Sunteți pe pagina 1din 37

ISP

TRAINING REPORT
On

ISP TECHNOLOGY
Submitted in the practical fulfillment for the award of Degree of Bachelor of Technology
In

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGG.

HARYANA COLLEGE OF TECHNOLOGY & MANAGEMENT, KAITHAL-136027

Submitted by Rohit Nagpal (1708509)

Submitted to ECE Department

ELECTRONICS & COMMUNICATION ENGINEERING KURUKSHETRA UNIVERSITY KURUKSHETRA

ISP

CONTENTS

Company Certificate Company Introduction (Preface) Acknowledgement List of Figures List of Tables Chapter 1: INTRODUCTION

i ii iii iv v

1.1 Introduction to ISP 1.1 Definition of ISP Chapter 2: LITERATURE REVIEW

PAGE No. 1 2

2.1 ISP Interconnectiom 2.2 Networking 2.1.1 LAN 2.1.2 WAN 2.3 Network Topologies

Chapter 3: 3.1

CIRCUIT DIAGRAM & WORKING UTP Cabling standards 3.1.1 Straight through cable 3.1.2 Crossover Cable Network 3.2.1 point to point hdsl based 3.2.2 ill-sdsl based 3.2.3 ill-rfl based Routers

3.2

12

3.3

Chapter 4: Chapter 5:

RESULTS & DISCUSSION CONCLUSIONS AND FUTURE SCOPE 5.1 Conclusions 5.2 Future Scope

26

27 28

REFERENCES APPENDIX (include Datasheet, Source code)

31

ISP

CERTIFICATE

This is to certify that the Project titled ISP Technology and submitted by Rohit Nagpal having Roll No-1708509 for the partial fulfillment of the requirements for the degree of Bachelor of Technology/Engineering (B.Tech.),embodies the bonafide work done by him under my supervision.

__________________________ Signature of the Supervisor Place: ____________________

Date: ____________________

ISP

Acknowledgement

This report gives the details of the project work done at the end of IV/ VI semester during the summer vacation for partial fulfillment of the requirements for the degree of Bachelor of Technology/Engineering (B.Tech/ B.E.), under the Supervision of Mr. Ranbir , Mr. Neeraj , Mr. Atul , Mr. Akshay. I am very grateful to all my supervisors for their help and able guidance for the project. I am thankful to management of Connect to give me a chance for the summer training in there esteemed organization. I would also like to thanks all ISP department of connect that came out of their way to make my Summer Training comfortable and successful with aimed result.

____________________ Signature of the Student Name: Rohit Nagpal

Date: ______________

ISP

LIST OF FIGURES

Page No.

Fig.2.1 Fig.2.2

ISP Interconnection Networking

4 5 6 6 7 7 9 11 16 18 21 22 23 27 29 30 31 34 35

Fig.2.2.1 Lan Fig.2.2.2 Wan Fig.2.3.1 Mesh Topology Fig. 2.3.2 Star Topology Fig. 2.3.3 Bus Topology Fig. 2.3.4 Ring Topology Fig. 3.1.1 UTP Cable Fig. 3.1.2 Crossover Cable Fig.3.1.3 RJ45 Ends Fig. 3.2.1 point to point-hdsl based network Fig. 3.2.2 Ill-sdsl based network Fig.3.2.3 ill-RF based Fig.3.4 Fig.4.2 Routers Allot

Fig. 4.2.1 Bandwidth monitoring in allot Fig 4.3 Fig.4.4 Ping command MRTG Graphs

ISP

LIST OF TABLES

TABLE S.NO. NO. 1. 2 3 4 5 3.1.1 3.1.2 3.2.1 3.2.2 4.1 One end of straight cable One end of straight cable One end of crossover cable Other end of crossover cable E1 to Ethernet converters DESCRIPTION

PAGE NO. 19 20 22 23 30

ISP

ABOUT THE COMPANY : HFCL Introduction We are delighted to hereby present our project report that was undertaken during July 2010, HFCL,which aims at giving training to student for advance computing.The project undertaken was Employee Management System Established in the year 1987, Himachal Futuristic Communications Ltd. has developed a vast base for indigenous telecom equipment manufacturing in India . It started with manufacturing transmission Equipment and soon expanded its product portfolio to manufacture Access Equipment, Optical Fibre Cable, Accessories and Terminal Equipment. A combination of long-term vision and proactive business strategy has helped Himachal Futuristic Communications Ltd. achieve a leadership position. From the time of inception, intensive R&D efforts have helped to create products that match global standards. The R&D areas range from exploration of new technologies, designing of radio, optical transmission equipment and access equipment and development of software solutions. HFCL's reputation is built upon its technological expertise and in its sophisticated manufacturing plants. In this I will give some brief overview about my training.I studied Network architecture & structure , Network Connectivity's , work of each shift ,MRTG graphs.During this training now I m familiar with all network devices which are used there like router , L3 switches ,converters etc This Summer Training provided to Engineers, which include the Practical approach to the networking, & how to implement the network used in the Company. The services include: Basic Telephony CDMA based Mobile Service Centrex Phone Card Tele Meet Leased Line Internet Leased line ISDN Video Conference

HFCL Infotel limited (formerly The Investment Trust of India Limited) is a premier broadband telecommunication service provider operating in the Punjab Telecom Circle, comprising of State of Punjab and Union Territory of Chandigarh. The Company is the first private Basic services Licensee for the circle offering fixed and wireless telephony services and a large bouquet of value-added, data and broadband services like XDSL, ISDN, and leased-lines.

ISP

INTRODUCTION 1.1 INTRODUTION TO ISP 1.2 DEFINITION In this I will give some brief overview about my training.I studied Network structure , how to change policy , MRTG graphs ,About work of each shift, how to disconnect planet caf customer and some other important tasks. During this training now I m familiar with all network devices which are used there like router , L2 , L3,converters ,database server ,allot, packetshaper, Sub netting , Firewall etc. This Summer Training provided to Engineers, which include the Practical approach to the networking, & how to implement the network used in the Company.

1.2 WHAT IS ISP TECHNOLOGY? An Internet service provider (ISP), also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the Internet. The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol Paradigm, such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects. ISPs may provide Internet e-mail accounts to users which allow them to communicate with one another by sending and receiving electronic messages through their ISP's servers. ISPs may provide services such as remotely storing data files on behalf of their customers, as well as other services unique to each particular ISP. SPs employ a range of technologies to enable consumers to connect to their network. For users and small businesses, the most popular options include dial-up, DSL (typically Asymmetric Digital Subscriber Line, ADSL), broadband wireless, cable modem, fiber to the premises (FTTH), and Integrated Services Digital Network (ISDN) (typically basic rate interface). For customers with more demanding requirements, such as medium-to-large businesses, or other ISPs, DSL (often SHDSL or ADSL), Ethernet, Metro Ethernet, Gigabit Ethernet, Frame Relay, ISDN(BRI or PRI), ATM, satellite Internet access and synchronous optical networking (SONET) are more likely to be used.

ISP

2.1

ISP Interconnection

Figure 2.1

Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP and/or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a Tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence.

2.2 Networking
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.

ISP

Figure 2.2

Computer networking is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data.[1] Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology and/or computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines. The three types of networks are: the Internet, the intranet, and the extranet. Examples of different network methods are:

Local area network (LAN), which is usually a small network constrained to a small geographic area. An example of a LAN would be a computer network within a building.

Metropolitan area network (MAN), which is used for medium size area. examples for a city or a state.

Wide area network (WAN) that is usually a larger network that covers a large geographic area.

Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.

All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies.[2] The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet[3]). Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs.

10

ISP

2.2.1 LAN:

A LAN, or Local Area Network is a group of two or more computers, physically close together (usually in the same building), that are linked to each other. LANs can contain devices other than computers, for example, printers, print servers, storage devices, etc.

Most local area networks are built with relatively inexpensive hardware such as Ethernet cables, network adapters, and hubs. Wireless LAN and other more advanced LAN hardware options also exist.

Specialized operating system software may be used to configure a local area network. For example, most flavors of Microsoft Windows provide a software package called Internet Connection Sharing (ICS) that supports controlled access to LAN resources.

The term LAN party refers to a multiplayer gaming event where participants bring their own computers and build a temporary LAN.

The ITU-T G.hn standard is an example of a technology that provides high-speed (up to 1 Gbit/s) local area networking over existing home wiring (power lines, phone lines and coaxial cables). A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).

Figure 2.2.1 Typical library network, in a branching tree topology and controlled access to resources

11

ISP

All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers. The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and no need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Gbit/s.

2.2.2 WAN

A WAN spans a large geographic area, such as a state, province or country. WANs often
connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs). The world's most popular WAN is the Internet. Some segments of the Internet, like VPNbased extranets, are also WANs in themselves. Finally, many WANs are corporate or research networks that utilize leased lines. WANs generally utilize different and much more expensive networking equipment than do LANs. Key technologies often found in WANs include SONET, Frame Relay, and ATM.

A wide area network is a network where a wide variety of resources are deployed across a large domestic area or internationally. An example of this is a multinational business that uses a WAN to interconnect their offices in different countries. The largest and best example of a WAN is the Internet, which is a network composed of many smaller networks. The Internet is considered the largest network in the world.The PSTN (Public Switched Telephone Network) also is an extremely large network that is converging to use Internet technologies, although not necessarily through the public Internet.

12

ISP

Figure 2.2.2 WAN

A Wide Area Network involves communication through the use of a wide range of different technologies. These technologies include Point-to-Point WANs such as Point-to-Point Protocol (PPP) and High-Level Data Link Control (HDLC), Frame Relay, ATM (Asynchronous Transfer Mode) and Sonet (Synchronous Optical Network). The difference between the WAN technologies is based on the switching capabilities they perform and the speed at which sending and receiving bits of information (data) occur. A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, thedata link layer, and the network layer.

2.3 Network Topologies


Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer network.[1][2] Network topologies may be physical or logical. Physical topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. Topology can be considered as a virtual shape or structure of a network. This shape does not correspond to the actual physical design of the devices on the computer network. The computers on a home network can be arranged in a circle but it does not necessarily mean that it represents a ring topology.

13

ISP

Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical. A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometric shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular network.

2.3.1 Basic topology types


The study of network topology recognizes seven basic topologies:

Bus topology Star topology Ring topology Mesh topology Hybrid topology

Mesh Topology:
Devices are connected with many redundant interconnections between network nodes. In a true mesh topology every node has a connection to every other node in the network. The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law. Mesh networking is a type of networking wherein each node in the network may act as an independent router, regardless of whether it is connected to another network or not. It allows for continuous connections and reconfiguration around broken or blocked paths by hopping from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully

14

ISP

connected network. Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile. Mesh networks can be seen as one type of ad hoc network. Mobile ad hoc networks (MANET) and mesh networks are therefore closely related, but MANET also have to deal with the problems introduced by the mobility of the nodes. Mesh networks are self-healing: the network can still operate when one node breaks down or a connection goes bad. As a result, the network may typically be very reliable, as there is often more than one path between a source and a destination in the network. Although mostly used in wireless scenarios, this concept is also applicable to wired networks and software interaction. The animation at the right illustrates how wireless mesh networks can self form and self heal. For more animations seeHistory of Wireless Mesh Networking

Figure 2.3.1 Fully connected mesh topology

The number of connections in a full mesh = n(n - 1) / 2

Star Topology:
All devices are connected to a central hub, Nodes communicate across the network by passing data through the hub. In local area networks with a star topology, each network host is connected to a central hub. In contrast to the bus topology, the star topology connects each node to the hub with a point-to-point connection. All traffic that traverses the network passes through the central hub. The hub acts as a signal booster or repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.

15

ISP

Figure 2.3.2 Star topology

The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected. It is also designed with each node (file servers, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator. Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It is also acts as a repeater for the data flow. This configuration is common with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.

Bus Topology:
All devices are connected to a central cable, called the bus or backbone. In local area networks where bus topology is used, each machine is connected to a single cable. Each computer or server is connected to the single bus cable through some kind of connector. A terminator is required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the MAC address or IP address on the network that is the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data does match the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive

16

ISP

to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If the network cable breaks, the entire network will be down.

Figure 2.3.3 Bus topology

Bus networks are the simplest way to connect multiple clients, but may have problems when two clients want to transmit at the same time on the same bus. Thus systems which use bus network architectures normally have some scheme of collision handling or collision avoidance for communication on the bus, quite often using Carrier Sense Multiple Access or the presence of a bus master which controls access to the shared bus resource. A true bus network is passive the computers on the bus simply listen for a signal; they are not responsible for moving the signal along. However, many active architectures can also be described as a "bus", as they provide the same logical functions as a passive bus; for example, switched Ethernet can still be regarded as a logical network, if not a physical one. Indeed, the hardware may be abstracted away completely in the case of a software bus. With the dominance of switched Ethernet over passive Ethernet, passive bus networks are uncommon in wired networks. However, almost all current wireless networks can be viewed as examples of passive bus networks, with radio propagation serving as the shared passive medium. The bus topology makes the addition of new devices straightforward. The term used to describe clients is station or workstation in this type of network. Bus network topology uses a broadcast channel which means that all attached stations can hear every transmission and all stations have equal priority in using the network to transmit data.

Ring Topology:
All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it . Local area networks where

17

ISP

the ring topology is used, each computer is connected to the network in a closed loop or ring. Each machine or computer has a unique address that is used for identification purposes. The signal passes through each machine or computer connected to the ring in one direction. Ring topologies typically utilize a token passing scheme, used to control access to the network. By utilizing this scheme, only one machine can transmit on the network at a time. The machines or computers connected to the ring act as signal boosters or repeaters which strengthen the signals that traverse the network. The primary disadvantage of ring topology is the failure of one machine will cause the entire network to fail. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.

Figure 2.3.4 Ring topology

Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure or cable break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto the complementary ring before it reaches the end of the cable, maintaining a path to every node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring networks -- avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a Multistation Access Unit (MAU) to imitate a ring at the datalink layer. Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring.

18

ISP

3.1.1 UTP CABLING STANDARDS


2.1 Straight-Through Cable : This type of cable is used to connect two dissimilar devices. Eg.

Host to switch or hub. Straight-through cable is a type of twisted pair copper wire cable for local area network (LAN) use for which the RJ-45 connectors at each end have the same pinout (i.e., arrangement of conductors).It is identical to crossover cable, except that in the latter the wires on the cable are crossed over so that the receive signal pins on the connector on one end are connected to the transmit signal pins on the connector on the other end.Straight-through cable is also commonly referred to as patch cable. However, this might be confusing in some situations because patch cable also has a broader definition that emphasizes the fact that there is a connector on each end rather than the equality (or lack thereof) of the pinouts. Straight-through cable is used to connect computers and other end-user devices (e.g., printers) to networking devices such as hubs and switches. It can also be used to directly connect like devices (e.g., two hubs or two switches) if the cable is plugged into an uplink port on one (but not both) of the devices. Crossover cable is used to connect two like devices without the use of an uplink port. 1-TX+, 2- TX- ,3-RX+,6-Rx-

Figure 3.1.1 UTP Cable

Color coding : Or/w Or Gr/w Bl Bl/w Gr Br/w Br ENDS OF RJ45 STRAIGHT CABLE One End Pin 1 Color White/Green

19

ISP

2 3 4 5 6 7 8 Other end Pin 1 2 3 4 5 6 7 8

Green White/Orange Blue White/Blue Orange White/Brown Brown

Color White/Green Green White/Orange Blue White/Blue Orange White/Brown Brown

Uses of Straight Cable


Pc to pc

20

ISP

Pc to router Router to router Switch to switch Hub to hub Hub to switch

3.1.2 Crossover Cable :


This type of cable is used to connect two similar devices. Eg. Switch to switch, host to host. A crossover cable connects two devices of the same type, for example DTE-DTE or DCEDCE, usually connected asymmetrically (DTE-DCE), by a modified cable called a crosslink. Such distinction of devices was introduced by IBM. The crossing wires in a cable or in a connector adaptor allows:

connecting two devices directly, output of one to input of the other, letting two terminal (DTE) devices communicate without an interconnecting hub knot, i.e. PCs,

linking two or more hubs, switches or routers (DCE) together, possibly to work as one wider device.

Figure 3.1.2 Crossover cable

Examples of crossover cable

a Null modem of RS-232

21

ISP

Ethernet crossover cable Rollover cable A loopback is a type of degraded "one side cross linked connection" connecting a port to itself, usually for test purposes.

Use crossover cables for the following connections: Switch to switch, Switch to hub, Hub to hub, Router to router, PC to PC, Router to PC ENDS OF RJ45 CROSS CABLE One end Pin 1 2 3 4 5 6 7 8 Other End Pin 1 2 3 4 5 Color White/Green Green White/Orange White/Brown Brown Color White/Orange Orange White/Green Blue White/Blue Green White/Brown Brown

22

ISP

6 7 8

Orange Blue White/Blue

Uses of Crossover Cable


Pc to switch Pc to hub Hub to router Switch to router

About the RJ45 Ends


Before the name RJ45 was used to refer to computer networking connectors, RJ45 was originally a Telephone-only standard. It is one of the many registered jacks, like RJ11, another telephone standard. As a registered jack, telephone RJ45 specifies the physical male and female connectors as well as the pin assignments of the wires in a telephone cable. The original RJ45 uses a special [1] [2] keyed 8P2C modular connector, with Pins 5 and 4 wired for tip and ring of a single telephone line and Pins 7 and 8 connected to a programming resistor. It is meant to be used with a high speed modem, and is obsolete today. Telephone installers who wired telephone RJ45 jacks were familiar with the pin assignment which was part of the RJ45 standard. However, near-identical physical connectors for computer networking became ubiquitous, and informally inherited the name RJ45 due to the overwhelming similarity. While telephone RJ45 uses a "keyed" variety of the 8P body, meaning it may have an extra tab that a computer RJ45 connector is unable to mate with, the visual difference from an Ethernet 8P is subtle. The only other difference is the presence of extra conductors in the cable, which cannot be seen without very close inspection. True telephone RJ45 connectors are a special variant of 8P2C, meaning only the middle 2 positions have conductors in them, while pins 7 and 8 are shorting a programming resistor. Computer RJ45 is8P8C, with all eight conductors present.

23

ISP

Understandably, because telephone RJ45 8P connectors never saw wide usage and computer 8P connectors are quite well known today, RJ45 is used almost exclusively to refer to Ethernet-type computer connectors. Electronics catalogs not specialized to the telephone industry advertise 8P8C modular connectors as "RJ45". Virtually all electronic equipment that uses an 8P8C connector (or possibly any 8P connector at all) will document it as an "RJ45" connector. In common usage, RJ45 also refers to the pin assignments for the attached cable, which are actually defined in the wiring standard TIA/EIA-568-B. A locking boot for RJ45 Modular Plugs was developed to prevent inadvertent disconnects in mission critical facilities. The RJ45 end is a 8-position modular connector that looks like a large phone plug. There are a couple variations available. The primary variation you need to pay attention to is whether the connector is intended for braided or solid wire. For braided/stranded wires, the connector has contacts that actually pierce the wire. For solid wires, the connector has fingers which pierce the insulation and make contact with the wire by grasping it from both sides. The connector is the weak point in an ethernet cable, choosing the wrong one will often cause grief later. If you just walk into a computer store, it's nearly impossible to tell what type of connector it is.

Here is a diagram and pin out:

Figure 3.1.3

24

ISP

3.2 NETWORK
3.2.1 POINT TO POINT-HDSL BASED As shown in Fig, E1s from STM or Optics' are dropped on DDF(Digital distribution frame). The E1 from DDF is fed into HDSL modem installed at exchange side. Then the signal is being traveled through copper to customer end & terminated at customers end modem. Both the modems will be sync when connected back to back. Then V.35 output is taken from modem & fed into serial port of router. The output from router can then be given to customers PC or switch or hub. Cross-connection is done at transmission end.. Drawback-here router is necessary which will increase cost abruptly.

Figure 3.2.1

3.2.2 ILL-SDSL BASED An E1 is laid between ISP & exchange end. At both ends, E1 to Ethernet converters are used to obtain Ethernet output. At ISP end, Ethernet output is fed into L2 or L3 & the configuration part is done. At exchange end, Ethernet output is fed into SDSL modem & is

25

ISP

traveled to customer through copper. At customer end, the output from SDSL modem is taken & is fed to PC.

(a) Figure 3.2.2

(b)

26

ISP

Reliance

(C)

27

ISP

3.2.3 ILL-RF BASED

figure 3.2.3

As shown in Fig, RF modems are installed at node end & customer end. When antennas will be aligned in the same direction, modems will get sync. Ethernet output is given to node end modem & the same is traveled to customer end through RF waves (electromagnetic waves). Frequency used by HFCL is 2.4 GHz. Then Ethernet output from customer end modem can be fed to customers PC. The bandwidth capping is done at ISP end as required by customer.

3.4. ROUTERS

Packets are only passed to the network segment they are destined for. They work similar to bridges and switches in that they filter out unnecessary network traffic and remove it from

28

ISP

network segments. Routers generally work at the protocol level.Routers were devised in order to separate networks logically. For instance, a TCP/IP router can segment the network based on IP subnets. Filtering at this level (on IP addresses) will take longer than that of a bridge or switch which only looks at the MAC layer. Most routers can also perform bridging functions. A major feature of routers, because they can filter packets at a protocol level, is to act as a firewall. This is essentially a barrier, which prevents unwanted packets either entering or leaving the network.Typically, and organization which connects to the Internet will install a router as the main gateway link between their network and the outside world. By configuring the router with access lists (which define). For example, an internal WWW server can be allowed IP access from external networks, but other company servers which contain sensitive data can be protected, so that external hosts outside the company are prevented access (you could even deny internal workstations access if required).

Figure 3.4

29

ISP

4. Results and Discussions


4.1 CONVERTERS These are devices which are basically used to convert e1 to ethernet at isp end and ethernet to e1 at node end.e1 carries 2.048 mbps. 1. E1 to ethernet converters CTC E1 connector Comes in DB-15 or RJ-45 type DB-15 Pin1 Pin 3 Pin 9 Pin 11 RJ-45 Pin 2 Pin 5 Pin 1 Pin 4 Signal Transmit Receive Transmit Receive

2. Loop Pin 1,2 is for receive & Pin 4,5 is for transmit. 3 . 4E1 to ethernet converters :(1) EBANG Pin 1,2 is for transmit & Pin 4,5 is for receive. (2) Primatel Pin 7,8 is for transmit & Pin 1,2 is for receive. 4.2 ALLOT Allot is used to allot the bandwidth to the customers according to their requirement .firstly packeteer was used but its max bandwidth is upto 309 Mbps only. After that allot is started to used because its bandwidth is in GB`s.

30

ISP

figure 4.2

(a)

(b)

4.2.1 Bandwidth monitoring in allot

Figure 4.2.1

4.3 PING COMMAND Pinging is a command which tells you if the connection between your computer and a particular domain is working correctly.

31

ISP

In Windows, select Start > Programs > Accessories > Command Prompt. This will give you a window like the one below. Enter the word ping, followed by a space, then the domain name. If the results show a series of replies, the connection is working. The time shows you how fast the connection is. If you see a "timed out" error instead of a reply, there is a breakdown somewhere between your computer and the domain. In this case the next step is to perform a trace route.

Figure 4.3

4.4 FOR BANDWIDTH TESTIING Steps to change plan on user used inside the campus of connect.open
http://jisp.connectzone.in/

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.

account-search account fill username click on account list in configure-click on change package select package example_%444,%1111 change to status to prepostpaid select service package list then billing effect-manual credit account-0,debit account-0 reason-why we are changing that?// change package

If during connectivity we got error 691 then we have to update radius policy. Radius policy basically used for authentificate user

32

ISP

If we bind some ip at particular user then not any other plan can be working on user except that IP plan

FOR BRAS 32.210,32.211,32.212 Open telnet 202.164.32.210/211/212 Enter username password Display access user Find total number of online user Its the total number of users using internet Ctrl-c System-view Display cpu usage Find usage Then quit Quit

FOR DIAL UP Open internet explorer Then open http://202.164.32.112 Check user rias and then active callers

FOR PLANET CONNECT open 202.164.50.39 and 202.164.50.38 fill username password then you can see number of users online we can also disconnect particular user from here for this click on right side of user and then disconnect. this are for the planet caf of connect

FOR PDSN open huawie operation and maintainance username password then mml command then a11 user then user management then number of users then execute find number os user.

33

ISP

4.5 MRTG GRAPHS These graphs are used to check download and upload of customer. Open http://sales.connectzone.in/ Then press ctrl-f And enter name of link Here green part represent download of customer And blue represents upload of customer

Figure 4.4

5. Conclusion AND Future Scope

5.1 Conclusion

Today's Internet is the way it is because of the way it developed. In every arena technical standards, operating practices, resource allocation, and others, policy is established by self organized, inclusive organizations, operating with a high degree of transparency, and representing a broad constituency. This approach is nearly inevitable, given the inherently decentralized native architecture of the Internet and the heterogeneous, global market in which the Internet operates. The incentives are well aligned: due to the network effect, continued growth of the Internet is a rising tide that lifts all boats, which creates a strong bias toward policies that facilitate growth and efficiency. If the policy making organizations didn't respond to that imperative, the participants wouldn't follow, and the policy makers would lose their mandate.

34

ISP

On the other hand, top-down attempts to regulate, either in the service of "improving" the Internet itself, to redress perceived inequalities in access or pricing, or in furtherance of orthogonal policy objectives (solving the digital divide problem, for example), no matter how well intentioned or carefully crafted, are contrary to the fundamental, decentralized nature of the Internet, which is an important source of the Internet's vitality, and run the risk of being destabilizing and harmful. At present, the self-organized, self-regulating aspects of the Internet are thriving. Regulatory policy-makers should remain attuned to the possibility that future developments would lead to a less competitive environment, and watch for the signatures of a distorted market, but until such problems present themselves, should refrain from action.

5.2 Future Scope While it's unfortunate, it is nonetheless a fact that the Federal Communications Commission could radically change, if not wipe out, some or all of the ISP industry virtually overnight. The FCC is making rulings every day that can effect ISPs. While the FCC appears not to want to regulate the Internet, per se, it certainly does regulate the local loops that constitute most Net users' 'last mile.' Bandwidth brawl One of the most pressing ISP-related issues under reviewby the FCC is broadband policy. Many ISP industry organizations including ISP/C, CIX, TISPA, VISPA, CIUISP, and OpenNet Coalition have been lobbying the FCC to mandate open access to broadband cable networks. Despite the number of ISP associations carrying this lobbying effort forward, the RBOCs and cable operators have far more lobbyists and money than all of them combined. Congressional crunch However the open access struggle is resolved, ISPs also have to watch for taxes, privacy, copyright, and security issues on Capitol Hill. Congress has done a good job of keeping the Internet free of massive, intrusive legislation, but eventually, it will legislate the Internet, the question is how. Such legislation could change the face of the Internet industry overnight. Industry implosion While up until now ISPs have steadily grown in number - despite many learned predictions in the next 12 to18 months the long-anticipated consolidation of ISPs is likely to occur in earnest. Companies like OneMain and Voyager are already making it happen. Third generation ISPs such as these are acquiring first and second generation ISPs as fast as they can, in order to take advantage of the public/private arbitrage that currently exists. They buy ISPs for two to three times annual revenues ($500-$750/subscriber) and transform that business it into one valued at five to seven times annual revenues ($1,200-$1,680/ subscriber).Third generation ISPs will probably continue coining money in this way for some time to come. However, the consolidation process also presents an opportunity to those first

35

ISP

and second generation ISPs who remain independent: They can build up their subscriber bases, since between 15 and 30 percent of the subscribers to acquired ISPs 'churn.' 5 Sources and References

The FCC and the Unregulation of the Internet. Jason Oxman, July 1999. FCC Office of Plans and Policy Working Paper No. 31. http://www.fcc.gov/Bureaus/OPP/working_papers/oppwp31.pdf The Digital Handshake: Connecting Internet Backbones. Michael Kende, September 2000. FCC Office of Plans and Policy Working Paper No. 32. http://www.fcc.gov/Bureaus/OPP/working_papers/oppwp32.pdf Bill and Keep at the Central Office As the Efficient Interconnection Regime. Patrick DeGraba, December 2000. FCC Office of Plans and Policy Working Paper No. 33. http://www.fcc.gov/Bureaus/OPP/working_papers/oppwp33.pdf A Competitively Neutral Approach to Network Interconnection. Jay M. Atkinson and Christopher C. Barnekov, December 2000. FCC Office of Plans and Policy Working Paper No. 34. http://www.fcc.gov/Bureaus/OPP/working_papers/oppwp34.pdf

Appendix
The definition of the words that are frequently used in this report are as follows: Client one who uses the project Network Topology - Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer network. Network- it is a communication path between computers LAN local area network Hardware- That can be touch WAN wide area network Crossover cable- This type of cable is used to connect two similar devices PIPES- A inter-process method Sockets- For distributed network Straight cable - This type of cable is used to connect two dissimilar devices Software- That can be seen not touch

36

ISP

37

S-ar putea să vă placă și