SlideShare a Scribd company logo
1 of 65
A PROJECT REPORT
ON
“THE STUDY OF AIR INDIA NETWORK”
Submitted to the Department of
Computer Science & Engineering
In partial fulfillment of degree
Bachelor of Technology in Computer Science
SUBMITTED TO SUBMITTED BY
Er.K.P.Gangwar Rohitash mathur
Er. Vikas Gupta Roll No-13476100033
BATCH(2013-2017)
Future Institute Of Engineering& Technology, Bareilly(UP)
Dr. A.P.J Abdul Kalam University, Lucknow(UP)
Acknowledgement
The project work in this report is an outcome of continual work and draws intellectual support from various sources.
Obligations thus incurred in completing the work have been many. It is therefore almost impossible to express adequately
the debts owed to many persons who have been contributing to bring about this project.
We take the opportunity to thank Mukesh Kumar, Sr. Manager (S/M) and Mr. Vijay Kumar Dy Manager (DC),
Department of IT, for giving me an opportunity to work here and for their invaluable guidance to us. I am also thankful to
the Air India team for their help where required.
Finally, I would like to thank all the people who, directly or indirectly helped me in completing this project.
Date: 01-06-16 to 1-08-16
Place: Air India ltd, Safdarjung, Near jorbagh metro station, New Delhi-110003.
Thank you
Abstract
NACIL, a wholly owned company of the Government of India, has been incorporated under the Indian Companies Act
1956. The two airlines namely Indian Airlines Limited (IAL) and Air India Limited (AIL) have been merged into this new
company. The existing airline designator for IAL is IC and the airline accounting code is 058. The existing airline
designator for AIL is AI and the airline accounting code is 098. The brand name of the merged airline is Air India and will
have the airline designator AI and the airline accounting code 098.
Indian Airlines has its Production Data Centre at IGI Airport, New Delhi (Site-B) consisting of IBM Mainframe Server
z9BC (Model 2096– R07). Another Data Centre (Site A) having a similar IBM Mainframe Server Model 2096-R07 is
located half a km away from the Production Data Centre for hosting other Business applications and also to act as a
Disaster Recovery System during failure of Production Data Centre. Indian Airlines Data Network is used to provide
“Host Connectivity” to end users. The Network consists of a Core backbone of 2 mbps leased Data Links which connect
six major domestic Metro Airports and City Booking offices with Computer Centre, Palam, Site A & Site B. These
dedicated leased links have ISDN back up also. High performances Cisco Routers using Dlsw are installed at all the metro
locations for routing the data. Non-metro Booking offices and Airport locations are connected to backbone network
with high-speed 64 K digital leased lines with ISDN backups. Cisco low ends Routers are installed at these
locations and vice versa. However, various remote non-metro Booking Offices are connected via 9.6 Kbps analog lines.
The connectivity to Call Centre (third party provided/operated) is also extended through digital links from the above-
referred Site B. The third party hosted Cargo System is also connected to the IAL network through leased lines from
Computer Centre, New Delhi & Air India Building, Nariman point, Mumbai. The connectivity to SITA for connectivity to
IAL international ATOs/CTOs is provided through 2 MBPS leased lines (SITA IP-VPN Service). Most of the Host-to-
Host communication which includes GDS connectivity, connectivity to e-tkt Server and Type B traffic, is through SITA
network (2MBPS Link) using MATIP and some part of Host to-Host connectivity and Type B traffic is through SITA
Network (64 kbps line speed with 19.2 kbps port ) using AX.25 protocol. IAL network supports both IBM terminals and
old U-100 legacy terminals currently. The legacy network is supported by using an IBM product called CUTS (Connect
UTS) which converts SNA protocol to U-100 protocol. IBM terminals are installed at major metro booking offices and all
domestic airports. IBM terminals are basically PC’s with IBM PCOM 3270 emulator software running over them.This
case study contains the detailed analysis of almost every hardware and software implemented in IAL from the network
point of view. Its working and implementation has been explained.Whereever possible, a detailed diagram is given for
easy understanding. All protocols used in the network have also been explained.Finally,a conclusion has been reported.
INDEX
I. Part-I Overviewof networking
1. Introduction…………………………………………………………………….……..1
2. Network……………………………………………………………………….………1
3. Why Builda Network…………………………………………………………….2
4. NetworkCriteria………………………………………………………………….2
5. Typesof Connections…………………………………………………………….3
6. NetworkTopology………………………………………………………………..3
7. Typesof Networks………………………………………………………………..5
8. OSI Model…………………………………………………………………………....6
9. The Layers………………………………………………………………………..7
10.Protocol Stack…………………………………………………………………….8
11. Router………………………………………………………………………………...9
12 Broadcast and Multicast………………………………………………………....10
13. EthernetRepeatersandHubs…………………………………………………………11
14. NetworkCabling……………………………………………………………………...11
UTP(UnsheildedTwistedPair)…………………………………………………...11
STP(SheildedTwistedPair)………………………………………………………12
WirelessLAN…………………………………………………………………......14
15. NetworkOperatingSystem…………………………………………………………...15
Peerto Peer……………………………………………………………………….15
Client/Server……………………………………………………………………...16
16. Ethernet…………………………………………………………………………17
17. Firewall……………………………………………………………………………...17
II. Part-II A Case Study: Air India (Indian Airlines) Network
1. CompanyPerspective…………………………………………….……………….…..20
2. Air India(orIndianAirlines) History…………………….…….……………....…20
3. Air IndiaIT Department……………………………………..……….………….21
Role of IT Department………………………………………………….…………21
IT Manpower…………………………………………………….……………….22
EngineeringInfrastructure……………………………………………….……….22
4. Air IndiaMainframe………………………………………………...…………...23
Overview………………………………………………………………………….23
z9BC Mainframe………………………………………………………………….23
Mainframe Software………………………………………………………………27
IBM 3745 FrontEnd Processor…………………………………………………...27
5. IndianAirlines(orAirIndia) Network……………………………………….….28
Application………………………………………………………………………..28
Network……………………………………………………………………….......30
6. NetworkServices……………………………………………………………….……..32
7. Routers………………………………………………………………………….……..33
High End Routers…………………………………………………………………33
MediumEnd Routers……………………………………………………….……..34
Low End Routers…………………………………………………………….…....35
8. Switches………………………………………………………………………….……37
CiscoLayer 2 Switches…………………………………………………………...37
CiscoLayer 3 Switches…………………………………………………………....40
9. NetworkConnectivityandProtocols………………………………………………..42
WAN Technology………………………………………………………………42
Leasedline …………………………………………………………………………....44
LAN …………………………………………………………………………....45
TCP/IPProtocol Suite……………………………………………………….….46
OSPF……………………………………………………………..……………50
10. NetworkManagement……………………………………………………………...51
11. NetworkandInternetSecurity……………………………………………………...53
SecurityThreatsinNetworks………………………………………………….53
Cryptography…………………………………………………………………....54
Cyberoam......................................................................54
15. Conclusion……………………………………………………………………..…...55
16. References…………………………………………………………………………..56
LIST OF FIGURES
Fig.1.Network…………………………………………………………………………...10
Fig.2. Point-to-PointandMultipointConnection………………………………………..12
Fig.3.Bus Topology……………………………………………………………………..13
Fig.4.RingTopology…………………………………………………………………….13
Fig.5.Star Toplogy………………………………………………………………………13
Fig.6.Star Bus Topology………………………………………………………………...14
Fig.7.Tree Topology………………………………………………………………….…14
Fig.8.LAN……………………………………………………………………………….15
Fig.9.WAN……………………………………………………………………………....15
Fig.10. OSIReference model……………………………………………………….……17
Fig.11. Architecture of arouter…………………………………………………………..19
Fig.12. Packetsroutedbyroutersto theirdestinations…………………………………...20
Fig.13. Repeater……………………………………………………………………….…20
Fig.14 Unshieldedtwistedpair………………………………………………………….21
Fig.15. RJ-45 connector…………………………………………………………………22
Fig.16. Coaxial cable ……………………………………………………………………22
Fig.17. BNCconnector………………………………………………………………….23
Fig.18. Fiberopticcable ………………………………………………………………...23
Fig.19. WirelessLANs…………………………………………………………………..24
Fig.20. Peer-to-peernetwork……………………………………………………………25
Fig.21. Client/servernetwork…………………………………………………………...26
Fig.22 WAN TechnologiesOperateatthe LowestLevelsof the OSIModel…………...52
Fig.23 A Typical Point-to-PointLink…………………………………………………....52
Fig.24 A Circuit-SwitchedWAN ……………………………………………………….53
Fig.25 PacketSwitchingTransfersPacketsAcrossaCarrierNetwork………………….54
Fig.26 LeasedLines……………………………………………………………………...55
Fig.27 PopularLAN ProtocolsMappedto the OSIReference Model…………………..56
Fig.28 Protocol Structure - IP/IPv4Header(InternetProtocol version4)……………..57
Fig.29 Protocol Structure - IPv6 (IPng) InternetProtocol version6…………………...58
Fig.30 Protocol Structure - TCP TransmissionControl Protocol………………………59
Fig.31 CyberoamCR200iNG .......................69
LIST OF TABLES
Table 1. OSI layersandtheirdescription………………………………………………..17
Table 2. Categoriesof UnshieldedTwistedPair………………………………………...21
Table 3 EthernetCable Summary………………………………………………………..24
Table 4. Configurationof the Mainframes………………………………………………38
Table 5 WS-C2960-24TC-L……………………………………………………………..48
Table 6 WS-C2960-24-S………………………………………………………………...49
Table 7 WS-C3750G-24TS-S……………………………………………………………50
Table 8 WS-C3750G-12S-S……………………………………………………………..51
Part-I : Overview of Networking
1. Introduction
During the 20th
century, the key technology was information gathering, processing and distribution. Among other
developments, we saw the installation of worldwide telephone networks, the inventions of radio and television, birth and
unprecedented growth of computer industry, and the launching of communication satellites. Due to this technological
advance,our world is shrinking.
Now a day, large numbers of separate but interconnected computers do the job; these systems are called computer
networks.
2. Network
A network consists of two or more computers that are linked in order to share resources (such as printers and
CD-ROMs), exchange files, or allow electronic communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or infrared light beams.
Here are some of the fundamental parts of a network:
Fig. 1. Network
 Network - A network is a group of computers connected together in a way that allows information to be
exchanged between the computers.
 Node - A node is anything that is connected to the network. While a node is typically a computer, it can also be
something like a printer or CD-ROM tower.
 Segment - A segment is any portion of a network that is separated, by a switch, bridge or router, from other parts
of the network.
 Backbone - The backbone is the main cabling of a network that all of the segments connect to. Typically, the
backbone is capable of carrying more information than the individual segments. For example, each segment may
have a transfer rate of 10 Mbps (megabits per second), while the backbone may operate at 100 Mbps.
 Topology - Topology is the way that each node is physically connected to the network .
Local Area Network (LAN) - A LAN is a network of computers that are in the same general physical location,
usually within a building or a campus. If the computers are far apart (such as across town or in different cities),
then a Wide Area Network (WAN) is typically used.
 Network Interface Card (NIC) - Every computer (and most other devices) is connected to a network through an
NIC. In most desktop computers, this is an Ethernet card (normally 10 or 100 Mbps) that is plugged into a slot on
the computer's motherboard.
 Media Access Control (MAC) address - This is the physical address of any .0`device -- such as the NIC in a
computer -- on the network. The MAC address, which is made up of two equal parts, is 6 bytes long. The first 3
bytes identify the company that made the NIC. The second 3 bytes are the serial number of the NIC itself.
 Unicast - A unicast is a transmission from one node addressed specifically to another node.
 Multicast - In a multicast, a node sends a packet addressed to a special group address. Devices that are interested
in this group register to receive packets addressed to the group. An example might be a Cisco router sending out
an update to all of the other Cisco routers.
 Broadcast - In a broadcast, a node sends out a packet that is intended for transmission to all other nodes on the
network.
3. Why Build a Network?
 If we’re happy with receiving or sending information by hand, we can resort to the postal service. But hard copy
correspondence is called “snail-mail” for good reason. It’s far too slow in today’s accelerated world. By the time a
letter arrives, its contents are often old news.
 In contrast, a computer network enables faster communications between parties. In so doing, it leads to more
efficient use of time.
 By sharing electronic data among perhaps thousands of people, a computer network encourages (requires!) the use
of standard policies and procedures. After all, our personal computer and our text-proficient cell phone have no
inferential power as we humans do. We can just respond with, “Say again please,” if we don’t understand a
transmission. But a computer network must be laboriously programmed to perform this one simple task.
However,and once again, these standardized procedures lead to more efficient communications.
 Networks provide backup and recovery support for our data. If the postal service’s mail truck breaks down, our
letter might be delayed for a day—at least. Not so for a computer network. It’s designed to provide near-
instantaneous recovery from a failure—all without a loss of a single character or number in our (electronic) mail.
 “I’ve lost that file!” “I’ve lost the letter!” These lamentations are no longer true with computer networks. If
networks are properly designed, it’s easy to store copies of our data. Be it mail, photographs, files, or video, we
can keep copies safe and sound on another computer in another part of the country—if we take the time to instruct
the network to do so.
 Shared resources lead to less expensive communications. Take the Internet, for example. It’s an expensive public
network (in reality, millions of interconnected networks), but we use it for a few rupees a month, and its
performance is such that we might consider it our own private network. That is, we think we have this network for
ourselves, but we don’t. A term to describe this fine service is virtual private network.
4. Network Criteria
 Performance
 Transit time: amount of time required for a message to travel from one device to another
 Response time:elapsed time between an inquiry and a response
 Performance depends on:
 Number of users
 Type of transmission medium
 Capabilities of the connected hardware
 Efficiency of the software
 Throughput
 Delay
 Reliability, measured by:
 The frequency of failure
 The time it takes a link to recover from a failure
 The network robustness in a catastrophe
 Security
 Protecting data from unauthorized access
 Protecting data from damage
 Procedures for recovery from breaches and data losses
5. Types of Connections
There are two possible types of connections: point-to-point and multipoint.
 Point-to-Point connection: A point-to-point connection provides a dedicated link between two devices. The
entire capacity of the link is reserved for transmission between those two devices.
 Multipoint connection: A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link (see Figure 2). In a multipoint environment, the capacity of the channel is shared,
either spatially or temporally. If several devices can use the link simultaneously, it is a spatially shared
connection. If users must take turns, it is a timeshared connection.
Fig.2. Point-to-Point and Multipoint Connection
6. Network Topologies
The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical
topology should not be confused with logical topology which is the method used to pass information between
workstations.
 Bus - Each node is daisy-chained (connected one right after the other) along the same backbone.Information sent
from a node travels along the backbone until it reaches its destination node. Each end of a bus network must be
terminated with a resistor to keep the signal that is sent by a node across the network from bouncing back when
it reaches the end of the cable.
Fig.3. Bus Topology
 Ring - Like a bus network, rings have the nodes daisy-chained. The difference is that the end of the network
comes back around to the first node, creating a complete circuit. In a ring network, each node takes a turn sending
and receiving information through the use of a token. The token, along with any data, is sent from the first node
to the second node, which extracts the data addressed to it and adds any data it wishes to send. Then, the second
node passes the token and data to the third node, and so on until it comes back around to the first node again. Only
the node with the token is allowed to send data. All other nodes must wait for the token to come to them.
Fig.4. Ring Topology
 Star - In a star network, each node is connected to a central device called a hub. The hub takes a signal that
comes from any node and passes it along to all the other nodes in the network. A hub does not perform any type
of filtering or routing of the data. It is simply a junction that joins all the different nodes together.
Fig.5. Star Toplogy
 Star bus - Probably the most common network topology in use today, star bus combines elements of the star and
bus topologies to create a versatile network environment. Nodes in particular areas are connected to hubs
(creating stars), and the hubs are connected together along the network backbone (like a bus network). Quite
often, stars are nested within stars,as seen in the example below:
Fig.6. Star Bus Topology
 Tree: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of
star-configured workstations connected to a linear bus backbone cable .Tree topologies allow for the
expansion of an existing network, and enable schools to configure a network to meet their needs.
Fig. 7. Tree Topology
7. Types of Network
LAN -: LocalArea Network
It is confined to a single location, typically one building or a complex. The maximum distance from one end of a network
is limited by the signal strength and networking system. Typically connects computer in a single building or campus.
 Medium: optical fibers, coaxial cables, twisted pair, wireless.
 Low latency (except in high traffic periods).
 High-speed networks (0.2 to 100 Mbps).
 Problems : Multi media based applications
 Typically buses or rings.
 Ethernet, Token Ring
Fig.8. LAN
WAN :- Wide Area Networks
WAN is a network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs.
Computers connected to a wide-area network are often connected through public networks, such as the telephone system.
They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.
 Developed in 1960s.
 Generally covers large distances (states,countries, continents).
 Medium: communication circuits connected by routers.
 Routers forward packets from one to another following a route from the sender to the receiver. Store-and-Forward
 Hosts are typically connected (or close to) the routers.
 Typical latencies: 100ms - 500ms.
 Problems with delays if using satellites.
 Typical speed: 20 - 2000 Kbits/s.
 Not (yet) suitable for distributed computing.
Fig. 9. WAN
8. OSI Model
Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI)
standard. OSI was developed in 1984 by the International Organization for Standardization (ISO), a global
federation of national standards organizations representing approximately 130 countries.
The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that
data must go through to travel from one device to another over a network.
9. The Layers
Think of the sevenlayers as the assembly line in the computer. At each layer, certain things happen to the
data that prepare it for the next layer. The seven layers, which separate into two sets, are:
 Application Set
 Layer 7: Application - This is the layer that actually interacts with the operating system or
application whenever the user chooses to transfer files, read messages or perform other network-
related activities.
 Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into
a standard format that the other layers can understand.
 Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving
device.
 Transport Set
 Layer 4: Transport - This layer maintains flow control of data and provides for error checking and
recovery of data between the devices. Flow control means that the Transport layer looks to see if data
is coming from more than one application and integrates each application's data into a single stream
for the physical network.
 Layer 3: Network - The way that the data will be sent to the recipient device is determined in this
layer. Logical protocols, routing and addressing are handled here.
 Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type
of network and the packet sequencing is defined.
 Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of
the network such as connections, voltage levels and timing.
Fig.10. OSI Reference model
The OSI Reference Model is really just a guideline. Actual protocol stacks often combine one or more of the
OSI layers into a single layer.
Layer Description Device
Application Provides network access for applications, flow control
and error recovery
Gateway
Presentation Performs protocol conversion, encryption and data
compression
Gateway and
redirectors
Session Allows 2 applications to communicate over a network
by opening a session and synchronizing the involved
computers
Gateway
Transport Repackages messages into smaller formats, provides
error free delivery and error handling functions
Gateway
Network Handles addressing, translates logical addresses and
names to physical addresses, routing and traffic
management.
Router and router
Data Link Packages raw bits into frames and includes a cyclical
redundancy check(CRC)
Switch, bridge and
router
Physical Transmits data over physical medium Multiplexer and
repeater and hub
Table 1. OSI layers and their description
10. Protocol Stack
A protocol stack is a group of protocols that all work together to allow software or hardware to perform a function. The
TCP/IP protocol stack is a good example. It uses four layers that map to the OSI model as follows:
 Layer 1: Network Interface - This layer combines the Physical and Data layers and routes the data between
devices on the same network. It also manages the exchange of data between the network and other devices.
 Layer 2: Internet - This layer corresponds to the Network layer. The Internet Protocol (IP) uses the IP address,
consisting of a Network Identifier and a Host Identifier, to determine the address of the device it is
communicating with.
 Layer 3: Transport - Corresponding to the OSI Transport layer, this is the part of the protocol stack where the
Transport Control Protocol (TCP) can be found. TCP works by asking another device on the network if it is
willing to accept information from the local device.
 Layer 4: Application - Layer 4 combines the Session, Presentation and Application layers of the OSI model.
Protocols for specific functions such as e-mail (Simple Mail Transfer Protocol, SMTP) and file transfer (File
Transfer Protocol, FTP) reside at this level.
As it can be seen, it is not necessary to develop a separate layer for each and every function outlined in the OSI
Reference Model. But developers are able to ensure that a certain level of compatibility is maintained by
following the general guidelines provided by the model.
11. Router
Router is an Intermediate System (IS) which operates at the network layer of the OSI reference model. Routers
may be used to connect two or more IP networks, or an IP network to an internet connection.
A router consists of a computer with at least two network interface cards supporting the IP protocol. The router
receives packets from each interface via a network interface and forwards the received packets to an appropriate
output network interface. Received packets have all link layer protocol headers removed, and transmitted
packets have a new link protocol header added prior to transmission.
The router uses the information held in the network layer header (i.e. IP header) to decide whether to forward
each received packet, and which network interface to use to send the packet. Most packets are forwarded based
on the packet's IP destination address, along with routing information held within the router in a routing table.
Before a packet is forwarded, the processor checks the Maximum Transfer Unit (MTU) of the specified
interface. Packets larger than the interface's MTU must be fragmented by the router into two or more smaller
packets. If a packet is received which has the Don't Fragment (DF) bit set in the packet header, the packet is not
fragmented, but instead discarded. In this case, an ICMP error message is returned to the sender (i.e. to the
original packet's IP source address) informing it of the interface's MTU size. This forms the basis for Path MTU
discovery (PMTU).
The routing and filter tables resemble similar tables in link layer bridges and switches. Except, that instead of
specifying link hardware addresses (MAC addresses), the router table specify network (IP addresses). The
routing table lists known IP destination addresses with the appropriate network interface to be used to reach that
destination. A default entry may be specified to be used for all addresses not explicitly defined in the table. A
filter table may also be used to ensure that unwanted packets are discarded. The filter may be used to deny
access to particular protocols or to prevent unauthorized access from remote computers by discarding packets to
specified destination addresses.
A router forwards packets from one IP network to another IP network. Like other systems, it determines the IP
network from the logical AND of an IP address with the associated subnetwork address mask. One exception to
this rule is when a router receives an IP packet to a network broadcast address. In this case, the router discards
the packet. Forwarding broadcast packet can lead to severe storms of packets, and if uncontrolled could lead to
network overload.
A router introduces delay (latency) as it processes the packets it receives. The total delay observed is the sum of
many components including:
 Time taken to process the frame by the data link protocol
 Time taken to select the correct output link (i.e. filtering and routing)
 Queuing delay at the output link (when the link is busy)
 Other activities which consume processor resources (computing routing tables, network management, generation
of logging information)
The router queue of packets waiting to be sent also introduces a potential cause of packet loss. Since the router
has a finite amount of buffer memory to hold the queue, a router which receives packets at too high a rate may
experience a full queue. In this case, the router ahs no other option than to simply discard excess packets. If
required, these may later be retransmitted by a transport protocol.
Fig.11. Architecture ofa router
Routers are often used to connect together networks which use different types of links (for instance an HDLC
link connecting a WAN to a local Ethernet LAN). The optimum (and maximum) packet lengths (i.e. the
maximum transmission unit (MTU)) is different for different types of network. A router may therefore uses IP
to provide segmentation of packets into a suitable size for transmission on a network.
Associated protocols perform network error reporting (ICMP), communication between routers (to determine
appropriate routes to each destination) and remote monitoring of the router operation (network management).
Fig.12. Packets routed by routers to their destinations
12. Broadcast and Multicast
Bridges forward a broadcast frame out of all connected ports except that on which the frame was received. The
normal action for multicast frame is to treat them as broadcast frame. This is clearly suboptimal, since a bridge
may send multicast frames to parts of the network for which there are no interested receivers. Some bridges
implement extra processing to control the flooding of multicast frames
13. Ethernet Repeaters and Hubs
Ethernet hubs and repeaters operate at the Physical Layer of the OSI Reference model and are defined by IEEE
802.3c/d. They are used to connect together one or more Ethernet cable segments of any media type. If an
Ethernet segment were allowed to exceed the maximum length or the maximum number of attached systems to
the segment, the signal quality would deteriorate. (If unchecked this would ultimately lead to errors in the data.)
Hubs and repeaters may be used between a pair of segments (see below) to provide signal amplification and
regeneration to restore a good signal level before sending it from one cable segment to another. By allowing
two or more LAN segments to be connected, they allow the network to span a larger distance. They also
provide electrical isolation from failures in the cable or attached systems, protecting equipment on other LAN
segments from the effect of the fault.
Fig.13. Repeater
A very important fact about hubs and repeaters is that they allow users to share an Ethernet LAN. A network of
repeaters and hubs is therefore called a "Shared Ethernet" or a "Collision Domain". The various systems
sharing the Ethernet all compete for access using the CSMA/CD access protocol. This means that only one
system is allowed to proceed with a transmission of a frame within a Collision Domain at any one time. Each
system has to share a proportion of the available network bandwidth.
14. Network Cabling
Cable is the medium through which information usually moves from one network device to another. There are
several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type
of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to
the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how
they relate to other aspects of a network is necessary for the development of a successful network.
Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most
popular and is generally the best option for school networks (See fig.21).
Fig.14 Unshielded twisted pair
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four
pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate
interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported
transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association /
Telecommunication Industry Association) has established standards of UTP and rated five categories of wire.
Type Use
Category 1 Voice Only (Telephone Wire)
Category 2 Data to 4 Mbps (Local Talk)
Category 3 Data to 10 Mbps (Ethernet)
Category 4 Data to 20 Mbps (16 Mbps Token Ring)
Category 5 Data to 100 Mbps (Fast Ethernet)
Table 2. Categories of Unshielded Twisted Pair
If designing a 10 Mbps Ethernet network and are considering the cost savings of buying Category 3 wire
instead of Category 5, remember that the Category 5 cable will provide more "room to grow" as transmission
technologies increase. Both Category 3 and Category 5 UTP have a maximum segment length of 100 meters.
10BaseT refers to the specifications for unshielded twisted pair cable (Category 3, 4, or 5) carrying Ethernet
signals. Category 6 is relatively new and is used for gigabit connections.
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector
that looks like a large telephone-style connector (See fig. 22). A slot allows the RJ-45 to be inserted only one
way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone
industry. This standard designates which wire goes with each pin inside the connector.
Fig. 15. RJ-45 connector
Shielded Twisted Pair (STP) Cable
A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference. Shielded
twisted pair (STP) is suitable for environments with electrical interference; however, the extra shielding can
make the cables quite bulky. Shielded twisted pair is often used on networks using Token Ring topology.
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the
center conductor and a braided metal shield (See fig. 23). The metal shield helps to block any outside
interference from fluorescent lights, motors, and other computers.
Fig. 16. Coaxial cable
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can
support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling
are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable
carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual
fact the maximum segment length is 185 meters.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable
carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable
has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick
coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is
that it does not bend easily and is difficult to install.
Coaxial Cable Connectors
The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector
(See fig. 24). Different types of adapters are available for BNC connectors, including a T-connector, barrel
connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid
problems with your network, always use the BNC connectors that crimp, rather than screw, onto the cable.
Fig. 17. BNC connector
Fiber Optic Cable
Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig.
25). It transmits light rather than electronic signals eliminating the problem of electrical interference. This
makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it
the standard for connecting networks between buildings, due to its immunity to the effects of moisture and
lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It
also has the capability to carry information at vastly greater speeds. This capacity broadens communication
possibilities to include services such as video conferencing and interactive services. The cost of fiber optic
cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to
the specifications for fiber optic cable carrying Ethernet signals.
Fig.18. Fiber optic cable
Facts about fiber optic cables:
 Outer insulating jacket is made of Teflon or PVC.
 Kevlar fiber helps to strengthen the cable and prevent breakage.
 A plastic coating is used to cushion the fiber center.
 Center (core) is made of glass or plastic fibers.
Fiber Optic Connector
The most common connector used with fiber optic cable is an ST connector. It is barrel shaped, similar to a
BNC connector. A newer connector, the SC, is becoming more popular. It has a squared face and is easier to
connect in a confined space.
Specification Cable Type Maximum length
10BaseT Unshielded Twisted Pair 100 meters
10Base2 Thin Coaxial 185 meters
10Base5 Thick Coaxial 500 meters
10BaseF Fiber Optic 2000 meters
100BaseT Unshielded Twisted Pair 100 meters
100BaseTX Unshielded Twisted Pair 220 meters
Table 3 Ethernet Cable Summary
Wireless LANs
Fig.19. Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency
radio signals, infrared light beams, or lasers to communicate between the workstations and the file server or
hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and
receive the data. Information is relayed between transceivers as if they were physically connected. For longer
distance, wireless communications can also take place through cellular telephone technology, microwave
transmission, or by satellite.
Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN.
Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools are line-of-sight and scattered
broadcast. Line-of-sight communication means that there must be an unblocked direct line between the
workstation and the transceiver. If a person walks within the line-of-sight while there is a transmission, the
information would need to be sent again. This kind of obstruction can slow down the wireless network.
Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that
bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are
virtually the same as line-of-sight infrared networks.
Wireless LANs have several disadvantages. They provide poor security, and are susceptible to interference from
lights and electronic devices. They are also slower than LANs using cabling.
15. Network Operating System
Unlike operating systems, such as DOS and Windows that are designed for single users to control one computer
network operating systems (NOS) coordinate the activities of multiple computers across a network. The
network operating system acts as a director to keep the network running smoothly. The two major types of
network operating systems are:
 Peer-to-Peer
 Client/Server
Peer-to-Peer
Peer-to-peer network operating systems allow users to share resources and files located on their computers and
to access shared resources found on other computers. However, they do not have a file server or a centralized
management source (See fig. 27). In a peer-to-peer network, all computers are considered equal; they all have
the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily
for small to medium local area networks. AppleShare and Windows for Workgroups are examples of programs.
Fig. 20. Peer-to-peer network
Advantages of a peer-to-peernetwork:
 Less initial expense - No need for a dedicated server.
 Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for
peer-to-peer operations.
Disadvantagesofa peer-to-peernetwork:
 Decentralized - No central repository for files and applications.
 Security - Does not provide the security available on a client/server network.
Client/Server
Client/server network operating systems allow the network to centralize functions and applications in one or
more dedicated file servers (See fig. 25). The file servers become the heart of the system, providing access to
resources and providing security. Individual workstations (clients) have access to the resources available on the
file servers. The network operating system provides the mechanism to integrate all the components of the
network and allow multiple users to simultaneously share the same resources irrespective of physical location.
Novell Netware and Windows 2000 Server are examples of client/server network operating systems.
Fig. 21. Client/server network
Advantages of a client/servernetwork:
 Centralized - Resources and data security are controlled through the server.
 Scalability - Any or all elements can be replaced individually as needs increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple platforms.
Disadvantagesofa client/servernetwork:
 Expense - Requires initial investment in dedicated server.
 Maintenance - Large networks will require a staff to ensure efficient operation.
 Dependence - When server goes down, operations will cease across the network.
16. Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier
Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before
sending anything through the network. If the network is clear, the computer will transmit. If some other node is
already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two
computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then
backs off and waits a random amount of time before attempting to retransmit. With this access method, it is
normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not
normally affect the speed of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access
points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that
supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the use of different, more
expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber
optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired.
Gigabit Ethernet
The most recent development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps.
Gigabit Ethernet is primarily used for backbones on a network at this time. In the future, it will probably be
used for workstation and server connections also. It can be used with both fiber optic cabling and copper. The
1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the formal standard in 1999.
17. Firewall
Firewall is an internetwork security device that serves on the only access route that connects the internal
network / internetwork (i.e. the segment to be protected) to the external network (s) / internetwork (s); and,
decides about physically allowing / denying entry / exit to / from the protected segment using a set of policies
(often manifested in terms of rules) is called a Firewall. A Firewall may be implemented in hardware / software
/ firmware or a combination of these. Characteristically, an Internet Firewall exhibits security measures and
internetwork-control-mechanisms related to but not necessarily limited to:
 Internet services as separated from the intranet services
 Service-based directional traffic
 User-specific / Class-specific / Group-specific service access
 Service-usage / deployment-behaviour
 Origin-specific / Destination-specific service / traffic / monitoring / QoS-security bindings
 Relaying / blocking / redirection of encapsulated and / or encrypted traffic
A common assumption (though debatable) made is that the Firewall itself is incorruptible / impenetrable . A
firewall works under the assumption that it is solely responsible for blockade / allowance of any traffic between
two or more than two networks / internetworks separated by it.
As part of an Internetwork Security System, a firewall:
 Allows defining exit and entry points for traffic from and to the internal protected network / intranet
 Offers a set of mechanisms and a set of locations / points for supervising security-sensitive activities /
events / behaviour
 Provides network-level encapsulation, encryption, decryption, decapsulation, tunnelling services
 Permits a variable -security facility-zone’s creation that may also offer some functionalities not
necessarily related to the security function that is the primary function of the firewall
 Supports creation and interpretation of structured logging mechanisms and files for a variety of
purposes.
A Firewall is not meant for:
 Virus / Worm / Trojan Horse / Logic bomb detection
 Virus / Worm / Trojan Horse / Logic bomb removal
 Semantic analysis of the application-to-application messages with certain exceptions
 Protecting a network / internetwork from a trusted entity (client / server / user) or an internal
authorized user with adequate privileges
 Protecting from power, link or protocol failure
 Monitoring processes at individual workstations / servers / switches that are of local significance to
that machine or network segment except for certain explicitly registered classes of processes / systems
/ users / patterns
 Guarding against traffic that bypasses the Firewall itself
Firewall Constituents: (some of these can serve as firewalls as well)
 Application-level Gateways and Proxies
 Transport-level / Circuit-level Gateways and Proxies
 Network-level Gateways / Routers
 Packet filters (also known as Static Packet Filtering Firewalls)
 Bastion Host
 Screened Host
Part-II: A Case Study: Air India (Indian Airlines)
Network
OBJECTIVE
In the computerized world of today everything happens at one click of mouse, here the development and
security of any company is dependent on the network of the Institution. Accessibilty of the applications of the
Instituition plays a key role in the road of success. Indian Airlines Ltd. (IAL) caters to millions of user’s
everyday and hence, has a Vast network throughout India and the World.
The objective of this case study is to study the entire networking hierarchy of Indian Airlines network. We
studied in depth of the various hardware and software implemented in the network.Extensive research and study
material was studied for finalizing the report.
The case study contains the detailed analysis of almost ebery hardware and software implemented in IAL from
the network point of view. Its working and implementation has been explained.Whereever possible, a detailed
diagram is given for easy understanding. All protocols used in the network have also been explained.
We have tried our level best to give accurate and updated information in this case study.Finally,a conclusion has
been reported.
1. Company Perspectives
Indian Airlines or Indian is an airline based in Delhi, India and focuses primarily on domestic routes, along
with several international services to neighbouring countries in Asia. Indian Airlines is state-owned, and is
administered by the Ministry of Civil Aviation. Its main bases are Delhi's Indira Gandhi International Airport,
Mumbai's Chhatrapati Shivaji International Airport, Chennai International Airport and Kolkata's Netaji Subhash
Chandra Bose International Airport.
Though the company that owns and operates the airline continues to be named Indian Airlines Limited, on 7
December 2005, the airline was rebranded as Indian for advertising purposes as a part of a program to revamp
its image in preparation for an initial public offering (IPO) The airline operates closely with Air India, India's
national carrier. Alliance Air, a fully-owned subsidiary of Indian Airlines, was renamed Air India Regional.
In February 2007, the Government of India approved plans to merge Indian Airlines with Air India. The
merger process is currently underway.
2. Indian Airlines (Air India(IC)) History
The airline is set up under the Air Corporations Act, 1953 with an initial capital of Rs. 32 million and started
operations on 1 August 1953. It was established after legislation came into force to nationalise the entire airline
industry in India. Two new national airlines were to be formed along the same lines as happened in the United
Kingdom with British Overseas Airways Corporation (BOAC) and British European Airways (BEA). Air India
took over international routes and Indian Airlines Corporation (IAC) took over the domestic and regional
routes.
Seven former freedom domestic airlines, Deccan Airways, Airways India, Bharat Airways, Himalayan
Aviation, Kalinga Airlines, Indian National Airways and Air Services of India, were merged to form the new
domestic national carrier. Indian Airlines Corporation inherited a fleet of 99 aircraft including 74 Douglas DC-3
Dakotas, 12 Vickers Vikings, 3 Douglas DC-4s and various smaller types from the seven airlines that made it
up.
Vickers Viscounts were introduced in 1957 with Fokker F27 Friendships being delivered from 1961. The 1960s
also saw Hawker Siddeley HS 748s, manufactured in India by Hindustan Aeronautics Limited, join the fleet.
The jet age began for IAC with the introduction of the pure-jet Sud Aviation Caravelle airliner in 1964,
followed by Boeing 737-200s in the early 1970s. April 1976 saw the first three Airbus A300 wide-body jets
being introduced. The regional airline, Vayudoot, which had been established in 1981, was later reintegrated.
By 1990, Airbus A320s were introduced. The economic liberalisation process initiated by the Government of
India in the early 1990s ended Indian Airlines' dominance of India's domestic air transport industry. Indian
Airlines faced tough competition from Jet Airways, Air Sahara (now Jet Lite), East-West Airlines and
ModiLuft. As of 2005, Indian Airlines was the second largest airline in India after Jet Airways while Air Sahara
controlled 17% of the Indian aviation industry.
East-West Airlines and ModiLuft discontinued flight operations but the entry of several low-cost airlines in
India, such as Air Deccan, SpiceJet and others like Kingfisher Airlines continue to give competition in its
market, forcing Indian to cut down air-fares. However, as of 2006, Indian Airlines was still a profit making
airline.
Indian Airlines Limited is wholly owned by the Government of India through a holding company and has
19,300 employees as of March 2007.Its annual turn-over, together with that of its subsidiary Alliance Air, is
well over Rs.4000 crores (around US$ 1 billion). Together with its subsidiary, Alliance Air, Indian Airlines
carries a total of over 7.5 million passengers annually.
On 22 February 2007, the Group of Ministers (GoM) approved the merger of state-owned carriers, Air India
and Indian Airlines. Operating under the name Air India, the two airlines formally became one entity on 15 July
2007 upon receiving the new Boeing 777-200LR with the new livery of the merged airline. The new airline's
headquarters will remain in Mumbai, and will have a fleet of over 130 aircraft.
In December 2007, Air India was invited to join the Star Alliance. Since Indian Airlines is in the midst of
merging with Air India, it too will effectively be a member
3. Air India (IC) IT Department
Role of IT Department
Information technology department is a backbone of Indian Airlines (now known as Air India) IT
department has simplified the various critical and important operations of airline. The works, which need to
take lot of time like manual booking and handling of passengers at the airport for issuing of boarding passes,
now can be done instantly and with maximum accuracy. Earlier, passenger used to be standing in long
queues and they had to be physically present at airport 2-3 hours before of their flight timings, which is now
drastically reduced after the introduction of departure control systems and other online systems with the
help of Information Technology.
It has contributed a lot in achieving the customer satisfaction by providing better quality services. Indian
Airlines has started the online booking and e-ticketing facility through its website http://indian-
airlines.nic.in/index.aspx. Passenger now can book their tickets through Internet any time and from
anywhere at their own convenience.
IT Man power
IT department is headed by Director (IT). There is General Manager who reports to Director (IT). There are
DGMs who report to GM and look after the different portfolios in IT department. The major
functions/operations in IT department in Indian Airlines are:
 Providing computerized services for passenger Reservation, Ticketing and Departure Control
system.
 Maintenance of Mainframe and related equipment operations.
 Maintenance of Data communication hardware and networking equipments.
 Online booking and ticketing services.
 Call center services at several locations.
 Providing host connectivity at various IAL booking offices, Airports and travel agents
locations.
 Connectivity at 17 International locations, where IAL operates via SITA network.
 Internet and Intranet services.
 Development of PC based financial applications.
 Aircraft spares inventory Control system.
Indian Airlines has divided its entire computer network under 4 regions and one central headquarter. Four
regions are Northern, Western, Eastern, and Southern with their Nodal center at Delhi, Mumbai, Kolkatta and
Chennai respectively. Regional IT functions are being looked into by Regional IT teams, which are headed by
Sr. Manager (IT). The Regional IT heads report to GM (IT) at central IT Headquarter, New Delhi.
At Central site, IT department has approximately 150 employess and in 4 regions, total staff strength is 70
approximately. Therefore, overall staff strength of IT department in Indian Airlines is approximately 220.
IAL has also outsourced some of its IT services like facility management services at all airports, Call center
services etc.
Engineering Infrastructure
Engineering Department is headed by Director (Engg.), now designated as SBU Head - MRO (Engine & Comp.) in
NACIL at its registered office in Delhi and is assisted by Executive Director (Engg.), General Manager (Engg.) from
Quality Assurance & Technical Services, Engg. Services, Support Services (Production, Planning & Control) and Dy.
General Manager (Industrial Engg.). IAL Maintenance and Engineering main workshop facilities are located at four major
bases viz. Delhi, Mumbai, Kolkata and Hyderabad. Each major base is headed by General Manager (Engg.). G.M.
(Engg.) is assisted by Dy. General Managers from various divisions i.e. Line Maintenance, Major Maintenance, Avionics
(Electrical, Instrument, Radio, ATEC), Accessories (airframe components) Overhaul, Production Planning & Control,
Quality Control, Industrial Engg. And Engg. Training.
4. Air India(or Indian Airlines) Mainframe
Overview
Indian Airlines has installed state of art networking devices on its computer network which provide 100%
performance and are highly efficient. Networking hardware deployed in Indian Airlines network is:
(1) Z9 BC Mainframe: IAL has two IBM Mainframe connected to each other by a CTC link. Both the
servers are situated at Delhi. The z9 BC is able to manage numerous operating systems on a single
server, including z/OS®, z/OS.e, z/VM®, z/VSE™, z/TPF, TPF, and Linux® for System z9 (31-bit
and 64-bit distributions). The operating systems are designed to support existing application
investments without anticipated change to help realize the benefits of the z9 BC. Earlier, S/390
Mainframe was used. It has now been upgraded by z9BC Mainframe.
(2) Cisco Routers: IAL has the following Cisco routers installed at various locations.
 Cisco 7507 Routers: Very high End Routers with in built TCP/IP gateway functionality. IAL has
installed one each at Site-A and Site-b locations.
 Cisco 3745, 3845 and 2821 Routers: IAL has more than 25 such Mid Range Routers, which are
being deployed at various locations on IAL network. These are modular routers and can have
various different kinds of modular cards to cater the different requirements.
 Cisco 1721, 1751, 1601 and 1800 series Routers: These are Low end routers which are being used
at small and remote locations. Mainly these routers are used for connectivity of remote airports for
extending the DCS functionality.
(3) 3-com switches and Cisco switches: IAL has 24 ports,10/100 Mbps Ethernet switches used for
providing LAN setup at various locations. These switches are managed switches and can be remotely
managed through management software installed in a PC.
(4) Cisco 525 PIX Firewall: IAL has installed the Cisco 525 PIX Firewall (with fail-over configuration)
at their Central Site. This firewall is being used for the implementation of network security
requirements and restricting the secured access to various users.
The Firewall has also built-in VPN (Virtual Private Network) Server functionality in it. The VPN
services are used for providing the IAL Host access through Internet to remote users like travel agents
and some IAL locations. The VPN connectivity uses secured and encrypted tunnel for transmitting the
data over the public network.
Z9 BC Mainframe:
 IBM System z9™ technology, for entry level to midsize capacity needs, with a wide choice of capacity
settings and highly granular growth options, an increase of 2.6 times more capacity settings than
IBM eServer™ zSeries®890(z890)
 A broad set of specialty engines to facilitate integration of many types of workloads and fully leverage the
power of the mainframe
 Helps protect client’s investments in mainframe technologies with upgradeability from z890 and z800 servers
 Key System z9 features of advanced security, resiliency, virtualization and connectivity technologies
delivered in a midrange package
The IBM System z9™ Business Class (z9 BC) takes advantage of the innovation of the System z9 platform and is
designed to bring value to a wider audience, both midrange and small enterprise businesses. The z9 BC offers a low cost
of entry, granular growth, flexible configurations, sub capacity pricing and On/Off Capacity on Demand to meet growing
and changing demands for traditional and new workloads.
And the z9 BC can participate in IBM’s Parallel Sysplex® technology, which can give you the flexibility to solve
business issues such as rapid response to business needs change, ensuring continuous availability of IT assets and
reducing your overall cost of computing.
On the z9 BC, sub capacity options are offered on 1-way to 4-way servers. Having the ability to offer just a portion of the
full capacity gives you greater flexibility. The z9 BC is available in two models with 73 capacity settings so you can
choose just the right size. The Model R07, aimed at smaller enterprises, has a smaller I/O configuration and lower entry
point where large amounts of resources are not the driving factor, but always a quick upgrade away when needed, either
temporary or permanent. The Model S07 is aimed at medium-sized businesses that need to have more available I/O or
more capacity, as well as upgrades to the IBM System z9 Enterprise Class (z9 EC). For ease of installation, the z9 BC can
be installed in either a raised or non-raised floor environment.
Today, more than ever, z9 BC means there is a System z9 for everyone.
The z9 BC is able to manage numerous operating systems on a single server, including z/OS®, z/OS.e, z/VM®, z/VSE™,
z/TPF, TPF, and Linux® for System z9 (31-bit and 64-bit distributions). The operating systems are designed to support
existing application investments without anticipated change to help realize the benefits of the z9 BC.
IBM provides world-class mainframe technology to help today’s enterprises respond to business conditions quickly and
with flexibility. From automation to advanced virtualization technologies and open industry standards such as SOA,
IBM mainframes teamed with IBM’s storage products help deliver competitive advantages. IBM System z9—Powerful
servers for simplified infrastructures.
Features and Benefits:
1. Availability/Reliability
 Air cooling
 CICS subspace group facility
 CICS subsystem storage protect
 Concurrent channel, OSA-E,OSA-E2 and Coupling Link maintenance
 Concurrent Hardware Management Console (HMC) and Support Element
 Concurrent Licensed Internal Code (LIC) maintenance for CP, SAP, SE, PR/SM™, LPAR, HMC, OSA-
Express2
 Concurrent power and thermal maintenance
 Dual Support Elements
 Dynamic Channel Path Management
 Dynamic I/O Reconfiguration
 Dynamic memory sparing
 Dynamic Oscillator Switchover
 Enhanced Application Preservation
 Enhanced Driver Maintenance
 Enhanced Dynamic Reconfiguration Management
 Enhanced Firmware Simulation
 Failure Containment for MBA
 Fault Tolerant Interconnect Design
 FICON Purge Path Extended
 Frame Bolt Down Kit
 Multipath IPL
 N+1 power supply technology
 OSA-Express2 Link Aggregation Support
 OSA-Express2 Network Traffic Analyzer
 Partial memory restart
 Redundant I/O Interconnect
 Remote operations support
 Sparing for Storage Protect Preservation Keys
 System Assist Processor (SAP)
 Transparent CP Sparing
2. Security
 Advanced encryption standard (AES)
 Certified for LPAR isolation
 Configurable Crypto Express2 (1 or 2 PCI-XAdapter features)
 CP Assist for Cryptographic Function
 Designed for FIPS 140-2 Level 4
 EAL5 certified
 LDAP support for HMC user authentication
 Open Architecture Distributed Transaction Enablement
 Pseudo random number generator (PRNG)
 Remote key load for ATMs
 Secure hash algorithm-256 (SHA-256)
 SSL Acceleration for Linux and z/OS
 Tamper-proof Cryptographic Support
3. Capacity on Demand
 Administrative On/Off CoD Testing
 API for On/Off CoD activation
 Capacity Backup Upgrade (from any model to any model and capacity setting)
 Capacity Upgrade on demand
 Customer Initiated upgrades
 On/Off Capacity on Demand
 Up to 100 configuration records may be stored on System Element
 Specialty Engines
 Integrated Facility for Linux (IFL)
 Internal Coupling Facility (ICF)
 System z9 Application Assist Processor (zAAP)
 System z9 Integrated Information
 I/O Connectivity
 ESCON CTC native and basic mode
 ESCON half duplex data transfer
 FCP LUN Access Control
 FCP support for SCSI devices by Linux and z/VM
 FICON CTC
 FICON Express4 4 Gbps (2 and 4 channel features)
 FICON full duplex data transfer
 Full fabric FCP support
 Multiple Image Facility (MIF) sharing across LCSS’s
 N_Port ID Virtualization
 QDIO
 Networking
 HiperSockets™
 OSA for NCP (OSN)
 OSA Layer 3 VMAC
 OSA-Express (Gigabit Ethernet, 1000BASE-T Ethernet, Fast Ethernet)2
 OSA-Express and OSA-Express2 Layer 2 Support
 OSA-Express Integrated Console Controller (1000BASE-T Ethernet)
 OSA-Express2 (Gigabit Ethernet, 10 Gigabit Ethernet, 1000BASE-T Ethernet
 Performance
 Compare-and-move extended
 DB2 sort assist
 FCP Enhancements
 Hardware-assisted data compression
 IEEE binary floating point support for advanced Lotus® Domino® and Java performance
 Long Displacement Facility
 Modified Indirect Data Address Word (MIDAW) Facility
 Multiple Subchannel sets (MSS)
 OSA Dynamic LAN idle
 Performed Locked Operations for enhanced IP performance
 Up to 64 GB memory
4. Z/Architecture
 Intelligent Resource Director
 Superscalar Processor
 Tri-modal addressability
 Up to 30 LPARS each (up to 15 LPARS each for model R07) with 64-bit central memory
addressability
Mainframe Software
The system software deployed on PSS system is ZOS1.9 and ALCS V2R41. The system software deployed on
System running other business applications is ZOS 1.10 and CICS V3.2/DB2 V9.1. Both TPFDF and Non
TPFDF data structures are used in the PSS applications. The other business applications like FFP, MIS uses
IBM DB2 database. The e-ticketing application is hosted on Amadeus ET server.
At present, Indian Airlines is accesing both the hosts (z9BC) through IBM 3745 (communication Controller),
which acts as a SNA gateway and also through Cisco 7507, which is acting as a TCP/IP gateway.
IBM 3745 FEP (Front End Processor)
Historically, IBM's primary solution for mainframe access has been the FEP. The FEP offers a great deal of functionality
for subarea networks and legacy protocols. However, only the largest networks use most of the functionality provided by
the FEP; most small networks use only a subset of this functionality. In addition, networks are changing rapidly and the
typical enterprise network now supports a multitude of protocols, LANs, WANs, and device types. High-performance
substitutes, such as LANs, high-speed serial lines, and Frame Relay have replaced low-speed serial lines. The FEP has not
kept up with the requirements of today's enterprise networks so other networking gear is required to augment or replace
the FEPs. If you are considering replacing some or all of your FEPs, first determine which functions your FEP is
providing today so that you do not lose any of these functions as you move forward to CMCC.
FEPs have the following key functions in today's networks:
 SNA session routing—SNA session routing is required in environments with multiple data centers
or Advanced Communications Function (ACF)/VTAM application hosts and a high volume of
cross-domain SNA traffic. SNA session routing can be important in environments with distributed
AS/400s.
 SNA COS—SNA COS allows prioritization of SNA traffic between the FEPs and the mainframes
and is important in environments with SNA backbones. SNA COS is less important in
environments that have consolidated the FEPs in the data center. In this case, either there is no
FEP-to-FEP traffic, or the FEPs are connected at the data center over high-speed LANs that do not
have bandwidth contention problems. However, some networks take advantage of Link Services
Prioritization (LSPRI), which provides transmission priority based on COS for outbound traffic
(for example, FEP to cluster controller).
 Serial line concentration—FEPs can concentrate large numbers of low-speed (9.6-kbps) serial
lines. However, as networks migrate to high-speed WAN backbones, the need for high-density,
low-speed serial connectivity decreases.
 Switched SDLC—Some enterprises rely on switched SDLC to support transient SNA connections
to small branch offices or to provide switched network backup. As SDLC is being replaced by
multiprotocol data links, switched SDLC requirements are diminishing. In place of SDLC,
protocols such as Integrated Services Digital Network (ISDN), Point-to-Point Protocol (PPP), and
Serial Line Interface Protocol (SLIP) are being used to provide multiprotocol or IP-switched line
support.
 SNA boundary network node (BNN) function—FEPs provide an SNA BNN function, which
includes polling, converting from local addresses to SNA addresses, and converting exchange
identification (XID). In the absence of remote FEPs, local FEPs can perform these functions. In the
absence of any FEPs, ACF/VTAM can perform most of these functions.
 SNA Network Interconnection (SNI)—Many enterprises use FEPs for SNI to allow independent
SNA networks to communicate. There are other alternatives, such as the SNASw border node
function and electronic data exchange over the Internet; however, any change on one side requires
a change on the other side, so this migration will be a slow one.
 SSCP takeover—With this facility, if an owning VTAM goes down, another VTAM can assume
ownership of those resources without disrupting any existing application sessions. The NCP plays
a role in allowing this takeover.
 Extended recovery facility (XRF)—The XRF is a program that allows one VTAM application to
take over for another. The XRF code in the NCP plays a key role in supporting this capability.
 X.25 support—X.25 Interconnection allows the NCP to act as an X.25 packet switch. NCP Packet
Switching Interface (NPSI) allows the NCP to connect to other resources over X.25 networks.
X.25 Interconnection supports both SNA and non-SNA devices. For non-SNA (Asynchronous and
Binary Synchronous Communications Protocol) devices, it supports conversion to SNA.
 Specialized program products that support custom or older applications—Network Routing
Facility (NRF) provides routing inside the NCP without VTAM participation. An emulation
program allows the IBM 3745 to connect to Basic Telecommunications Access Method (BTAM)
in an IBM mainframe.
 Legacy protocols—The FEP supports program products, such as Non-SNA Interconnection (NSI)
for Bisynch conversion, Airline Line Control Interconnection (ALCI) for airline line control
protocol transport, and Network Terminal Option (NTO) for synchronous conversion. You can
install these products in the FEP to handle non-SNA protocols. Legacy protocols are older
protocols that are declining in usage
5. Indian Airlines(Air India (IC)) Network
Indian Airlines has its PSS Production Data Centre at IGI Airport, New Delhi (Site-B) consisting of IBM
Mainframe Server z9BC (Model 2096– R07). Another Data Centre (Site A) having a similar IBM Mainframe
Server Model 2096-R07 is located half a km away from the Production Data Centre for hosting other Business
applications and also to act as a Disaster Recovery System during failure of Production Data Centre. These Data
Centers are channel to channel connected through high bandwidth fiber links. The configuration of the
Mainframes is as follows:
IBM z9BC (Model 2096– R07 Mainframe (Site-A)
IBM z9BC (Model 2096– R07 (Site-B)
Memory - 8 GB Main Memory – on each system
Disk Storage - DS8100 with 7 TB usable storage on each system
Tape system - 34592 Cartridge Tape Drives (2 on each systems)
Router - Cisco 7507 IP Gateway Router
Controller - 3745 Communication Controller
The system software deployed on PSS system is ZOS1.9 and ALCS V2R41
The system software deployed on System running other business applications is ZOS
1.10 and CICS V3.2/DB2 V9.1
Table 4. Configuration of the Mainframes
Applications
The application software deployed is RTB (BAPSS from erstwhile M/s Speedwings a subsidiary of British
Airways). The applications software commissioned in 1997 provided functionalities for Reservation, Ticketing,
Inventory Control and Departure Control with Advance Load Planning.
IAL Passenger Services Functionality
 Flight Inventory
 Schedule Change Function
 Class Cut-off & Merge
 Availability and Schedule Display
 Passenger Name Record (PNR)
 Passenger Itinerary Print
 Time limit PNR
 Special Travel Agent Records (STAR) PNR’s
 Duplicate PNR’s
 Repetitive PNR construction
 Passenger Lists
 On-line Flight analysis
 Pricing and Tariffs
 Automated Ticketing
 Flight Information
 Central Information System
 Agent Productivity
 Host Access to SITA TIMATIC for viewing Travel Information Manual
 Levels of Participation with various GDS
 Amadeus Access sell/Direct Access
 Abacus Direct Connect Sell
 Sabre Direct Connect Sell
 Galileo Interactive sell
 Apollo Interactive Sell
 Worldspan Direct connect sell
 Axess Answer back
 Infini Full Availability
 e-Ticketing
Indian Airlines has entered into an agreement with M/s Amadeus for the implementation of E-ticketing in
Indian Airlines. The IAL PSS system has been modified to make it E compliant. Departure Control System with
Advance Load Planning Baggage Reconciliation System (BRS) – Directive of Bureau of Civil Aviation
Security (BCAS) India, makes baggage reconciliation mandatory. IC is currently carrying out manual baggage
matching at all domestic airports. The various terminal populations connected to present IC host systems fall in
following categories
a) ATO/ CTO – Domestic (Through IC Network)
b) ATO/ CTO – International (Through SITA network / Internet)
c) Travel Agents (Through Internet connectivity)
d) Connectivity to GDSs via GDS Host to IAL Host connectivity More than 10,000 such Terminals / Printers
are configured in the current IA Host System It may be noted that terminals at few non metro locations at ATOs
/ CTOs, which are based on obsolete/u-100 protocol, will be replaced with new Wintel (Windows + Intel) PCs
at the time of upgrade of current multi-flavoured network (SNA+IP+U-100) to pure IP network. The existing
3270 emulator software PCOM, will continue to be used on some of these PCs which require access to other
business applications running on IAL’s present IBM mainframe.
In-house developed Flight Information System (General Information System)
General Information system has departure/arrival pages of all flights of the day to be filled by co-ordination cell
for movement information of the flights. This has various statistical information also, viz. capacity utilized /
delay information/payload etc. This arrival/departure information of the flight is also used by IVRS system.
This also provides the information of seats offered of yesterday / current / next day.
Dial – A – Ticket
Through the Dial-a-Ticket facility, the passengers can book a seat by calling up the 24 X 7 Indian Airlines call
center from anywhere in the country, make the payment by giving their credit card details and receive the
“Itinerary Receipt” through courier, e-mail, fax or even collecting it at metro airports.
Interfaces – Passenger Services
1. Interface between RES and Amadeus e-ticketing Server.
2. Interface for message switching.
3. Interface for IATA Host-to-Host for GDS.
4. Interface with GDS direct Access, Direct Connect, and other relevant existing participation levels.
5. Interface with GDS for e-ticketing.
6. Interface with interline and code share partners.
7. Interface on SSIM data interchange and ASM/SSM message exchanges.
8. Interface with interline e-ticketing.
9. Interface with handling agency e-ticket interface.
10. Interface with Airline Revenue Management System (ARMS).
11. Interface with Management Information System
12. Interface with data ware house for RES / DCS data downloading.
13. Interface with ground handlers at international stations for downloading PNL/ADL etc.
14. Interface with other airlines for through check-in.
15. Interface with IC internet booking engine.
16. Interface with FFP System for providing passenger travel data from DCS.
17. Interface with ICICI for providing travel data from DCS for I-mint, Platinum Card schemes.
Network
Indian Airlines Data Network is used to provide “Host Connectivity” to end users. The Network consists of a
Core backbone of 2 mbps leased Data Links which connect six major domestic Metro Airports and City
Booking offices with Computer Centre, Palam, Site A & Site B. These dedicated leased links have ISDN back
up also. High performances Cisco Routers using Dlsw are installed at all the metro locations for routing the
data. Non-metro Booking offices and Airport locations are connected to backbone network with high-speed 64
K digital leased lines with ISDN backups. Cisco low ends Routers are installed at these locations and vice versa.
However, various remote non-metro Booking Offices are connected via 9.6 Kbps analog lines.
The connectivity to Call Centre (third party provided/operated) is also extended through digital links from the
above-referred Site B. The third party hosted Cargo System is also connected to the IAL network through leased
lines from Computer Centre, New Delhi & Air India Building, Nariman point, Mumbai.
The connectivity to SITA for connectivity to IAL international ATOs/CTOs is provided through 2 MBPS leased
lines (SITA IP-VPN Service).Most of the Host-to- Host communication which includes GDS connectivity,
connectivity to e-ticket Server and Type B traffic, is through SITA network (2MBPS Link) using MATIP and
some part of Host to-Host connectivity and Type B traffic is through SITA Network (64 kbps line speed with
19.2 kbps port ) using AX.25 protocol. IAL network supports both IBM terminals and old U-100 legacy
terminals currently. The legacy network is supported by using an IBM product called CUTS (Connect UTS)
which converts SNA protocol to U-100 protocol. IBM terminals are installed at major metro booking offices
and all domestic airports. IBM terminals are basically PC’s with IBM PCOM 3270 emulator software running
over them.
The connectivity for the travel agents is extended by various means. Travel agents are connected through GDSs.
Internet based Host connectivity has been extended to remote locations in India and PSAs abroad. Indian
Airlines has started the process of migration of its rather complex multi-protocol flavored network as detailed
above to a simple IP based network ex-Host. The existing Data Centre Connectivity and Network Diagrams are
enclosed as Diagram-1 and Diagram-2.
Application – Frequent Flyer (FFP)
Flying Returns, the loyalty program (Frequent Flier) of NACIL is supported by an online application. It
provides the complete functionality to service Frequent Flyer members of the India Program. It allows the
accruals, redemptions, class upgrade against mileage points and retro-credit of mileage points of Frequent Flyer
members of India Programme in online mode from city offices and airport extension counters from six metro
locations – DEL, BOM, CCU, MAA, BLR & HYD. This facility has also been extended to AMD & PNQ thru
HOB .
The Overseas Programme members are serviced by a third party managed Application. This application is a
server based application on Windows/Visual-Fox platform.
The two application provide the facilities of
 Member profile Maintenance.
 Mileage Accumulation based on travel on NACIL, Alliance Partners and Code Share Partners.
 Add –on Mileage Accumulation for non airline alliance partners
 Bonus point accumulation
 Redemptions
 Tier Management
 Data extraction for maintenance of Flying Returns website http://www.flyingreturns.com
 Generation of Mileage Point Statement
 STAR RECORD generation/ Updation for frequent flyer Members
 Facility for Flagging of Award letters.
 Class upgrade against Mileage Points
 Mileage Points lapse
 Queries & Reports
For data capture & transfer FFP application has the following External interfaces.
 Creation & updation of STAR data in PSS.
 PSS/DCS interface for Downloading DCS data.
 Frequent Travel List interface to receive FTL data in IATA format from NACIL International stations
and Alliance Airlines.
 Central Information System pages (CIS pages) Interface to receive Non DCS data.
 Data interchange between FFP application and Flying Returns website
IAL does not currently validate frequent traveler data of IAL or any other partner airline during PNR creation
and DCS process.
Interface – Frequent Flyer
1. DCS for receiving Flight data .
2. Interface for receiving FTL data (as per IATA stds - 1719a) of AI and IC International stations
generated by DCS system available at that station as y dot (MX) message through SITA.
3. Interface for receiving Non DCS data as y dot (MX) message through SITA.
4. PSS interface for updating STAR records.
5. FTP Interface for uploading/downloading data to/from FFP application by MSC for partners & website
updation.
Network – Frequent Flyer
1. SNA connectivity thru' IC Computer Network at MSC offices at BOM, HYD, CCU, BLR, DEL city and
airport offices and MAA city office
2. HOB connectivity at AMD, PNQ
6. Network services
 Internet Services
IAL has its own website with its web server installed at NIC on their network which is then connected to IAL
HOST for getting any online information.
Applications – Web based Applications
1. Internet Booking Engine for general public and travel agents through Website.
2. Advance payment module for Online Travel portals/Travel agent/Corporate.
3. Web based MIS reports for user departments and travel portals.
4. Direct access with host reservation system for Web bookings through Travel portals
5. E-ticketing for Web bookings for general public and travel portals.
6. Maintenance /updation of fares for IC domestic sectors and international sectors (ex India) on IC web-
server.
7. An integrated web based application module for prevention of fraudulent transactions developed in-house
and integrated with Internet Booking Engine (similar to CyberSource software).
8. Dial A Ticket.
9. In-house web based interface for Mobile/ATM bookings.
10. Web based interface for auction bookings of Domestic/International sectors operated by IC.
Network – Web based Applications
Two internet links (2 MBPS each) through MTNL and Reliance.
The Servers are all on internal Data Centre LAN.
System – Data Mart
IAL is having PC based exhaustive data warehouse facilities. Query based mining tools are used for retrieval
and analysis of the historical data.
Applications – Data Mart
The passenger reservation data purged from the system during the NFM process is downloaded into a PC text
file on a daily basis. The passenger DCS historical data which includes the details like board / off points, seat
number, discount code, FFP number, check-in time, transaction history etc. is also downloaded from the
main frame. Compact disc having data & GUI based interface are distributed to users on weekly basis.
Query Based Promotion & Discount Information System provides the performance of the domestic
promotional and discount schemes. On-line data is taken from Reservation and DCS systems to create a merged
database for analysis purposes.
Query Based System has been developed to analyze the Indian Airlines and Competitor Carriage Data. On-
line facility has been provided to file the Competitor Data while Indian Airlines carriage data is picked up from
the MIS system
Interface – Data Mart
Access IBM host for data downloading
Network – Data Mart
Not Applicable
 Intranet Services
IAL has also provided the Intranet services to its employees. IAL has installed the IBM RISC high end
machine on AIX platform, which acts as an Intranet server. IAL has been using IBM Lotus Domino Server for
providing Web Services, Mail Services, Proxy server and many others.
Intranet has the following main features:
 E-mail services to its employees.
 Information on various operations of several departments.
 Notifications of various circulars, events, meeting etc.
 Telephone directory information
 Workflow applications etc.
7. Routers
High End Router
Cisco Router7507 (Gateway)
The high-performance Cisco 7500 series Routers Helps IAL to optimize network density, bandwidth
aggression, availability, serviceability and operational costs. It has breadth of advanced support for LAN/WAN
services, redundancy, reliability and performance.
A distributed architecture using versatile Interface Processors (VIPs) is the key to the Cisco 7500’s scalability.
Each VIP has its own processor, which is capable of switching IP data packets and providing network services.
This scenario allows the overall system performance of Cisco 7500 routers to scale up when they need to handle
more high-speed network connections and more data packets. The RSP is still the market of the system. It runs
routing protocol with other routers in the network to gather switching intelligence, which is then downloaded to
the VIPs so that each can switch IP packets on its own.
In addition to performance packet switching, the VIPs can also provide a set of distributed IP network services,
including access control, QoS and traffic accounting (NetFlow). With the VIPs off-loading these IP switching
and services functions from the RSP, the RSP can devote all its CPU cycles to handle other essential tasks.
Medium End Router
Cisco Router3745
With the on-board LAN/WAN connectivity, new high density service modules. And support for multiple
advanced integration modules, the Cisco 3745 Series Multiservice Access Router delivers new level of service
density for IAL airport branch offices in compact form factor.
When configured with the 16- or 36- port EtherSwtich network module, the Cisco 3745 series offers a single,
integrated platform that combines flexible routing and low-density switching. In addition, it can support internal
inline power for the EtherSwtich ports, delivering a single-platform IP telephony and voice gateway solution
that facilitates flexible, incremental and scalable migration to a converged network. These single-platform
solutions help lower total cost of ownership by simplifying training. Deployment and management, and modular
expansion options help protect current network investment.
As a cornerstone of Cisco AVVID (Architecture for Voice, Video and Integrated Data), the Cisco 3745 series
supports rich Cisco IOS Software features such as availability, quality of service and security to address the
resilience needs of the branch office. The Cisco 3745 series combines these features with flexible applications
and services consolidation to offer branch offices a platform optimized for integrating future services.Now, IAL
is upgrading the router by doing some software changes.
Cisco 3845Router
The Cisco 3845 Integrated Services Router is part of the Cisco 3800 Integrated Services Router Series which
complements the Integrated Services Router Portfolio.
The Cisco 3845 Integrated Services Router provides the following support:
 Wire-speed performance for concurrent services such as security and voice , and advanced services at full
T3/E3 rates
 Enhanced investment protection through increased performance and modularity
 Enhanced investment protection through increased modularity
 Increased density through High-Speed WAN Interface Card Slots (four)
 Enhanced Network Module Slot
 Support for over 90 existing and new modules
 Support for majority of existing AIMs, NMs, WICs,VWICs,and VICs
 Integrated GE ports with copper and fiber support
 Optional Layer 2 switching support with Power over Ethernet (PoE) (as an option) , supports the 36-port
Cisco EtherSwitch module (NMD-36ESW)
 Security
 On-board encryption
 Support of up to 2500 VPN tunnels with the AIM-HPII-PLUS Module
 Antivirus defense support through Network Admission Control (NAC)
 Intrusion Prevention as well as stateful Cisco IOS Firewall support and many more essential
security features
 Voice
 Analog and digital voice call support
 Optional voice mail support
 Optional support for Cisco CallManager Express for local call processing in stand alone business
for up to 240 IP Phones
 Optional support for Survivable Remote Site Telephony support for local call processing in small
enterprise branch offices for up to 720 IP phones
Cisco 2821Router
The Cisco 2821 Integrated Services Router is part of the Cisco 2800 Integrated Services Router Series which
complements the Integrated Services Router Portfolio.
The Cisco 2821 Integrated Services Router provides the following support:
 Wire-speed performance for concurrent services such as security and voice , and advanced services to multiple
T1/E1/xDSL WAN rates
 Enhanced investment protection through increased performance and modularity
 Enhanced investment protection through increased modularity
 Increased density through High-Speed WAN Interface Card Slots (four)
 Enhanced Network Module Slot
 Support for over 90 existing and new modules
 Support for majority of existing AIMs, NMs, WICs,VWICs,and VICs
 Two Integrated 10/100/1000 Ethernet ports
 Optional Layer 2 switching support with Power over Ethernet (PoE) (as an option)
 Security
 On-board encryption
 Support of up to 1500 VPN tunnels with the AIM-EPII-PLUS Module
 Antivirus defense support through Network Admission Control (NAC)
 Intrusion Prevention as well as statefulCisco IOS Firewall support and many more essential security
features
 Voice
 Analog and digital voice call support
 Dedicated Extension Voice Module slot
 Optional voice mail support
 Optional support for Cisco CallManager Express (Cisco CME) for local call processing in stand alone
business for up to48 IP Phones
 Optional support for Survivable Remote Site Telephony support for local call processing in small enterprise
branch offices for up to 48 IP phones
Low End Routers
Cisco 1721Router
The Cisco 1721 Modular Access Router is designed to help organizations embrace the productivity benefits of e-business
applications. The Cisco 1721 router enables e-business by delivering secure Internet, intranet, and extranet access with
virtual private networks (VPNs) and firewall technology
The Cisco 1721 Router offers:
 Wide array of WAN access options, including high-speed business-class digital subscriber line (DSL)
 High-performance routing with bandwidth management
 Inter-virtual LAN (VLAN) routing
 VPN access with firewall option
Key Features:
 A RISC processor to support high-performance routing, encryption, and broadband services
 One autosensing 10/100 Fast Ethernet port
 Two WAN interface card (WIC) slots that support the same data WAN interface cards as the Cisco
1600,2600, and 3700 routers
 One auxiliary (AUX) port (up to 115.2-kbps asynchronous serial)
 One internal expansion slot for the hardware-assisted VPN encryption card (MOD1700-VPN)
 16 MB Flash Memory
 32 MB DRAM
Cisco 1751Router
Cisco 1751 Modular Access Router is ideally suited to help you evolve your organization into an e-Business. It supports
e-Business features such as VPNs; secure Internet, intranet, and extranet access with optional firewall technology;
broadband DSL and cable connectivity; and multiservice voice/video/data/fax integration.
The Cisco 1751 Modular Access Router offers:
 Flexibility to adapt to changing requirements
 Modularity that allows you to individually configure the system to meet specific business needs
 Investment protection with features and performance to support new WAN services such as broadband DSL
and cable access,multiservice voice/data integration, and VPNs
 Integration of multiple network functions, including anoptional firewall VPN,and data service
unit/channelservice unit (DSU/CSU) to simplify deployment and management
 Cisco 1751 Base Model Includes everything an office needs for data networking now (32 MB Flash, 64 MB
DRAM, and Cisco IOS IP software feature set), with a simple upgrade path to full voice functionality. WAN
interface cards are available separately.
 Cisco 1751-V Multiservice Model Includes all the features needed for immediate integration of data and
voice services with support for up to two voice channels (32 MB Flash and 96 MB DRAM, one DSP (PVDM-
256K-4), and Cisco IOS IP Plus Voice feature set). Voice and WAN interface cards are available separately.
 All Cisco 1751 models offer three modular slots for voice and data interface cards, an autosensing
10/100BaseT Fast Ethernet LAN port supporting standards-based IEEE 802.1Q VLAN, a console port, and an
auxiliary port.The Cisco 1751 Router supports the same WAN interface cards as the Cisco 1600, 1700, 2600,
and 3600 Series routers, and the same voice interface cards and voice-over-IP (VoIP) technology as the Cisco
1700, 2600, and 3600 Series routers. This simplifies support requirements.
Cisco 1601Router
Cisco 1600 series routers connect small offices with Ethernet Lans to the Internet and to company intranet using several
wide area network(WAN) technologies: Integrated service Digital Network(ISDN), asynchronous serial , and
synchronous serial such as Frame relay,leased lines, Switched 56, Switched Multimegabit data Service(SMDS), and
X.25.Cisco 1601 contains one Ethernet, one serial , one WAN interface card slot.
Cisco 1841Router
IAL is now replacing Cisco’s 1700 and 1600 series router with 1841 series routers. Cisco's 1841 router was created with
the smaller branch office in mind. This router is a low-end device making the 1841 as one of the cheaper models
manufactured by Cisco. The 1841 Cisco router has low failure rates and is enterprise class hardware. Typical of Cisco
products, this router has openings for standard Cisco cards offering network interfaces and features while running on the
IOS software. With such a comfort level in the IT community for Cisco products and its IOS, setup time and maintenance
usually have a minimal learning curve compared to competing manufacturers. The 1841 router fits in rack mounts making
it suitable for data closet installation. However, the 1841 has only a single power supply revealing its intended place in the
field offices rather than central routing for a large company.
This particular model comes with these features:
 2 10/100 Ethernet ports (copper - RJ45)
 2 Wan Interface Card (WIC) slots for the ports of your choice
 1 internal expansion slot
 standard pair of console/auxiliary console ports
 1 USB port for console access (localdevice management)
 128 Meg RAM; only expandable to 384 Meg.
 1U height
The 1841 routers come with three-speed fans controlled by a thermostat in the chassis. For noise abatement and extended
life, fan speeds are variable depending on the cooling needs. The 1841 routers come with internal clocks, but are
dependent on a non-replaceable battery. If the battery fails, this would require the chassis be sent back to the factory for
repair - which should be covered under warrantee.
For VoIP implementations a separate appliance will be needed since the 1841 router capabilities do not include VoIP or
voice even though it has 2 WICs. A single power supply is a drawback, but for most implementations this means no
redundant power supply. For installations of 300 users or less, the Cisco 1841 meets the needs of a field office. It is
overkill for a job of less than 20 nodes where a smaller router or a PIX firewall is recommended. Whatever the router
selection, Network Address Translation, a secondary Internet circuits to the headquarters, and a reasonable amount of
access controllists (ACLS) should be included in its capabilities.
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep
myrep

More Related Content

What's hot

Fabric design pattern feeding through human machine interface (hmi) for an el...
Fabric design pattern feeding through human machine interface (hmi) for an el...Fabric design pattern feeding through human machine interface (hmi) for an el...
Fabric design pattern feeding through human machine interface (hmi) for an el...eSAT Journals
 
IRJET-Smart Parking System
IRJET-Smart Parking SystemIRJET-Smart Parking System
IRJET-Smart Parking SystemIRJET Journal
 
IRJET- Vehicle Accident Prevention System
IRJET-  	  Vehicle Accident Prevention SystemIRJET-  	  Vehicle Accident Prevention System
IRJET- Vehicle Accident Prevention SystemIRJET Journal
 
Wireless Communication Unit 5 GSM system operation
Wireless Communication Unit 5 GSM system operationWireless Communication Unit 5 GSM system operation
Wireless Communication Unit 5 GSM system operationAshutha K
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza SystemIRJET Journal
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMvishnuRajan20
 
IRJET- Automotive Collision Avoidance System
IRJET-  	  Automotive Collision Avoidance SystemIRJET-  	  Automotive Collision Avoidance System
IRJET- Automotive Collision Avoidance SystemIRJET Journal
 
Intro to _evolved_packet_core_network
Intro to _evolved_packet_core_networkIntro to _evolved_packet_core_network
Intro to _evolved_packet_core_networkSanjay Shukla
 
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Associate Professor in VSB Coimbatore
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET Journal
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-pShuo Zhang
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...Sivaram P
 
Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksKalyan Acharjya
 
It802 d mobilecommunicationspart3
It802 d mobilecommunicationspart3It802 d mobilecommunicationspart3
It802 d mobilecommunicationspart3Debasis Das
 
Image processing on automobiles (1)
Image processing on automobiles (1)Image processing on automobiles (1)
Image processing on automobiles (1)9177547219
 

What's hot (20)

7hj
7hj7hj
7hj
 
Fabric design pattern feeding through human machine interface (hmi) for an el...
Fabric design pattern feeding through human machine interface (hmi) for an el...Fabric design pattern feeding through human machine interface (hmi) for an el...
Fabric design pattern feeding through human machine interface (hmi) for an el...
 
IRJET-Smart Parking System
IRJET-Smart Parking SystemIRJET-Smart Parking System
IRJET-Smart Parking System
 
IRJET- Vehicle Accident Prevention System
IRJET-  	  Vehicle Accident Prevention SystemIRJET-  	  Vehicle Accident Prevention System
IRJET- Vehicle Accident Prevention System
 
Wireless Communication Unit 5 GSM system operation
Wireless Communication Unit 5 GSM system operationWireless Communication Unit 5 GSM system operation
Wireless Communication Unit 5 GSM system operation
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza System
 
Mobile GPS Tracking
Mobile GPS TrackingMobile GPS Tracking
Mobile GPS Tracking
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEM
 
IRJET- Automotive Collision Avoidance System
IRJET-  	  Automotive Collision Avoidance SystemIRJET-  	  Automotive Collision Avoidance System
IRJET- Automotive Collision Avoidance System
 
Intro to _evolved_packet_core_network
Intro to _evolved_packet_core_networkIntro to _evolved_packet_core_network
Intro to _evolved_packet_core_network
 
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent Lift
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
 
Nireeksha
NireekshaNireeksha
Nireeksha
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
 
Internship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication NetworksInternship Presentation B.Tech Communication Networks
Internship Presentation B.Tech Communication Networks
 
It802 d mobilecommunicationspart3
It802 d mobilecommunicationspart3It802 d mobilecommunicationspart3
It802 d mobilecommunicationspart3
 
Image processing on automobiles (1)
Image processing on automobiles (1)Image processing on automobiles (1)
Image processing on automobiles (1)
 

Similar to myrep

An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connectionMDMusab
 
IRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation SystemIRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation SystemIRJET Journal
 
Smart Car Parking System Based on IoT Concept
Smart Car Parking System Based on IoT ConceptSmart Car Parking System Based on IoT Concept
Smart Car Parking System Based on IoT Conceptinventionjournals
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectMDMusab
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
Arduino Based Collision Prevention Warning System
Arduino Based Collision Prevention Warning SystemArduino Based Collision Prevention Warning System
Arduino Based Collision Prevention Warning SystemMadhav Reddy Chintapalli
 
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...IRJET Journal
 
IRJET- Passenger Indicator for Driver
IRJET- Passenger Indicator for DriverIRJET- Passenger Indicator for Driver
IRJET- Passenger Indicator for DriverIRJET Journal
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptxJohn Veigas
 
Review on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationReview on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationIRJET Journal
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET Journal
 
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
 
Watch the first 10 minutes of the video below and then answer the que.pdf
Watch the first 10 minutes of the video below and then answer the que.pdfWatch the first 10 minutes of the video below and then answer the que.pdf
Watch the first 10 minutes of the video below and then answer the que.pdfdeepakarora871
 
IRJET- Survey Paper on Automatic Cart Movement Trailer
IRJET- Survey Paper on Automatic Cart Movement TrailerIRJET- Survey Paper on Automatic Cart Movement Trailer
IRJET- Survey Paper on Automatic Cart Movement TrailerIRJET Journal
 

Similar to myrep (20)

An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connection
 
IRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation SystemIRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation System
 
Final project report
Final project reportFinal project report
Final project report
 
Smart Car Parking System Based on IoT Concept
Smart Car Parking System Based on IoT ConceptSmart Car Parking System Based on IoT Concept
Smart Car Parking System Based on IoT Concept
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
Arduino Based Collision Prevention Warning System
Arduino Based Collision Prevention Warning SystemArduino Based Collision Prevention Warning System
Arduino Based Collision Prevention Warning System
 
Ijecet 06 07_004
Ijecet 06 07_004Ijecet 06 07_004
Ijecet 06 07_004
 
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
 
IRJET- Passenger Indicator for Driver
IRJET- Passenger Indicator for DriverIRJET- Passenger Indicator for Driver
IRJET- Passenger Indicator for Driver
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Review on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationReview on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial Application
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe Request
 
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
 
Proposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud ComputingProposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud Computing
 
Watch the first 10 minutes of the video below and then answer the que.pdf
Watch the first 10 minutes of the video below and then answer the que.pdfWatch the first 10 minutes of the video below and then answer the que.pdf
Watch the first 10 minutes of the video below and then answer the que.pdf
 
IRJET- Survey Paper on Automatic Cart Movement Trailer
IRJET- Survey Paper on Automatic Cart Movement TrailerIRJET- Survey Paper on Automatic Cart Movement Trailer
IRJET- Survey Paper on Automatic Cart Movement Trailer
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 

myrep

  • 1. A PROJECT REPORT ON “THE STUDY OF AIR INDIA NETWORK” Submitted to the Department of Computer Science & Engineering In partial fulfillment of degree Bachelor of Technology in Computer Science SUBMITTED TO SUBMITTED BY Er.K.P.Gangwar Rohitash mathur Er. Vikas Gupta Roll No-13476100033 BATCH(2013-2017) Future Institute Of Engineering& Technology, Bareilly(UP) Dr. A.P.J Abdul Kalam University, Lucknow(UP)
  • 2. Acknowledgement The project work in this report is an outcome of continual work and draws intellectual support from various sources. Obligations thus incurred in completing the work have been many. It is therefore almost impossible to express adequately the debts owed to many persons who have been contributing to bring about this project. We take the opportunity to thank Mukesh Kumar, Sr. Manager (S/M) and Mr. Vijay Kumar Dy Manager (DC), Department of IT, for giving me an opportunity to work here and for their invaluable guidance to us. I am also thankful to the Air India team for their help where required. Finally, I would like to thank all the people who, directly or indirectly helped me in completing this project. Date: 01-06-16 to 1-08-16 Place: Air India ltd, Safdarjung, Near jorbagh metro station, New Delhi-110003. Thank you
  • 3. Abstract NACIL, a wholly owned company of the Government of India, has been incorporated under the Indian Companies Act 1956. The two airlines namely Indian Airlines Limited (IAL) and Air India Limited (AIL) have been merged into this new company. The existing airline designator for IAL is IC and the airline accounting code is 058. The existing airline designator for AIL is AI and the airline accounting code is 098. The brand name of the merged airline is Air India and will have the airline designator AI and the airline accounting code 098. Indian Airlines has its Production Data Centre at IGI Airport, New Delhi (Site-B) consisting of IBM Mainframe Server z9BC (Model 2096– R07). Another Data Centre (Site A) having a similar IBM Mainframe Server Model 2096-R07 is located half a km away from the Production Data Centre for hosting other Business applications and also to act as a Disaster Recovery System during failure of Production Data Centre. Indian Airlines Data Network is used to provide “Host Connectivity” to end users. The Network consists of a Core backbone of 2 mbps leased Data Links which connect six major domestic Metro Airports and City Booking offices with Computer Centre, Palam, Site A & Site B. These dedicated leased links have ISDN back up also. High performances Cisco Routers using Dlsw are installed at all the metro locations for routing the data. Non-metro Booking offices and Airport locations are connected to backbone network with high-speed 64 K digital leased lines with ISDN backups. Cisco low ends Routers are installed at these locations and vice versa. However, various remote non-metro Booking Offices are connected via 9.6 Kbps analog lines. The connectivity to Call Centre (third party provided/operated) is also extended through digital links from the above- referred Site B. The third party hosted Cargo System is also connected to the IAL network through leased lines from Computer Centre, New Delhi & Air India Building, Nariman point, Mumbai. The connectivity to SITA for connectivity to IAL international ATOs/CTOs is provided through 2 MBPS leased lines (SITA IP-VPN Service). Most of the Host-to- Host communication which includes GDS connectivity, connectivity to e-tkt Server and Type B traffic, is through SITA network (2MBPS Link) using MATIP and some part of Host to-Host connectivity and Type B traffic is through SITA Network (64 kbps line speed with 19.2 kbps port ) using AX.25 protocol. IAL network supports both IBM terminals and old U-100 legacy terminals currently. The legacy network is supported by using an IBM product called CUTS (Connect UTS) which converts SNA protocol to U-100 protocol. IBM terminals are installed at major metro booking offices and all domestic airports. IBM terminals are basically PC’s with IBM PCOM 3270 emulator software running over them.This case study contains the detailed analysis of almost every hardware and software implemented in IAL from the network point of view. Its working and implementation has been explained.Whereever possible, a detailed diagram is given for easy understanding. All protocols used in the network have also been explained.Finally,a conclusion has been reported.
  • 4. INDEX I. Part-I Overviewof networking 1. Introduction…………………………………………………………………….……..1 2. Network……………………………………………………………………….………1 3. Why Builda Network…………………………………………………………….2 4. NetworkCriteria………………………………………………………………….2 5. Typesof Connections…………………………………………………………….3 6. NetworkTopology………………………………………………………………..3 7. Typesof Networks………………………………………………………………..5 8. OSI Model…………………………………………………………………………....6 9. The Layers………………………………………………………………………..7 10.Protocol Stack…………………………………………………………………….8 11. Router………………………………………………………………………………...9 12 Broadcast and Multicast………………………………………………………....10 13. EthernetRepeatersandHubs…………………………………………………………11 14. NetworkCabling……………………………………………………………………...11 UTP(UnsheildedTwistedPair)…………………………………………………...11 STP(SheildedTwistedPair)………………………………………………………12 WirelessLAN…………………………………………………………………......14 15. NetworkOperatingSystem…………………………………………………………...15 Peerto Peer……………………………………………………………………….15 Client/Server……………………………………………………………………...16 16. Ethernet…………………………………………………………………………17 17. Firewall……………………………………………………………………………...17
  • 5. II. Part-II A Case Study: Air India (Indian Airlines) Network 1. CompanyPerspective…………………………………………….……………….…..20 2. Air India(orIndianAirlines) History…………………….…….……………....…20 3. Air IndiaIT Department……………………………………..……….………….21 Role of IT Department………………………………………………….…………21 IT Manpower…………………………………………………….……………….22 EngineeringInfrastructure……………………………………………….……….22 4. Air IndiaMainframe………………………………………………...…………...23 Overview………………………………………………………………………….23 z9BC Mainframe………………………………………………………………….23 Mainframe Software………………………………………………………………27 IBM 3745 FrontEnd Processor…………………………………………………...27 5. IndianAirlines(orAirIndia) Network……………………………………….….28 Application………………………………………………………………………..28 Network……………………………………………………………………….......30 6. NetworkServices……………………………………………………………….……..32 7. Routers………………………………………………………………………….……..33 High End Routers…………………………………………………………………33 MediumEnd Routers……………………………………………………….……..34 Low End Routers…………………………………………………………….…....35 8. Switches………………………………………………………………………….……37 CiscoLayer 2 Switches…………………………………………………………...37 CiscoLayer 3 Switches…………………………………………………………....40 9. NetworkConnectivityandProtocols………………………………………………..42 WAN Technology………………………………………………………………42 Leasedline …………………………………………………………………………....44 LAN …………………………………………………………………………....45 TCP/IPProtocol Suite……………………………………………………….….46
  • 7. LIST OF FIGURES Fig.1.Network…………………………………………………………………………...10 Fig.2. Point-to-PointandMultipointConnection………………………………………..12 Fig.3.Bus Topology……………………………………………………………………..13 Fig.4.RingTopology…………………………………………………………………….13 Fig.5.Star Toplogy………………………………………………………………………13 Fig.6.Star Bus Topology………………………………………………………………...14 Fig.7.Tree Topology………………………………………………………………….…14 Fig.8.LAN……………………………………………………………………………….15 Fig.9.WAN……………………………………………………………………………....15 Fig.10. OSIReference model……………………………………………………….……17 Fig.11. Architecture of arouter…………………………………………………………..19 Fig.12. Packetsroutedbyroutersto theirdestinations…………………………………...20 Fig.13. Repeater……………………………………………………………………….…20 Fig.14 Unshieldedtwistedpair………………………………………………………….21 Fig.15. RJ-45 connector…………………………………………………………………22 Fig.16. Coaxial cable ……………………………………………………………………22 Fig.17. BNCconnector………………………………………………………………….23 Fig.18. Fiberopticcable ………………………………………………………………...23 Fig.19. WirelessLANs…………………………………………………………………..24 Fig.20. Peer-to-peernetwork……………………………………………………………25 Fig.21. Client/servernetwork…………………………………………………………...26 Fig.22 WAN TechnologiesOperateatthe LowestLevelsof the OSIModel…………...52 Fig.23 A Typical Point-to-PointLink…………………………………………………....52 Fig.24 A Circuit-SwitchedWAN ……………………………………………………….53 Fig.25 PacketSwitchingTransfersPacketsAcrossaCarrierNetwork………………….54
  • 8. Fig.26 LeasedLines……………………………………………………………………...55 Fig.27 PopularLAN ProtocolsMappedto the OSIReference Model…………………..56 Fig.28 Protocol Structure - IP/IPv4Header(InternetProtocol version4)……………..57 Fig.29 Protocol Structure - IPv6 (IPng) InternetProtocol version6…………………...58 Fig.30 Protocol Structure - TCP TransmissionControl Protocol………………………59 Fig.31 CyberoamCR200iNG .......................69 LIST OF TABLES Table 1. OSI layersandtheirdescription………………………………………………..17 Table 2. Categoriesof UnshieldedTwistedPair………………………………………...21 Table 3 EthernetCable Summary………………………………………………………..24 Table 4. Configurationof the Mainframes………………………………………………38 Table 5 WS-C2960-24TC-L……………………………………………………………..48 Table 6 WS-C2960-24-S………………………………………………………………...49 Table 7 WS-C3750G-24TS-S……………………………………………………………50 Table 8 WS-C3750G-12S-S……………………………………………………………..51
  • 9. Part-I : Overview of Networking
  • 10. 1. Introduction During the 20th century, the key technology was information gathering, processing and distribution. Among other developments, we saw the installation of worldwide telephone networks, the inventions of radio and television, birth and unprecedented growth of computer industry, and the launching of communication satellites. Due to this technological advance,our world is shrinking. Now a day, large numbers of separate but interconnected computers do the job; these systems are called computer networks. 2. Network A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Here are some of the fundamental parts of a network: Fig. 1. Network  Network - A network is a group of computers connected together in a way that allows information to be exchanged between the computers.  Node - A node is anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower.  Segment - A segment is any portion of a network that is separated, by a switch, bridge or router, from other parts of the network.  Backbone - The backbone is the main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second), while the backbone may operate at 100 Mbps.  Topology - Topology is the way that each node is physically connected to the network .
  • 11. Local Area Network (LAN) - A LAN is a network of computers that are in the same general physical location, usually within a building or a campus. If the computers are far apart (such as across town or in different cities), then a Wide Area Network (WAN) is typically used.  Network Interface Card (NIC) - Every computer (and most other devices) is connected to a network through an NIC. In most desktop computers, this is an Ethernet card (normally 10 or 100 Mbps) that is plugged into a slot on the computer's motherboard.  Media Access Control (MAC) address - This is the physical address of any .0`device -- such as the NIC in a computer -- on the network. The MAC address, which is made up of two equal parts, is 6 bytes long. The first 3 bytes identify the company that made the NIC. The second 3 bytes are the serial number of the NIC itself.  Unicast - A unicast is a transmission from one node addressed specifically to another node.  Multicast - In a multicast, a node sends a packet addressed to a special group address. Devices that are interested in this group register to receive packets addressed to the group. An example might be a Cisco router sending out an update to all of the other Cisco routers.  Broadcast - In a broadcast, a node sends out a packet that is intended for transmission to all other nodes on the network. 3. Why Build a Network?  If we’re happy with receiving or sending information by hand, we can resort to the postal service. But hard copy correspondence is called “snail-mail” for good reason. It’s far too slow in today’s accelerated world. By the time a letter arrives, its contents are often old news.  In contrast, a computer network enables faster communications between parties. In so doing, it leads to more efficient use of time.  By sharing electronic data among perhaps thousands of people, a computer network encourages (requires!) the use of standard policies and procedures. After all, our personal computer and our text-proficient cell phone have no inferential power as we humans do. We can just respond with, “Say again please,” if we don’t understand a transmission. But a computer network must be laboriously programmed to perform this one simple task. However,and once again, these standardized procedures lead to more efficient communications.  Networks provide backup and recovery support for our data. If the postal service’s mail truck breaks down, our letter might be delayed for a day—at least. Not so for a computer network. It’s designed to provide near- instantaneous recovery from a failure—all without a loss of a single character or number in our (electronic) mail.  “I’ve lost that file!” “I’ve lost the letter!” These lamentations are no longer true with computer networks. If networks are properly designed, it’s easy to store copies of our data. Be it mail, photographs, files, or video, we can keep copies safe and sound on another computer in another part of the country—if we take the time to instruct the network to do so.  Shared resources lead to less expensive communications. Take the Internet, for example. It’s an expensive public network (in reality, millions of interconnected networks), but we use it for a few rupees a month, and its performance is such that we might consider it our own private network. That is, we think we have this network for ourselves, but we don’t. A term to describe this fine service is virtual private network. 4. Network Criteria  Performance  Transit time: amount of time required for a message to travel from one device to another  Response time:elapsed time between an inquiry and a response  Performance depends on:  Number of users  Type of transmission medium  Capabilities of the connected hardware  Efficiency of the software  Throughput  Delay
  • 12.  Reliability, measured by:  The frequency of failure  The time it takes a link to recover from a failure  The network robustness in a catastrophe  Security  Protecting data from unauthorized access  Protecting data from damage  Procedures for recovery from breaches and data losses 5. Types of Connections There are two possible types of connections: point-to-point and multipoint.  Point-to-Point connection: A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between those two devices.  Multipoint connection: A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link (see Figure 2). In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If several devices can use the link simultaneously, it is a spatially shared connection. If users must take turns, it is a timeshared connection. Fig.2. Point-to-Point and Multipoint Connection 6. Network Topologies The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations.  Bus - Each node is daisy-chained (connected one right after the other) along the same backbone.Information sent from a node travels along the backbone until it reaches its destination node. Each end of a bus network must be
  • 13. terminated with a resistor to keep the signal that is sent by a node across the network from bouncing back when it reaches the end of the cable. Fig.3. Bus Topology  Ring - Like a bus network, rings have the nodes daisy-chained. The difference is that the end of the network comes back around to the first node, creating a complete circuit. In a ring network, each node takes a turn sending and receiving information through the use of a token. The token, along with any data, is sent from the first node to the second node, which extracts the data addressed to it and adds any data it wishes to send. Then, the second node passes the token and data to the third node, and so on until it comes back around to the first node again. Only the node with the token is allowed to send data. All other nodes must wait for the token to come to them. Fig.4. Ring Topology  Star - In a star network, each node is connected to a central device called a hub. The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together. Fig.5. Star Toplogy
  • 14.  Star bus - Probably the most common network topology in use today, star bus combines elements of the star and bus topologies to create a versatile network environment. Nodes in particular areas are connected to hubs (creating stars), and the hubs are connected together along the network backbone (like a bus network). Quite often, stars are nested within stars,as seen in the example below: Fig.6. Star Bus Topology  Tree: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable .Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs. Fig. 7. Tree Topology 7. Types of Network LAN -: LocalArea Network It is confined to a single location, typically one building or a complex. The maximum distance from one end of a network is limited by the signal strength and networking system. Typically connects computer in a single building or campus.  Medium: optical fibers, coaxial cables, twisted pair, wireless.  Low latency (except in high traffic periods).  High-speed networks (0.2 to 100 Mbps).  Problems : Multi media based applications  Typically buses or rings.  Ethernet, Token Ring
  • 15. Fig.8. LAN WAN :- Wide Area Networks WAN is a network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.  Developed in 1960s.  Generally covers large distances (states,countries, continents).  Medium: communication circuits connected by routers.  Routers forward packets from one to another following a route from the sender to the receiver. Store-and-Forward  Hosts are typically connected (or close to) the routers.  Typical latencies: 100ms - 500ms.  Problems with delays if using satellites.  Typical speed: 20 - 2000 Kbits/s.  Not (yet) suitable for distributed computing. Fig. 9. WAN
  • 16. 8. OSI Model Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. OSI was developed in 1984 by the International Organization for Standardization (ISO), a global federation of national standards organizations representing approximately 130 countries. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. 9. The Layers Think of the sevenlayers as the assembly line in the computer. At each layer, certain things happen to the data that prepare it for the next layer. The seven layers, which separate into two sets, are:  Application Set  Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network- related activities.  Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.  Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.  Transport Set  Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network.  Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here.  Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined.  Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing. Fig.10. OSI Reference model
  • 17. The OSI Reference Model is really just a guideline. Actual protocol stacks often combine one or more of the OSI layers into a single layer. Layer Description Device Application Provides network access for applications, flow control and error recovery Gateway Presentation Performs protocol conversion, encryption and data compression Gateway and redirectors Session Allows 2 applications to communicate over a network by opening a session and synchronizing the involved computers Gateway Transport Repackages messages into smaller formats, provides error free delivery and error handling functions Gateway Network Handles addressing, translates logical addresses and names to physical addresses, routing and traffic management. Router and router Data Link Packages raw bits into frames and includes a cyclical redundancy check(CRC) Switch, bridge and router Physical Transmits data over physical medium Multiplexer and repeater and hub Table 1. OSI layers and their description 10. Protocol Stack A protocol stack is a group of protocols that all work together to allow software or hardware to perform a function. The TCP/IP protocol stack is a good example. It uses four layers that map to the OSI model as follows:  Layer 1: Network Interface - This layer combines the Physical and Data layers and routes the data between devices on the same network. It also manages the exchange of data between the network and other devices.  Layer 2: Internet - This layer corresponds to the Network layer. The Internet Protocol (IP) uses the IP address, consisting of a Network Identifier and a Host Identifier, to determine the address of the device it is communicating with.  Layer 3: Transport - Corresponding to the OSI Transport layer, this is the part of the protocol stack where the Transport Control Protocol (TCP) can be found. TCP works by asking another device on the network if it is willing to accept information from the local device.  Layer 4: Application - Layer 4 combines the Session, Presentation and Application layers of the OSI model. Protocols for specific functions such as e-mail (Simple Mail Transfer Protocol, SMTP) and file transfer (File Transfer Protocol, FTP) reside at this level.
  • 18. As it can be seen, it is not necessary to develop a separate layer for each and every function outlined in the OSI Reference Model. But developers are able to ensure that a certain level of compatibility is maintained by following the general guidelines provided by the model. 11. Router Router is an Intermediate System (IS) which operates at the network layer of the OSI reference model. Routers may be used to connect two or more IP networks, or an IP network to an internet connection. A router consists of a computer with at least two network interface cards supporting the IP protocol. The router receives packets from each interface via a network interface and forwards the received packets to an appropriate output network interface. Received packets have all link layer protocol headers removed, and transmitted packets have a new link protocol header added prior to transmission. The router uses the information held in the network layer header (i.e. IP header) to decide whether to forward each received packet, and which network interface to use to send the packet. Most packets are forwarded based on the packet's IP destination address, along with routing information held within the router in a routing table. Before a packet is forwarded, the processor checks the Maximum Transfer Unit (MTU) of the specified interface. Packets larger than the interface's MTU must be fragmented by the router into two or more smaller packets. If a packet is received which has the Don't Fragment (DF) bit set in the packet header, the packet is not fragmented, but instead discarded. In this case, an ICMP error message is returned to the sender (i.e. to the original packet's IP source address) informing it of the interface's MTU size. This forms the basis for Path MTU discovery (PMTU). The routing and filter tables resemble similar tables in link layer bridges and switches. Except, that instead of specifying link hardware addresses (MAC addresses), the router table specify network (IP addresses). The routing table lists known IP destination addresses with the appropriate network interface to be used to reach that destination. A default entry may be specified to be used for all addresses not explicitly defined in the table. A filter table may also be used to ensure that unwanted packets are discarded. The filter may be used to deny access to particular protocols or to prevent unauthorized access from remote computers by discarding packets to specified destination addresses. A router forwards packets from one IP network to another IP network. Like other systems, it determines the IP network from the logical AND of an IP address with the associated subnetwork address mask. One exception to this rule is when a router receives an IP packet to a network broadcast address. In this case, the router discards the packet. Forwarding broadcast packet can lead to severe storms of packets, and if uncontrolled could lead to network overload. A router introduces delay (latency) as it processes the packets it receives. The total delay observed is the sum of many components including:  Time taken to process the frame by the data link protocol  Time taken to select the correct output link (i.e. filtering and routing)  Queuing delay at the output link (when the link is busy)  Other activities which consume processor resources (computing routing tables, network management, generation of logging information) The router queue of packets waiting to be sent also introduces a potential cause of packet loss. Since the router has a finite amount of buffer memory to hold the queue, a router which receives packets at too high a rate may
  • 19. experience a full queue. In this case, the router ahs no other option than to simply discard excess packets. If required, these may later be retransmitted by a transport protocol. Fig.11. Architecture ofa router Routers are often used to connect together networks which use different types of links (for instance an HDLC link connecting a WAN to a local Ethernet LAN). The optimum (and maximum) packet lengths (i.e. the maximum transmission unit (MTU)) is different for different types of network. A router may therefore uses IP to provide segmentation of packets into a suitable size for transmission on a network. Associated protocols perform network error reporting (ICMP), communication between routers (to determine appropriate routes to each destination) and remote monitoring of the router operation (network management). Fig.12. Packets routed by routers to their destinations 12. Broadcast and Multicast Bridges forward a broadcast frame out of all connected ports except that on which the frame was received. The normal action for multicast frame is to treat them as broadcast frame. This is clearly suboptimal, since a bridge may send multicast frames to parts of the network for which there are no interested receivers. Some bridges implement extra processing to control the flooding of multicast frames
  • 20. 13. Ethernet Repeaters and Hubs Ethernet hubs and repeaters operate at the Physical Layer of the OSI Reference model and are defined by IEEE 802.3c/d. They are used to connect together one or more Ethernet cable segments of any media type. If an Ethernet segment were allowed to exceed the maximum length or the maximum number of attached systems to the segment, the signal quality would deteriorate. (If unchecked this would ultimately lead to errors in the data.) Hubs and repeaters may be used between a pair of segments (see below) to provide signal amplification and regeneration to restore a good signal level before sending it from one cable segment to another. By allowing two or more LAN segments to be connected, they allow the network to span a larger distance. They also provide electrical isolation from failures in the cable or attached systems, protecting equipment on other LAN segments from the effect of the fault. Fig.13. Repeater A very important fact about hubs and repeaters is that they allow users to share an Ethernet LAN. A network of repeaters and hubs is therefore called a "Shared Ethernet" or a "Collision Domain". The various systems sharing the Ethernet all compete for access using the CSMA/CD access protocol. This means that only one system is allowed to proceed with a transmission of a frame within a Collision Domain at any one time. Each system has to share a proportion of the available network bandwidth. 14. Network Cabling Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network. Unshielded Twisted Pair (UTP) Cable Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks (See fig.21). Fig.14 Unshielded twisted pair The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported
  • 21. transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association / Telecommunication Industry Association) has established standards of UTP and rated five categories of wire. Type Use Category 1 Voice Only (Telephone Wire) Category 2 Data to 4 Mbps (Local Talk) Category 3 Data to 10 Mbps (Ethernet) Category 4 Data to 20 Mbps (16 Mbps Token Ring) Category 5 Data to 100 Mbps (Fast Ethernet) Table 2. Categories of Unshielded Twisted Pair If designing a 10 Mbps Ethernet network and are considering the cost savings of buying Category 3 wire instead of Category 5, remember that the Category 5 cable will provide more "room to grow" as transmission technologies increase. Both Category 3 and Category 5 UTP have a maximum segment length of 100 meters. 10BaseT refers to the specifications for unshielded twisted pair cable (Category 3, 4, or 5) carrying Ethernet signals. Category 6 is relatively new and is used for gigabit connections. Unshielded Twisted Pair Connector The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector (See fig. 22). A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector. Fig. 15. RJ-45 connector Shielded Twisted Pair (STP) Cable A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference. Shielded twisted pair (STP) is suitable for environments with electrical interference; however, the extra shielding can make the cables quite bulky. Shielded twisted pair is often used on networks using Token Ring topology. Coaxial Cable Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 23). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
  • 22. Fig. 16. Coaxial cable Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial. Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install. Coaxial Cable Connectors The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector (See fig. 24). Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather than screw, onto the cable. Fig. 17. BNC connector Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 25). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting. Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.
  • 23. Fig.18. Fiber optic cable Facts about fiber optic cables:  Outer insulating jacket is made of Teflon or PVC.  Kevlar fiber helps to strengthen the cable and prevent breakage.  A plastic coating is used to cushion the fiber center.  Center (core) is made of glass or plastic fibers. Fiber Optic Connector The most common connector used with fiber optic cable is an ST connector. It is barrel shaped, similar to a BNC connector. A newer connector, the SC, is becoming more popular. It has a squared face and is easier to connect in a confined space. Specification Cable Type Maximum length 10BaseT Unshielded Twisted Pair 100 meters 10Base2 Thin Coaxial 185 meters 10Base5 Thick Coaxial 500 meters 10BaseF Fiber Optic 2000 meters 100BaseT Unshielded Twisted Pair 100 meters 100BaseTX Unshielded Twisted Pair 220 meters Table 3 Ethernet Cable Summary Wireless LANs Fig.19. Wireless LANs Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations and the file server or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and
  • 24. receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite. Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables. The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast. Line-of-sight communication means that there must be an unblocked direct line between the workstation and the transceiver. If a person walks within the line-of-sight while there is a transmission, the information would need to be sent again. This kind of obstruction can slow down the wireless network. Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks. Wireless LANs have several disadvantages. They provide poor security, and are susceptible to interference from lights and electronic devices. They are also slower than LANs using cabling. 15. Network Operating System Unlike operating systems, such as DOS and Windows that are designed for single users to control one computer network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly. The two major types of network operating systems are:  Peer-to-Peer  Client/Server Peer-to-Peer Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source (See fig. 27). In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks. AppleShare and Windows for Workgroups are examples of programs. Fig. 20. Peer-to-peer network
  • 25. Advantages of a peer-to-peernetwork:  Less initial expense - No need for a dedicated server.  Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations. Disadvantagesofa peer-to-peernetwork:  Decentralized - No central repository for files and applications.  Security - Does not provide the security available on a client/server network. Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers (See fig. 25). The file servers become the heart of the system, providing access to resources and providing security. Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. Novell Netware and Windows 2000 Server are examples of client/server network operating systems. Fig. 21. Client/server network Advantages of a client/servernetwork:  Centralized - Resources and data security are controlled through the server.  Scalability - Any or all elements can be replaced individually as needs increase.  Flexibility - New technology can be easily integrated into system.  Interoperability - All components (client/network/server) work together.  Accessibility - Server can be accessed remotely and across multiple platforms. Disadvantagesofa client/servernetwork:  Expense - Requires initial investment in dedicated server.  Maintenance - Large networks will require a staff to ensure efficient operation.  Dependence - When server goes down, operations will cease across the network.
  • 26. 16. Ethernet The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally affect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps. Fast Ethernet To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired. Gigabit Ethernet The most recent development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for backbones on a network at this time. In the future, it will probably be used for workstation and server connections also. It can be used with both fiber optic cabling and copper. The 1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the formal standard in 1999. 17. Firewall Firewall is an internetwork security device that serves on the only access route that connects the internal network / internetwork (i.e. the segment to be protected) to the external network (s) / internetwork (s); and, decides about physically allowing / denying entry / exit to / from the protected segment using a set of policies (often manifested in terms of rules) is called a Firewall. A Firewall may be implemented in hardware / software / firmware or a combination of these. Characteristically, an Internet Firewall exhibits security measures and internetwork-control-mechanisms related to but not necessarily limited to:  Internet services as separated from the intranet services  Service-based directional traffic  User-specific / Class-specific / Group-specific service access  Service-usage / deployment-behaviour  Origin-specific / Destination-specific service / traffic / monitoring / QoS-security bindings  Relaying / blocking / redirection of encapsulated and / or encrypted traffic A common assumption (though debatable) made is that the Firewall itself is incorruptible / impenetrable . A firewall works under the assumption that it is solely responsible for blockade / allowance of any traffic between two or more than two networks / internetworks separated by it. As part of an Internetwork Security System, a firewall:  Allows defining exit and entry points for traffic from and to the internal protected network / intranet  Offers a set of mechanisms and a set of locations / points for supervising security-sensitive activities / events / behaviour
  • 27.  Provides network-level encapsulation, encryption, decryption, decapsulation, tunnelling services  Permits a variable -security facility-zone’s creation that may also offer some functionalities not necessarily related to the security function that is the primary function of the firewall  Supports creation and interpretation of structured logging mechanisms and files for a variety of purposes. A Firewall is not meant for:  Virus / Worm / Trojan Horse / Logic bomb detection  Virus / Worm / Trojan Horse / Logic bomb removal  Semantic analysis of the application-to-application messages with certain exceptions  Protecting a network / internetwork from a trusted entity (client / server / user) or an internal authorized user with adequate privileges  Protecting from power, link or protocol failure  Monitoring processes at individual workstations / servers / switches that are of local significance to that machine or network segment except for certain explicitly registered classes of processes / systems / users / patterns  Guarding against traffic that bypasses the Firewall itself Firewall Constituents: (some of these can serve as firewalls as well)  Application-level Gateways and Proxies  Transport-level / Circuit-level Gateways and Proxies  Network-level Gateways / Routers  Packet filters (also known as Static Packet Filtering Firewalls)  Bastion Host  Screened Host
  • 28. Part-II: A Case Study: Air India (Indian Airlines) Network
  • 29. OBJECTIVE In the computerized world of today everything happens at one click of mouse, here the development and security of any company is dependent on the network of the Institution. Accessibilty of the applications of the Instituition plays a key role in the road of success. Indian Airlines Ltd. (IAL) caters to millions of user’s everyday and hence, has a Vast network throughout India and the World. The objective of this case study is to study the entire networking hierarchy of Indian Airlines network. We studied in depth of the various hardware and software implemented in the network.Extensive research and study material was studied for finalizing the report. The case study contains the detailed analysis of almost ebery hardware and software implemented in IAL from the network point of view. Its working and implementation has been explained.Whereever possible, a detailed diagram is given for easy understanding. All protocols used in the network have also been explained. We have tried our level best to give accurate and updated information in this case study.Finally,a conclusion has been reported. 1. Company Perspectives Indian Airlines or Indian is an airline based in Delhi, India and focuses primarily on domestic routes, along with several international services to neighbouring countries in Asia. Indian Airlines is state-owned, and is administered by the Ministry of Civil Aviation. Its main bases are Delhi's Indira Gandhi International Airport, Mumbai's Chhatrapati Shivaji International Airport, Chennai International Airport and Kolkata's Netaji Subhash Chandra Bose International Airport. Though the company that owns and operates the airline continues to be named Indian Airlines Limited, on 7 December 2005, the airline was rebranded as Indian for advertising purposes as a part of a program to revamp its image in preparation for an initial public offering (IPO) The airline operates closely with Air India, India's national carrier. Alliance Air, a fully-owned subsidiary of Indian Airlines, was renamed Air India Regional. In February 2007, the Government of India approved plans to merge Indian Airlines with Air India. The merger process is currently underway. 2. Indian Airlines (Air India(IC)) History The airline is set up under the Air Corporations Act, 1953 with an initial capital of Rs. 32 million and started operations on 1 August 1953. It was established after legislation came into force to nationalise the entire airline industry in India. Two new national airlines were to be formed along the same lines as happened in the United Kingdom with British Overseas Airways Corporation (BOAC) and British European Airways (BEA). Air India took over international routes and Indian Airlines Corporation (IAC) took over the domestic and regional routes.
  • 30. Seven former freedom domestic airlines, Deccan Airways, Airways India, Bharat Airways, Himalayan Aviation, Kalinga Airlines, Indian National Airways and Air Services of India, were merged to form the new domestic national carrier. Indian Airlines Corporation inherited a fleet of 99 aircraft including 74 Douglas DC-3 Dakotas, 12 Vickers Vikings, 3 Douglas DC-4s and various smaller types from the seven airlines that made it up. Vickers Viscounts were introduced in 1957 with Fokker F27 Friendships being delivered from 1961. The 1960s also saw Hawker Siddeley HS 748s, manufactured in India by Hindustan Aeronautics Limited, join the fleet. The jet age began for IAC with the introduction of the pure-jet Sud Aviation Caravelle airliner in 1964, followed by Boeing 737-200s in the early 1970s. April 1976 saw the first three Airbus A300 wide-body jets being introduced. The regional airline, Vayudoot, which had been established in 1981, was later reintegrated. By 1990, Airbus A320s were introduced. The economic liberalisation process initiated by the Government of India in the early 1990s ended Indian Airlines' dominance of India's domestic air transport industry. Indian Airlines faced tough competition from Jet Airways, Air Sahara (now Jet Lite), East-West Airlines and ModiLuft. As of 2005, Indian Airlines was the second largest airline in India after Jet Airways while Air Sahara controlled 17% of the Indian aviation industry. East-West Airlines and ModiLuft discontinued flight operations but the entry of several low-cost airlines in India, such as Air Deccan, SpiceJet and others like Kingfisher Airlines continue to give competition in its market, forcing Indian to cut down air-fares. However, as of 2006, Indian Airlines was still a profit making airline. Indian Airlines Limited is wholly owned by the Government of India through a holding company and has 19,300 employees as of March 2007.Its annual turn-over, together with that of its subsidiary Alliance Air, is well over Rs.4000 crores (around US$ 1 billion). Together with its subsidiary, Alliance Air, Indian Airlines carries a total of over 7.5 million passengers annually. On 22 February 2007, the Group of Ministers (GoM) approved the merger of state-owned carriers, Air India and Indian Airlines. Operating under the name Air India, the two airlines formally became one entity on 15 July 2007 upon receiving the new Boeing 777-200LR with the new livery of the merged airline. The new airline's headquarters will remain in Mumbai, and will have a fleet of over 130 aircraft. In December 2007, Air India was invited to join the Star Alliance. Since Indian Airlines is in the midst of merging with Air India, it too will effectively be a member 3. Air India (IC) IT Department Role of IT Department Information technology department is a backbone of Indian Airlines (now known as Air India) IT department has simplified the various critical and important operations of airline. The works, which need to take lot of time like manual booking and handling of passengers at the airport for issuing of boarding passes, now can be done instantly and with maximum accuracy. Earlier, passenger used to be standing in long queues and they had to be physically present at airport 2-3 hours before of their flight timings, which is now
  • 31. drastically reduced after the introduction of departure control systems and other online systems with the help of Information Technology. It has contributed a lot in achieving the customer satisfaction by providing better quality services. Indian Airlines has started the online booking and e-ticketing facility through its website http://indian- airlines.nic.in/index.aspx. Passenger now can book their tickets through Internet any time and from anywhere at their own convenience. IT Man power IT department is headed by Director (IT). There is General Manager who reports to Director (IT). There are DGMs who report to GM and look after the different portfolios in IT department. The major functions/operations in IT department in Indian Airlines are:  Providing computerized services for passenger Reservation, Ticketing and Departure Control system.  Maintenance of Mainframe and related equipment operations.  Maintenance of Data communication hardware and networking equipments.  Online booking and ticketing services.  Call center services at several locations.  Providing host connectivity at various IAL booking offices, Airports and travel agents locations.  Connectivity at 17 International locations, where IAL operates via SITA network.  Internet and Intranet services.  Development of PC based financial applications.  Aircraft spares inventory Control system. Indian Airlines has divided its entire computer network under 4 regions and one central headquarter. Four regions are Northern, Western, Eastern, and Southern with their Nodal center at Delhi, Mumbai, Kolkatta and Chennai respectively. Regional IT functions are being looked into by Regional IT teams, which are headed by Sr. Manager (IT). The Regional IT heads report to GM (IT) at central IT Headquarter, New Delhi. At Central site, IT department has approximately 150 employess and in 4 regions, total staff strength is 70 approximately. Therefore, overall staff strength of IT department in Indian Airlines is approximately 220. IAL has also outsourced some of its IT services like facility management services at all airports, Call center services etc. Engineering Infrastructure Engineering Department is headed by Director (Engg.), now designated as SBU Head - MRO (Engine & Comp.) in NACIL at its registered office in Delhi and is assisted by Executive Director (Engg.), General Manager (Engg.) from Quality Assurance & Technical Services, Engg. Services, Support Services (Production, Planning & Control) and Dy. General Manager (Industrial Engg.). IAL Maintenance and Engineering main workshop facilities are located at four major bases viz. Delhi, Mumbai, Kolkata and Hyderabad. Each major base is headed by General Manager (Engg.). G.M. (Engg.) is assisted by Dy. General Managers from various divisions i.e. Line Maintenance, Major Maintenance, Avionics (Electrical, Instrument, Radio, ATEC), Accessories (airframe components) Overhaul, Production Planning & Control, Quality Control, Industrial Engg. And Engg. Training.
  • 32. 4. Air India(or Indian Airlines) Mainframe Overview Indian Airlines has installed state of art networking devices on its computer network which provide 100% performance and are highly efficient. Networking hardware deployed in Indian Airlines network is: (1) Z9 BC Mainframe: IAL has two IBM Mainframe connected to each other by a CTC link. Both the servers are situated at Delhi. The z9 BC is able to manage numerous operating systems on a single server, including z/OS®, z/OS.e, z/VM®, z/VSE™, z/TPF, TPF, and Linux® for System z9 (31-bit and 64-bit distributions). The operating systems are designed to support existing application investments without anticipated change to help realize the benefits of the z9 BC. Earlier, S/390 Mainframe was used. It has now been upgraded by z9BC Mainframe. (2) Cisco Routers: IAL has the following Cisco routers installed at various locations.  Cisco 7507 Routers: Very high End Routers with in built TCP/IP gateway functionality. IAL has installed one each at Site-A and Site-b locations.  Cisco 3745, 3845 and 2821 Routers: IAL has more than 25 such Mid Range Routers, which are being deployed at various locations on IAL network. These are modular routers and can have various different kinds of modular cards to cater the different requirements.  Cisco 1721, 1751, 1601 and 1800 series Routers: These are Low end routers which are being used at small and remote locations. Mainly these routers are used for connectivity of remote airports for extending the DCS functionality. (3) 3-com switches and Cisco switches: IAL has 24 ports,10/100 Mbps Ethernet switches used for providing LAN setup at various locations. These switches are managed switches and can be remotely managed through management software installed in a PC. (4) Cisco 525 PIX Firewall: IAL has installed the Cisco 525 PIX Firewall (with fail-over configuration) at their Central Site. This firewall is being used for the implementation of network security requirements and restricting the secured access to various users. The Firewall has also built-in VPN (Virtual Private Network) Server functionality in it. The VPN services are used for providing the IAL Host access through Internet to remote users like travel agents and some IAL locations. The VPN connectivity uses secured and encrypted tunnel for transmitting the data over the public network. Z9 BC Mainframe:  IBM System z9™ technology, for entry level to midsize capacity needs, with a wide choice of capacity settings and highly granular growth options, an increase of 2.6 times more capacity settings than IBM eServer™ zSeries®890(z890)  A broad set of specialty engines to facilitate integration of many types of workloads and fully leverage the power of the mainframe
  • 33.  Helps protect client’s investments in mainframe technologies with upgradeability from z890 and z800 servers  Key System z9 features of advanced security, resiliency, virtualization and connectivity technologies delivered in a midrange package The IBM System z9™ Business Class (z9 BC) takes advantage of the innovation of the System z9 platform and is designed to bring value to a wider audience, both midrange and small enterprise businesses. The z9 BC offers a low cost of entry, granular growth, flexible configurations, sub capacity pricing and On/Off Capacity on Demand to meet growing and changing demands for traditional and new workloads. And the z9 BC can participate in IBM’s Parallel Sysplex® technology, which can give you the flexibility to solve business issues such as rapid response to business needs change, ensuring continuous availability of IT assets and reducing your overall cost of computing. On the z9 BC, sub capacity options are offered on 1-way to 4-way servers. Having the ability to offer just a portion of the full capacity gives you greater flexibility. The z9 BC is available in two models with 73 capacity settings so you can choose just the right size. The Model R07, aimed at smaller enterprises, has a smaller I/O configuration and lower entry point where large amounts of resources are not the driving factor, but always a quick upgrade away when needed, either temporary or permanent. The Model S07 is aimed at medium-sized businesses that need to have more available I/O or more capacity, as well as upgrades to the IBM System z9 Enterprise Class (z9 EC). For ease of installation, the z9 BC can be installed in either a raised or non-raised floor environment. Today, more than ever, z9 BC means there is a System z9 for everyone. The z9 BC is able to manage numerous operating systems on a single server, including z/OS®, z/OS.e, z/VM®, z/VSE™, z/TPF, TPF, and Linux® for System z9 (31-bit and 64-bit distributions). The operating systems are designed to support existing application investments without anticipated change to help realize the benefits of the z9 BC. IBM provides world-class mainframe technology to help today’s enterprises respond to business conditions quickly and with flexibility. From automation to advanced virtualization technologies and open industry standards such as SOA, IBM mainframes teamed with IBM’s storage products help deliver competitive advantages. IBM System z9—Powerful servers for simplified infrastructures. Features and Benefits: 1. Availability/Reliability  Air cooling  CICS subspace group facility  CICS subsystem storage protect  Concurrent channel, OSA-E,OSA-E2 and Coupling Link maintenance  Concurrent Hardware Management Console (HMC) and Support Element  Concurrent Licensed Internal Code (LIC) maintenance for CP, SAP, SE, PR/SM™, LPAR, HMC, OSA- Express2  Concurrent power and thermal maintenance  Dual Support Elements  Dynamic Channel Path Management  Dynamic I/O Reconfiguration  Dynamic memory sparing  Dynamic Oscillator Switchover
  • 34.  Enhanced Application Preservation  Enhanced Driver Maintenance  Enhanced Dynamic Reconfiguration Management  Enhanced Firmware Simulation  Failure Containment for MBA  Fault Tolerant Interconnect Design  FICON Purge Path Extended  Frame Bolt Down Kit  Multipath IPL  N+1 power supply technology  OSA-Express2 Link Aggregation Support  OSA-Express2 Network Traffic Analyzer  Partial memory restart  Redundant I/O Interconnect  Remote operations support  Sparing for Storage Protect Preservation Keys  System Assist Processor (SAP)  Transparent CP Sparing 2. Security  Advanced encryption standard (AES)  Certified for LPAR isolation  Configurable Crypto Express2 (1 or 2 PCI-XAdapter features)  CP Assist for Cryptographic Function  Designed for FIPS 140-2 Level 4  EAL5 certified  LDAP support for HMC user authentication  Open Architecture Distributed Transaction Enablement  Pseudo random number generator (PRNG)  Remote key load for ATMs  Secure hash algorithm-256 (SHA-256)  SSL Acceleration for Linux and z/OS  Tamper-proof Cryptographic Support 3. Capacity on Demand  Administrative On/Off CoD Testing  API for On/Off CoD activation  Capacity Backup Upgrade (from any model to any model and capacity setting)  Capacity Upgrade on demand  Customer Initiated upgrades  On/Off Capacity on Demand  Up to 100 configuration records may be stored on System Element  Specialty Engines  Integrated Facility for Linux (IFL)  Internal Coupling Facility (ICF)  System z9 Application Assist Processor (zAAP)
  • 35.  System z9 Integrated Information  I/O Connectivity  ESCON CTC native and basic mode  ESCON half duplex data transfer  FCP LUN Access Control  FCP support for SCSI devices by Linux and z/VM  FICON CTC  FICON Express4 4 Gbps (2 and 4 channel features)  FICON full duplex data transfer  Full fabric FCP support  Multiple Image Facility (MIF) sharing across LCSS’s  N_Port ID Virtualization  QDIO  Networking  HiperSockets™  OSA for NCP (OSN)  OSA Layer 3 VMAC  OSA-Express (Gigabit Ethernet, 1000BASE-T Ethernet, Fast Ethernet)2  OSA-Express and OSA-Express2 Layer 2 Support  OSA-Express Integrated Console Controller (1000BASE-T Ethernet)  OSA-Express2 (Gigabit Ethernet, 10 Gigabit Ethernet, 1000BASE-T Ethernet  Performance  Compare-and-move extended  DB2 sort assist  FCP Enhancements  Hardware-assisted data compression  IEEE binary floating point support for advanced Lotus® Domino® and Java performance  Long Displacement Facility  Modified Indirect Data Address Word (MIDAW) Facility  Multiple Subchannel sets (MSS)  OSA Dynamic LAN idle  Performed Locked Operations for enhanced IP performance  Up to 64 GB memory 4. Z/Architecture  Intelligent Resource Director  Superscalar Processor  Tri-modal addressability  Up to 30 LPARS each (up to 15 LPARS each for model R07) with 64-bit central memory addressability
  • 36. Mainframe Software The system software deployed on PSS system is ZOS1.9 and ALCS V2R41. The system software deployed on System running other business applications is ZOS 1.10 and CICS V3.2/DB2 V9.1. Both TPFDF and Non TPFDF data structures are used in the PSS applications. The other business applications like FFP, MIS uses IBM DB2 database. The e-ticketing application is hosted on Amadeus ET server. At present, Indian Airlines is accesing both the hosts (z9BC) through IBM 3745 (communication Controller), which acts as a SNA gateway and also through Cisco 7507, which is acting as a TCP/IP gateway. IBM 3745 FEP (Front End Processor) Historically, IBM's primary solution for mainframe access has been the FEP. The FEP offers a great deal of functionality for subarea networks and legacy protocols. However, only the largest networks use most of the functionality provided by the FEP; most small networks use only a subset of this functionality. In addition, networks are changing rapidly and the typical enterprise network now supports a multitude of protocols, LANs, WANs, and device types. High-performance substitutes, such as LANs, high-speed serial lines, and Frame Relay have replaced low-speed serial lines. The FEP has not kept up with the requirements of today's enterprise networks so other networking gear is required to augment or replace the FEPs. If you are considering replacing some or all of your FEPs, first determine which functions your FEP is providing today so that you do not lose any of these functions as you move forward to CMCC. FEPs have the following key functions in today's networks:  SNA session routing—SNA session routing is required in environments with multiple data centers or Advanced Communications Function (ACF)/VTAM application hosts and a high volume of cross-domain SNA traffic. SNA session routing can be important in environments with distributed AS/400s.  SNA COS—SNA COS allows prioritization of SNA traffic between the FEPs and the mainframes and is important in environments with SNA backbones. SNA COS is less important in environments that have consolidated the FEPs in the data center. In this case, either there is no FEP-to-FEP traffic, or the FEPs are connected at the data center over high-speed LANs that do not have bandwidth contention problems. However, some networks take advantage of Link Services Prioritization (LSPRI), which provides transmission priority based on COS for outbound traffic (for example, FEP to cluster controller).  Serial line concentration—FEPs can concentrate large numbers of low-speed (9.6-kbps) serial lines. However, as networks migrate to high-speed WAN backbones, the need for high-density, low-speed serial connectivity decreases.  Switched SDLC—Some enterprises rely on switched SDLC to support transient SNA connections to small branch offices or to provide switched network backup. As SDLC is being replaced by multiprotocol data links, switched SDLC requirements are diminishing. In place of SDLC, protocols such as Integrated Services Digital Network (ISDN), Point-to-Point Protocol (PPP), and Serial Line Interface Protocol (SLIP) are being used to provide multiprotocol or IP-switched line support.  SNA boundary network node (BNN) function—FEPs provide an SNA BNN function, which includes polling, converting from local addresses to SNA addresses, and converting exchange identification (XID). In the absence of remote FEPs, local FEPs can perform these functions. In the absence of any FEPs, ACF/VTAM can perform most of these functions.  SNA Network Interconnection (SNI)—Many enterprises use FEPs for SNI to allow independent SNA networks to communicate. There are other alternatives, such as the SNASw border node
  • 37. function and electronic data exchange over the Internet; however, any change on one side requires a change on the other side, so this migration will be a slow one.  SSCP takeover—With this facility, if an owning VTAM goes down, another VTAM can assume ownership of those resources without disrupting any existing application sessions. The NCP plays a role in allowing this takeover.  Extended recovery facility (XRF)—The XRF is a program that allows one VTAM application to take over for another. The XRF code in the NCP plays a key role in supporting this capability.  X.25 support—X.25 Interconnection allows the NCP to act as an X.25 packet switch. NCP Packet Switching Interface (NPSI) allows the NCP to connect to other resources over X.25 networks. X.25 Interconnection supports both SNA and non-SNA devices. For non-SNA (Asynchronous and Binary Synchronous Communications Protocol) devices, it supports conversion to SNA.  Specialized program products that support custom or older applications—Network Routing Facility (NRF) provides routing inside the NCP without VTAM participation. An emulation program allows the IBM 3745 to connect to Basic Telecommunications Access Method (BTAM) in an IBM mainframe.  Legacy protocols—The FEP supports program products, such as Non-SNA Interconnection (NSI) for Bisynch conversion, Airline Line Control Interconnection (ALCI) for airline line control protocol transport, and Network Terminal Option (NTO) for synchronous conversion. You can install these products in the FEP to handle non-SNA protocols. Legacy protocols are older protocols that are declining in usage 5. Indian Airlines(Air India (IC)) Network Indian Airlines has its PSS Production Data Centre at IGI Airport, New Delhi (Site-B) consisting of IBM Mainframe Server z9BC (Model 2096– R07). Another Data Centre (Site A) having a similar IBM Mainframe Server Model 2096-R07 is located half a km away from the Production Data Centre for hosting other Business applications and also to act as a Disaster Recovery System during failure of Production Data Centre. These Data Centers are channel to channel connected through high bandwidth fiber links. The configuration of the Mainframes is as follows: IBM z9BC (Model 2096– R07 Mainframe (Site-A) IBM z9BC (Model 2096– R07 (Site-B) Memory - 8 GB Main Memory – on each system Disk Storage - DS8100 with 7 TB usable storage on each system Tape system - 34592 Cartridge Tape Drives (2 on each systems) Router - Cisco 7507 IP Gateway Router Controller - 3745 Communication Controller The system software deployed on PSS system is ZOS1.9 and ALCS V2R41 The system software deployed on System running other business applications is ZOS 1.10 and CICS V3.2/DB2 V9.1 Table 4. Configuration of the Mainframes Applications The application software deployed is RTB (BAPSS from erstwhile M/s Speedwings a subsidiary of British Airways). The applications software commissioned in 1997 provided functionalities for Reservation, Ticketing, Inventory Control and Departure Control with Advance Load Planning.
  • 38. IAL Passenger Services Functionality  Flight Inventory  Schedule Change Function  Class Cut-off & Merge  Availability and Schedule Display  Passenger Name Record (PNR)  Passenger Itinerary Print  Time limit PNR  Special Travel Agent Records (STAR) PNR’s  Duplicate PNR’s  Repetitive PNR construction  Passenger Lists  On-line Flight analysis  Pricing and Tariffs  Automated Ticketing  Flight Information  Central Information System  Agent Productivity  Host Access to SITA TIMATIC for viewing Travel Information Manual  Levels of Participation with various GDS  Amadeus Access sell/Direct Access  Abacus Direct Connect Sell  Sabre Direct Connect Sell  Galileo Interactive sell  Apollo Interactive Sell  Worldspan Direct connect sell  Axess Answer back  Infini Full Availability  e-Ticketing Indian Airlines has entered into an agreement with M/s Amadeus for the implementation of E-ticketing in Indian Airlines. The IAL PSS system has been modified to make it E compliant. Departure Control System with Advance Load Planning Baggage Reconciliation System (BRS) – Directive of Bureau of Civil Aviation Security (BCAS) India, makes baggage reconciliation mandatory. IC is currently carrying out manual baggage matching at all domestic airports. The various terminal populations connected to present IC host systems fall in following categories a) ATO/ CTO – Domestic (Through IC Network) b) ATO/ CTO – International (Through SITA network / Internet) c) Travel Agents (Through Internet connectivity) d) Connectivity to GDSs via GDS Host to IAL Host connectivity More than 10,000 such Terminals / Printers are configured in the current IA Host System It may be noted that terminals at few non metro locations at ATOs / CTOs, which are based on obsolete/u-100 protocol, will be replaced with new Wintel (Windows + Intel) PCs at the time of upgrade of current multi-flavoured network (SNA+IP+U-100) to pure IP network. The existing 3270 emulator software PCOM, will continue to be used on some of these PCs which require access to other business applications running on IAL’s present IBM mainframe.
  • 39. In-house developed Flight Information System (General Information System) General Information system has departure/arrival pages of all flights of the day to be filled by co-ordination cell for movement information of the flights. This has various statistical information also, viz. capacity utilized / delay information/payload etc. This arrival/departure information of the flight is also used by IVRS system. This also provides the information of seats offered of yesterday / current / next day. Dial – A – Ticket Through the Dial-a-Ticket facility, the passengers can book a seat by calling up the 24 X 7 Indian Airlines call center from anywhere in the country, make the payment by giving their credit card details and receive the “Itinerary Receipt” through courier, e-mail, fax or even collecting it at metro airports. Interfaces – Passenger Services 1. Interface between RES and Amadeus e-ticketing Server. 2. Interface for message switching. 3. Interface for IATA Host-to-Host for GDS. 4. Interface with GDS direct Access, Direct Connect, and other relevant existing participation levels. 5. Interface with GDS for e-ticketing. 6. Interface with interline and code share partners. 7. Interface on SSIM data interchange and ASM/SSM message exchanges. 8. Interface with interline e-ticketing. 9. Interface with handling agency e-ticket interface. 10. Interface with Airline Revenue Management System (ARMS). 11. Interface with Management Information System 12. Interface with data ware house for RES / DCS data downloading. 13. Interface with ground handlers at international stations for downloading PNL/ADL etc. 14. Interface with other airlines for through check-in. 15. Interface with IC internet booking engine. 16. Interface with FFP System for providing passenger travel data from DCS. 17. Interface with ICICI for providing travel data from DCS for I-mint, Platinum Card schemes. Network Indian Airlines Data Network is used to provide “Host Connectivity” to end users. The Network consists of a Core backbone of 2 mbps leased Data Links which connect six major domestic Metro Airports and City Booking offices with Computer Centre, Palam, Site A & Site B. These dedicated leased links have ISDN back up also. High performances Cisco Routers using Dlsw are installed at all the metro locations for routing the data. Non-metro Booking offices and Airport locations are connected to backbone network with high-speed 64 K digital leased lines with ISDN backups. Cisco low ends Routers are installed at these locations and vice versa. However, various remote non-metro Booking Offices are connected via 9.6 Kbps analog lines. The connectivity to Call Centre (third party provided/operated) is also extended through digital links from the above-referred Site B. The third party hosted Cargo System is also connected to the IAL network through leased lines from Computer Centre, New Delhi & Air India Building, Nariman point, Mumbai. The connectivity to SITA for connectivity to IAL international ATOs/CTOs is provided through 2 MBPS leased lines (SITA IP-VPN Service).Most of the Host-to- Host communication which includes GDS connectivity, connectivity to e-ticket Server and Type B traffic, is through SITA network (2MBPS Link) using MATIP and
  • 40. some part of Host to-Host connectivity and Type B traffic is through SITA Network (64 kbps line speed with 19.2 kbps port ) using AX.25 protocol. IAL network supports both IBM terminals and old U-100 legacy terminals currently. The legacy network is supported by using an IBM product called CUTS (Connect UTS) which converts SNA protocol to U-100 protocol. IBM terminals are installed at major metro booking offices and all domestic airports. IBM terminals are basically PC’s with IBM PCOM 3270 emulator software running over them. The connectivity for the travel agents is extended by various means. Travel agents are connected through GDSs. Internet based Host connectivity has been extended to remote locations in India and PSAs abroad. Indian Airlines has started the process of migration of its rather complex multi-protocol flavored network as detailed above to a simple IP based network ex-Host. The existing Data Centre Connectivity and Network Diagrams are enclosed as Diagram-1 and Diagram-2. Application – Frequent Flyer (FFP) Flying Returns, the loyalty program (Frequent Flier) of NACIL is supported by an online application. It provides the complete functionality to service Frequent Flyer members of the India Program. It allows the accruals, redemptions, class upgrade against mileage points and retro-credit of mileage points of Frequent Flyer members of India Programme in online mode from city offices and airport extension counters from six metro locations – DEL, BOM, CCU, MAA, BLR & HYD. This facility has also been extended to AMD & PNQ thru HOB . The Overseas Programme members are serviced by a third party managed Application. This application is a server based application on Windows/Visual-Fox platform. The two application provide the facilities of  Member profile Maintenance.  Mileage Accumulation based on travel on NACIL, Alliance Partners and Code Share Partners.  Add –on Mileage Accumulation for non airline alliance partners  Bonus point accumulation  Redemptions  Tier Management  Data extraction for maintenance of Flying Returns website http://www.flyingreturns.com  Generation of Mileage Point Statement  STAR RECORD generation/ Updation for frequent flyer Members  Facility for Flagging of Award letters.  Class upgrade against Mileage Points  Mileage Points lapse  Queries & Reports For data capture & transfer FFP application has the following External interfaces.  Creation & updation of STAR data in PSS.  PSS/DCS interface for Downloading DCS data.  Frequent Travel List interface to receive FTL data in IATA format from NACIL International stations and Alliance Airlines.  Central Information System pages (CIS pages) Interface to receive Non DCS data.
  • 41.  Data interchange between FFP application and Flying Returns website IAL does not currently validate frequent traveler data of IAL or any other partner airline during PNR creation and DCS process. Interface – Frequent Flyer 1. DCS for receiving Flight data . 2. Interface for receiving FTL data (as per IATA stds - 1719a) of AI and IC International stations generated by DCS system available at that station as y dot (MX) message through SITA. 3. Interface for receiving Non DCS data as y dot (MX) message through SITA. 4. PSS interface for updating STAR records. 5. FTP Interface for uploading/downloading data to/from FFP application by MSC for partners & website updation. Network – Frequent Flyer 1. SNA connectivity thru' IC Computer Network at MSC offices at BOM, HYD, CCU, BLR, DEL city and airport offices and MAA city office 2. HOB connectivity at AMD, PNQ 6. Network services  Internet Services IAL has its own website with its web server installed at NIC on their network which is then connected to IAL HOST for getting any online information. Applications – Web based Applications 1. Internet Booking Engine for general public and travel agents through Website. 2. Advance payment module for Online Travel portals/Travel agent/Corporate. 3. Web based MIS reports for user departments and travel portals. 4. Direct access with host reservation system for Web bookings through Travel portals 5. E-ticketing for Web bookings for general public and travel portals. 6. Maintenance /updation of fares for IC domestic sectors and international sectors (ex India) on IC web- server. 7. An integrated web based application module for prevention of fraudulent transactions developed in-house and integrated with Internet Booking Engine (similar to CyberSource software). 8. Dial A Ticket. 9. In-house web based interface for Mobile/ATM bookings. 10. Web based interface for auction bookings of Domestic/International sectors operated by IC. Network – Web based Applications Two internet links (2 MBPS each) through MTNL and Reliance. The Servers are all on internal Data Centre LAN.
  • 42. System – Data Mart IAL is having PC based exhaustive data warehouse facilities. Query based mining tools are used for retrieval and analysis of the historical data. Applications – Data Mart The passenger reservation data purged from the system during the NFM process is downloaded into a PC text file on a daily basis. The passenger DCS historical data which includes the details like board / off points, seat number, discount code, FFP number, check-in time, transaction history etc. is also downloaded from the main frame. Compact disc having data & GUI based interface are distributed to users on weekly basis. Query Based Promotion & Discount Information System provides the performance of the domestic promotional and discount schemes. On-line data is taken from Reservation and DCS systems to create a merged database for analysis purposes. Query Based System has been developed to analyze the Indian Airlines and Competitor Carriage Data. On- line facility has been provided to file the Competitor Data while Indian Airlines carriage data is picked up from the MIS system Interface – Data Mart Access IBM host for data downloading Network – Data Mart Not Applicable  Intranet Services IAL has also provided the Intranet services to its employees. IAL has installed the IBM RISC high end machine on AIX platform, which acts as an Intranet server. IAL has been using IBM Lotus Domino Server for providing Web Services, Mail Services, Proxy server and many others. Intranet has the following main features:  E-mail services to its employees.  Information on various operations of several departments.  Notifications of various circulars, events, meeting etc.  Telephone directory information  Workflow applications etc.
  • 43. 7. Routers High End Router Cisco Router7507 (Gateway) The high-performance Cisco 7500 series Routers Helps IAL to optimize network density, bandwidth aggression, availability, serviceability and operational costs. It has breadth of advanced support for LAN/WAN services, redundancy, reliability and performance. A distributed architecture using versatile Interface Processors (VIPs) is the key to the Cisco 7500’s scalability. Each VIP has its own processor, which is capable of switching IP data packets and providing network services. This scenario allows the overall system performance of Cisco 7500 routers to scale up when they need to handle more high-speed network connections and more data packets. The RSP is still the market of the system. It runs routing protocol with other routers in the network to gather switching intelligence, which is then downloaded to the VIPs so that each can switch IP packets on its own. In addition to performance packet switching, the VIPs can also provide a set of distributed IP network services, including access control, QoS and traffic accounting (NetFlow). With the VIPs off-loading these IP switching and services functions from the RSP, the RSP can devote all its CPU cycles to handle other essential tasks. Medium End Router Cisco Router3745 With the on-board LAN/WAN connectivity, new high density service modules. And support for multiple advanced integration modules, the Cisco 3745 Series Multiservice Access Router delivers new level of service density for IAL airport branch offices in compact form factor. When configured with the 16- or 36- port EtherSwtich network module, the Cisco 3745 series offers a single, integrated platform that combines flexible routing and low-density switching. In addition, it can support internal inline power for the EtherSwtich ports, delivering a single-platform IP telephony and voice gateway solution that facilitates flexible, incremental and scalable migration to a converged network. These single-platform solutions help lower total cost of ownership by simplifying training. Deployment and management, and modular expansion options help protect current network investment. As a cornerstone of Cisco AVVID (Architecture for Voice, Video and Integrated Data), the Cisco 3745 series supports rich Cisco IOS Software features such as availability, quality of service and security to address the resilience needs of the branch office. The Cisco 3745 series combines these features with flexible applications and services consolidation to offer branch offices a platform optimized for integrating future services.Now, IAL is upgrading the router by doing some software changes. Cisco 3845Router The Cisco 3845 Integrated Services Router is part of the Cisco 3800 Integrated Services Router Series which complements the Integrated Services Router Portfolio. The Cisco 3845 Integrated Services Router provides the following support:
  • 44.  Wire-speed performance for concurrent services such as security and voice , and advanced services at full T3/E3 rates  Enhanced investment protection through increased performance and modularity  Enhanced investment protection through increased modularity  Increased density through High-Speed WAN Interface Card Slots (four)  Enhanced Network Module Slot  Support for over 90 existing and new modules  Support for majority of existing AIMs, NMs, WICs,VWICs,and VICs  Integrated GE ports with copper and fiber support  Optional Layer 2 switching support with Power over Ethernet (PoE) (as an option) , supports the 36-port Cisco EtherSwitch module (NMD-36ESW)  Security  On-board encryption  Support of up to 2500 VPN tunnels with the AIM-HPII-PLUS Module  Antivirus defense support through Network Admission Control (NAC)  Intrusion Prevention as well as stateful Cisco IOS Firewall support and many more essential security features  Voice  Analog and digital voice call support  Optional voice mail support  Optional support for Cisco CallManager Express for local call processing in stand alone business for up to 240 IP Phones  Optional support for Survivable Remote Site Telephony support for local call processing in small enterprise branch offices for up to 720 IP phones Cisco 2821Router The Cisco 2821 Integrated Services Router is part of the Cisco 2800 Integrated Services Router Series which complements the Integrated Services Router Portfolio. The Cisco 2821 Integrated Services Router provides the following support:  Wire-speed performance for concurrent services such as security and voice , and advanced services to multiple T1/E1/xDSL WAN rates  Enhanced investment protection through increased performance and modularity  Enhanced investment protection through increased modularity  Increased density through High-Speed WAN Interface Card Slots (four)  Enhanced Network Module Slot  Support for over 90 existing and new modules  Support for majority of existing AIMs, NMs, WICs,VWICs,and VICs  Two Integrated 10/100/1000 Ethernet ports  Optional Layer 2 switching support with Power over Ethernet (PoE) (as an option)  Security  On-board encryption  Support of up to 1500 VPN tunnels with the AIM-EPII-PLUS Module  Antivirus defense support through Network Admission Control (NAC)  Intrusion Prevention as well as statefulCisco IOS Firewall support and many more essential security features  Voice  Analog and digital voice call support  Dedicated Extension Voice Module slot
  • 45.  Optional voice mail support  Optional support for Cisco CallManager Express (Cisco CME) for local call processing in stand alone business for up to48 IP Phones  Optional support for Survivable Remote Site Telephony support for local call processing in small enterprise branch offices for up to 48 IP phones Low End Routers Cisco 1721Router The Cisco 1721 Modular Access Router is designed to help organizations embrace the productivity benefits of e-business applications. The Cisco 1721 router enables e-business by delivering secure Internet, intranet, and extranet access with virtual private networks (VPNs) and firewall technology The Cisco 1721 Router offers:  Wide array of WAN access options, including high-speed business-class digital subscriber line (DSL)  High-performance routing with bandwidth management  Inter-virtual LAN (VLAN) routing  VPN access with firewall option Key Features:  A RISC processor to support high-performance routing, encryption, and broadband services  One autosensing 10/100 Fast Ethernet port  Two WAN interface card (WIC) slots that support the same data WAN interface cards as the Cisco 1600,2600, and 3700 routers  One auxiliary (AUX) port (up to 115.2-kbps asynchronous serial)  One internal expansion slot for the hardware-assisted VPN encryption card (MOD1700-VPN)  16 MB Flash Memory  32 MB DRAM Cisco 1751Router Cisco 1751 Modular Access Router is ideally suited to help you evolve your organization into an e-Business. It supports e-Business features such as VPNs; secure Internet, intranet, and extranet access with optional firewall technology; broadband DSL and cable connectivity; and multiservice voice/video/data/fax integration. The Cisco 1751 Modular Access Router offers:  Flexibility to adapt to changing requirements  Modularity that allows you to individually configure the system to meet specific business needs  Investment protection with features and performance to support new WAN services such as broadband DSL and cable access,multiservice voice/data integration, and VPNs  Integration of multiple network functions, including anoptional firewall VPN,and data service unit/channelservice unit (DSU/CSU) to simplify deployment and management  Cisco 1751 Base Model Includes everything an office needs for data networking now (32 MB Flash, 64 MB DRAM, and Cisco IOS IP software feature set), with a simple upgrade path to full voice functionality. WAN interface cards are available separately.  Cisco 1751-V Multiservice Model Includes all the features needed for immediate integration of data and voice services with support for up to two voice channels (32 MB Flash and 96 MB DRAM, one DSP (PVDM- 256K-4), and Cisco IOS IP Plus Voice feature set). Voice and WAN interface cards are available separately.
  • 46.  All Cisco 1751 models offer three modular slots for voice and data interface cards, an autosensing 10/100BaseT Fast Ethernet LAN port supporting standards-based IEEE 802.1Q VLAN, a console port, and an auxiliary port.The Cisco 1751 Router supports the same WAN interface cards as the Cisco 1600, 1700, 2600, and 3600 Series routers, and the same voice interface cards and voice-over-IP (VoIP) technology as the Cisco 1700, 2600, and 3600 Series routers. This simplifies support requirements. Cisco 1601Router Cisco 1600 series routers connect small offices with Ethernet Lans to the Internet and to company intranet using several wide area network(WAN) technologies: Integrated service Digital Network(ISDN), asynchronous serial , and synchronous serial such as Frame relay,leased lines, Switched 56, Switched Multimegabit data Service(SMDS), and X.25.Cisco 1601 contains one Ethernet, one serial , one WAN interface card slot. Cisco 1841Router IAL is now replacing Cisco’s 1700 and 1600 series router with 1841 series routers. Cisco's 1841 router was created with the smaller branch office in mind. This router is a low-end device making the 1841 as one of the cheaper models manufactured by Cisco. The 1841 Cisco router has low failure rates and is enterprise class hardware. Typical of Cisco products, this router has openings for standard Cisco cards offering network interfaces and features while running on the IOS software. With such a comfort level in the IT community for Cisco products and its IOS, setup time and maintenance usually have a minimal learning curve compared to competing manufacturers. The 1841 router fits in rack mounts making it suitable for data closet installation. However, the 1841 has only a single power supply revealing its intended place in the field offices rather than central routing for a large company. This particular model comes with these features:  2 10/100 Ethernet ports (copper - RJ45)  2 Wan Interface Card (WIC) slots for the ports of your choice  1 internal expansion slot  standard pair of console/auxiliary console ports  1 USB port for console access (localdevice management)  128 Meg RAM; only expandable to 384 Meg.  1U height The 1841 routers come with three-speed fans controlled by a thermostat in the chassis. For noise abatement and extended life, fan speeds are variable depending on the cooling needs. The 1841 routers come with internal clocks, but are dependent on a non-replaceable battery. If the battery fails, this would require the chassis be sent back to the factory for repair - which should be covered under warrantee. For VoIP implementations a separate appliance will be needed since the 1841 router capabilities do not include VoIP or voice even though it has 2 WICs. A single power supply is a drawback, but for most implementations this means no redundant power supply. For installations of 300 users or less, the Cisco 1841 meets the needs of a field office. It is overkill for a job of less than 20 nodes where a smaller router or a PIX firewall is recommended. Whatever the router selection, Network Address Translation, a secondary Internet circuits to the headquarters, and a reasonable amount of access controllists (ACLS) should be included in its capabilities.