1. DATA COMMUNICATION AND
COMPUTER NETWORK
Proof of Concept document
SEPTEMBER 22, 2014
B.SARAVANA PRASANTH
IT 14237300
Lecturer In-Charge Signature
2. IT14237300 1
Table of Contents
INTRODUCTION.......................................................................................................................................2
DIAGRAM ................................................................................................................................................3
HIGHLEVEL DIAGRAM .............................................................................................................................3
SMALL..................................................................................................................................................6
DATA CENTER-SRILANKA.....................................................................................................................7
DATA RECOVERY-SWITZERLAND.........................................................................................................8
PSTN..................................................................................................................................................12
DEVICES.................................................................................................................................................14
ROUTER.............................................................................................................................................14
PERIMETER FIREWALL.......................................................................................................................14
INTERNAL FIREWALL .........................................................................................................................15
SWITCH..............................................................................................................................................16
SERVERS ............................................................................................................................................17
PROXY SERVER ..............................................................................................................................17
WEB SERVER..................................................................................................................................17
FILE SERVER...................................................................................................................................18
MAIL SERVER.................................................................................................................................18
DATA BASE SERVER.......................................................................................................................19
INTERNET SERVICE PROVIDERS.............................................................................................................20
3. IT14237300 2
INTRODUCTION
The rise of information technology very helpful to the humans daily to day life.
From that they can exchange their data’s, views and ideas from one end to
another end of the world.
The aim of this project was to create a design for a global organization, to
communicate with their branches threw the networking systems.
This project presents the design for the networking diagram, which includes
the following components:
The networking diagram, products, products details, protection.
A description of the design and an analysis of operational will give the finalized
networking diagram. Finally it will be very cost effective and very safety to
communicate with their branches.
4. IT14237300 3
DIAGRAM
HIGHLEVEL DIAGRAM
Figure 01: It Describes About the Connection between DC, DR and Branches
Figure 01
TYPES OF BRANCHES
1. LARGE
• It contains which branches having more than 40 Employees.
Large= (Branch Employees>40)
2. MEDIUM
• It contains which branches having more than 30 Employees.
Medium= (Branch Employees>30)
3. SMALL
• It contains which branches having less than 40 Employees.
Small= (Branch Employees<40)
5. IT14237300 4
LARGE
Figure 02: It Describes About How The Large Level Branches Connected With The Data Center And
Data Recovery Center.
Figure 02
6. IT14237300 5
MEDIUM
Figure 03: It Describes About How the Medium Level Branches Connected With the Data Center And
Data Recovery Center.
Figure 03
7. IT14237300 6
SMALL
Figure 04: It Describes About How the Large Level Branches Connected With The Data Center And
Data Recovery Center.
Figure 04
The reason for having single internet service providers in the branches of small diagram is for
redundancy purpose.in these branches they are having small amount of employees and then if
we add another internet service provider. We want to spend more money to get service
providers and devices. In these kind of small branches they no need to have multiple amount of
service providers.
8. IT14237300 7
DATA CENTER-SRILANKA
Figure 05: It Describes About How The Data Center Connected With Their Employees.
Figure 05
In this data center there are 200 employees are working in here. From that I divided into four
main departments.
• DEPARTMENT 01=50 employees
• DEPARTMENT 02=50 employees
• DEPARTMENT 03=50 employees
• DEPARTMENT 04=50 employees
9. IT14237300 8
DATA RECOVERY-SWITZERLAND
Figure 06: It Describes About How The Data Recovery Center Connected With Their Employees.
Figure 06
There are 150 employees working in data recovery center. From this I divided into four main
departments.
• DEPARTMENT 01=50 employees
• DEPARTMENT 02=50 employees
• DEPARTMENT 03=25 employees
• DEPARTMENT 04=25 employees
10. IT14237300 9
DMZ (Demilitarized Zone)
In Computer Networking, a DMZ or Demilitarized Zone (Referred To As A Perimeter Network). Is A
Physical or Logical Network That Contains and Exposes an Organization’s External-Facing Services to
A Large and Untrusted Network, Usually the Internet. The Purpose of a DMZ Is To Add an Additional
Layer of Security to an Organization’s Local Area Network (LAN); an External Attacker Only Has
Direct Access to Equipment in the DMZ, Rather Than Any Other Part Of The Network.
Figure 07: It describes about the internal architecture in the Demilitarized Zone (DMZ).
Figure 07
11. IT14237300 10
A server farm [SF]
A server farm or server cluster is a collection of computer servers usually maintained by an
organizations to accomplish server needs far beyond the capability of one machine. Server farms
often consist of thousands of computers which require a large amount of power to run and keep
cool. At the optimum performance level, a server farm has enormous costs associated with it, both
financially and environmentally. Server farms often have backup servers, which can take over the
function of primary servers in the event of a primary server failure.
Figure 08: It describes about the internal architecture in the Server Farm (SF).
Figure 08
12. IT14237300 11
SERVER FARM IN BRANCHES [SFB]
In branches side we connecting the Proxy Server and the Mail Server to the perimeter Fire wall for
that we contract a layer called Server Farm in Branch’s.
Figure 09: In this diagram it describes about the how the Server Farm in the Branch’s working.
Figure 09
14. IT14237300 13
PSTN IN THE ORGANIZATION
Figure 11: It describes about how maybe the connection between the DC , DR and Branches through
the PSTN.
Figure 11
15. IT14237300 14
DEVICES
ROUTER
• Usage: Router is a network device. It forwards data packets between
computer networks. Router send the data packets for correct destination it
determine the routing table or routing policy.
Figure 12: It Describes About What Kind of Router’s Are Using for Construct This Network.
And Reason For Using That Specific Router.
MODEL PLACE RESON
cisco 1800 series
integrated service
routers
In Branches It’s End of Life Is More Than Five
Years.
cisco ASR 1003 Series
Aggregation Services
Router
In Data Center And Data Recovery It’s End of Life Is More Than Five
Years.
PERIMETER FIREWALL
• Usage: Perimeter firewall basically used in DMZ (demilitarized network). Which is
used to establish a barrier between a trusted, secure internal network and another
network (e.g. - the Internet).
Figure 13: It Describes About What Kind of Perimeter Firewall’s Are Using for Construct This
Network. And Reason For Using That Specific Firewall.
MODEL PLACE RESON
Cisco ASA 5500-X
Series Next-Generation
Firewalls
Data Center And Data Recovery
Center
It’s End of Life Is More Than Five
Years.
Figure 13
Figure 12
16. IT14237300 15
INTERNAL FIREWALL
Usage: The Internal Firewall which establishes a barrier between a trusted, secure external network
and internal network.
Figure 14: It Describes About What Kind of Internal Firewall’s Are Using for Construct This Network.
And Reason For Using That Specific Firewall.
MODEL PLACE RESON
Juniper SRX110 Data Center, Data Recovery
Center and Branches.
It’s End of Life Is More Than Five
Years.
Figure 14
The reason for using two different firewalls in the networking is:
In this diagram it have permitted firewall and internal firewalls. Permitted firewall is Cisco and
internal firewall is Juniper .The reason for two different fire wall is; the Cisco firewall is having a
different architecture and Juniper firewall is having a different kind of architecture. So if hackers
easily can’t access in our Systems. For that security purpose we are using different kind of firewalls.
The reason for using only internal firewall in branches is:
If we had the internal and permitted both firewalls our working speed may be low. That’s why we
using the internal firewall only to the branches.
17. IT14237300 16
SWITCH
Usage: The Switch is a computer networking device. That is used to connect devices together on a
computer network. It using a form of packet switching to forward data to destination device.
Figure 15: It Describes About What Kind of Switch’s Are Using for Construct This Network. And
Reason For Using That Specific Switch.
MODEL PLACE RESON
Cisco Catalyst 3850 Series
Switches
In DR and DC’s Access Layers It’s End of Life Is More Than Five
Years.
And also it have 48 ports to
connect the machines In DC and
DR, so it useful for redundancy.
Cisco Nexus 7000 4-Slot Switch In DMZ in DC and DR’s. It’s End of Life Is More Than Five
Years.
And also it have 4 ports to
connect the servers, so it useful
for redundancy.
Cisco Nexus 7000 9-Slot Switch In Server farm in DC and DR’s It’s End of Life Is More Than Five
Years.
And also it have 9 ports to
connect the servers, so it useful
for redundancy.
Cisco Nexus 7000 9-Slot Switch In DR and DC’s Distribution layer It’s End of Life Is More Than Five
Years.
And also it have 9 ports to
connect the servers, so it useful
for redundancy.
Figure 15
18. IT14237300 17
SERVERS
PROXY SERVER
In computer networks, a proxy server is a server (a computer system or an application) that acts as
an intermediary for requests from clients seeking resources from other servers. A client connects to
the proxy server, requesting some service, such as a file, connection, web page, or other resource
available from a different server and the proxy server evaluates the request as a way to simplify and
control its complexity. Proxies were invented to add structure and encapsulation to distributed
systems
Figure 16: It Describes About What Kind Proxy Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
WEB SERVER
The term web server, also written as Web server, can refer to either the hardware (the computer) or
the software (the computer application) that helps to deliver web content that can be accessed
through the Internet.
The most common use of web servers is to host websites, but there are other uses such as gaming,
data storage, running enterprise applications, handling email, FTP, or other web uses.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than
Five Years.
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than
Five Years.
HP 9000 Legacy Servers In Server Farms of Branches
[SFB] in Branches.
It’s End of Life Is More Than
Five Years.
Figure 16
19. IT14237300 18
Figure 16: It Describes About What Kind Web Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than Five
Years.
FILE SERVER
In computing, a file server is a computer attached to a network that has the primary purpose of
providing a location for shared disk access, i.e. shared storage of computer files (such as documents,
sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations
that are attached to the same computer network. The term server highlights the role of the machine
in the client–server scheme, where the clients are the workstations using the storage. A file server is
not intended to perform computational tasks, and does not run programs on behalf of its clients. It is
designed primarily to enable the storage and retrieval of data while the computation is carried out
by the workstations.
Figure 17: It Describes About What Kind Web Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
Figure 17
MODEL PLACE RESON
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than Five
Years.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR
{Front End Mail Server}
It’s End of Life Is More Than
Five Years.
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.{Back End Mail Server}
It’s End of Life Is More Than
Five Years.
Figure 16
MAIL SERVER
Figure 18: It Describes About What Kind Mail Servers are Using for Construct This Network. And
Reason for Using That Specific Server.
MODEL PLACE RESON
HP 9000 High-End Servers IN DMZ of DC and DR It’s End of Life Is More Than
Five Years.
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than
Five Years.
HP 9000 Legacy Servers In Server Farms of Branches
[SFB] in Branches.
It’s End of Life Is More Than
Five Years.
20. IT14237300 19
Figure 18
DATA BASE SERVER
Figure 19: It Describes About What Kind of Data Base Server Servers are using for Construct This
Network. And Reason for Using That Specific Server.
Figure 19
HP 9000 Legacy Servers In Server Farms of Branches
[SFB] in Branches.
{Mail server}
It’s End of Life Is More Than
Five Years.
MODEL PLACE RESON
HP 9000 Mid-Range Servers IN Server Farms [SF] in DC and
DR.
It’s End of Life Is More Than Five
Years.
21. IT14237300 20
INTERNET SERVICE PROVIDERS
Figure 20: It describes about the internet service provider’s and PSTN provider’s in these countries.
COUNTRY INTERNET PSTN
SRILANKA DIALOG Airtel
SLT Etisalat
SWITZERLAND SWISSCOM-SSC Orange
SUNRISE-SUN UPC Cablecom- UPC
England BT Group-BT Vodafone-VOD
Sky Broadband-SKY Hutchison 3 -HUTCH
India BSNL TATA DOCOMO- TATA
Airtel Reliance Communications- REL
Japan ASAHI net SoftBank - SOFT
SO-Net au
Bangladesh AB Network Limited-AB
Grameenphone-GRAM
Aftab It Limited- AFTAB Airtel
Australia AAR Net-AAR Vodafone-VF
BIG Air-BIG Optus
China MSN China-MSN China mobile- MOBILE
China Telecom-Tel China Unicom-UNI
22. IT14237300 21
COUNTRY INTERNET PSTN
United States of America (USA) Windstream-WIND Skyriver-S/RIVER
Russia City line-CITY Beeline-BEE
South Africa Afrihost-AFRI Telkom-T/KOM
Canada Gemstelecom-GEM Shaw
Figure 20