Professional Documents
Culture Documents
Report
Report
1 Introduction 1
4 Network devices 8
5 cables 11
6 Topologies 14
7 OSI Model 23
INTERNSHIP STUDY
Chapter: 1
INTRODUCTION
ABOUT BHEL
Bharat Heavy Electricals Limited (BHEL) owned and founded by the Government of
India, is an engineering and manufacturing company based in New Delhi, India.
Established in 1964, BHEL is India's largest power generation equipment manufacturer.
BHEL EDN
BACKGROUND INFORMATION:
The Electronics Division (EDN) of BHEL was formed in 1976, at Bangalore mainly to
establish a strong base in the areas of power and control electronics, to supplement and
support BHEL's strong and unique presence in power generation and transmission
equipment manufacturing. The division came into being when BHEL took over the Radio
and Electricals Manufacturing Company (REMCO), which formally merged with BHEL-
EDN in 1980, Growing from a meager turnover of Rs. 3 crores in 1976 - 1977 to 354 crores
in 1996 - 1997, BHEL-EDN has entered a new phase of growth. Its quick progress was
aided by the collaborations with international leaders in the field. But it was BHEL - EDN'S
pioneering spirit and the unwavering commitment to in-house solutions that has really
contributed to its rapid growth and success. BHEL - EDN today holds on its own against
the world's leaders in the field and has won many prestigious contract against stiff
competition from them. In recognition of its commitment to the Quality systems and
procedures, the unit was awarded ISO 9001 certification by BVQI (UK) in July 1993. This
was further re-certified in July 1996 for the updated version of ISO 9001. Presently the unit
is treading along the path of Total Quality Management (TQM) as Business Process Re-
Engineering (BPR). In addition to its comprehensive product profile, a number of new
technology areas have been earmarked for future developments. Prominent among them
are Power and control Electronics for Traction applications, Energy Management Systems,
Training simulators for Defense applications, Large telecommunication exchanges,
Electronic Energy meters, etc. On the threshold of the millennium, BHEL's "VISION
BHEL-EDN, Mysore Road, Bengaluru-560026 Page 1
INTERNSHIP STUDY
2001" envisages further growth for EDN, transforming it into a world class enterprise
providing comprehensive solutions to customers, while exploring new frontiers in software
and hardware applications to fulfill the growing needs and expectation of the global market.
VISION: A world-class, innovative, competitive and profitable engineering enterprise
providing total business solutions.
MISSION: To be the leading Indian engineering enterprise providing quality products,
systems and services in the fields of energy, transportation, industry infrastructure and
other potential areas.
VALUES:
• Meeting commitments made to external and internal customers
• Foster learning, creativity and speed of response
• Respect for dignity and potential of individuals
• Loyalty and pride in the company
• Team playing
• Zeal to excel
• Integrity and fairness in all matters
PRODUCT PANORAMA:
The Comprehensive product profile of Electronics Division includes:
AUTOMATION and POWER ELECTRONIC SYSTEMS:
• Power Plant Automation
• DC Drive Systems
• Static Starters
• Power Suppliers
• Excitation Drive Systems
• Traction Drive Systems
• HVDC Systems
• Static - VAR Compensation Systems
• Industrial Automation
TELECOMMUNICATIONS:
• EPABX (Electronic Private Automatic Branch Exchanges)
• RAX (Rural Automatic Exchanges)
• SBM (Single Base Module) RAX
• MAX - L (Up to 10,000 lines)
DEFENCE ELECTRONICS:
• Samphire Tactical Gunnery Simulator
• Infantry Weapon Effects Simulator for Tactical Gunnery Training
• Small Arms Training Simulator For Marksmanship Training METERS and
CAPACITORS
• Electromechanical (Ferrari) Energy Meters
• Electronic Energy Meters
• Electrolytic Capacitors
INTERNATIONAL CLIENTS:
BHEL - EDN has the competence in offering comprehensive solutions to the customers
across the globe. The countries where BHEL - EDN manufactured equipments/ systems
have been in operation are; Bhutan, Cyprus, New Zealand, Oman, Ghana, Italy, Saudi
Arabia, Sweden, Malaysia, Malta, Tanzania Thailand, Mauritius, Nepal, USA.
Chapter: 2
INFORMATION TECHNOLOGY and SERVICES IN
BHEL, EDN
The DTG (Digital Transformation Group) of BHEL, EDN deals with network and
hardware issues. They also monitor the Network devices and firewalls in the Data Center
on a daily basis to prevent unauthorized accesses and maintains data integrity. Data center
is a room where limited access is given to authorized people. All the main servers, switches,
routers etc. are kept there.
They have two sub-departments where one deals with hardware repairing and
troubleshooting and the other deals with network related issues.
The hardware repairing deals with desktop related problems. Troubleshooting is related by
analyzing and tracing the correct faults in the LAN, switches, routers, firewalls etc.
They also have a Helpline Ticketing portal where any authorized system users can register
their network or hardware related issues to the DTG department.
The DTG department can resolve the issues by either conducting a physical visit to the
affected system or taking remote of the system.
In the data centric laboratory we use computers to gather, process, store, protect, and
transfer information. The computer consists of:
Hardware-physical computer parts, palpable and visible
(a) Personal computer- The employees of BHEL, EDN have a personal
computer where they can execute many tasks simultaneously
(multitasking).
Managing personal or business tasks and assignments.
Maintaining the address book.
Accessing and browsing the internet.
Sending/receiving e-mails, etc.
Chapter: 3
Career Exploration
Learn about a career in the field of information technology and services in BHEL
Work alongside a professional in chosen career area
Observe the workplace and different departments.
Leadership and Skill Development
Learn new skills and add to their knowledge base while gaining confidence in their
abilities
Opportunity to practice communication and teamwork skills
Gain industry knowledge first hand from an organization and professionals
Provide evidence that they have initiative, are reliable, and have a sense of
responsibility
Networking and Establishing Mentors and References
Meet new people and practice networking skills while establishing a network of
professional contacts, mentors, and references
Open to door to advice on the next steps to take on their career path
Resume Enhancements
Gain valuable experience and accomplishments to add to their resume and /or
enhance their application to graduate school
Create an advantage over other job or graduate school applicants
Potential for a full-time job offer at the end of the internship based on their
performance
Chapter: 4
NETWORK DEVICES
Hub
Hubs connect multiple computer networking devices together. A hub also acts as a repeater
in that it amplifies signals that deteriorate after traveling long distances over connecting
cables. A hub is the simplest in the family of network connecting devices because it
connects LAN components with identical protocols.
A hub can be used with both digital and analog data, provided its settings have been
configured to prepare for the formatting of the incoming data. For example, if the incoming
data is in digital format, the hub must pass it on as packets; however, if the incoming data
is analog, then the hub passes it on in signal form.
Hubs do not perform packet filtering or addressing functions; they just send data packets
to all connected devices. Hubs operate at the Physical layer of the Open Systems
Interconnection (OSI) model. There are two types of hubs: simple and multiple port.
Switch
Switches generally have a more intelligent role than hubs. A switch is a multiport device
that improves network efficiency. The switch maintains limited routing information about
nodes in the internal network, and it allows connections to systems like hubs or routers.
Strands of LANs are usually connected using switches. Generally, switches can read the
hardware addresses of incoming packets to transmit them to the appropriate destination.
Using switches improves network efficiency over hubs or routers because of the virtual
circuit capability. Switches also improve network security because the virtual circuits are
more difficult to examine with network monitors. You can think of a switch as a device
that has some of the best capabilities of routers and hubs combined. A switch can work at
either the Data Link layer or the Network layer of the OSI model. A multilayer switch is
one that can operate at both layers, which means that it can operate as both a switch and a
router. A multilayer switch is a high-performance device that supports the same routing
protocols as routers.
BHEL-EDN, Mysore Road, Bengaluru-560026 Page 8
INTERNSHIP STUDY
Switches can be subject to distributed denial of service (DDoS) attacks; flood guards are
used to prevent malicious traffic from bringing the switch to a halt. Switch port security is
important so be sure to secure switches: Disable all unused ports and use DHCP snooping,
ARP inspection and MAC address filtering.
Router
Routers help transmit packets to their destinations by charting a path through the sea of
interconnected networking devices using different network topologies. Routers are
intelligent devices, and they store information about the networks they’re connected to.
Most routers can be configured to operate as packet-filtering firewalls and use access
control lists (ACLs). Routers, in conjunction with a channel service unit/data service unit
(CSU/DSU), are also used to translate from LAN framing to WAN framing. This is needed
because LANs and WANs use different network protocols. Such routers are known as
border routers. They serve as the outside connection of a LAN to a WAN, and they operate
at the border of your network.
Router are also used to divide internal networks into two or more subnetworks. Routers can
also be connected internally to other routers, creating zones that operate independently.
Routers establish communication by maintaining tables about destinations and local
connections. A router contains information about the systems connected to it and where to
send requests if the destination isn’t known. Routers usually communicate routing and
other information using one of three standard protocols: Routing Information Protocol
(RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF).
Routers are your first line of defense, and they must be configured to pass only traffic that
is authorized by network administrators. The routes themselves can be configured as static
or dynamic. If they are static, they can only be configured manually and stay that way until
changed. If they are dynamic, they learn of other routers around them and use information
about those routers to build their routing tables.
Bridge
Bridges are used to connect two or more hosts or network segments together. The basic
role of bridges in network architecture is storing and forwarding frames between the
different segments that the bridge connects. They use hardware Media Access Control
(MAC) addresses for transferring frames. By looking at the MAC address of the devices
connected to each segment, bridges can forward the data or block it from crossing. Bridges
can also be used to connect two physical LANs into a larger logical LAN.
Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used
to divide larger networks into smaller sections by sitting between two physical network
segments and managing the flow of data between the two.
Bridges are like hubs in many respects, including the fact that they connect LAN
components with identical protocols. However, bridges filter incoming data packets,
known as frames, for addresses before they are forwarded. As it filters the data packets, the
bridge makes no modifications to the format or content of the incoming data. The bridge
filters and forwards frames on the network with the help of a dynamic bridge table. The
bridge table, which is initially empty, maintains the LAN addresses for each computer in
the LAN and the addresses of each bridge interface that connects the LAN to other LANs.
Bridges, like hubs, can be either simple or multiple port.
Bridges have mostly fallen out of favor in recent years and have been replaced by switches,
which offer more functionality. In fact, switches are sometimes referred to as “multiport
bridges” because of how they operate.
Repeater
A repeater is an electronic device that amplifies the signal it receives. You can think of
repeater as a device which receives a signal and retransmits it at a higher level or higher
power so that the signal can cover longer distances, more than 100 meters for standard
LAN cables. Repeaters work on the Physical layer.
Chapter: 5
CABLES
Coaxial Cables
Invented in the 1880s, "coax" was best known as the kind of cable that connected television
sets to home antennas. Coaxial cable is also a standard for 10 Mbps Ethernet cables. When
10 Mbps Ethernet was most popular, during the 1980s and early 1990s, networks typically
utilized one of two kinds of coax cable — thinnet(10BASE2 standard) or
thicknet (10BASE5). These cables consist of an inner copper wire of varying thickness
surrounded by insulation and another shielding. Their stiffness caused network
administrators difficulty in installing and maintaining thinnet and thicknet.
Two primary types of twisted pair cable industry standards have been defined: Unshielded
Twisted Pair (UTP) and Shielded Twisted Pair (STP). Modern Ethernet cables use UTP
wiring due to its lower cost, while STP cabling can be found in some other types of
networks such as Fiber Distributed Data Interface (FDDI).
Fiber Optics
Instead of insulated metal wires transmitting electrical signals, fiber optic network cables
work using strands of glass and pulses of light. These network cables are bendable despite
being made of glass. They have proven especially useful in wide area network (WAN)
installations where long distance underground or outdoor cable runs are required
and also in office buildings where a high volume of communication traffic is common.
Two primary types of fiber optic cable industry standards are defined — single- mode
(100BaseBX standard) and multimode (100BaseSX standard). Long-distance
telecommunications networks more commonly use single-mode for its relatively higher
bandwidth capacity, while local networks typically use multimode instead due to its lower
cost.
USB Cables
Most Universal Serial Bus (USB) cables connect a computer with a peripheral device
(keyboard or mouse) rather than to another computer. However, special network adapters
(sometimes called dongles) also allow connecting an Ethernet cable to a USB port
indirectly. USB cables feature twisted pair wiring.
Because many PCs in the 1980s and early 1990s lacked Ethernet capability, and USB had
not been developed yet, serial and parallel interfaces (now obsolete on modern computers)
were sometimes used for PC-to-PC networking. So-called null model cables, for example,
connected the serial ports of two PCs enabling data transfers at speeds between 0.115 and
0.45 Mbps.
Crossover Cables
Null modem cables are one example of the category of crossover cables. A crossover cable
joins two network devices of the same type, such as two PCs or two network switches.
The use of Ethernet crossover cables was especially common on older home networks years
ago when connecting two PCs directly together. Externally, Ethernet crossover cables
appear nearly identical to ordinary (sometimes also called straight-through), the only
visible difference being the order of color-coded wires appearing on the cable's end
connector. Manufacturers typically applied special distinguishing marks to their crossover
cables for this reason. Nowadays, though, most home networks utilize routers that have
built-in crossover capability, eliminating the need for these special cables.
Chapter: 6
TOPOLOGIES
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2. Cheap to install and expand
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected
to each other. Mesh has n (n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are:
1. Routing
2. Flooding
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those node etc. We can even have routing
logic, to re-configure the failed nodes.
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and it’s very unlikely to lose the data. But it leads to unwanted
load over the network.
1. Partial Mesh Topology: In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology: Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
3. Not flexible.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).
1. Complex in design.
2. Costly.
Chapter: 7
OSI MODEL
OSI MODEL
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International
Organization of Standardization‘, in the year 1974. It is a 7 layer architecture with each layer
having specific functionality to perform. All these 7 layers work collaboratively to transmit the
data from one person to another across the globe.
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual
physical connection between the devices. The physical layer contains information in the form
of bits. It is responsible for the actual physical connection between the devices. When receiving
data, this layer will get the signal received and convert it into 0s and 1s and send them to the Data
Link layer, which will put the frame back together.
1. Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits
sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes
are arranged in a network i.e. bus, star or mesh topology.
4. Transmission mode: Physical layer also defines the way in which the data flows between
the two connected devices. The various transmission modes possible are: Simplex, half-
duplex and full-duplex.
☺→ Hub, Repeater, Modem, Cables are Physical Layer devices.
☺ →Network Layer, Data Link Layer and Physical Layer are also known as Lower
Layers or Hardware Layers.
The data link layer is responsible for the node to node delivery of the message. The main function
of this layer is to make sure data transfer is error free from one node to another, over the physical
layer. When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host
using its MAC address.
Data Link Layer is divided into two sub layers :
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
The packet received from Network layer is further divided into frames depending on the frame
size of NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address
in the header.
1. Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by
attaching special bit patterns to the beginning and end of the frame.
2. Physical addressing: After creating frames, Data link layer adds physical addresses (MAC
address) of sender and/or receiver in the header of each frame.
3. Error control: Data link layer provides the mechanism of error control in which it detects
and retransmits damaged or lost frames.
4. Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus , flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
5. Access control: When a single communication channel is shared by multiple devices, MAC
sub-layer of data link layer helps to determine which device has control over the channel at
a given time.
☺→ Packet in Data Link layer is referred as Frame.
☺→ Data Link layer is handled by the NIC (Network Interface Card) and device drivers of
host machines.
☺→Switch & Bridge are Data Link Layer devices.
Network layer works for the transmission of data from one host to the other located in different
networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the
packet, from the number of routes available. The sender & receiver’s IP address are placed in the
header by network layer.
The functions of the Network layer are :
1. Routing: The network layer protocols determine which route is suitable from source to
destination. This function of network layer is known as routing.
2. Logical Addressing: In order to identify each device on internetwork uniquely, network
layer defines an addressing scheme. The sender & receiver’s IP address are placed in the
header by network layer. Such an address distinguishes each device uniquely and
universally.
Transport layer provides services to application layer and takes services from network layer. The
data in the transport layer is referred to as Segments. It is responsible for the End to End delivery
of the complete message. Transport layer also provides the acknowledgment of the successful
data transmission and re-transmits the data if an error is found.
• At sender’s side:
Transport layer receives the formatted data from the upper layers, performs Segmentation and
also implements Flow & Error control to ensure proper data transmission. It also adds Source
and Destination port number in its header and forwards the segmented data to the Network
Layer.
Note: The sender need to know the port number associated with the receiver’s application.
Generally, this destination port number is configured, either by default or manually. For
example, when a web application makes a request to a web server, it typically uses port number
80, because this is the default port assigned to web applications. Many applications have default
port assigned.
• At receiver’s side:
Transport Layer reads the port number from its header and forwards the Data which it has
received to the respective application. It also performs sequencing and reassembling of the
segmented data.
The functions of the transport layer are:
1. Segmentation and Reassembly: This layer accepts the message from the (session) layer,
breaks the message into smaller units. Each of the segment produced has a header associated
with it. The transport layer at the destination station reassembles the message.
2. Service Point Addressing: In order to deliver the message to correct process, transport layer
header includes a type of address called service point address or port address. Thus by
specifying this address, transport layer makes sure that the message is delivered to the correct
process.
The services provided by transport layer:
Presentation layer is also called the Translation layer. The data from the application layer is
extracted here and manipulated as per the required format to transmit over the network.
The functions of the presentation layer are:
1. Translation: For example, ASCII to EBCDIC.
2. Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the cipher text and the decrypted data is known as plain text. A
key value is used for encrypting as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.
At the very top of the OSI Reference Model stack of layers, we find Application layer which is
implemented by the network applications. These applications produce the data, which has to be
transferred over the network. This layer also serves as a window for the application services to
access the network and for displaying the received information to the user.
Ex: Application – Browsers, Skype Messenger etc.
Application Layer is also called as Desktop Layer.