Punch RJ45 socket into CAT 5 cables.


Step 1: The following items are required.

CAT 6
Crimping
Tool

Figure 6.3.1
In order to successfully terminate your Cat 5 cable, wwill need:
Cat 6 cable
8P8C (8 pin 8 contact) connectors - (these are also referred to as "RJ45" connectors)

ii

A modular connector crimping tool


Wire cutters/strippers (may not be needed depending on crimping tool)
Step 2: cut the wire
Step 3: Put the strands in order

Figure 6.3.2
There are two orders the colored strands can be put into before inserting them into the connector.
Both standards: T568A (A) and T568B (B) work equally well. One cable using the A standard
can also be connected to another using the B standard and the system will work fine, but it is
important that both ends of the same cable are terminated using the same standard. The colour
order for each specification is illustrated in the second picture. Get the wires into the correct
order for whichever standard you are using, and flatten them out in order. If you have difficulty
getting the wires in the right order, keep trying. It can be done.

Step 4:
ii

Figure 6.3.3
Perhaps the hardest part of terminating a Cat 5 cable is inserting the cable into the connector
while keeping the strands in the right order. Once the strands are in order, insert them into the
connector. Once they're in, check to make sure they're in the correct order by color. Then, push
the cable into the connector so the strands go all the way to the front.
Step 5:

Using Crimping tool


Figure 6.3.4
Insert the connector into the crimping tool and use your big muscles to squeeze the handles until
it's crimped. () If your tool ratchets, you'll know it's done when the ratchet releases. If not, just
squeeze nice and hard to make sure you get it tight. Congrats, you just terminated a Cat 5 cable!
If you need to terminate both ends (as you likely will), repeat the steps in this Instructable,
making sure you use the same order of wires (specification) that you used for the first end.

DCOS
Store
building

DCC and S&T


ii

ETU
Workshop
building

Connectivity to each building in the depot

There are five buildings in the depot.


The buildings are connected to each other via fiber optics cables.
The topology is used is star and ring topology.
Inside the building they are connected via CAT 6 cables to each other.

Site 5
Operations Control Centre (OCC) Shastri Park

ii

Hard
Disk

Backup
Library

Train
Micro

Manag
er

Serv
er

Stora
ge

Figure 6.5.1

In Shastri Park OCC the database server and ERP servers are kept.
SAP ERP is enterprise resource planning software developed

by the

German

company SAP SE. SAP ERP incorporates the key business functions of an organization.

The latest version (SAP ERP 6.0) was made available in 2006.
ERP servers are used in:ii

HR module
Finance
Rolling Stock Module

Servers
ERP Module

Production
Quality
Development

(end users)
(for code properly implemented)
(For developers)

RAID Server
RAID (originally redundant array of inexpensive disks; now commonly redundant array of
independent disks) is a data storage virtualization technology that combines multiple disk drive
components into a single logical unit for the purposes of data redundancy or performance
improvement.
Data is distributed across the drives in one of several ways, referred to as RAID levels,
depending on the specific level of redundancy and performance required. The different schemes
or architectures are named by the word RAID followed by a number (e.g. RAID 0, RAID 1).
Each scheme provides a different balance between the key goals: reliability, availability,
performance, and capacity. RAID levels greater than RAID 0 provide protection against
unrecoverable (sector) read errors, as well as whole disk failure.

ii

ii

ii

Figure 6.5.2

Site 5
DMRC Site Office Khyber Pass
2 MBPS leased line from Tata.
SAP management is used here.
The basic purpose of this site is for managing finance and other task.

IT Rack

CAT
6
ii
Power

Tata

Figure 6.6 How Connectivity is done

Chapter 7

CONCLUSION
Computer network and communication are expanding rapidly. Networking is a never ending
field of computer field. Lots of new technology are emerging which are making the scenario
more complex and faster for user to access.
Each and every day making sharing of information trillion times better before they exists. Mobile
computing and is now getting edgier by the day. New technologies are being implemented, tested
and apply in mobile computing making us and the future another step closer. The internet is also
getting better along the lines of the information age. Meanwhile, types of network available for
us adding it on top of making computer networks and communications the new mans best
friend.
ii

ii

Você também pode gostar