SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
DATA COMMUNICATION AND
COMPUTER NETWORK
Proof of Concept document
SEPTEMBER 22, 2014
B.SARAVANA PRASANTH
IT 14237300
Lecturer In-Charge Signature
IT14237300 1
Table of Contents
INTRODUCTION.......................................................................................................................................2
DIAGRAM ................................................................................................................................................3
HIGHLEVEL DIAGRAM .............................................................................................................................3
SMALL..................................................................................................................................................6
DATA CENTER-SRILANKA.....................................................................................................................7
DATA RECOVERY-SWITZERLAND.........................................................................................................8
PSTN..................................................................................................................................................12
DEVICES.................................................................................................................................................14
ROUTER.............................................................................................................................................14
PERIMETER FIREWALL.......................................................................................................................14
INTERNAL FIREWALL .........................................................................................................................15
SWITCH..............................................................................................................................................16
SERVERS ............................................................................................................................................17
PROXY SERVER ..............................................................................................................................17
WEB SERVER..................................................................................................................................17
FILE SERVER...................................................................................................................................18
MAIL SERVER.................................................................................................................................18
DATA BASE SERVER.......................................................................................................................19
INTERNET SERVICE PROVIDERS.............................................................................................................20
IT14237300 2
INTRODUCTION
The rise of information technology very helpful to the humans daily to day life.
From that they can exchange their data’s, views and ideas from one end to
another end of the world.
The aim of this project was to create a design for a global organization, to
communicate with their branches threw the networking systems.
This project presents the design for the networking diagram, which includes
the following components:
The networking diagram, products, products details, protection.
A description of the design and an analysis of operational will give the finalized
networking diagram. Finally it will be very cost effective and very safety to
communicate with their branches.
IT14237300 3
DIAGRAM
HIGHLEVEL DIAGRAM
Figure 01: It Describes About the Connection between DC, DR and Branches
Figure 01
TYPES OF BRANCHES
1. LARGE
• It contains which branches having more than 40 Employees.
Large= (Branch Employees>40)
2. MEDIUM
• It contains which branches having more than 30 Employees.
Medium= (Branch Employees>30)
3. SMALL
• It contains which branches having less than 40 Employees.
Small= (Branch Employees<40)
IT14237300 4
LARGE
Figure 02: It Describes About How The Large Level Branches Connected With The Data Center And
Data Recovery Center.
Figure 02
IT14237300 5
MEDIUM
Figure 03: It Describes About How the Medium Level Branches Connected With the Data Center And
Data Recovery Center.
Figure 03
IT14237300 6
SMALL
Figure 04: It Describes About How the Large Level Branches Connected With The Data Center And
Data Recovery Center.
Figure 04
The reason for having single internet service providers in the branches of small diagram is for
redundancy purpose.in these branches they are having small amount of employees and then if
we add another internet service provider. We want to spend more money to get service
providers and devices. In these kind of small branches they no need to have multiple amount of
service providers.
IT14237300 7
DATA CENTER-SRILANKA
Figure 05: It Describes About How The Data Center Connected With Their Employees.
Figure 05
In this data center there are 200 employees are working in here. From that I divided into four
main departments.
• DEPARTMENT 01=50 employees
• DEPARTMENT 02=50 employees
• DEPARTMENT 03=50 employees
• DEPARTMENT 04=50 employees
IT14237300 8
DATA RECOVERY-SWITZERLAND
Figure 06: It Describes About How The Data Recovery Center Connected With Their Employees.
Figure 06
There are 150 employees working in data recovery center. From this I divided into four main
departments.
• DEPARTMENT 01=50 employees
• DEPARTMENT 02=50 employees
• DEPARTMENT 03=25 employees
• DEPARTMENT 04=25 employees
IT14237300 9
DMZ (Demilitarized Zone)
In Computer Networking, a DMZ or Demilitarized Zone (Referred To As A Perimeter Network). Is A
Physical or Logical Network That Contains and Exposes an Organization’s External-Facing Services to
A Large and Untrusted Network, Usually the Internet. The Purpose of a DMZ Is To Add an Additional
Layer of Security to an Organization’s Local Area Network (LAN); an External Attacker Only Has
Direct Access to Equipment in the DMZ, Rather Than Any Other Part Of The Network.
Figure 07: It describes about the internal architecture in the Demilitarized Zone (DMZ).
Figure 07
IT14237300 10
A server farm [SF]
A server farm or server cluster is a collection of computer servers usually maintained by an
organizations to accomplish server needs far beyond the capability of one machine. Server farms
often consist of thousands of computers which require a large amount of power to run and keep
cool. At the optimum performance level, a server farm has enormous costs associated with it, both
financially and environmentally. Server farms often have backup servers, which can take over the
function of primary servers in the event of a primary server failure.
Figure 08: It describes about the internal architecture in the Server Farm (SF).
Figure 08
IT14237300 11
SERVER FARM IN BRANCHES [SFB]
In branches side we connecting the Proxy Server and the Mail Server to the perimeter Fire wall for
that we contract a layer called Server Farm in Branch’s.
Figure 09: In this diagram it describes about the how the Server Farm in the Branch’s working.
Figure 09
IT14237300 12
PSTN
Figure 10: It describes about the how the PSTN’s working in the organization.
Figure 10
IT14237300 13
PSTN IN THE ORGANIZATION
Figure 11: It describes about how maybe the connection between the DC , DR and Branches through
the PSTN.
Figure 11
IT14237300 14
DEVICES
ROUTER
• Usage: Router is a network device. It forwards data packets between
computer networks. Router send the data packets for correct destination it
determine the routing table or routing policy.
Figure 12: It Describes About What Kind of Router’s Are Using for Construct This Network.
And Reason For Using That Specific Router.
MODEL PLACE RESON
cisco 1800 series
integrated service
routers
In Branches It’s End of Life Is More Than Five
Years.
cisco ASR 1003 Series
Aggregation Services
Router
In Data Center And Data Recovery It’s End of Life Is More Than Five
Years.
PERIMETER FIREWALL
• Usage: Perimeter firewall basically used in DMZ (demilitarized network). Which is
used to establish a barrier between a trusted, secure internal network and another
network (e.g. - the Internet).
Figure 13: It Describes About What Kind of Perimeter Firewall’s Are Using for Construct This
Network. And Reason For Using That Specific Firewall.
MODEL PLACE RESON
Cisco ASA 5500-X
Series Next-Generation
Firewalls
Data Center And Data Recovery
Center
It’s End of Life Is More Than Five
Years.
Figure 13
Figure 12
IT14237300 15
INTERNAL FIREWALL
Usage: The Internal Firewall which establishes a barrier between a trusted, secure external network
and internal network.
Figure 14: It Describes About What Kind of Internal Firewall’s Are Using for Construct This Network.
And Reason For Using That Specific Firewall.
MODEL PLACE RESON
Juniper SRX110 Data Center, Data Recovery
Center and Branches.
It’s End of Life Is More Than Five
Years.
Figure 14
The reason for using two different firewalls in the networking is:
In this diagram it have permitted firewall and internal firewalls. Permitted firewall is Cisco and
internal firewall is Juniper .The reason for two different fire wall is; the Cisco firewall is having a
different architecture and Juniper firewall is having a different kind of architecture. So if hackers
easily can’t access in our Systems. For that security purpose we are using different kind of firewalls.
The reason for using only internal firewall in branches is:
If we had the internal and permitted both firewalls our working speed may be low. That’s why we
using the internal firewall only to the branches.
IT14237300 16
SWITCH
Usage: The Switch is a computer networking device. That is used to connect devices together on a
computer network. It using a form of packet switching to forward data to destination device.
Figure 15: It Describes About What Kind of Switch’s Are Using for Construct This Network. And
Reason For Using That Specific Switch.
MODEL PLACE RESON
Cisco Catalyst 3850 Series
Switches
In DR and DC’s Access Layers It’s End of Life Is More Than Five
Years.
And also it have 48 ports to
connect the machines In DC and
DR, so it useful for redundancy.
Cisco Nexus 7000 4-Slot Switch In DMZ in DC and DR’s. It’s End of Life Is More Than Five
Years.
And also it have 4 ports to
connect the servers, so it useful
for redundancy.
Cisco Nexus 7000 9-Slot Switch In Server farm in DC and DR’s It’s End of Life Is More Than Five
Years.
And also it have 9 ports to
connect the servers, so it useful
for redundancy.
Cisco Nexus 7000 9-Slot Switch In DR and DC’s Distribution layer It’s End of Life Is More Than Five
Years.
And also it have 9 ports to
connect the servers, so it useful
for redundancy.
Figure 15
IT14237300 17
SERVERS
PROXY SERVER
In computer networks, a proxy server is a server (a computer system or an application) that acts as
an intermediary for requests from clients seeking resources from other servers. A client connects to
the proxy server, requesting some service, such as a file, connection, web page, or other resource
available from a different server and the proxy server evaluates the request as a way to simplify and
control its complexity. Proxies were invented to add structure and encapsulation to distributed
systems
Figure 16: It Describes About What Kind Proxy Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
WEB SERVER
The term web server, also written as Web server, can refer to either the hardware (the computer) or
the software (the computer application) that helps to deliver web content that can be accessed
through the Internet.
The most common use of web servers is to host websites, but there are other uses such as gaming,
data storage, running enterprise applications, handling email, FTP, or other web uses.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than
Five Years.
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than
Five Years.
HP 9000 Legacy Servers In Server Farms of Branches
[SFB] in Branches.
It’s End of Life Is More Than
Five Years.
Figure 16
IT14237300 18
Figure 16: It Describes About What Kind Web Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five
Years.
FILE SERVER
In computing, a file server is a computer attached to a network that has the primary purpose of
providing a location for shared disk access, i.e. shared storage of computer files (such as documents,
sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations
that are attached to the same computer network. The term server highlights the role of the machine
in the client–server scheme, where the clients are the workstations using the storage. A file server is
not intended to perform computational tasks, and does not run programs on behalf of its clients. It is
designed primarily to enable the storage and retrieval of data while the computation is carried out
by the workstations.
Figure 17: It Describes About What Kind Web Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
Figure 17
MODEL PLACE RESON
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than Five
Years.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR
{Front End Mail Server}
It’s End of Life Is More Than
Five Years.
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.{Back End Mail Server}
It’s End of Life Is More Than
Five Years.
Figure 16
MAIL SERVER
Figure 18: It Describes About What Kind Mail Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than
Five Years.
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than
Five Years.
HP 9000 Legacy Servers In Server Farms of Branches
[SFB] in Branches.
It’s End of Life Is More Than
Five Years.
IT14237300 19
Figure 18
DATA BASE SERVER
Figure 19: It Describes About What Kind of Data Base Server Servers are using for Construct This
Network. And Reason for Using That Specific Server.
Figure 19
HP 9000 Legacy Servers In Server Farms of Branches
[SFB] in Branches.
{Mail server}
It’s End of Life Is More Than
Five Years.
MODEL PLACE RESON
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than Five
Years.
IT14237300 20
INTERNET SERVICE PROVIDERS
Figure 20: It describes about the internet service provider’s and PSTN provider’s in these countries.
COUNTRY INTERNET PSTN
SRILANKA DIALOG Airtel
SLT Etisalat
SWITZERLAND SWISSCOM-SSC Orange
SUNRISE-SUN UPC Cablecom- UPC
England BT Group-BT Vodafone-VOD
Sky Broadband-SKY Hutchison 3 -HUTCH
India BSNL TATA DOCOMO- TATA
Airtel Reliance Communications- REL
Japan ASAHI net SoftBank - SOFT
SO-Net au
Bangladesh AB Network Limited-AB
Grameenphone-GRAM
Aftab It Limited- AFTAB Airtel
Australia AAR Net-AAR Vodafone-VF
BIG Air-BIG Optus
China MSN China-MSN China mobile- MOBILE
China Telecom-Tel China Unicom-UNI
IT14237300 21
COUNTRY INTERNET PSTN
United States of America (USA) Windstream-WIND Skyriver-S/RIVER
Russia City line-CITY Beeline-BEE
South Africa Afrihost-AFRI Telkom-T/KOM
Canada Gemstelecom-GEM Shaw
Figure 20
IT14237300 22

Más contenido relacionado

Destacado

Data Communication And Networking
Data Communication And NetworkingData Communication And Networking
Data Communication And NetworkingGanesh Meghale
 
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Ahmed El-Arabawy
 
CCNA_Data Communication and Computer Networking
CCNA_Data  Communication and Computer Networking CCNA_Data  Communication and Computer Networking
CCNA_Data Communication and Computer Networking Tariqul Islam Shohag
 
Computer networks 1
Computer networks 1Computer networks 1
Computer networks 1Vijaya Babu
 
Digital Image Processing (Lab 08)
Digital Image Processing (Lab 08)Digital Image Processing (Lab 08)
Digital Image Processing (Lab 08)Moe Moe Myint
 
Managing effective communication network in organisation through diplomacy
Managing effective communication network in organisation through diplomacyManaging effective communication network in organisation through diplomacy
Managing effective communication network in organisation through diplomacyAquatix Pharma
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Lect 02 first portion
Lect 02   first portionLect 02   first portion
Lect 02 first portionMoe Moe Myint
 
Lect 03 - first portion
Lect 03 - first portionLect 03 - first portion
Lect 03 - first portionMoe Moe Myint
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Lect 02 second portion
Lect 02  second portionLect 02  second portion
Lect 02 second portionMoe Moe Myint
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Chapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsChapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsasodariyabhavesh
 
Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)Moe Moe Myint
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01 Sehrish Rafiq
 
Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2NANDINI SHARMA
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab FileNitin Bhasin
 

Destacado (20)

Data Communication And Networking
Data Communication And NetworkingData Communication And Networking
Data Communication And Networking
 
Data Communication & Networking
Data Communication & Networking Data Communication & Networking
Data Communication & Networking
 
Network
NetworkNetwork
Network
 
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts) Course 102: Lecture 20: Networking In Linux (Basic Concepts)
Course 102: Lecture 20: Networking In Linux (Basic Concepts)
 
CCNA_Data Communication and Computer Networking
CCNA_Data  Communication and Computer Networking CCNA_Data  Communication and Computer Networking
CCNA_Data Communication and Computer Networking
 
Computer networks 1
Computer networks 1Computer networks 1
Computer networks 1
 
Digital Image Processing (Lab 08)
Digital Image Processing (Lab 08)Digital Image Processing (Lab 08)
Digital Image Processing (Lab 08)
 
Managing effective communication network in organisation through diplomacy
Managing effective communication network in organisation through diplomacyManaging effective communication network in organisation through diplomacy
Managing effective communication network in organisation through diplomacy
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Lect 02 first portion
Lect 02   first portionLect 02   first portion
Lect 02 first portion
 
Lect 03 - first portion
Lect 03 - first portionLect 03 - first portion
Lect 03 - first portion
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
Lect 02 second portion
Lect 02  second portionLect 02  second portion
Lect 02 second portion
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Chapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woodsChapter 1 and 2 gonzalez and woods
Chapter 1 and 2 gonzalez and woods
 
Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
 

Similar a DATA COMMUNICATION AND NETWORKING

Vmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperVmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperCloudSyntrix
 
VMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WPVMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WPStephen Fenton
 
Vmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paperVmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paperCloudSyntrix
 
Juniper: Data Center Evolution
Juniper: Data Center EvolutionJuniper: Data Center Evolution
Juniper: Data Center EvolutionTechnologyBIZ
 
Network management (HND in Networking)
Network management (HND in Networking)Network management (HND in Networking)
Network management (HND in Networking)L.Naresh Naresh
 
Deploying OpenStack Private Cloud on NEC DX1000 MicroServer Chassis
Deploying OpenStack Private Cloud on NEC DX1000 MicroServer ChassisDeploying OpenStack Private Cloud on NEC DX1000 MicroServer Chassis
Deploying OpenStack Private Cloud on NEC DX1000 MicroServer ChassisPrincipled Technologies
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudJohn Atchison
 
193734Researchproejct
193734Researchproejct193734Researchproejct
193734ResearchproejctRachael Marsh
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
HCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCL Technologies
 
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxAdvanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxService Solutions Pvt. Ltd. (SSL)
 

Similar a DATA COMMUNICATION AND NETWORKING (20)

Vmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paperVmware nsx network virtualization platform white paper
Vmware nsx network virtualization platform white paper
 
VMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WPVMware-NSX-Network-Virtualization-Platform-WP
VMware-NSX-Network-Virtualization-Platform-WP
 
Vmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paperVmware nsx-network-virtualization-platform-white-paper
Vmware nsx-network-virtualization-platform-white-paper
 
Juniper: Data Center Evolution
Juniper: Data Center EvolutionJuniper: Data Center Evolution
Juniper: Data Center Evolution
 
Network management (HND in Networking)
Network management (HND in Networking)Network management (HND in Networking)
Network management (HND in Networking)
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Training report - ITSMS Pvt Ltd.
Training report - ITSMS Pvt Ltd.Training report - ITSMS Pvt Ltd.
Training report - ITSMS Pvt Ltd.
 
En35793797
En35793797En35793797
En35793797
 
Seminor Documentation
Seminor DocumentationSeminor Documentation
Seminor Documentation
 
Deploying OpenStack Private Cloud on NEC DX1000 MicroServer Chassis
Deploying OpenStack Private Cloud on NEC DX1000 MicroServer ChassisDeploying OpenStack Private Cloud on NEC DX1000 MicroServer Chassis
Deploying OpenStack Private Cloud on NEC DX1000 MicroServer Chassis
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
 
2000330 en
2000330 en2000330 en
2000330 en
 
ITSM Approach for Clouds
 ITSM Approach for Clouds ITSM Approach for Clouds
ITSM Approach for Clouds
 
193734Researchproejct
193734Researchproejct193734Researchproejct
193734Researchproejct
 
E0332427
E0332427E0332427
E0332427
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
HCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for Clouds
 
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxAdvanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
 

Último

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

DATA COMMUNICATION AND NETWORKING

  • 1. DATA COMMUNICATION AND COMPUTER NETWORK Proof of Concept document SEPTEMBER 22, 2014 B.SARAVANA PRASANTH IT 14237300 Lecturer In-Charge Signature
  • 2. IT14237300 1 Table of Contents INTRODUCTION.......................................................................................................................................2 DIAGRAM ................................................................................................................................................3 HIGHLEVEL DIAGRAM .............................................................................................................................3 SMALL..................................................................................................................................................6 DATA CENTER-SRILANKA.....................................................................................................................7 DATA RECOVERY-SWITZERLAND.........................................................................................................8 PSTN..................................................................................................................................................12 DEVICES.................................................................................................................................................14 ROUTER.............................................................................................................................................14 PERIMETER FIREWALL.......................................................................................................................14 INTERNAL FIREWALL .........................................................................................................................15 SWITCH..............................................................................................................................................16 SERVERS ............................................................................................................................................17 PROXY SERVER ..............................................................................................................................17 WEB SERVER..................................................................................................................................17 FILE SERVER...................................................................................................................................18 MAIL SERVER.................................................................................................................................18 DATA BASE SERVER.......................................................................................................................19 INTERNET SERVICE PROVIDERS.............................................................................................................20
  • 3. IT14237300 2 INTRODUCTION The rise of information technology very helpful to the humans daily to day life. From that they can exchange their data’s, views and ideas from one end to another end of the world. The aim of this project was to create a design for a global organization, to communicate with their branches threw the networking systems. This project presents the design for the networking diagram, which includes the following components: The networking diagram, products, products details, protection. A description of the design and an analysis of operational will give the finalized networking diagram. Finally it will be very cost effective and very safety to communicate with their branches.
  • 4. IT14237300 3 DIAGRAM HIGHLEVEL DIAGRAM Figure 01: It Describes About the Connection between DC, DR and Branches Figure 01 TYPES OF BRANCHES 1. LARGE • It contains which branches having more than 40 Employees. Large= (Branch Employees>40) 2. MEDIUM • It contains which branches having more than 30 Employees. Medium= (Branch Employees>30) 3. SMALL • It contains which branches having less than 40 Employees. Small= (Branch Employees<40)
  • 5. IT14237300 4 LARGE Figure 02: It Describes About How The Large Level Branches Connected With The Data Center And Data Recovery Center. Figure 02
  • 6. IT14237300 5 MEDIUM Figure 03: It Describes About How the Medium Level Branches Connected With the Data Center And Data Recovery Center. Figure 03
  • 7. IT14237300 6 SMALL Figure 04: It Describes About How the Large Level Branches Connected With The Data Center And Data Recovery Center. Figure 04 The reason for having single internet service providers in the branches of small diagram is for redundancy purpose.in these branches they are having small amount of employees and then if we add another internet service provider. We want to spend more money to get service providers and devices. In these kind of small branches they no need to have multiple amount of service providers.
  • 8. IT14237300 7 DATA CENTER-SRILANKA Figure 05: It Describes About How The Data Center Connected With Their Employees. Figure 05 In this data center there are 200 employees are working in here. From that I divided into four main departments. • DEPARTMENT 01=50 employees • DEPARTMENT 02=50 employees • DEPARTMENT 03=50 employees • DEPARTMENT 04=50 employees
  • 9. IT14237300 8 DATA RECOVERY-SWITZERLAND Figure 06: It Describes About How The Data Recovery Center Connected With Their Employees. Figure 06 There are 150 employees working in data recovery center. From this I divided into four main departments. • DEPARTMENT 01=50 employees • DEPARTMENT 02=50 employees • DEPARTMENT 03=25 employees • DEPARTMENT 04=25 employees
  • 10. IT14237300 9 DMZ (Demilitarized Zone) In Computer Networking, a DMZ or Demilitarized Zone (Referred To As A Perimeter Network). Is A Physical or Logical Network That Contains and Exposes an Organization’s External-Facing Services to A Large and Untrusted Network, Usually the Internet. The Purpose of a DMZ Is To Add an Additional Layer of Security to an Organization’s Local Area Network (LAN); an External Attacker Only Has Direct Access to Equipment in the DMZ, Rather Than Any Other Part Of The Network. Figure 07: It describes about the internal architecture in the Demilitarized Zone (DMZ). Figure 07
  • 11. IT14237300 10 A server farm [SF] A server farm or server cluster is a collection of computer servers usually maintained by an organizations to accomplish server needs far beyond the capability of one machine. Server farms often consist of thousands of computers which require a large amount of power to run and keep cool. At the optimum performance level, a server farm has enormous costs associated with it, both financially and environmentally. Server farms often have backup servers, which can take over the function of primary servers in the event of a primary server failure. Figure 08: It describes about the internal architecture in the Server Farm (SF). Figure 08
  • 12. IT14237300 11 SERVER FARM IN BRANCHES [SFB] In branches side we connecting the Proxy Server and the Mail Server to the perimeter Fire wall for that we contract a layer called Server Farm in Branch’s. Figure 09: In this diagram it describes about the how the Server Farm in the Branch’s working. Figure 09
  • 13. IT14237300 12 PSTN Figure 10: It describes about the how the PSTN’s working in the organization. Figure 10
  • 14. IT14237300 13 PSTN IN THE ORGANIZATION Figure 11: It describes about how maybe the connection between the DC , DR and Branches through the PSTN. Figure 11
  • 15. IT14237300 14 DEVICES ROUTER • Usage: Router is a network device. It forwards data packets between computer networks. Router send the data packets for correct destination it determine the routing table or routing policy. Figure 12: It Describes About What Kind of Router’s Are Using for Construct This Network. And Reason For Using That Specific Router. MODEL PLACE RESON cisco 1800 series integrated service routers In Branches It’s End of Life Is More Than Five Years. cisco ASR 1003 Series Aggregation Services Router In Data Center And Data Recovery It’s End of Life Is More Than Five Years. PERIMETER FIREWALL • Usage: Perimeter firewall basically used in DMZ (demilitarized network). Which is used to establish a barrier between a trusted, secure internal network and another network (e.g. - the Internet). Figure 13: It Describes About What Kind of Perimeter Firewall’s Are Using for Construct This Network. And Reason For Using That Specific Firewall. MODEL PLACE RESON Cisco ASA 5500-X Series Next-Generation Firewalls Data Center And Data Recovery Center It’s End of Life Is More Than Five Years. Figure 13 Figure 12
  • 16. IT14237300 15 INTERNAL FIREWALL Usage: The Internal Firewall which establishes a barrier between a trusted, secure external network and internal network. Figure 14: It Describes About What Kind of Internal Firewall’s Are Using for Construct This Network. And Reason For Using That Specific Firewall. MODEL PLACE RESON Juniper SRX110 Data Center, Data Recovery Center and Branches. It’s End of Life Is More Than Five Years. Figure 14 The reason for using two different firewalls in the networking is: In this diagram it have permitted firewall and internal firewalls. Permitted firewall is Cisco and internal firewall is Juniper .The reason for two different fire wall is; the Cisco firewall is having a different architecture and Juniper firewall is having a different kind of architecture. So if hackers easily can’t access in our Systems. For that security purpose we are using different kind of firewalls. The reason for using only internal firewall in branches is: If we had the internal and permitted both firewalls our working speed may be low. That’s why we using the internal firewall only to the branches.
  • 17. IT14237300 16 SWITCH Usage: The Switch is a computer networking device. That is used to connect devices together on a computer network. It using a form of packet switching to forward data to destination device. Figure 15: It Describes About What Kind of Switch’s Are Using for Construct This Network. And Reason For Using That Specific Switch. MODEL PLACE RESON Cisco Catalyst 3850 Series Switches In DR and DC’s Access Layers It’s End of Life Is More Than Five Years. And also it have 48 ports to connect the machines In DC and DR, so it useful for redundancy. Cisco Nexus 7000 4-Slot Switch In DMZ in DC and DR’s. It’s End of Life Is More Than Five Years. And also it have 4 ports to connect the servers, so it useful for redundancy. Cisco Nexus 7000 9-Slot Switch In Server farm in DC and DR’s It’s End of Life Is More Than Five Years. And also it have 9 ports to connect the servers, so it useful for redundancy. Cisco Nexus 7000 9-Slot Switch In DR and DC’s Distribution layer It’s End of Life Is More Than Five Years. And also it have 9 ports to connect the servers, so it useful for redundancy. Figure 15
  • 18. IT14237300 17 SERVERS PROXY SERVER In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems Figure 16: It Describes About What Kind Proxy Servers are Using for Construct This Network. And Reason for Using That Specific Server. WEB SERVER The term web server, also written as Web server, can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the Internet. The most common use of web servers is to host websites, but there are other uses such as gaming, data storage, running enterprise applications, handling email, FTP, or other web uses. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five Years. HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years. HP 9000 Legacy Servers In Server Farms of Branches [SFB] in Branches. It’s End of Life Is More Than Five Years. Figure 16
  • 19. IT14237300 18 Figure 16: It Describes About What Kind Web Servers are Using for Construct This Network. And Reason for Using That Specific Server. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five Years. FILE SERVER In computing, a file server is a computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations that are attached to the same computer network. The term server highlights the role of the machine in the client–server scheme, where the clients are the workstations using the storage. A file server is not intended to perform computational tasks, and does not run programs on behalf of its clients. It is designed primarily to enable the storage and retrieval of data while the computation is carried out by the workstations. Figure 17: It Describes About What Kind Web Servers are Using for Construct This Network. And Reason for Using That Specific Server. Figure 17 MODEL PLACE RESON HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR {Front End Mail Server} It’s End of Life Is More Than Five Years. HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR.{Back End Mail Server} It’s End of Life Is More Than Five Years. Figure 16 MAIL SERVER Figure 18: It Describes About What Kind Mail Servers are Using for Construct This Network. And Reason for Using That Specific Server. MODEL PLACE RESON HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five Years. HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years. HP 9000 Legacy Servers In Server Farms of Branches [SFB] in Branches. It’s End of Life Is More Than Five Years.
  • 20. IT14237300 19 Figure 18 DATA BASE SERVER Figure 19: It Describes About What Kind of Data Base Server Servers are using for Construct This Network. And Reason for Using That Specific Server. Figure 19 HP 9000 Legacy Servers In Server Farms of Branches [SFB] in Branches. {Mail server} It’s End of Life Is More Than Five Years. MODEL PLACE RESON HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and DR. It’s End of Life Is More Than Five Years.
  • 21. IT14237300 20 INTERNET SERVICE PROVIDERS Figure 20: It describes about the internet service provider’s and PSTN provider’s in these countries. COUNTRY INTERNET PSTN SRILANKA DIALOG Airtel SLT Etisalat SWITZERLAND SWISSCOM-SSC Orange SUNRISE-SUN UPC Cablecom- UPC England BT Group-BT Vodafone-VOD Sky Broadband-SKY Hutchison 3 -HUTCH India BSNL TATA DOCOMO- TATA Airtel Reliance Communications- REL Japan ASAHI net SoftBank - SOFT SO-Net au Bangladesh AB Network Limited-AB Grameenphone-GRAM Aftab It Limited- AFTAB Airtel Australia AAR Net-AAR Vodafone-VF BIG Air-BIG Optus China MSN China-MSN China mobile- MOBILE China Telecom-Tel China Unicom-UNI
  • 22. IT14237300 21 COUNTRY INTERNET PSTN United States of America (USA) Windstream-WIND Skyriver-S/RIVER Russia City line-CITY Beeline-BEE South Africa Afrihost-AFRI Telkom-T/KOM Canada Gemstelecom-GEM Shaw Figure 20