Summer_Training_Report
-
Upload
sidharth-patnaik -
Category
Documents
-
view
41 -
download
1
Transcript of Summer_Training_Report
Internship report
On
Study of Networking Structure at Infocom services, ONGC
Submitted in partial fulfilment of the
requirement for the award of the degree of
Bachelor of Technology
in
Electronics & Communication
By
Sidharth Patnaik
Enrollment No. 11EC001348
Department of Electronics & Communication
Sir Padampat Singhania University
Udaipur 313601 Rajasthan India
Under the supervision of
Mr. Naresh Chandra
Chief Engineer, Infocom Services
ONGC, Ahmedabad Asset
Chandkheda Road, Ahmedabad,
Gujarat - 382424
Submitted to
ACKNOWLEDGEMENT
Firstly, I would like to thank ONGC Infocom Services; Ahmedabad Asset for
giving me this wonderful opportunity, to undertake my Summer Internship as
an Undergraduate student here. It has been an enriching experience for me.
Secondly and most importantly, I would like to express my heartfelt gratitude
to my Mentor & Project Supervisor Mr. Naresh Chandra (Chief Engineer,
Infocom Services, ONGC, Ahmedabad Asset) for his able guidance,
continuous encouragement and cooperation during the course of the training.
Lastly but never the least, I extend my gratitude towards my university, our
HOD Mr. Udayprakash Singh (ECE) and the faculty members for providing
me with this opportunity to come here and accomplish my undergraduate
engineering training.
SUMMARY
Objectives Of the study was to assess theoretical aspects taught at university
with practical knowledge at a company. To know about the different
departments of an organization. To know about Computer systems and
Computer Networking and its application in the MNCs, how SCADA systems
work and their applications. To learn about Information security which is a
major aspect of data protection and security in MNCs as of today. Learn about
satellite systems and their usage in the data transfer. To learn about GPS
tracking. We were also assigned a project regarding the networking of an
offsite settlement and its connection with the head-office.
CONTENTS
1. INTRODUCTION………………………………………………………..1
2. COMPANY PROFILE…………………………………………………..2
3. Chapter 1: IT NETWORK IN ONGC………………………………….6
4. Chapter 2: SCADA SYSTEM IN ONGC……………………………10
5. Chapter 3: INFORMATION SECURITY IN ONGC………………..13
6. Chapter 4: GPS BASED VEHICLE TRACKING SYSTEM………16
7. Chapter 5: WELL LOGGING SYSTEM…………………………….17
8. Chapter 6: C-BAND, VSAT, BROADBAND WIRELESS ACCESS
RADIO NETWORK……………………………………………………18
9. Chapter 7: SATELLITE COMMUNICATION………………………21
10. Chapter 8: PROJECT REPORT ON NETWORKING…………….24
11. CONCLUSION………………………………………………………..32
12. BIBLIOGRAPHY……………………………………………………..33
1
INTRODUCTION
ONGC (Oil and Natural Gas Corporation Limited) the flagship company of
India was incorporated on June 23, 1993, is a public sector petroleum
company. It is India’s leading “NAVRATNA” in the Oil & Gas sector and
Fortune 2000 company, the most valuable company in India(by market
capitalization) contributing 77% of India’s crude Oil production and 81% 0f
India’s natural gas production. It is the highest profit making corporation in
India. It was set up as a commission on August 14, 1956.
Company name : Oil & Natural Gas Corporation Ltd.
ROC registration number : 55-54155
Incorporation year : 1959
Ownership : Central Govt. Commercial Enterprises.
Main Activity : Exploration & Production of Oil and Gas
Subsidiary/ies : Mangalore Refinery & Petrochemical Ltd.
ONGC Bonny Brahmaputra Ltd.
ONGC Narmada Ltd.
ONGC Videsh Ltd.
Company’s Vision-: “To be a World-Class Oil & Gas Company integrated in
Energy Business with dominant Indian Leadership and Global presence.”
Motto-: “Provide quality services with efficiency and transparency.”
Quality Objective-: “ONGC is committed to provide quality service at optimum
cost with efficiency and Transparency within time frame.”
2
COMPANY PROFILE
ONGC HISTORY:
1947-1960
1961-1990
After 1990
During the pre-independence period, the Assam Oil Company in the north
eastern and attack oil company in north western part of the undivided India
were the only oil companies producing oil in the country, with minimal
exploration input. The major part of Indian sedimentary basins was deemed to
be unfit for development of oil and gas resources.
After independence, the national Government realized the importance oil and
gas for rapid industrial development and its strategic role in defence.
Consequently, while framing the Industrial Policy Statement of 1948, the
development of petroleum industry in the country was considered to be of
utmost necessity.
Until 1955, private oil companies mainly carried out exploration of
hydrocarbon resources of India. In Assam, the Assam Oil Company was
producing oil at Digboi (discovered in 1889) and the Oil India Ltd. (a 50% joint
venture between Government of India and Burma Oil Company) was engaged
in developing two newly discovered large fields Naharkatiya and Moran in
Assam. In West Bengal, the Indo-Staved petroleum project (a joint venture
between government of India and Standard Vacuum Oil Company of USA)
was engaged in exploration work. The vast sedimentary tract in other parts of
India and adjoining offshore remained largely unexplored.
In 1955, Government of India decided to develop the oil and natural gas
resources in the various regions of the country as part of the Public sector
development. With this objective, an Oil and Natural Gas Directorate was set
up towards the end of 1955, as a subordinate office under the Ministry of
Natural Resources and scientific Research. The department was constituted
with a nucleus of geoscientists from the Geological survey of India.
3
A delegation under the leadership of Mr K. D Malviya, the then Minister of
Natural Resources, visited several European countries to study the status of
oil industry in those countries and to facilitate the training of Indian
professionals for exploring potential oil and gas reserves. Foreign experts
from USA, West Germany, Romania and erstwhile U.S.S.R visited India and
helped the government with their expertise. Finally, the visiting Soviet experts
drew up a detailed plan for geological and geophysical surveys and drilling
operations to be carried out in the 2nd Five year Plan (1956-57 to 1960-61).
Soon, after the formation of the Oil and Natural Gas Directorate, it became
apparent that it would not be possible for the Directorate with its limited
financial and administrative powers as subordinate office of the government,
to function efficiently. So in August, 1956, the Directorate was raised to the
status of a commission with enhanced powers, although it continued to be
under the government. In October 1959, the Commission was converted into
a statutory body by an act of the Indian Parliament, which enhanced powers
of the commission further. The main functions of the Oil and Natural Gas
Commission subject to the provisions of the Act were “to plan, promote,
organize and implement programmes for development of Petroleum
Resources and the production and sale of petroleum and petroleum products
produced by it, and to perform such other functions as the Central
Government may, from time, assign to it”. The act further outlined the
activities and steps to be taken by ONGC in fulfilling its mandate.
4
ONGC OFFICES ALL OVER INDIA:
5
Faculties/department visited
Department Duration of
Visit (From)
(To)
Major Equipment Name of
Official
Infocom 08/06/14 08/06/14 Base station radio
Base station data unit
GPS receiver
Remote station
Subscriber station
Subscriber data
adaptor
Mr.Naresh
Chandra
and
Mr.Anoop
Sharma
SCADA 16/06/14 16/06/14 Rig Station
Asset Centers
RTU(Remote
Terminal Unit)
Mr.PK
Gupta
Well and
Logging
30/6/14 30/06/14 Flow meter
Thermometer
Pressure gauge
Mr. Ashok
Khalkor
6
Chapter 1: IT NETWORK IN ONGC
A network is a hierarchical system of boxes and wires organized by
geographical proximity.
LAN (local area network) spans a building or campus.
Ethernet is most prominent example.
WAN (wide-area network) spans country or world.
Typically high-speed point-to-point phone lines
An internetwork (internet) is an interconnected set of networks.
The Global IP Internet (uppercase “I”) is the most famous example of an
internet (lowercase “i”). In Networking, data is transferred in the form of
packets (a stream of 0’s and 1’s), and the way in which the transfer takes
place, is decided by computer’s “Protocol”. “http” is a kind of Protocol, known
as Hypertext transfer protocol. While surfing on web, when we try to open a
webpage, we indirectly request the server of the concerned webpage by using
protocols.
The Architecture of a Network consists of seven layers:-
• PHYSICAL LAYER
• DATA LINK LAYER
• NETWORK LAYER
• TRANSPORT LAYER
• SESSION LAYER
• PRESENTATION LAYER
• APPLICATION LAYER
The first four layers are data flow layers, which are responsible for handling,
addressing, encoding the data in the network.
7
The last three layers are known as application layers, here the decoding,
transformation of data in required form takes place.
More clearly, the working of various layers is described below-:
• Physical layer – This layer is responsible for moving data bits between
devices. Specifies voltage references, wire speeds and pin out cables.
• Data link layer – This layer combines bits into bytes and bytes into
frames. Accesses media using MAC Address. It can detect errors but cannot
correct them.
• Network layer – This layer provides logical addressing, which routers
use for path discrimination. This addressing is known as IP addressing.
• Transport layer – This layer is responsible for monitoring of the
networking system. Checks for the reliable and unreliable delivery.
Responsible for error correction.
• Session layer – This layer remembers the port number of the session.
• Presentation layer – This layer transforms the data frames/bytes/bits
into the desired format.
• Application layer – This is the final layer, which delivers the data to the
outside world.
8
USAGE OF COMPUTER NETWORK
Resource Sharing- programs, equipment, data & information are
available
• Reliable and up-to-date information
• Communication
• Businesses and customer services
Internet-It is a single network but a network of networks. The internet is a
system of linked networks that are worldwide in scope and facilitate data
communication services such as remote login, file transfer, electronic mail, the
World Wide Web and newsgroups.
Intranet-It is an internal closed network of organizations that is utilizing
Internet-type & protocols.
Firewalls - used to prevent unauthorized communication and secure sensitive
internal data.
Virtual Private Networking (VPN) -- a way to access intranets from public
Internet
NETWORKING ACTIVE DEVICES
Client / Server-This type of network is designed to support a large number of
users and uses dedicated server/s to accomplish this. Clients log on to the
server/s in order to run applications or obtain files. Security and permissions
can be managed by 1 or more administrators which cut down on confusion.
This type of network also allows for convenient backup services, reduces
network traffic and provides a host of other services that come with the
network operating system (NOS)
Workstations and NIC
Switch (& Bridge)
A bridge is a L2 device that divides a network into separate collision domains
while retaining the broadcast domain. It divides a network into segments with
9
each segment having a reduced number of nodes that are competing for
access to the transmission medium. Switches are bridges with multiple ports.
When a packet arrives, the header is checked to determine which segment
the packet is destined for, and then it is forwarded to that segment. If the
packet is destined for the same segment that it arrives on, the packet is
dropped and not retransmitted. This prevents the packet being “broadcasted”
onto unnecessary segments, reducing the traffic.
Nodes which inter-communicate frequently should be placed on the segment.
Switches work at the MAC layer level (L2).
Routers-They work similar to bridges and switches in that they filter out
unnecessary network traffic and remove it from network segments. Routers
generally work at the protocol level (L3).
Hub-A hub is repeater with multiple ports. Each port is RJ-45 connector.
Repeater- A physical layer device that extends the distance of a network by
amplifying and retiming signals. A repeater corrects for attenuation problems.
10
Chapter 2: Supervisory Control and Data Acquisition (SCADA)
SCADA system consists of acquiring information, transferring to a central site,
carrying out necessary analysis and control, and then displaying this data on
operator screen/s.
The SCADA system is used to monitor and control a plant from
a distance.
SCADA systems are used in nearly every industry
The size of such systems range from thousands of input/output
(I/O) channels.
Data acquisition refers to the method used to access information or data from
the equipment being monitored and controlled. The data accessed are then
forwarded onto a telemetry system ready for transfer to the different sites.
They can be analog and digital information gathered by sensors. It can also
be data to control equipment.
The SCADA system is used in two areas of ONGC:-
• Drilling
• Production
Presently, there is no supervision and control at ONGC, here SCADA servers
are used only for data acquisition.
1. Drilling SCADA:
Drilling SCADA system is divided into three tier system, i.e.
• Tier 1: Local drilling or regional (Rig.) stations.
• Tier 2: Asset centre (i.e. Ahmedabad, Mehsana, etc.)
• Tier 3: Corporate office or Headquarter (New Delhi)
At Rig station (Tier 1):
11
Aggregating drilling data from rig servers.
Transmitting drilling data from rig servers to asset centre at
0.2Hz rate.
Receiving drilling data from rig servers at 1Hz rate.
WAN connectivity.
Generate and view plots based on historic drilling data.
View Sort and analyse drilling reports.
Do first line drilling calculations through built in drilling
calculators.
At Asset centre (Tier 2):
Access data from all rig locations of asset centre port-folio.
Receive data in 5 seconds resolution & store database.
Falcon database in Bangalore, store database of third party.
At Headquarters (Tier 3):
Receive, view and analyse drilling parameters from all tier 2
connectivity.
2. Production SCADA:
Production information is required by different organization, from scientific
research as well as business purpose groups and managers.
Information is vital for planning and coordination of all E and P activity.
OPC - OLE for process control
OLE - Object linking and embedding
APPLICATIONS:
• Well testing
• Tank gauging
• Reports
12
INSTRUMENTS:
• Differential pressure transmitter
• Temperature transmitter
• Ultrasonic Meter
• Level transmitter (Storing and testing)
Remote Terminal Unit (RTU):-Collects all digital and analog field signals (FF,
Modbus, hart, etc.). Load data into OPC servers.
SCADA are of two types: -
Primary
Secondary
SERVERS:
• SCADA Servers
• Common Database and Application Servers
• NMS and Web Servers
• Training Simulator
SCADA SERVERS:
• Type A- Intel Xeon, 2 CPU Windows 2003 OS
• Type B- Intel Xeon (64 Bit), 2 CPU Windows 2003 OS
• Type C - Intel Xeon (64 Bit), 2 CPU 400 GB RAID Windows 2003
• Type D - Intel Xeon (64 Bit), 4 CPU400 GB RAID Windows 2003
13
Chapter 3: INFORMATION SECURITY IN ONGC
INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS)
Information Security:-
Information is an asset that like other important business asset is essential to
an organization business and consequently needs to be suitably protected. In
today’s increasingly interconnected complex business environment it has got
far reaching implications. And because of this complex interconnectivity,
information is now exposed to a growing number and wide variety of threats
and vulnerabilities.
Information security is the protection of information from wide range of threats
in order to achieve business continuity, minimize business risk and maximize
ROI and business opportunities.
ISMS is achieved by implementing a suitable set of controls, including
policies, processes, procedures, organizational structures and software and
hardware functions. These controls are to be established, implemented,
monitored, reviewed and improved, wherever required.
There are three basic tenets of Information Security:-
1. Confidentiality
2. Integrity
3. Availability
It is required by the officials to prevent disclosure of information to
unauthorized individuals and any violation of message is actively modified in
transit.
In case of damage of hardware, the information must be available or
recovered back, because the risk of information lost cannot be tolerated as it
is very crucial.
Some measures taken by ONGC for Information security:-
14
• “Gate Pass” system to enter the premises.
• Only authorized external drives (e.g. Pen drives) are allowed in the
premises.
• Only licensed softwares are installed in PC’s, to ensure cyber security.
ITIMMS (IT Infrastructure Maintenance & Management Systems)
IT Infrastructure Maintenance and Management Services (ITIMMS) contract is
a kind of contract issued by ONGC to fulfil requirements of hardware
management & Maintenance, which has its own terms and conditions.
Recently, this contract is given to TATA TCS, and this contract is revised after
every three years.
There are two categories of services provided under this contract:-
1. Maintenance Support Services (MSS): Comprehensive maintenance
and repair of all IT hardware to keep the system operational. Minimum
number of service engineers are appointed for respective number of
hardware’s to check upon. There are total 4229 number of hardware in
Ahmadabad asset, which are working in proper situation every day by the
help of MSS.
2. Facility management Service (FMS): Complete network and server
management, internet, antivirus, gateway, vendor management. Under this
service, contractors are bounded to perform their work timely.
Under the ITIMMS contract, to fulfil the requirement of above two services
various centres are established i.e.
Network operational centre (NOC): It is set up at Delhi with software like CA
(computer associates) tools.
15
This software includes various features:-
i. Traffic accounting.
ii. Network performance.
iii. Network fault management.
For, Network management, Reporting and analysis of data NOC is
established.
Call Management- 37 locations configure as help desk in service desk. They
are established to attend calls and resolve the problem in required time.
Apart from all this, there is also a provision of penalty over the contractors
under this contract.
There is a provision of SLR (Service Level Requirement), under which overall
quarterly availability is 99%. To insure the calls encountered, they are put
under three categories-:
I. Critical 1:- L3 switch, Router, OFC etc.
II. Critical 2:- Individual user, slowness, etc.
III. Critical 3:- View software upgradation.
The terms Response time and Resolution time are usual among calls, if they
are exceed then there is provision of penalty under Non-performance
Detection (NPD).To avoid penalty standby hardware must be present, i.e.
10% of annual MSS value for spare, minimum 2% of NOS of desktop, Printer,
UPS and 1% laptop for standby
16
Chapter 4: GPS TRACKING SYSTEM-A VEHICLE BASED
SYSTEM
The first class was of GPS based vehicle tracking system. In this class we
have been taught about how GPS system helps ONGC to track and monitor
the Oil containing vehicle. This technology found greater importance for
security purpose, because each and every vehicle tanker contains about INR
9 Lacks of crude oil.
This technology has been implemented on :- (Ahmedabad asset)
• 40 Nos. of oil tanker
• 12 Nos. of fire tenders
• 10 Nos. of security patrolling jeeps
• 40 Nos. of Line walkers
All of the above are meant to patrol 250km Oil trunk lines of Ahmedabad
asset.
-:
Figure 4.1 GPS ARCHITECTURE
17
Chapter 5: WELL LOGGING SYSTEMS
Once a well is drilled, the presence of hydrocarbons and its commercial
viability has to be determined. The first step to this direction is to record geo-
physical parameters such as resistivity, sonic velocity, fluid nature, its
producibility and volume of hydrocarbons present. This activity is known as
log data acquisition and interpretation.
Classification of Well logging Systems:-
• Open hole logging
• Cased hole logging
Basically, open hole logging is carried out to explore the existence of Oil
reservoirs, properties to calculate the diameter of bore hole.
It can be classified as-:
Conventional
Measurement while drilling (MWD)
Tough logging conditions (TLC)
High tech services.
Cased hole logging jobs are carried out when casing is lowered in the well
and it is in static condition.
Important logging tools:-
• Resistivity tools
• Porosity tools
• Selective formation tester (SFT)
• Temperature log
• Dipmeter (FED/SED)
• Gamma rays/SP etc.
18
• Calliper log
• Free point indicator- CCL assembly
• Casing and drilling pipe cutter
• Side wall coring tool
• Flow meter
• Thermometer
• Pressure gauge
• Radio active tracer
• Fluid density tool
Types of Logs:-
• SPLOG – It is one of the simplest log known as Spontaneous potential
log. It is used for boundary resolution, estimation of salinity in the formation
etc.
• GRLOG – It is known as gamma rays log used in measurement of
naturally occurring gamma activities in formation.
• Resistivity
• Porosity & Calliper Log
19
Chapter 6: C-BAND, VSAT & BROADBAND WIRELESS
ACCESS RADIO NETWORK
The C band is a name given to certain portions of the electromagnetic
spectrum, including wavelengths of microwaves that are used for long-
distance radio telecommunications. The IEEE C-band (4 to 8 GHz) - and its
slight variations - contains frequency ranges that are used for many satellite
communications transmissions, some Wi-Fi devices, some cordless
telephones, and some weather radar systems. For satellite communications,
the microwave frequencies of the C-band perform better under adverse
weather conditions in comparison with Ku band (11.2 GHz to 14.5 GHz)
microwave frequencies, which are used by other communication satellites.
The adverse weather conditions, collectively referred to as rain fade, all have
to do with moisture in the air, including rain and snow.
NATO C-band: The NATO C-band is the range of radio frequencies from 500
to 1000 megahertz (MHz) in the system of letter designations for frequency
bands used by the NATO for electronic countermeasure (ECM)
applications.[2][3] This is equivalent to wavelengths between 0.6 and 0.3 m.
VSAT: A Very Small Aperture Terminal (VSAT) is a 2-way satellite ground
station with a dish antenna that is smaller than 3 meters.
Antennas range - 75 cm to 1.2 m
Data rates range-narrowband up to 4 Mbit/s
VSAT was originally intended for store and forward data communication but
has evolved into real-time internet services.
• Much smaller and vastly lower-powered antenna.
• Several return-path channels can co-exist on a single satellite
transponder, which is further subdivided using to serve multiple customers.
20
• VSAT frequency allocation is as follows:
Band C: 3 to 7 GHz
Band Ku: 10 to 18 Hz
Band Ka: 18 to 31 Hz
Applications:
• VSATs are also used for transportable, on the move (with phased-array
antennas) or mobile maritime communications.
• VSATs access satellites in geosynchronous orbit to relay data from
small remote earth stations (terminals) to other terminals (in mesh
configurations) or master earth station "hubs" (in star configurations).
• VSATs are commonly used to transmit narrowband data (point of sale
transactions such as credit card, polling or RFID data; or SCADA), or
broadband data (for the provision of Satellite Internet access to remote
locations, VoIP or video).
Interactive Applications:
In a centralized system, all terminals in the offices operate “on-line” and
communicate intermittently with the host or servers at the data centre. In a
distributed system, each remote office has terminals linked to its local host or
servers. The servers then communicate with each other in WAN.
• VSAT network supports 2-way voice capability for telephone
• File Transfer –use of the TCP/IP File transfer Protocol (FTP) to transfer
files and the printing of large reports
• File Broadcast – IP multicast – send the data to multiple sites in one
transaction
21
Chapter 7: SATELLITE COMMUNICATION
INTRODUCTION:
Communication involves the transfer of information between a source and a
user.
Satellite Communication refers to transmitting a signal from the Earth up to a
satellite and then receiving a signal back to the Earth.
The time to go and bounce back is two seconds is called satellite delay.
The ability to transmit our signal up to such a high relay point and then receive
it again back on the Earth allow us to receive it whenever we are in the world
as long as we can see the relay point. The satellite does not have to be a
huge expensive array of electronics and solar panels.
This wide range broadcasting ability has given rise to a multitude of different
satellites carrying all kinds of information.
SATELLITE EARTH STATION:
A satellite earth station is a communications facility with a microwave radio
transmitting and receiving antenna and required receiving and transmitting
equipment for communicating with satellites (also known as space stations).
ONGC uses ARABSAT-II, each with its own preferred antenna designs, with
C band electromagnetic spectrum.
WORKING:
In a satellite communication system we have a modem (modulator /
demodulator) which takes in the digital information and modulates onto a
signal carrier for transmission and can also demodulate the data from a
received carrier to produce the data or digital TV picture.
22
Then we have a transmitter and a receiver amplifier for two way
communications. If we were only receiving then we would only have the
receive side of the system, this why our satellite TV boxes are small and
affordable. It cheaper to receive than it is to transmit.
Next we have our antenna. We point the antenna at the satellite and we can
receive a signal. We can also now send our signals to the satellite.
The satellite also has an antenna, a receiver, a transmitter and another
antenna. This is to keep our transmit signals separate from our receive
signals.
ADVANTAGES & APPLICATIONS OF SATELLITE COMMUNICATION:
• Mainly used for World Wide Telecommunications
• Used for remote area communication
• To reach isolated planes on Earth
• Long distance, domestic, telephone links
• Cellular phones and Broadcasting services such as TV and Radio
• To make point – to – point communication
• Cyclone warning Dissemination system
• Used in military services
SERVICES:
The services offered by the satellites can be divided in to the following
categories:
Voice Services
• Telephony
• Audio Broadcasting
23
• Voice conferencing
Video and Image Services
• Facsimile
• Graphics
• Full motion video
• Broadcast quality video
• Teletext / videotext
Data Services
• Electronic Mail
• Database services
• File transfer
• Remote data monitoring
• Short message transmission
• Paging
24
Chapter 8: PROJECT WORK-SUMMER TRAINING-JUNE-2014
“A new GGS (Group gathering station) has come at a distance of 25 km from
our asset office at Chandkheda. We have received requirement from the GGS
for providing internet and SAP services connectivity to 25 executives within a
month’s time.”
•Assuming that you have fair idea about computer networking and you
understand ONGC’s network well, prepare a plan for providing network
connectivity to the GGS to meet above requirement.
•Show various steps you will take to conceptualize the total requirement i.e.
time of completion, Architecture of network and total cost.
•Also provide LAN connectivity within 25 executives at GGS.
•Prepare details of networking hardware (switches, routers, hubs, modems,
UTP cable, etc.)
•Is it possible to provide voice connectivity over the same WAN connectivity
you are providing for data? If yes, give details.
•Think out of box and suggest as many alternative plans as you can for
fulfilling the networking requirement within months’ time.
25
Schematic Diagram of Network from Ahmedabad Asset to Group
Gathering Station (GGS)
Figure 8.1
26
Components of Network
• Server: A server is a computer that provides data to other computers. It
may serve data to systems on a local area network (LAN) or a wide area
network (WAN) over the Internet.
• L2 Switch: Layer 2 switching is hardware based, which means switches
use application-specific integrated circuit (ASICs) to build and maintain filter
tables (also known as MAC address tables or CAM tables). One way to think
of a layer 2 switch is as a multiport bridge.
• Router: A router is a device that forwards data packets between
computer networks. This creates an overlay internetwork, as a router is
connected to two or more data lines from different networks.
• Leased Lines: A leased line is a service contract between a provider
and a customer, whereby the provider agrees to deliver a symmetric
telecommunications line connecting two or more locations in exchange for a
monthly rent (hence the term lease).
• Voice Over Internet Protocol (VoIP) Software Exchange Switch: VoIP
Switch is a platform that allows implementing various types of Voice Over the
Internet Protocol (VOIP) services, with retaining shared, uniform management
interface.
• Modem: Short for modulator-demodulator. A modem is a device or
program that enables a computer to transmit data over, for example,
telephone or cable lines. Computer information is stored digitally, whereas
information transmitted over telephone lines is transmitted in the form of
analog waves. A modem converts between these two forms.
• Printing Device/Printer: In computers, a printer is an output device that
accepts text and graphic output from a computer and transfers the information
to paper, usually to standard size sheets of paper.
27
• UPS (Uninterruptible Power Supply): A device that provides battery
backup when the electrical power fails or drops to an unacceptable voltage
level. It is a very useful device when it comes to keeping the data that is
stored in the dynamic memory of a computer which depends upon the power
supply for the storage.
• UTP Cable (CAT-6): (Unshielded twisted pair cable ie:- Category 6
cable):
Cat-6 network cabling is used as the cabling infrastructure for 10BASE-T
(Ethernet), 100BASE-TX (Fast Ethernet), 1000BASE-T (Gigabit Ethernet, or
GbE) and 10GBASE-T (10-Gigabit Ethernet, or 10 GbE) networks. The Cat 6
standard provides performance of up to 250 MHz (500 MHz for the newer Cat
6a standard) and can be used up to a maximum length of 100 meters (55
meters for 10GBASE-T networks).
Working of Network
The network is basically formed between the Ahmedabad Asset Infocom
Services Office (Chandkheda base station) and Group Gathering Station
(GGS) at a distance of 25 km.
At Infocom Services Office (Ahmedabad Asset), Firstly the 5 Servers namely
S1-Antivirus/Firewall Server, S2-ADC/DHCP Server, S3-NOC Server, S4-
Scada Server, and S5-Back-Up Server are connected to the Central Power
Supply which is also connected to the UPS.
Antivirus/Firewall Server: They protect the system/data contained in system
from being corrupt by Malware.
ADC/DHCP Server: An application delivery controller (ADC) is a computer
network device in a data centre, often part of an application delivery network
(ADN) that helps perform common tasks such as those done by web sites to
remove load from the web servers themselves. A DHCP Server assigns IP
addresses to client computers.
28
NOC Server: A network operations centre (NOC) also known as a “network
management centre”, is one or more locations from which network monitoring
and control, or network management, is exercised over a computer.
Scada Server: Supervisory Control and Data Acquisition (SCADA)
communication server. Now, important information from SCADA remote
terminal units is readily available to the control system and desktops of
supervisors and managers throughout the organization enabling them to
make faster, more effective decisions.
Back-Up Server: A server responsible for backing up and restoring files,
folders, databases and hard drives on a network in order to prevent the loss of
data in the event of a hard drive failure, user error, disaster or accident.
48 Port L2 Switch: It is a computer networking device that is used to the 5
servers together on a computer network by performing a form of packet
switching.
Router at Chandkheda is basically used to connect network at
CHANDKHEDA to network at GGS through a Router installed at GGS.
Now these 2 routers shall be ideally connected through Wireless Antenna but
due to its installation duration exceeding one month, we use a common
alternative ie Leased Line having bandwidth of 2 Mbps. And this bandwidth is
sufficient as not all workstations will be switched on simultaneously. As soon
as Wireless Antenna is ready to be used, we will switch to it as it is much
more cost effective.
The Router at GGS is connected to 48 Port L2 Switch over there. If the
workstations are located within 100 m, we directly make a connection from
switch to respective workstation using CAT-6 UTP Cable. Otherwise, if the
workstations are located beyond 100 m, we can’t establish a direct
connection, so we connect using ADSL lines and MODEMS. A link is
established between switch to Modem1 using CAT-6 UTP Cable, which is
further connected to Modem2 using ADSL cable, then again to workstation by
CAT-6 UTP Cable. A common link is established for continuous power supply
at GGS using Power Supply Bus finally connected to UPS.
29
COST ESTIMATION:
Serial No.
Component
Quantity
Cost
Companies
1.
Leased Line
Cover
distance
of 25 km
2.5
lakhs
BSNL
2.
Router
1
2,749
D-Link DSL-2750
Wireless Router
3.
48 Port L2
Switch
1
14,850
D-Link DES-1210-
52
4.
Printer
1
6,000
Canon, hp
6.
Modem
5
4,500
TP LINK TD-8816
ADSL MODEM
7.
UPS
1
10,000 -
25,000
Intex, APC, iball
8.
VoIP
Software
Exchange
Switch
1
4,255
NetGear
FS108PEU
9.
ADSL Cable
74.50
per meter
ADSL Patch Cable
Cord 2M
TOTAL
EXPENDI
TURE
340,000
(Approx. & At
max)
Table 8.1 Cost Expenditure
30
Antivirus Software:
• We will use Server-Client type Antivirus instead of Standalone Antivirus
that is commonly used in our Personal Computers. This is a very important
aspect for providing desktop security and antivirus protection. It is like server
based antivirus updates itself on the server so other clients connected to it ,
just download it and update locally Whereas in client based each would have
to update via the web. Server-based AV usually means the scan processing is
done there.
• Servers that download updates on behalf of clients which are
connected to it are usually called management servers. They let an
administrator use a single central point of control for all the connected clients,
configuring scanning and exception policies, running reports, and checking
client status in one place. All the popular "enterprise" Anti-Virus vendors offer
something like this, often called endpoint suites. It's usually cost effective if
you have more than 20 clients.
IP Addressing & VoIP Scheme
An Internet Protocol address (also known as an IP address) is a numerical
label assigned to each device (e.g., computer, printer) participating in a
computer network that uses the Internet Protocol for communication. Here,
the MAC Address is permanent, whereas the IP address can change. The IP
address thus, assigned here is temporary having 8-day validity. The Dynamic
Host Configuration Protocol (DHCP) server assigns the IP address
dynamically. The address is valid only till the workstation is switched ON and
for 8-days. The DHCP server checks every 8 days for the ON/OFF status of
the workstation during which if the Workstation is Switched OFF it takes away
the IP address assigned to the workstation. A new IP maybe assigned as
soon as the workstation is ON.
Voice-over-Internet protocol (VoIP) is a methodology and group of
technologies for the delivery of voice communications and multimedia
sessions over Internet Protocol (IP) networks, such as the Internet. Here,
31
voice connectivity over the same WAN connectivity is provided using Voice
over Broadband. It is a branch of Internet Telephony.
The term Internet telephony specifically refers to the provisioning of
communications services (voice, fax, SMS, voice-messaging) over the public
Internet, rather than via the public switched telephone network (PSTN). The
steps and principals involved in originating VoIP telephone calls are similar to
traditional digital telephony and involve signalling, channel setup, digitization
of the analog voice signals, and encoding. Instead of being transmitted over a
circuit-switched network, however, the digital information is packetized, and
transmission occurs as Internet Protocol (IP) packets.
32
CONCLUSION
It can be concluded that there are several new technologies but making
correct choice is important which should be secure, fast and profitable. For
communication, now a day’s IP addressing and VOIP scheme is used. An
Internet Protocol address (also known as an IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a computer
network that uses the Internet Protocol for communication.
Voice-over-Internet protocol (VoIP) is a methodology and group of
technologies for the delivery of voice communications and multimedia
sessions over Internet Protocol (IP) networks, such as the Internet.
ONGC Ahmedabad is using leased lines from BSNL.A leased line is a service
contract between a provider and a customer, whereby the provider agrees to
deliver a symmetric telecommunications line connecting two or more locations
in exchange for a monthly rent.
It can be concluded that with the increase of new communication and infocom
services, security of information is prime job so various new information
security methods should be used in order to protect them.
To conclude the present scenario in the field of communication has huge
potential to make India one of the leading countries economically and the
youth of India can make their career with specialization in handling new
software in market.
33
BIBLIOGRAPHY
ONGC Reports
Websites:
www.ongcindia.com
www.google.co.in
en.wikipedia.org