Concept of Networking

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 71

A

PROJECT REPORT
On

“CONCEPT OF NETWORKING AT INTAGLIO


SOLUTION NEW DELHI PVT. LTD ”

Submitted for the partial fulfillment


for the
Degree of
MASTER OF BUSINESS ADMINISTRATION
Semester III
Session 2010-2012

Under The Guidance of


Mr. Amit Gupta

Submitted
Submitted By
To
SUMESH SINGH
AMIT GUPTA
MBA III SEM
Enroll No – BD/32594
RANI DURGAVATI VISHWAVIDYALAYA JABALPUR (M.P.)
SHRI RAM INSTITUTE OF MANAGEMENT

CERTIFICATE

THIS IS TO CERTIFY THAT MR. SUMESH SINGH WHO IS A STUDENT OF SRIM


(MBA-III SEMESTER) HAS PREPARED THE PROJECT TITLED "CONCEPT OF
NETWORKING AT INTAGLIO SOLUTION PVT. LTD., NEW DELHI" UNDER THE
GUIDANCE OF Ms. Priyanka Singh Thakur AND THE SAME IS BEING FORWARDED
TO THE UNIVERSITY.

DR. AMIT GUPTA


Principal
Shri Ram Institute of Management,Jabalpur
SHRI RAM INSTITUTE OF MANAGEMENT

CERTIFICATE

THIS IS TO CERTIFY THAT MR. SUMESH SINGH STUDENT OF MASTER OF BUSINESS


ADMINISTRATIOR (III SEMESTER) OF SRIM, JABALPUR HAS COMPLETED THE PROJECT
TITLED "CONCEPT OF NETWORKING AT INTAGLIO SOLUTION PVT. LTD., JABALPUR" UNDER
MY GUIDANCE AND THE SAME IS BEING SUBMITTED FOR THE PARTIAL FULFILLMENT OF
THE AWARD OF THE DEGREE OF MASTER OF BUSINESS ADMINISTRATION BY RANI
DURGAVATI VISHWAVIDYALAYA, JABALPUR FOR THE ACADEMIC YEAR 2010-2012.

THIS REPORT IS UPTO THE STANDARD BOTH IN RESPECT OF ITS CONTENT AND ITS
LITERARY PRESENT.

I WISH HIM ALL THE SUCCESS.

MS. PRIYANKA SINGH THAKUR

ASST. PROFESSOR

SHRI RAM INSTITUTE OF MANAGEMENT,JABALPUR


DECLARATION

I hereby declare that the Project entitled "CONCEPT OF NETWORKING AT

INTAGLIO SOLUTION PVT. LTD., NEW DELHI" being submitted in partial fulfillment

for the award of the degree of Master of Business Administration to "Rani Durgawati

Vishwavidyalaya, Jabalpur" is the authentic record of my own work done under the

guidance of Ms. Priyanka Singh Thakur

Jabalpur

Dated : SUMESH SINGH


ACKNOWLEDGEMENT

I am highly indebted to Ms. Priyanka Singh Thakur for her guidance and
constant supervision as well as for providing necessary information regarding
the project and also for her support in completing the project.

I would like to express my gratitude towards Mr. Amit Gupta, Principal,


SRIM for their kind co-operation and encouragement which help me in
completing the project.

I am grateful to other faculty members also for their help and valuable
suggestions.

I am also thankful to the two directors MR. N.N. DUBEY and COL. S.K.
DHORELIYA for their encouragement and advice. It give me great pleasure in
expressing my heart full gratitude and indebtedness for the kind blessings
showered upon the students by hon'ble chairman SHRI R. KARSOLIA.

SUMESH SINGH
Table of Contents

Obetives and About company 1


Education Networking For Connecting Buildings
Leased Lines
The Building Blocks: Examples on a Campus
12
Basic Components of 14 27
Networks Margin Note: The
2 A Local-Area Network at For Connecting to
Universal Service Fund,
a Campus Another Campus or
or E-Rate
Clients and Servers 14 District
12
2 28
As the Campus Network
Margin Note: Fund-
Wiring and Cable Grows Margin Note: Training
Raising for Networking
3 15 and Support
Projects
28
Network Interface Cards 12 A Wide-Area Network for
3 a Small District
Margin Note: Remote
16
Hubs Access Servers
4 12 A Community College WAN
Margin Note: Network Which Service Is Right
Management for You?
4 13 Making the Right Connection:
Margin Note: Modems How to Connect to the Internet
4 How to Choose an Internet Service
Switches How to Create Your Own Web
5
Margin Note: Instant Web Content
Routers
5 Margin Note: Security
Margin Note:
Uninterruptible Power
Supplies Basic Network Design:
6 Considerations
21
Margin Note: Bridges
6 A Problem Solvers’ Guide
to Relieving Congestion
21
How to Spot Network
Networking
Congestion
Technologies Overview
21
7
Good Network Design:
Local-Area Networks:
The 80-20 Rule
Ethernet and Fast
23
Ethernet
7 Giving Your Network a
Performance Boost
Remote Access and
24
Wide-Area Networks
9 Dedicated Bandwidth to
Workgroups and Servers
Margin Note: Token
25
Ring
9 Margin Note: Types of
Ethernet Traffic
Margin Note: High-
25
Speed LAN Technologies
Making the Most of Your
9 Existing Equipment as
Analog Lines Your Network Evolves
10 26

Margin Note: Analog vs.


Digital
Networking Basics
10
Checklist
ISDN 27
11
For Building a Small LAN
Margin Note: Modems
vs. Routers 27
11
INTRODUCTION

The Building Blocks: Basic Components of Networks


There are as many definitions for the term “network” as Every network includes:
there are networks. However, most people would agree • At least two computers
that networks are collections of two or more connected • A network interface on each computer (the device that
computers. When their computers are joined in a network, lets the computer talk to the network—usually called
people can share files and peripherals such as modems, a network interface card [NIC] or adapter)
printers, tape backup drives, and CD-ROM drives. When • A connection medium—usually a wire or cable, but
networks at multiple locations are connected using services wireless communication between networked computers
available from phone companies, people can send e-mail, and peripherals is also possible
share links to the global Internet, or conduct video confer- • Network operating system software—such as Microsoft
ences in real time with other remote users on the network. Windows 95 or Windows NT, Novell NetWare, AppleShare,
or Artisoft LANtastic
Most networks—even those with just two computers—also
have a hub or a switch to act as a connection point between
the computers.
Basic Networking Components

Operating
System
Software
Operating
System
Software
PC
PC

Cable Cable
NIC Card NIC Card

Most networks consist of at least two computers, network interface Hub


cards, cabling, network operating system software, and a hub.

Clients and Servers


Often as a network grows and more computers are added, Note that you don’t need to have a dedicated server in
one computer will act as a server—a central storage point your network. With only a few computers connected,
for files or application programs shared on the net- work. networking can be “peer to peer.” Users can exchange files
Servers also provide connections to shared peripherals such and e-mail, copy files onto each others’ hard drives and
as printers. Setting up one computer as a server prevents even use printers or modems connected to just one computer.
you from having to outfit every networked computer with As more users are added to the network, however, having
extensive storage capability and duplicate costly peripherals. a dedicated server provides a central point for management
The computers that connect to the server are called clients. duties such as file backup and program upgrades.
Wiring and Cable Network interface cards
Network interface cards
(NICs), or adapters, are
usually installed inside
a computer’s case. With
portable and notebook
computers, the NIC is
Network Interface Card
Twisted Pair Coaxial Fiber-Optic usually in the credit card-
sized PC card (PCMCIA) format, which is installed in a
Networks use three primary types of wiring (also referred slot. Again, when selecting NICs, plan ahead. Ethernet
to as “media”): NICs support only Ethernet connections, while 10/100
Twisted-pair—the industry standard in new installations. NICs cost about the same and can work with either
This wire comes in several “standards.” Unshielded twisted Ethernet or higher-performance Fast Ethernet connec-
pair (UTP) Category 3 wire (also called 10BaseT) is tions. In addition, you need to ensure that your NICs will
often used for your phone lines, and UTP Category 5 (also support the type of cabling you will use—twisted-pair
called 10Base2) wire are the current networking standards. (also called 10BaseT), coaxial (also called 10Base2), or
a mixture of both.
Coaxial—resembles round cable TV wiring.

Fiber-optic—usually reserved for connections between


“backbone” devices in larger networks, though in some
very demanding environments, highly fault resistant fiber-
optic cable is used to connect desktop workstations to the
network and to link adjacent buildings. Fiber-optic cable
is the most reliable wiring but also the most expensive.
Care should be taken in selecting the cabling for your
classrooms and buildings. You want to be sure the wires
running through ceilings and between walls can handle
not only your present needs, but any upgrades you foresee
in the next several years. For instance, Ethernet can use
UTP Category 3 wiring. However, Fast Ethernet requires at
least the higher-grade UTP Category 5 wiring. As a result, all
new wiring installations should be Category 5. You may
also want to explore plenum cable, which can be routed
through many types of heating and cooling ducts in ceilings.
Check with your architect or wiring contractor to ensure
this process is fire code compliant.

Education
Hubs Network Management
Hubs, or repeaters, are Network management software allows you to monitor traffic
simple devices that inter-
flows, configure new equipment, and troubleshoot network
connect groups of users.
problems. “Managed” hubs and switches have the ability to
Hubs forward any data
packets they receive over tell a network management software “console” how much data
Hub
one port from one work- they are handling, sound alarms when problems occur, and record
station—including e-mail, word processing documents, traffic volumes over time to help you understand when users
spreadsheets, graphics, or print requests—to all of their
are placing the heaviest demands on the network throughout the
remaining ports. All users connected to a single hub or
stack of connected hubs are in the same “segment,” sharing day. While not essential for very small networks, network man-
the hub’s bandwidth or data-carrying capacity. As more agement becomes increasingly important as the network grows.
users are added to a segment, they compete for a finite Without it, keeping traffic flowing smoothly throughout the
amount of bandwidth devoted to that segment.
network, adding or moving users, and troubleshooting problems
can be difficult guessing games
Examples of INTEGLIO SOLUTIONS hub products:
INTEGLIO SOLUTIONS Micro Hub series
INTEGLIO SOLUTIONS FastHub® series Modems
Modems are used for “dialup” communications; in other words,
For example...To understand how a hub serves your campus
they dial up a network connection when needed, and when
network, imagine a hotel with just one phone line available
the transmission is completed, the connection is disabled. They
to all guests. Let’s say one guest wants to call another. She
picks up her phone and the phone rings in all rooms. All work with ordinary telephone lines. When you want to send
the other guests have to answer the phone and determine data across telephone lines, the modem takes the information
whether or not the call is intended for them. Then, as long from digital format and converts it (or modulates it) into an
as the conversation lasts, no one else can use the line. With
analog signal. The receiving modem converts the analog signal
only a few guests, this system is marginally acceptable.
However, at peak times of the day—say, when everyone back
returns to their rooms at 6 p.m.—it becomes difficult to into digital form (or demodulates it) to be read by your
communicate. The phone line is always busy. computer. This modulating and demodulating gives the modem
its name.
Internet
Switches Routers
Switches are smarter Compared to switches
than hubs and of fer and bridge s, r outers
mo r e ba ndwi dt h . A are smarter still. Routers
switch forwards data use a mor e complete
pa c ke t s o n ly t o t h e packet “address” to
Switch Router
appropriate port for the determine which router
intended recipient, based on information in each packet’s or workstation should receive each packet. Based on
header. To insulate the transmission from the other ports, a network roadmap called a “routing table,” routers can
the switch establishes a temporary connection between help ensure that packets are traveling the most efficient paths
the source and destination, then terminates the connection to their destinations. If a link between two routers goes
when the conversation is done. down, the sending router can determine an alternate route
As such, a switch can support multiple “conversations” to keep traffic moving.
and move much more traffic through the network than Routers also provide links between networks that speak
a hub. A single eight-port Ethernet hub provides a total of different languages—or, in computer speak—networks that
10 megabits per second (Mbps) of data-carrying capacity use different “protocols.” Examples include IP (Internet
shared among all users on the hub. A “full-duplex,” eight-port Protocol), the IPX® (Internet Packet Exchange Protocol),
Ethernet switch can support eight 10-Mbps conversations and AppleTalk. Routers not only connect networks in a
at once, for a total data-carrying capacity of 160 Mbps. single location or set of buildings, but they provide inter-
“Full-duplex” refers to simultaneous two-way communications, faces—or “sockets”—for connecting to wide-area network
such as telephone communication. With half-duplex commu- (WAN) services. These WAN services, which are offered by
nications, data can move across the cable or transmission telecommunications companies to connect geographically
medium in just one direction at a time. dispersed networks, are explained in more detail in the
next chapter.
Examples of INTEGLIO SOLUTIONS switch products:
INTEGLIO SOLUTIONS 1548 Micro Switch 10/100
INTEGLIO SOLUTIONS Catalyst® Series

For example...Switches are like a phone system with private


lines in place of the hub’s “party line.” Jane Tipton at the
Berkeley Hotel calls Bill Johnson in another room, and the
operator or phone switch connects the two of them on a
dedicated line. This allows more conversations at a time,
so more guests can communicate.
Examples of INTEGLIO SOLUTIONS router products: Uninterruptible Power Supplies
INTEGLIO
Uninterruptible power supplies (UPS) are not essential to networks
SOLUTIONS 700
but are highly recommended. They use constantly recharging
series INTEGLIO
SOLUTIONS batteries to prevent momentary power outages from shutting
1000 series down your network servers or clients. Most of them also
INTEGLIO provide protection against potentially damaging voltage spikes
SOLUTIONS
and surges.
1600 series
INTEGLIO
SOLUTIONS Bridges
2500 series As the network becomes crowded with users or traffic, bridges
INTEGLIO can be used to break them into multiple segments. Switches
SOLUTIONS
are basically multiple bridges in a single device. Bridges help
2600 series
INTEGLIO reduce congestion by keeping traffic from traveling onto the
SOLUTIONS network “backbone” (the spine that connects various segments
3600 series or “subnetworks”). If a user sends a message to someone in
INTEGLIO
his own segment, it stays within the local segment. Only those
SOLUTIONS
packets intended for users on other segments are passed onto
4500 series
the backbone. In today’s networks, switches are used where
For example...To understand routing, imagine the Berkeley the simplicity and relative low cost of bridges are desired.
Hotel and all the other fellow hotels in its chain have
trained their operators to be more efficient. When guest
Jane Tipton at the Berkeley Hotel calls guest Rita Brown
at the Ashton Hotel, the operator at the Berkeley knows
the best way to patch that call through. He sends it to the
Pembrook operator, who passes it to the
Ashton. If there’s ever a problem with the switchboard at
the Pembrook, the operator at the Berkeley can use an
alternate route to get the call through—for example, by
routing it to another hotel’s switchboard, which in
turns sends the call to the Ashton.
Networking Technologies Overview
Lo conversation. If multiple congestion. Files take
cal stations sense longer to print,
- an opening applications take
Ar and start longer to open, and
ea Shared Ethernet sending at the users are forced to
Net same time, a wait. At 60 percent or
wo “collision” higher bandwidth
rks occurs. Then, usage, the network can
: each station slow dramatically or
Et waits a even grind to a halt.
her random

Et
net amount of
an time and tries
d to send its
Fa packet again.
st After 16
Switched Ethernet
Et consecutive
her failed
net attempts, the

he
Ethernet has been original
around since the late application
1970s and remains the that sent the
leading network packet has to
technology for local- start again. As
area networks more people
(LANs). (A LAN is a try to use the
network contained in network, the
a building or on a number of

r
single campus.) collisions,
Ethernet is based on errors, and
carrier sense multiple subsequent
access with collision retransmits
detection (CSMA/CD). grows quickly,
(See the margin note causing
on Token Ring for a snowball effect.
another basic style Collisions are normal
of network occurrences, but too
communication.) many

Simply put, an can start to

Ethernet workstation cause the

can send data packets network to

only when no other slow down.

packets are traveling When more

on the network, that than 50 percent

is, when the network of the

is “quiet.” Otherwise, network’s total

it waits to transmit, bandwidth is

just as a person might used, collision

wait for another to rates begin to

speak during cause


Shared Fast Ethernet
As noted in the previous section, Ethernet’s bandwidth
or data-carrying capacity (also called throughput) is 10 Mbps.
Fast Ethernet (or 100BaseT) works the same way—through
collision detection—but it provides 10 times the bandwidth,
or 100 Mbps.
Shared Ethernet is like a single-lane highway with
a 10-Mbps speed limit (see diagrams below). Shared Fast
Ethernet is like a much wider highway with a 100-Mbps
speed limit; there is more room for cars, and they can
travel at higher speeds. What would Switched Ethernet
look like? A multilane highway with a speed limit of 10
Mbps in each lane. Switched Fast Ethernet also would be
a multilane highway, but with a speed limit of 100 Mbps
in each lane.

ne t
S witched Fast Ethern et

Fast
TOPIC DESCRIPTION
Token Ring
Remote Access and Wide-Area
Token Ring is a “token-passing” technology and an alternative to Networks
Ethernet’s collision-detection method. A token travels through LANs accommodate local users—people within a building

the network, which must be set up in a closed ring, and stops at or on a campus. WANs connect users and LANs spread
between various sites, whether in the same city, across the
each workstation to ask whether it has anything to send. If not,
country, or around the world. “Remote access” refers to
the token continues to the next point on the network. If there is a simple connection, usually dialed up over telephone lines
data to send, the sending station converts the token frame into a as needed, between an individual user or very small
data frame and places it into the ring. The frame continues branch office and a central network.
Your campus gains access to the Internet through
around the ring, sets repeated by all stations, but the
some type of remote connection. A single user can use a
destination station also copies the frame into memory. When the
modem to dial up an Internet service provider (ISP). Multi-
frame comes around to the sending station, it strips the data ple users within a campus might choose to rely on a router
frame to connect to the ISP, who then connects the campus to
from the ring and releases a new token. Token Ring networks the Internet.
In general, LAN speeds are much greater than WAN
operate at either 4 or 16 Mbps, but with the low cost, ease of
and remote access speeds. For example, a single shared-
use, and easy migration to higher performance in Ethernet
Ethernet connection runs at 10 Mbps (mega means “million”).
networks, Token Ring is rarely used for new network Today’s fastest analog modem runs at 56 kilobits per second
installations. (Kbps) (kilo means “thousand”)—less than one percent of
the speed of an Ethernet link. Even the more expensive,
dedicated WAN services such as T1 lines don’t compare (with
High-Speed LAN Technologies
bandwidth of 1.5 Mbps, a T1 lines has only 15 percent of
Today’s growing, fast-changing networks are like growing the capacity of a single Ethernet link). For this reason, proper
communities; the traffic they create tends to cause congestion network design aims to keep most traffic local—that is,
contained within one site—rather than allowing that traffic
and delays. To alleviate these problems, you can install higher-
to move across the WAN.
speed LAN technologies in your network that move traffic
more quickly and offer greater data-carrying capacity than
Ethernet, Fast Ethernet, or Token Ring. Fiber Distributed Data
Interface (FDDI) is another “token-passing” technology,
operating at 100
Mbps. But because it requires different wiring (fiber) and dif-
ferent hubs and switches from Ethernet, FDDI is losing ground to
Fast Ethernet and other high-speed technologies. Asynchronous
Transfer Mode (ATM) operates at a range of speeds up to 622
Mbps. It is a popular choice for the backbones of extremely
demanding or large networks, it has special features such as
the ability to carry voice and video traffic along with data, and
it can be used for wide-area networks connecting geographi-
cally separated sites. Gigabit Ethernet operates at 1000 Mbps

an
Analog Lines Analog vs. Digital
Using analog lines to dial out to other networks or to The difference between analog and digital signals is very impor-
the Internet—or to allow remote users to dial into your
tant for data communications. The most familiar “analog”
network—is a straightforward solution. Most ordinary
communication is a phone call. Varying electrical voltage reflects
phone lines are analog lines. Connect a modem to your
computer and to a wall jack and you’re in business. You the variations in the volume and tone of the human voice. By
pay for a connection as you would pay for a phone call— contrast, digital communications use a series of 1s and 0s to
by the minute, or a set rate per local call (long distance carry information from point to point. Modems actually convert
charges are the same as for a long distance telephone call).
the digital data of one computer into an analog signal for trans-
At present, the fastest analog modems operate at
mission over the phone lines. On the receiving end, another
56 Kbps for transferring data. With today’s larger file sizes
and graphically sophisticated World Wide Web sites on the modem converts the analog signal back into a series of 1s and 0s,
Internet, you should look for modems that operate at a so the receiving computer can interpret the transmission. Today,
minimum of 33.6 Kbps (also called V.34) and have phone companies can offer fully digital service between LANs
V.42 (error correction) and V.42bis (data compression)
(leased lines such as 56 K, 384 K, and T1s are digital services), or
capabilities for better performance.
While modems offer a simple solution for dialout Integrated Services Digital Network (ISDN) which allows dialup

connections to other LANs and the Internet, they do not scale connections on an as-needed basis. When it comes to moving
well as your network grows. Each modem can support only data, digital communications are less susceptible to errors and
one remote “conversation” at a time, and each device that
faster than analog signals because they are not susceptible to
wants to connect with the outside world needs a modem.
problems such as electrical “noise” on transmission lines.
See the examples in the next section for ways to overcome
this limitation by installing a router for wide-area commu-
nications and your Internet link.
Modems vs. Routers ISDN
When choosing between modems and routers for remote ISDN is a service that operates at 128 Kbps and is available
access to a central network or the Internet, consider the from your phone company. Charges for ISDN connections
usually resemble those for analog lines—you pay per call
following pros and cons:
and/or per minute, usually depending on distance. ISDN
charges also can be flat rate if linked to a local Centrex system.
Modems Technically, ISDN consists of two 64-Kbps channels
• Inexpensive that work separately. Load-balancing or “bonding” of the
• Good for one user or limited remote access for a small two channels into a 128-K single channel is possible when
group you have compatible hardware on each end of a connection
• Portable, so they can be used remotely from any location (for instance, between two of your campuses). What’s more,
as a digital service, ISDN is not subject to the “line noise”
with a phone line
that slows most analog connections, and thus offers actual
• Compatible with existing telephone lines
throughput much closer to its promised maximum rate.
• Connections can be made at a relatively low cost (essentially You can make ISDN connections either with an ISDN-
the same as a local or long-distance phone call) ready router or with an ISDN terminal adapter (also called
an ISDN modem) connected to the serial port of your router.
Again, modems are best for single users, because
Routers
each device needs its own modem, and only one “conver-
• Support faster WAN connections than modems sation” with the outside world can happen at any one time.
• Support multiple Your ISDN router, modem, or terminal adapter may come
users with analog ports, allowing you to connect a regular
• Many routers have a “live” connection (so you telephone, fax, modem, or other analog phone device. For
don’t example, a ISDN router with an analog phone jack would
get busy signals), and you save time not having to dial allow you to make phone calls and send faxes while staying
up the connection connected via the other ISDN digital channel.

• The connections are more reliable than with telephone lines


but may be more costly than ordinary phone lines and may
not support voice calls
• Offer data encryption (for enhanced security) in addition
to
data compression (for enhanced performance)

“Dial-on-demand routing” (DDR) is sometimes used as a


compromise between the dialup method of connecting and full-
fledged routing. “Dial-on-demand” means the router establishes
(and is charged for) a connection only when the connection is in
use. This solution uses a basic router paired with either a
modem or an ISDN line, which makes the calls as needed, when
the router requests a connection.
Leased Lines The Universal Service Fund, or E-Rate
Phone companies offer a variety of leased-line services, As part of a broad reform initiative to ensure universal access
which are digital, permanent, point-to-point communica-
to communications services such as telephones and
tion paths that usually are “open” 24 hours a day, seven
information networks, the U.S. government created through the
days a week. Rather than paying a fee for each connection,
you pay a set amount per month for unlimited use. The Telecommunications Act of 1996 special education subsidies,
leased lines that would be most appropriate for campuses called the Education Rate (E-Rate). For complete details on the
range in speed from 56 Kbps to 45 Mpbs (a “T3” service). discounts, who qualifies, and how to apply, visit
Because they all work the same way, the right one for you
http.//www.slcfund.org.
depends on the number of users and amount of remote
traffic the network will carry (and how much bandwidth
you can afford). A common service for campus networks is Fund-Raising for Network Projects
a “T1” line with 1.5 Mbps of bandwidth.
For innovative fund-raising ideas, start with the Computer
By “point-to-point,” we mean that leased lines use a
Learning Foundation’s “Help Your Campus Build Partnerships
direct, physical connection from your campus to the phone
company’s switch, and then to other campuses or your and Raise Funds for Technology,” at
central district, regional, statewide office, or ISP. The phone http://www.computerlearning.org.
or data services company may need to install new cabling.

Remote Access Servers


Remote access servers are like funnels for incoming calls from
remote users. A remote access server allows multiple people to
connect to the network at once from homes, remote work sites
or anywhere they can find an analog or digital phone line.
They make good sense when you want to provide many individ-
uals or small sites temporary access to your central network via
modems, rather than the permanent link of a leased line. They
also prevent the busy signals that remote users might
encounter if they were all dialing up a single modem. A remote
access server can have multiple phone lines all “pooled” to a
single listed phone number, allowing the user to rotate through
the phone lines transparently until finding an open line. As
usage increases or decreases, support staff can order more
lines to match the demand without affecting the phone number
users are familiar with calling.
District
Which Service Is Right for You?
Analog services are least expensive. ISDN costs somewhat
more but improves performance over even today’s fastest
analog offerings. Leased lines are the costliest of these three
options but offer dedicated, digital service for more
demanding situations. Which is right? To help you decide
answer the following questions:
• Will students and faculty use the Internet frequently?
• Will your libraries provide Internet access for research?
• Do you anticipate a large volume of traffic between
campuses and your central office?
• Will the network carry administrative traffic—such as
student records and accounting data—between campuses
and a central office?
• Do you plan to use videoconferencing between campuses
to expand course offerings for students (distance learning)?
• Who will use the campus connection to the Internet—
faculty, staff, students, parents?

The more times you answered “yes,” the more likely it


is that you need leased-line services. This is the direction
that most campuses and districts are taking today. It is also
possible to mix and match services. For example, individual
campuses might connect to each other and to your central
office using ISDN, while the main connection from the central
office to the Internet would be a T1. Which service you
select also depends on what your ISP is using. If your ISP’s
maximum line speed is 128 K, as with ISDN, it wouldn’t
make sense to connect to that ISP with a T1 service. It is
important to understand that as the bandwidth increases,
so do the charges, both from the ISP and the phone company.
Keep in mind that rates for different kinds of connections
vary from location to location. See the next chapter for
illustrations of how various “wide-area” connections
might work.
Education Networking Examples

A Local-Area Network at a Campus


This LAN starts simply—shared Ethernet, with a pair of
servers and a shared analog modem connecting students
and faculty to the Internet one at a time. Students can
write reports and do math drills on the computers, jump-
ing onto the Internet for research occasionally; faculty can
write lesson plans and e-mail colleagues in the campus;
administrators can track attendance and record grades.

Local-Area Network

Internet

POTS

Modem

Workgroup with
Ethernet Hub

Workgroup with
Ethernet Hub
Server Workgroup with
Ethernet Hub

Server

LAN
Growing LAN As the Campus Network Grows
Unfortunately, this network can’t accommodate growing
Workgroup with campus demands. Too many users compete for the 10-Mbps
Ethernet Switch
Ethernet network pathway. Only one user can connect to
the Internet at a time. As instructors try to incorporate
Server
CD-ROM-based, graphical programs into their lesson
plans, network performance stumbles.
Server The solution is to segment the network using Ethernet
switches and add a router for Internet connections. This
provides more bandwidth for students, faculty, and admin-
istrators and permits multiple simultaneous connections
Ethernet Switch
to the Internet. The campus can create a new multimedia
Workgroup lab, with dedicated 10-Mbps Ethernet channels to individ-
with
Router Ethernet
Hub ual workstations for smooth performance of video images
delivered from the CD-ROM server. The network upgrade
also saves money by incorporating all of the campus’ existing
Frame
Multimedia equipment and wiring.
Relay
PCs

Internet
WAN
A Wide-Area Network for a
Wide-Area Network
Small District
To improve communications between campuses and their
central office, the campuses decide to install a wide-area
network. The upgrade economizes on Internet connectivity
by offering all campuses a connection through a central
high-speed line. Internet

T1 Line
Campus B

Campus C

56K
Connection
56K
Connection

Campus A

Community College A Community College WAN


WAN
A growing community college system sees rising network
traffic at its three campuses. It wants to install future-ready
local networks to support multimedia applications and to
provide high-speed WAN links that will allow south and
west campus students to take advantage of north campus
Internet T3 Line courses via the network (distance learning). In addition,
because many students commute from great distances, the
North
Campus college wants to allow students at all three campuses to dial
up their local servers from home and retrieve assignments
and communicate with professors.
South Campus

T1 Line House
T1 Line

West Campus
Making the Right Connection: Network How-Tos
Dialup How to Connect to the Internet
Access The Internet is a global network of thousands of computers,
growing by leaps and bounds each year. It allows a world-
wide community comprising tens of millions of people to
Internet
Service communicate over any distance, access information from
Provider
anywhere in the world, and publish text and images instantly.
The Internet is a link to the information resources of
PC
POTS campuses, libraries, and businesses, assisting in research
Modem Internet projects and cross-cultural studies and permitting a free
flow of ideas and studies between students, faculty, and
their peers.
Remarkably, however, a large majority of classrooms
still lack Internet connections. If your campus is among
them, you will be pleased to hear that connecting to the
Internet is easier than ever.

Shared Access

Workgroup With
Ethernet Hub
Internet

Workgroup With
Ethernet Hub

WAN Workgroup With


Service Ethernet Hub
Internet
Service
Provider Ethernet Switch

Router

Connecting
Where connections once required costly special services, you
now have a range of options. Commercial online services
such as America Online and the Microsoft network offer
dialup Internet access for $20 or less per month. ISPs offer
dialup and shared access connections for a variety of prices,
based on a range of line speeds up to T3 (45 Mbps) for
environments with heavy demand or a large number of
users.
On the hardware side, you can make a dialup connection
with a modem attached to one computer or a router
attached to your local-area network, allowing multiple users
to access the Internet.
Modem connections are inexpensive and easy to acquire,
so they are a good idea if you’re just starting out or if your
campus has only a few computers. However, only one person
can use a modem at any given time, leading to heavy
competition for Internet access. A single router can provide
a shared-access solution, accommodating multiple users
and multiple simultaneous Internet connections. It con-
nects you directly to a router at your ISP’s location.
However you choose to connect, your window on the
Internet is a browser such as Netscape Navigator or
Microsoft Internet Explorer: easy-to-use programs that link
you to any active site on the Internet.
Service
Provi
How to will be, it makes pool and the Performance
Choose an sense to begin with number of It is important to
Internet a fixed-rate plan customers the ISP know how the
Service and then monitor is serving. Ask the service provider is
Provider usage. Generally, following connected to the
You have a campus budgets can questions: Internet. For
growing array of handle a fixed • Does the ISP example, it is not
ISPs to choose commitment of a enforce effective to have a
from, offering a known amount maximum T1 leased-line
wide range of more easily than a session times connection from
services and pricing variable and provide your campus to an
structures. An ISP commitment. password- ISP if the ISP is
can protected connected to the
Support
be a commercial access? Internet via a T1
If your campus
business or a local • Does the ISP use a connection or less,
does not have its single access number
university, state own networking especially if the
or a pool of
agency, or staff or is not numbers? ISP supports
nonprofit supported by a • What connection several customers.
organization. You central office staff, speeds are Generally, higher
can find out about extra support from available? (For connection speeds
ISPs in your area the ISP is a example, make allow a service
through the necessity. Ask the sure the ISP can provider to
Internet, from provider about connect high- accommodate
advertisements or onsite configu- speed analog many users and
the yellow pages, ration services, modems— operate more
and from Internet training, startup 33.6 K and 56 K efficiently.
books and guides. software supplied —or ISDN digital Additional Services
You also will find with the service, modems—128 K Internet
a list of Internet —if you have this
and whether the connectivity
service providers
on the provider operates a service. Also note requires ongoing
World Wide Web help desk with that as of this network adminis-
at phone or e-mail writing, stan- tration
http://thelist.intern dards for 56-K
et.com consultation. In configuration and
addition, peer modems were maintenance.
Factors to consider assistance can still not Your ISP may
when evaluating solidified. Make
ISPs include: prove invaluable, offer these
and some service sure your 56-K services, so be
Price technology is
providers organize sure to ask.
Some ISPs offer compatible with
user meetings and For dialup
access at a fixed your ISP’s.)
similar gatherings users: ask your ISP
rate per month or
to help their if maintenance of a
year. Others offer
customers use the user account and
service at an
Internet more mailbox is offered
hourly rate or by
effectively. on your behalf,
charging per
Access with ample mail
megabyte of data
If the ISP offers spool space for the
transferred or
dialup access, be number of users
archived. If you’re sure to ask about who can receive
not certain what the size
e-mail at your
your usage level of the modem
address. The
spool space is •
very important USEN
because it ET
determines how news
much content —
your mailbox Maint
will hold before rejecting new ains a
messages. local
For direct usene
access users: ask if t news
your ISP offers confer
registration of encing
network syste
identifiers, such as m
Internet domain • World Wide
names and IP Web or
addresses. You Gopher
will also need an publishing—
Internet server Allows you
com- puter that to publish
performs the information
following and make it
functions: accessible to
• Domain the Internet
Name community
System
(DNS)— Commercial
Provides Internet server
translation packages that run
from URL on a variety of
addresses platforms are
(for available, or your
example, ISP can assist with
www.INTEG many of these
LIO services (see right
SOLUTIONS —“How to Create
.com) to Your Own
numerical Web Site”).
addresses
(for example,
198.92.30.3
1)
• Electronic mail
service—
Establishes e-
mail accounts
and allows
campus users
to receive and
send e-mail
ders
How to some ISPs offer Instant Web Content for
access the network,
space on their Education
Create Your and authorization
Own Web servers and links INTEGLIO
governs what they
Site to your site SOLUTIONS offers
The basic tool for through their can see when
a useful content-
creating a Web site Internet they’re connected.
based Web resource
is Web authoring connections.
Audits enable you to
They also can and “virtual
software, which
help you secure track user activity to
can be as simple as schoolhouse” for
a word processor a domain name or help spot unauthorized activity
teachers looking for
before it becomes a full-fledged
with the ability to the address at
material they can use
which computer security breach.
convert the final
users find your right away. Check
result to HTML Firewalls protect
for publish- ing on Web site out
your internal
the World Wide (INTEGLIO http://sunsite.unc.edu
network from
Web. HTML is a SOLUTIONS.com
/INTEGLIO
is INTEGLIO invasion through
cross-platform
SOLUTIONS for
language—in other SOLUTIONS the Internet or
Systems’ domain CEARCH, the
words, other external
understandable by name). INTEGLIO
sources. Firewalls
any computer, from An SOLUTIONS
can restrict access
a Microsoft alternative is to
Education Archive.
establish a to certain users
Windows-based PC
to a UNIX worksta- dedicated Web and control which
tion to an Apple server in your own Security users can use
Macintosh. Within campus or district. Your network is which applications
HTML documents, This requires you
bound to carry at when dialing in
you can plant to maintain a
direct link to the least some from outside.
text, images,
sounds and, Internet rather information you INTEGLIO
with advanced than turning this want to protect from SOLUTIONS
authoring task
certain users— provides security
software, over to an ISP, and
students’ grades and products such as
video clips. it demands more
upkeep. You might attendance records, the INTEGLIO
The Internet’s
File Transfer also look into for example. For this SOLUTIONS PIX
Protocol (FTP) also devices such as reason, you’ll want to Firewall or the
provides a means of INTEGLIO
consider some form Windows NT
publishing non- SOLUTIONS’s
Micro Webserver, of network security. platform
HTML content,
which visitors which gives small Security solutions INTEGLIO
to your sites can campuses or on- come in three basic SOLUTIONS
download to use campus
on their own forms: user Centri™ Firewall,
organizations a
computers. authentication and and in INTEGLIO
way to establish
After you
their Internet sites authorization, audits, SOLUTIONS
have created your
and maintain them and firewalls. IOS® software.
Web site, the
locally at Authentication
next step is
a fraction of the
publishing it. For designates who can
cost of a dedicated,
a monthly fee, full-fledged server.
Basic Network Design:
Considerations
C
A Problem Solvers’ Guide to These last two issues are more recent. Students using the
Relieving Congestion Internet may be downloading multimegabyte image files to
Congestion is the networking term for too much traffic move across the network. This can clog pathways created
clogging network pathways. Common causes of congestion to carry small e-mail and word processing files. Meanwhile,
in today’s networks include: today’s personal computer interface (PCI) systems are fast
• Too many users on a single network segment or enough to move files like these at 30 to 90 Mbps,
collision domain easily overloading the actual 8- to 9-Mbps throughput
• High demand from networked applications, such as capacity of a shared Ethernet network channel. The speed
groupware (for scheduling and appointments) and e-mail and bandwidth of these desktop machines, the size of popu-
with large attached files lar Internet files, and the size of attachments sent via e-mail
• High demand from bandwidth-intensive applications, continue to increase at an accelerating pace. Your
such as desktop publishing and multimedia network bandwidth must grow in step to keep up with
• The growing number of users accessing the Internet these advances.
• The increased power of new PCs and servers

How to Spot Network Congestion


Some common indicators of network congestion include:

Increased Network Delay


All networks have a limited data-carrying capacity. When
the load is light, the average time from when a host submits
a packet for transmission until it is actually sent on the
LAN is short. When many users are vying for connections and
communicating, the average delay increases. This delay
has the effect of making the network appear “slower,” because
it takes longer to send the same amount of data under
congested conditions than it does when the load is light.
In extreme circumstances, an application can fail
completely under a heavy network load. Sessions may take
time-outs and disconnect, and applications or operating
systems may actually crash, requiring a system restart.
Remember that many factors contribute to application
performance (for example: CPU speed, memory, and disk
performance). The LAN is only one of several possible
bottlenecks.
iderations
Higher Network the network and some application
Utilization creating environments may
One important congestion?) For operate well
measure of most campus under heavier
congestion is environments, any loads or fail at
“channel of the following lighter levels.
utilization,” utilization levels
which is the can be used as
percentage of time “rules of thumb”
that a channel is to determine when
busy carrying an Ethernet LAN
data. It is directly is approaching
related to the exces- sive load:
traffic • 20 percent of
load. While many full capacity,
network averaged over
management an eight-hour
software programs work day
offer visual • 30 percent
displays of this averaged over the
information, your busiest hour of
the day
system may require
• 50
special network
percent
monitoring
averaged
equipment, such as Dissatisfied Users
over the
pro- tocol analyzers Network speeds are partly
busiest
or remote subjective; the ultimate measure
15
monitoring of LAN congestion
minutes
(RMON) devices. is whether users
of the
There are can get their work
day
many variables to done efficiently. If
consider when For very short- users are dissatisfied
trying to determine term periods with network
what constitutes (seconds, or even performance, there’s
acceptable tens of seconds), a problem—
utilization, network regardless of
including the utilization may be statistics indicating
number of stations nearly 100 that the network is
on the LAN, percent without doing just fine.
software or causing any Note that user
behavior, and problems. This dissatisfaction
network traffic situation might with performance
patterns. (In other occur during may not indicate
words, is most a large file transfer a network
traffic moving between a pair of congestion
between users and high-performance problem. The
a local server, or stations on an slowdown may be
are users reaching otherwise quiet because of
out of their own network. These applications,
segments across are not hard and computer CPU
fast rules, and
speeds, hard disk
performance,
servers, and WAN
access devices
(slow modems or
WAN connections).
Network
Good Network Design: The 80-20 Rule
The key to good network design is how you place clients in
relation to servers. Ideally, client computers should be
placed on the same “logical” network as the servers they
access most often. (By contrast, a “physical” network
connection would mean that a client and server were attached
to the same hub. A logical connection can be defined in
your network software, so that users in one classroom can
be in the same logical network segments as a server located
at the opposite end of a building or campus.) This simple
task minimizes the load on the network backbone, which
carries traffic between segments.
Here’s a good rule of thumb. In a properly designed
small to medium-sized network environment, 80 percent
of the traffic on a given network segment is local (destined
for a target in the same workgroup), and not more than
20 percent of the network traffic should need to move across
a backbone (the spine that connects various segments or
“subnetworks”). Backbone congestion can indicate that
traffic patterns are not meeting the 80-20 rule. In this case,
rather than adding switches or upgrading hubs, it may be
easier to improve network performance by doing one of
the following:
• Moving resources (applications, software programs, and
files from one server to another, for example) to contain
traffic locally within a workgroup
• Moving users (logically, if not physically) so that the
workgroups more closely reflect the actual traffic patterns
• Adding servers so that users can access them locally
without having to cross the backbone
After you have ensured proper network design and resource
location, the next step is to determine the optimal technology
to meet your growing needs.
Giving Your Many Smaller Files
Network a For sustained traffic with smaller files (frequent e-mail
Performance Boost messages or database reports on student attendance), the
Most LANs start as shared Ethernet networks, with performance difference between the two technologies is
all users sharing a single segment. Obviously, as more relatively minor. In this instance, the congestion is caused
users plug into the network and send larger files across by a constant stream of small files between the client and
it, traffic loads rise. server. For existing installations, segmenting the network
In the section “Education Networking Examples,” with an Ethernet switch provides the most cost-effective
we demonstrated how breaking a network into multiple solution. Segmentation delivers 10 Mbps per port and
“subnetworks” or separate collision domains can a 100-Mbps uplink for high-speed access to servers or the
alleviate congestion. network backbone, while leveraging the existing 10-Mbps
Ethernet switches, Fast Ethernet hubs, and Fast Ethernet network interface cards.
switches immediately and dramatically improve network Fewer Larger Files
performance compared with traditional shared 10-Mbps “Bursty” or sporadic traffic with large file transfers
hubs in a heavily loaded network. Adding these devices to and for power users running high-bandwidth applications
your network is like adding lanes to a highway (in the require a different approach. An example is a group of
case of a switch), increasing the speed limit (in the case students using an interactive learning program with full-
of a Fast Ethernet hub), or both (in the case of a Fast motion video clips. Because these types of large files take
Ethernet switch). too long to arrive at 10 Mbps, high-speed shared 100BaseT
In sheer performance, shared Fast Ethernet is always hubs provide the wider, faster “data highway” you need.
faster than switched 10-Mbps Ethernet for environments
Many Larger Files
with one server or moderately loaded multiple-server envi-
For sustained, large-file traffic such as in a library’s multime-
ronments. How much of a performance boost you see
dia lab or with network backups, Fast Ethernet hubs or
depends on the type of network traffic.
Fast Ethernet switches would be the best choice. They
can increase the throughput and speed of the transactions,
reducing the impact on the backbone and minimizing net-
work congestion.

Design
Types of Ethernet Traffic Dedicated bandwidth to
Ethernet traffic consists of three different types of packets: workgroups and servers
unicast, multicast, and broadcast. How much of each type If you need to provide up to 100 Mbps of bandwidth to
workgroups, servers, or workstations sending large files at
of traffic you have on your network can be important in
high volume, a Fast Ethernet switch is the right choice.
deter- mining whether you need a switch or a hub and types
A Fast Ethernet switch allows you to segment your LAN
of switch features. (that is, break it into smaller “collision domains”) and then
give each segment a dedicated network link or highway
Unicast packets are addressed to a single destination. This type lane at up 100 Mbps. You also can give popular servers their
own 100-Mbps links. Most often in today’s networks, a
typically comprises the bulk of traffic on an Ethernet LAN.
Fast Ethernet switch will act as the “backbone” of the LAN,
with Ethernet hubs, Ethernet switches, or Fast Ethernet
Multicast refers to a single transmission sent to a group of users. hubs providing the desktop connections in workgroups. As
This capability lightens the load on the server and the network demanding new applications such as desktop multimedia

because only one data stream is sent rather than one per user. or videoconferencing become more popular, you may choose
to give certain individual desktop computers their own
dedicated 100-Mbps network links.
At the other extreme, broadcast packets are sent to all nodes
Streaming Multimedia
within a single network segment and can be a major source
Finally, for single-server environments running streamed
of congestion. multimedia applications (such as a distance learning course
offered by a remote campus that you tune into over the
network), the large overall bandwidth of Fast Ethernet
switches is the best solution within the campus. They can
provide dedicated 100-Mbps connections to each server.
Switches can provide additional relief by containing multi-
casts, transmissions sent over the network to a single
address, that multiple client computers can listen to. When
connecting across the district WAN, a T1 or T3 line pro-
vides the needed bandwidth.
Making the Most of Your Existing As noted previously, whether you choose to install Ethernet
Equipment as Your Network Evolves switches or Fast Ethernet hubs, it is highly recommended
How you boost performance depends partly on what that you install 10/100-Mbps NICs in any new PC or server,
networking equipment you have installed—NICs, PCs and because the incremental cost for these adapters is marginal.
servers, and cabling. The 10/100 NICs also take advantage of the 30- to more
For instance, Fast Ethernet hubs support all existing than 90-Mbps throughput and power of Extended Industry-
Ethernet programs and management systems, but you’ll Standard Architecture (EISA) and PCI computers.
need 100BaseT or 10/100 NICs in all computers attached Cabling presents additional equipment consideration in
to Fast Ethernet ports. These hubs make sense in all new deciding on switched or Fast Ethernet. Switched Ethernet
networks, extensions to existing networks, and areas where runs on the common two-pair Category 3 cabling that
increased, high-volume throughput is essential. many companies have installed as well as Category 4 and
In existing networks in which regular Ethernet NIC Category 5 UTP cabling. However, 100BaseTX, the most
adapters are already installed, Ethernet switches are a good commonly used Fast Ethernet implementation, requires
idea. They provide an immediate boost in performance Category 5 cabling. Again, all new UTP cable installations
without sacrificing your current investment in adapters. should be Category 5.
See the table below for other minimum requirements for
Ethernet and Fast Ethernet network connections.

I met the minimums.

10-Mbps 100-Mbps

Cabling UTP Category 3 UTP Category 5

PCs ISA PCI, EISA

Adapters Existing 10 Mbps New 10/100 Mbps

Learning
Networking Basics Checklists
The following checklists provide a general idea of the
components you will need to install your network. These
Internet
are meant to be rough guidelines only; your own instal-
POTS to ISP
lation will vary based on your needs. Internet

Server Modem
For Building a Small LAN
• Clients with NICs installed
• Server PC
Ethernet
• Hub Hub
• Cabling PC
Printer
• Network operating system software (for example,
Windows NT, Windows 95, Novell NetWare,
LANtastic, AppleShare, and so on) PC

• Modem for dialup Internet access (optional)


PC

For Connecting Buildings on a Campus


• Clients with NICs installed • Network operating system software (for example,
• Servers Windows NT, Windows 95, Novell NetWare,
• Hubs LANtastic, AppleShare, and so on)
• Switch • Router for shared Internet access (optional)
• Cabling

Internet

T1 Line Server
Classrooms

Server
Router
Administration
LAN
Server
Switch
Library
LAN
Switch

Hub LAN

Switch

Hub

Hub
Training and Support
Studies of technology in campuses and colleges universally
point to teacher training as a critical success factor.
Investing in networking hardware and software is only the
Internet first step. Equipping faculty to integrate those tools in their
lesson plans maximizes the value of that investment.
Firewall
T1 Line District Another frequently neglected aspect of productive network
Office
East operation is support and management. Especially in smaller
Campus
West Campus campuses and districts, it can be difficult to dedicate resources
Router
and personnel to the network full time. However, network relia-
bility depends on planning for growth and monitoring for trends
Main
Router Router Campus Router that could spell trouble up the road.
Networking equipment resellers offer training and support.
POTS
Remote Educators also can take advantage of peer groups. Districts
Campus
Router
should consider the “train the trainer” model of spreading
network
expertise, which has proven effective across the country where
For Connecting to Another Campus or District
a small group of technology “evangelists” share home-grown
• Clients with NICs installed
enthusiasm and expertise.
• Servers
• Hubs INTEGLIO SOLUTIONS offers an education discount
• Switches through its training part- ners in the US to help support your
• Routers at each location for WAN connections, shared network. INTEGLIO SOLUTIONS has also developed an
Internet access
interactive CD—Implementing Networks in Education—with
• Access server for dialup access for remote users
over seven hours of content to help you design, build, and
• Cabling
• WAN service (ISDN, Frame Relay, or leased-line maintain networks.
service from phone company) You also have unique options available for including
• Network operating system software (for example, networking studies as part of your curriculum to expand student
Windows NT, Windows 95, Novell NetWare,
opportuni- ties and help support your campus needs for qualified
LANtastic, and so on)
support staff. For more information, visit http://www.INTEGLIO
SOLUTIONS.com/edu
on the World Wide Web and check out the INTEGLIO SOLUTIONS
Networking
Academies program.
COMPANY PROFILE
INTEGLIO SOLUTIONS -

Among the fastest growing it education in india, INTEGLIO SOLUTIONS -


offers a complete spectrum of quality training programs on software , hardware
networking well as various global certification in association with leading IT
Organisation world wide.

INTEGLIO SOLUTIONS is an initiative that enables individuals and organization


to benefit from INTEGLIO SOLUTIONS’s expertise in the IT space, The company has
venture into the field of IT training with an objective to meet the increasing demand for
skilled professionals across the country.

Our alliance with leading IT Corporation such as Mirosoft, Red Har ond Oracle
provides us with valuable inputs for augmenting our curriculum as well as in adopting
global best practices in IT Education our Training solutions are designed to help you
stay competitive today as well as in the future .
WHAT INTEGLIO SOLUTIONS - OFFERS YOU ……….

INTEGLIO SOLUTIONS HeritEdge: INTEGLIO SOLUTIONS - combines our


heritage of excellence with cutting – edge IT expertise across multiple it domains.

Cutting –Edge Courseware: Our courseware is designed and developed in consultation


with seasoned IT professionals and is countiuously updated per the changing industry
trends.

Global Alliances: through partnership with leading technology companies including


Microsoft. Oracle and red hat .INTEGLIO SOLUTIONS - conducts certification
programs in software, system and network administration offering you a distinct edge in
the job market.

International Recognition : all our training programs are backed by INTEGLIO


SOLUTIONS’s successful brand image that is well recognized all across the world.

Hands –on Training : All our training aspect Of IT training to make the students
industry-ready from day one.

Flexible Training Options: INTEGLIO SOLUTIONS - offers a variety of program


fomats to meet diverse student requirements ranging across career, modular and short –
term programs.

Widespread Network: INTEGLIO SOLUTIONS - has set up premier IT training


centers across the geography of india and the network is growing at a rapid pace with
ambitious global expansion plans on the anvil.

Professional Employment Support : our dedicated team of placement professionals


offers employment support through regular interface with the industry.

Traubers @ INTEGLIO SOLUTIONS


With a delivery capacity of more than 200 training solution, INTEGLIO
SOLUTIONS - is facilitated by expert trainers that are certified by Microsoft ,Red Hat
and Oracle Targeted to mett the unique learing requirements of individuals , corporations
and academic institutions , we provide cost –effective powerful training solution .

INTEGLIO SOLUTIONS - Trainers are experienced consultants and corportate


professionals who aee actively engaged in providing consultancy for real –life projects to
IT companies , Their methodology is to conduct powerful workshops with hand on
learing experience based on real world scenarios in which students can learn concepts in
an active and collaborative environments.

Our trainers specialize in technical content development on all products and


technologies . this includes hands –on-labs study material. Reference material
compilations and video based tutorials.

Certificate @INTEGLIO SOLUTIONS

Through our alliance with leading technology companies worldwide , we offer


globally recognized certification in the IT arena, including

Microsoft Certified Systems Engineer (MCSE)


Red Hat Certified Engineer (RHCE)
Oracle Certified professional (OCP)
Oracle Certified Associate (OCA)
Jave Cerification
Microsoft Certfication
Microsoft Certification (net Ver 3.5/2.0& SQL 2008/20050)

PROGRAMS OFFERED

INTEGLIO SOLUTIONS Certified Entreprise Engineer (HCE+)

INTEGLIO SOLUTIONS Certified Enterprise Associate Semester -1 HCEA 240 HRS/6


MONTHS

Infrastructure services
Infrastructure network management
Internetworking management part I
Microsoft Enterpise part –i
Service Desk Foundation

INTEGLIO SOLUTIONS Certified Enterprise Professional

Semester II HCEA 240 HRS/6 MONTHS

Internetworking management
Internetworking management part II
Linux Enterprise Administrator
INTEGLIO SOLUTIONSCertified Enterprise Engineer Semester III HCEA 240
HRS/6 MONTHS
Microsoft Enterprose Part III
Enterprise Storage management /IBM Tiwoli
PROGRAMS OFFERED

INTEGLIO SOLUTIONS Certified NETWORK Engineer (MCSE)

INTEGLIO SOLUTIONS Certified network Associate

Advanced networking

System Administrator

System engineer

Network Technology & Devices

Linux Administrator (RHCT)

Linux Network & Security (RHCE)

Wireless Network Administrator (WNA)

INTEGLIO SOLUTIONS Certified Network Engineer

8 MONTHS

Dot Net Track

Basics of Computer

Advanced Information Teechnology

MCP (Windows Applications)

MCP (Web Applications)

Basic of Computer

Software Engineering and project

Advanced Information Teechnology


DATA ANALYSIS AND INTERPRETATION
1. The objective of this study is to know the concept of networking and configuration

Diferent types of data can be displayed by switching between diferent monitoring views. The
default monitoring view is the Logs view, which shows a table with atack parameters and
various tools that can use to customize the table presentation.

The following table describes the all security monitoring views that can display in the Security
Reporting window.
2. Top Scan Dashboard

The Top Scan Dashboard view displays the network scanning activity in the network. The view
shows the top scanned target IPs, the top scanning IPs and the distribution of the scanned ports.
This Opts to get more info on the scanned port helps to identify whether the worms spreading
activity, including zero-day network worms, exists in the network.
3. Mitigation View

The Mitigation view allows to see how much of the attack traffic was mitigated. This monitoring
view is used for bandwidth consuming atacks, such as DoS, network scans, worm propagation
and so on. The graphical representation of traffic statistics in Mitigation view enables to see the
ratio of all the traffic that passed through the Defense Pro device, versus the traffic that was
blocked by security protections during an atack, as follows:

• Total aggregated traffic during atack—total traffic during the atack for the selected time
resolution.
Total mitigated traffic—total mitigated traffic during the atack for the selected time
resolution.
4. SOCIAL NETWORKING ANALYSIS
RECOMMENDATION FOR FUTURE PROJECT

It is clear that the present project might be significantly improved. For the future project, several
modifications should be done such as;
1. To have more flexible and rich web interface
2. More network adapters, including wireless. The following characteristics are reason why using
wireless is much better. Wireless proved independent of the standard communications
infrastructure and flexible packet-based network. In the other hand, using this wireless system
were potential to fast installation, flexible links for point-to-point or point-to-multipoint, and as
advantage for all users, it comes with low cost and high speed.
3. More ports at onboard VoIP device, probably digital port interface card
4. Configuration files archivation for easier backup/recover
5. Software upgrade procedure and system installer I hope that with the repaired and changes that
made as above, the PC based router will operate in wider network, and results to give in a
beneficial influ
SUMMARY AND CONCLUSION

As the conclusion, this project have successfully reached the aimed and objectives. The PC based router
showed it can do the routing process, as had been discuss above, for each design completed. Personally, I
find building this router somewhat fascinating. By completing the final stage of the project, I know how to
develop, examine and simulate various security and routing models that might ultimately prove suitable and
economizing for use in a space-networking environment, using the routing software. This PC based router
is secure. Nobody can access and change the configurations of daemons except for the developer, as the
password was set to start and enable the files.

Below is the example;

localhost:~ # rczebra start

Starting routing daemon (Zebra) done

ocalhost:~ # telnet localhost 2601

Trying 127.0.0.1...

Connected to localhost.

Escape character is '^]

Hello, this is test (version1.0).

Copyright 1996-2012 Intaglio Solutions.

User Access Verification

Password: xxxxxx

zebra> enable

Password: xxxxxx
BIBLIOGRAPHY

 WWW.ITSOLUTIONS.COM
 http://www.intaglio-solutions.com/placement.html
 www.INTEGLIO SOLUTIONS.com/ - United States
 INTEGLIO SOLUTIONS.netacad.net/
http://www.intaglio-solutions.com/placement.html

You might also like