Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Virtual LAN
(Prepared in Information System, BEL)
BHARAT ELECTRONICS
GHAZIABAD
CERTIFICATION
a) ISO – 9001- 2000 b) ISO 14001 c) ISO - 18001 OHSAS
Submitted by:
LALIT KUMAR
Page | 1
Bachelor of
Engineering
Computer Science
IIIrd year
INDEX
S.NO TOPIC PAGE NO.
1 ACKNOWLEDGEMENT
3
2 CERTIFICATE
4
3 PREFACE
5
6 ROTATION REPORT
20
7 ABOUT IS DEPARTMENT
Page | 2
9 CONCLUSION
79
CERTIFICATE
TO WHOM SO EVER IT MAY CONCERN
Page | 3
Anoop Kumar
Mr. Dinesh Goel
Sr.Engineer (IS)
Manager (IS)
ACKNOWLEDGEMENT
LALIT KUMAR
Page | 4
PREFACE
Page | 5
BHARAT ELECTRONICS LIMITED
.
BHARAT ELECTRONICS LIMITED (BEL)
now BHARAT ELECTRONICS was established in 1954 as
a public Sector Enterprise under the administrative
control of Ministry of Defense as the fountainhead to
manufacture and supply electronics components and
equipment. BEL, with a noteworthy history of pioneering
achievements, has met the requirement of state-of-art
professional electronic equipment for Defense,
broadcasting, civil Defense and telecommunications as
well as the component requirement of entertainment and
Page | 6
medical X-ray industry. Over the years, BEL has grown to
a multi-product, multi-unit, and technology driven
company with track record of a profit earning PSU.
The company has a unique position in India
of having dealt with all the generations of electronic
component and equipment. Having started with a HF
receiver in collaboration with T-CSF of France, the
company’s equipment designs have had a long voyage
through the hybrid, solid-state discrete component to the
state of art integrated circuit technology change.
Today BEL’s infrastructure is spread over 9
locations with 29 divisions having ISO-9001/9002
accreditation. Its manufacturing units have special focus
towards products ranges like Defense Communication,
Rader’s, Optical & Opto-electronics, Telecommunication,
sound & Vision Broadcasting, Electronic Components,
etc.
BEL has nurtured and built a strong in-house R&D base
by absorbing technologies from more than 50 leading
companies worldwide and DRDO Labs for a wide range of
products. Each unit has its own R&D Division. About 70%
of BEL’s products are of in-house design.
BEL was among the first Indian companies
Page | 7
to manufacture computer parts and peripherals under
arrangement with International Computers India Limited
(ICIL) in 1970s. BEL assembled a limited number of 1901
systems under the arrangement with ICIL. However,
following Government’s decision to restrict the computer
manufacture to ECIL, BEL could not progress in its
computer manufacturing plans. As many of its equipment
were microprocessor based, the company, continued to
develop computers based application, both hardware and
software. Most of its software requirements are in real
time. EMCCA, software intensive navel ships control and
command system is probably one of the first projects of
its nature in India and Asia.
BEL has won a number of national and
international awards for Import Substitution, Productivity,
Quality, Safety, Standardization etc. BEL was ranked No.
1 in the field of Electronics and 46th overall among the
top 1000 private and public sector undertakings in India
by the Business Standard in its special supplement “The
BS 1000 (1997-98)”. BEL was listed 3rd among the Mini
Ratanas (Category II) by the Government of India, 49th
among Asia’s top 100 worldwide Defense Companies by
the Defense News, USA.
Page | 8
1.1 Corporate Motto, Mission and Objectives:
The passionate pursuit of excellence at BEL
is reflected in a reputation with its customers that can be
described in its motto, mission and objectives:
CORPORATE MOTTO:
“Quality, Technology and innovation.”
CORPORATE MISSION:
“To be the market leader in Defense Electronics
and in other chosen fields and products.”
CORPORATE OBJECTIVES:
1. To become a customer-driven company
supplying products at competitive prices at the
expected time and providing excellent customer
support.
2. To achieve growth in the operations
commensurate with the growth of professional
electronics industry in the country.
Page | 9
through research and development as well as
through Collaboration with National Research
Laboratories, International Companies, Universities
and Academic Institutions.
6. To progressively increase overseas sales of its
products and services.
7. To create an organizational culture this encourages
members of organization to realize their full potential
through continuous learning on the job and through
other HRD initiatives.
1.2 Manufacturing Units:
BANGALORE (KANARATAKA)
BEL started its production activities in
Bangalore on 1954 with 400W high frequency (HF)
transmitter and communication receiver for the Army.
Since then, the Bangalore Complex has grown to
specialize in communication and Radar/Sonar Systems
for the Army, Navy and Air-force. The Unit has now
diversified into manufacturing of electronic products for
the civilian customers such as DoT, VSNL, AIR and
Doordarshan, ISRO, Police, Civil Aviation and Railways. As
an aid to Electorate, the unit has developed Electronic
Voting Machines
Page | 10
GHAZIABAD (UTTER PRADESH)
The second largest Unit at Ghaziabad was
set up in 1974 to manufacture special types of radar for
the Air Defense Ground Environment Systems (Plan
ADGES). The Unit provides Communication Systems to
Defense Forces & Microwave Communication Links to
various departments of the State & Central Govt... The
Unit’s product range included Static & Mobile Radar,
professional grade Antennae etc.
PUNE (MAHARASHTRA)
This Unit was started in 1979 to manufacture Image
Converter Tubes. Subsequently, Magnesium Manganese-
dioxide Batteries, Lithium Sulphur Batteries and X-ray
Tubes/Cables were added to the product range.
Page | 11
control systems. The Unit has successfully diversified to
making the Surgical Microscope with zoom facilities.
PANCHKULA (HARYANA)
To cater the growing needs of Defense Communications,
this Unit was established in 1985. Professional grade
Radio-communication Equipment in VHF and UHF ranges
entirely developed by BEL and required by the Defense
services are being met from this Unit.
Page | 13
1.3.2 GE-BE Private Limited
GE-BE Private Limited, Bangalore, a JV with General
Electric Medical Systems, USA was established in 1997-
98 for manufacture of High End Routing Anode Medical
Diagnostic X-ray tube called CT MAX, which is used in CT
Scanners. It will also establish a reloading facility for X-
ray tubes and market the conventional X-ray tubes made
at Pune Unit of BEL.
Page | 14
1.4 BEL Components & Customers
CUSTOMERS COMPONENTS
Page | 15
Industry
Medical & Health Care X-ray Tubes.
1.5 Systems/Network
Formation:
Page | 18
• Active Microwave components like LNAs,
Synthesizer, and Receivers etc.
• Passive Microwave components like Double
Balanced Mixers, etc.
Organization
The operations at BEL Ghaziabad are headed by General Manager with
Additional / Deputy General Manager heading various divisions as follows:
• Design & Engineering Divisions
• Development and Engineering-R
• Development and Engineering-C
• Development and Engineering-Antenna.
Page | 19
BEL Ghaziabad has well defined standards and
processes for as well as manufacturing and testing
activities. Activities are divided into various
departments like Production Control, Works Assembly,
and QC WORKS. The manufacture and control of
production is through central systems, BELMAC, BEL’s
own homegrown ERP system.
Material Management
Material Management division is responsible for
Page | 20
procurement, storage handling, issue of purchased
parts as well as raw materials required to manufacture
various equipment and spares.
Page | 22
Information Systems
IS Department is responsible for BEL’s own home
grown manufacturing and control systems called
BELMAC.it comprises of almost all modules a modern
ERP systems but is Host and dumb terminal based.
Page | 23
ROTATION PROGRAME
Page | 24
are now given in detail.
• GREEN Perfect
present
1 WS 102
2 WS 104
3 PS 520
4 PS 809
5 PS 811
6 PS 369
After the inspection of cables, PCB’s and other things the defect found are given
in following codes.
Page | 26
2 B --- Wrong Writing
8 H --- Stenciling
P.C.B. FABRICATION
P.C.B. stands for Printed Circuits Board. It’s an integral part of the Electronics
equipment as well as all the components are mounted on it. It Consists of the
fiberglass sheet having a layer of copper on both sides.
Types Of PCBs
1. Single Sided Board : Circuits on one side.
2. Double Sided Board : Circuit on Both sides.
3. Multi-layer Board : Several layers are interconnected
Through hole metallization.
Page | 27
3.2mm and the standard size of the board is 610mm to 675mm.
Operation in process
Following steps are for PCB manufacturing:-
1 CNC Drilling
2 Drill Location
3 Through Hole Plating
4 Clean Scrub and Laminate
5 Photo Print
6 Develop
7 Cu electroplate
8 Tin electroplate
9 Strip
11 Tin Stripping
12 Gold plating
14 Photo print
15 Develop
16 Thermal Baking
Page | 28
19 Reverse Marking
Page | 29
There are three types of solder marking done in BEL.
1 Wet solder mask: Due to some demerits this method is totally
ruled out. The demerit was non alignment which was due to wrong method
applied or wrong machine.
2 Dry pin solder mask: Due to wastage of films about 30% this
method is also not used now.
3 Liquid photo imaginable solder mask (LPISM): In this first
presoaking is at 80 degree Celsius for 10 to 20 minutes. Next, screen
preparation is done . the board is covered by a silk cloth whose mesh is T-48.
The angle to tilt of the board is 15 degree to 22.5 degree. The ink is Ink
preparation : Ink + Hardener
71 % : 29 %
(150 gms) : (300gms)
+
Butayae solo solve 50gms/kg.
Ink preparation-
It uses :-
Ink-----100gm
The catalyst is used as binder and prevents the following, while reducer is used
as thinner. The three things are then fully mixed.
After wash out, final baking for one hour at the temt. of 20degree C is done.
After this shearing or routing is done which is followed by debarring and
packing.
Page | 30
WORKS ASSEMBLY
This department plays an important role in the production. Its main function is
to assemble various components, equipments and instruments in a particular
procedure.
It has been broadly classified as :
1. WORK ASSEMBLY RADAR e.g.:INDRA-2, REPORTER
2. WORK ASSEMBLY COMMUNICATION e.g.: EMCCA, MSSR,
MFC
Page | 31
Preparation-- this is done before mounting and undertakes two procedures.
Mounting : It means soldering the components of the PCB plate with the help
of soldering tools. The soldering irons are generally of 25 W and are of variable
temperature, one of the wires of the components is soldered so that they don’t
move from their respective places on the PCB plate. On the other hand of the
component is also adjusted so that the PCB does not burn.
Storing : After this variable components are sleeved with Teflon. Before
Lacquering mounted plate is cleaned with isopropyl alcohol. The product is
then sent to store.
Page | 32
MAGNETICS
Page | 33
1. Preparation of former :
Former is made of plastic Bakelite comprising a male and female plates which are
joined alternately to form a rectangular box on which winding is done.
2. Winding :
It is done with different material and thickness of wire. The winding has specified
number of layers with each layer’s having a specified number of turns. The
distance between the two turns should be maintained constantly that is there
should be no overloading. The plastic layer is inserted between two consecutive
layers.
Type of Windings :
1) Layer Winding
2) Wave Winding
3) Bank Winding
3. Winding :
For inter-winding and inter layer, various types of insulation sheets viz. Craft
paper, paper, leather, oil paper, polyester film are being used.
4. Protection :
to protect the transformer from the external hazards, moisture, dust and to provide
high insulation resistance they are impregnated in the following forms.
Page | 34
Information System department act as an Internet
Service Provider for BEL Ghaziabad unit. It is
responsible for managing and troubleshooting of the
entire network setup.
BELMAC
IS Department is responsible for BEL’s own home
grown manufacturing and control systems called
BELMAC. It comprises of almost all modules a modern
ERP system but is Host and dumb terminal based. It
comprises of two servers: BEL1 and BEL2. BEL1 deals
with production control, D&E, Material Management
and Sales modules while BEL2 deals with Finance and
Payroll. The front end of BELMAC is implemented using
SQL Forms and oracle at back end. Report writer and
Proc*C are used as Report writing Tools.
Page | 35
NETWORK
Page | 36
Some Networking Devices
Page | 38
A router (broadband router) is also a device that enables
two or more computer to receive data packets from the
Internet under one IP address at the same time.
Remember that to be able to connect to the Internet; a
computer must have an IP address unique from the rest of
the computers. Therefore, every computer connected to the
Internet has it own IP address. It is like having a fingerprint
or ID as an access pass to be able to enter the web. With
the presence of the router, this? Fingerprint? Or? ID? Could
be shared by two or more computer at the same time. In
simplest form, a router makes two or more computer use
the Internet at the same with one access pass.
Application Layer Application Gateway
Transport Layer Transport Gateway
Network Layer Router
Data link Layer Bridge, Switch
Physical Layer Repeater, Hub
Page | 39
combines dial-up with faster data rates. Wireless, cable
modem, and Digital Subscriber Line (DSL) technologies
offer other possibilities for remote access.
Benefits:
• Enforces compliance and updates
• ePolicy Orchestrator lets you effectively manage policy
compliance and updates;
• You lower the risk of noncompliant systems
compromising your security Comprehensive security
management
• Handle all your enterprise-wide system protection with
this centralized management infrastructure.
• It covers anti-virus, anti-spyware, host IPS, content
filtering, and Microsoft® patch assessment Find non-
compliant systems
• It helps you identify noncompliant systems that
increase your risk of vulnerability and infection
Assesses Microsoft patch compliance
• You can assess Microsoft patch compliance and audit
your current patch rollout processes; it informs you
about your exposure to new exploits and vulnerabilities
Monitors security all day, every day
• You can monitor security status 24/7, evaluate your
policy status, and find your network's vulnerabilities
from one centralized
Features:
• Noncompliant system detection
• ePolicy Orchestrator lowers your risks due to
noncompliant systems by alerting you when such
systems are connected to your corporate network
Patch compliance and reporting
• ePolicy Orchestrator lets you search for a file, service,
registry key, or specific Microsoft patch; you can
monitor the compliance by viewing detailed graphical
Page | 41
reports Virus tracking and notification
• It tracks new anti-virus security updates every hour and
deploys them to appropriate systems without your
intervention through automatic and fast global
updating
Mail Server
Page | 42
rules to accommodate access from machines who receive
their IP addresses via DHCP is therefore more difficult
because the remote IP address will vary from time to time.
You'll probably have to allow access for the entire remote
DHCP subnet for a particular TCP/UDP port. Most home
router/firewalls are configured in the factory to be DHCP
servers for your home network.
Phases of DHCP Operations: -
• IP lease request
• IP lease offer
• IP lease selection
• IP lease acknowledgement.
1. IP Lease Request:-
Whenever a computer comes on line, it checks to see if it
currently has an IP address leased. If it doesn't, it requests
a lease from a DHCP server. Because the client computer
doesn't know the address of a DHCP server, it uses 0.0.0.0
as its own IP address and 255.255.255.255 as the
destination address. Doing so allows the client to
broadcast a DHCPDISCOVER message across the network.
Such a message consists of the client computer's Media
Access Control (MAC) address (the hardware address built
into the network card) and its NetBIOS name.
2. IP Lease Offer:-
When a DHCP server receives an IP lease request from a
client, it extends an IP lease offer. This is done by
reserving an IP address for the client and broadcasting a
DHCPOFFER message across the network. This message
contains the client's MAC address, followed by the IP
address that the server is offering, the subnet mask, the
Page | 43
lease duration, and the IP address of the DHCP server
making the offer.
3. IP Lease Selection:-
When the client PC receives an IP lease offer, it must tell
all the other DHCP servers that it has accepted an offer. To
do this, the client broadcasts a DHCP REQUEST message
containing IP address of the server that made the offer.
When the other DHCP servers receive this message, they
withdraw any offers that they might have made to the
client. They then return the address that they had reserved
for the client back to the pool of valid addresses that they
can offer to another computer. Any number of DHCP
servers can respond to an IP lease request, but the client
can only accept one offer per network interface card.
4. IP Lease Acknowledgement:-
When the DHCP server receives the DHCP REQUEST
message from the client, it initiates final phase of
configuration process. This acknowledgement phase
involves sending a DHCPACK packet to client. This packet
includes lease duration and any other configuration
information that the client might have requested. At this
point, TCP/IP configuration process is complete.
Page | 44
3 Should support voice and data integration on the same
switch to provide a single platform for running a
multi-service network.
4 Should provide for capability to integrate VoIP using
IP Telephone in the campus.
5 Should have provision to upgrade current
10BAseT/100BaseTX modules for in-line power to IP
phones or should allow for the same externally.
6 Efficient intranet multimedia and multicast support
through protocol independent multicast (PIM),
Internet Group Management Protocol (IGMP), and
GARP Multicast Registration Protocol (GMRP)
delivering end to end, scalable bandwidth for
multimedia and multicast applications.
7 Should support QoS policies enforced by using Layer
2,3, and 4 information such as, precedence bits from
IP, and 802.1p frames or layer 4 port numbers.
8 Support for in-built protocol based Server load
balancing for optimal server utilization.
9 Support for fast Web Caching for optimal network
utilization. Support for Web Caching Control protocol
(WCCP2).
10 Support for multiple queues with configurable
thresholds employing queue management techniques
like WRED, WRR, and type of service / class of
service (ToS/CoS) mapping mechanism to ensure that
QoS is maintained as packets traverse Layer 2 and
Layer 3 boundaries.
11 Support for wide range of IP, IPX, and IP multicast
routing protocols.
12 Support for over 32000 MAC addresses.
13 IEEE 802.1Q, 802.1p, 802.3x
14 Ethernet: IEEE 802.3u, 100Base TX, 100Base FX.
15 Gigabit Ethernet: IEEE 802.3z.
16 Support for hot standby redundancy on Layer 3.
17 Support for SNMP MIB-II, 4 groups of RMON-1
(RFC 2819) on each ports and RMON-2 (RFC 2021)
through external Network Analysis Module.
18 Support for SMON – Switch monitoring.
19 Support for IEEE 802.1D Spanning-Tree Protocol
Page | 45
instance per VLAN preferred.
20 Modular architecture for quick replacement of faulty
modules.
21 Redundancy and fault tolerance :
o Requirement for redundant switching matrix /
Supervisory / Controller in central switch.
o Requirements for supporting redundant, load
sharing and hot pluggable power supply.
o Requirement for Redundant Supervisory and
Management module.
o Requirement for Redundant System clocks.
o Requirement for Redundant Fan modules.
22 Requirement for hot swappable I/O modules.
23 Support for over 4000 VLANs.
24 Security: Switch to support Secure Port filtering,
TACACs+ and IP permit lists, dynamic ACLs and
MD5 Route authentication shall be preferred. If the
same is offered by connecting a external device , then
it is to be indicated.
25 Port requirement :
o Gigabit Ethernet – provision for over 40 ports.
o Fast Ethernet – 48 ports 10 BaseT / 100
BaseTX. Option to enhance port count to over
200. should be able to support inline power if
required.
o WAN ports support option for T1/E1, T3/E3,
HSSI, ATM, and POS in the same chassis for
future upgradability.
o Voice support using FXS (atleast 48 ports in the
same chassis), E1.
26 Single TFTP download for entire chassis for the
purpose of upgrade of Switch S/W.
27 Advanced diagnostic support for troubleshooting
requirements.
Access Switches:
1 Support for at least 8 ports of 10BaseT/100BaseTX working
simultaneously is required.
2 Support for Auto-sensing and Auto-negotiation on each port.
3 Support for Web-based network management in addition to
regular management using SNMP.
4 Support for at least 4 port-based VLANs.
5 Internal power supply is required.
HUB Specifications:
1 16 port of 10 Mbps each.
2 Unmanaged and standalone.
3 One AUI port.
4 Inbuilt power supply.
5 19” Rack Mounted.
6 Front LED for Status and Link.
The fiber patch cord shall consist of one or two single, buffered,
graded-index 62.5/125 µm fibers. The fiber patch cord shall be
terminated with STII, STII+ or SC connector on each end. The
connector should specify whether simplex or duplex cords are
provide in the tender response.
The fiber patch panels shall be wall or 19” rack mounted. The
preferred method including the connector type should be detailed
in the tender response. This will depend on the space requirements
of the building.
Page | 52
VIRUAL LOCAL AREA NETWORKS
(VLANs)
Introduction
Page | 53
major LAN equipment vendor. Although end user
enthusiasm for Vlan implementation has yet to take off,
most organizations have begun to look for vendors that
have a well articulated Vlan strategy, as well as Vlan
functionality built into products today. One of the reasons
for the attention placed on Vlan functionality now is the
rapid deployment of LAN switching that began in
1994/1995. The shift toward LAN switching as a
replacement for local or departmental routers- and now
even shared media devices (hubs)- will only accelerate in
the future. With the rapid decrease in Ethernet and token
ring switch prices a per port basis, many more ambitious
organizations are moving quickly toward networks
featuring private port (single user/port) LAN switching
architectures. Such a desktop switching architecture is
ideally suited to Vlan implementation. to understand why
private port LAN switching is so well suited to Vlan
implementation, it is useful to review the evolution of
segmentation and broadcast containment in the network
over the past several years.
Page | 54
However the continued deployment of switches, dividing
the network into more and more segments (with fewer and
fewer users per segment) does not reduce he need for
broadcast containment. Using routers, broadcast domains
typically remain in 100-500 user range. Vlans represent an
alternative solution to routers for broadcast containment,
since Vlans also allow switches to contain broadcast traffic.
With the implementation of switches in conjunction with
Vlans, each network segment can contain as few as one
user (approaching private port LAN switching), while
broadcast domains can be as large as 1000 users or
perhaps even more. In addition, if implemented properly,
Vlans can track workstation movements to new locations
without requiring manual reconfiguration of IP address.
Why haven’t more organizations deployed Vlans? For the
vast majority of end user organizations, switches have yet
to be implemented on large scale to necessitate Vlans.
That situation will soon change. There are, however, other
reasons for the lukewarm reception that Vlans have
received from network users up to now.
Page | 55
• Although many analysts have suggested that
Vlans enhance the ability to deploy centralized servers,
customers may look at enterprise wide Vlan
implementation and see difficulties in enabling full high
performance to centralized servers.
Defining VLANs
Page | 56
grouping, network layer grouping and IP multicast
grouping.
Page | 57
way, a Vlans defined by MAC addresses can be thought of
as a user based Vlan.
Page | 58
this problem may particularly not be common, I does
illustrate some f the limitations of the MAC address based
Vlans.
Page | 59
First it enables partioning by protocols type. This may be
an attractive option for network managers who are
dedicated to a service or application strategy.
Page | 61
Manual with purely manual Vlans configuration both the
initial setup and all subsequent moves and changes are
controlled by network administrator. Purely manual
configuration enables high degree of control. The ever in
large enterprise networks manual configuration is not
practical. Furthermore it defeat the primary benefits of
Vlans : elimination of time it takes to administer moves and
changes – although moving users manually with Vlans may
actually be easier than moving users across routers subnets
depending on the\e specific vendor’s Vlans management
interface .
Page | 62
Switch must have a way of understanding Vlans
membership when network traffic arrives from other
switches; otherwise Vlans would be limited to single switch.
In general; layer 2 based Vlans (defined by port or MAC
address) must communicate Vlans membership explicitly,
while Vlans membership in IP based Vans in implicitly
communicated by IP address. Depending on the particular
vendor’ solution, communication of vans membership must
also been in case of layer 3 based Vlans in multiprotocol
environment to date outside of implementing an ATM.
Backbone.
Page | 63
Frame tagging: - a header is typically inserted into each
frame on inters switch trunks to uniquely identify which LAN
a particular which MAC-layer frame belongs to. Vendors
differ in the way they solve the problem of occasionally
exceeding the maximum length of Mac layer frames as
these headers are inserted. These headers also add to
network over traffic.
Security
The ability of Vlans to create firewalls can also satisfy more
stringent security requirements and thus replace much of the
functionality of routers in this area. This is primarily true when
Vlans are implemented in conjunction with private port switching.
The only broadcast traffic on single user segment would be from
that user’s Vlans (that is traffic intended for that user). Conversely
it would be impossible to broadcast or unicast traffic not intended
for that user because such traffic does not physically traverse that
segment.
LAN Emulation
With he introduction of ATM connected end stations, the network
becomes truly mixed environments , with two types of networks
operating under fundamentally different technologies :
connectionless Lans (Ethernet, Token Ring, FDDI, etc.) and
connection oriented ATM. This environment puts the
responsibility on the ATM side of the network to emulate the
characteristics of broadcast LANs and provide MAC to ATM
address resolution. The LAN emulation (LANE) specification,
standardized in 1995by the ATM forum, specifies how this
emulation is accomplished in a multivendor environment. LANE
specifies a LAN emulation server (LES), which can be
incorporated into one or more switches or separate workstations to
provide the MAC-to-ATM address resolution in conjunction with
LAN Emulation clients (LECs), which are incorporated into ATM
edge switches and ATM NICs. Figure 2: briefly illustrates how
LANE operates:
Page | 68
• Only the LEC ha the Destination MAC address in its tables
responds tot the LES.
Edge routing:
Basically, edge routing dictates that the routing function across the
ATM backbone be incorporated into each LAN switch at the edge
of the ATM backbone. Traffic within Vlans can be switched
across the ATM backbone with minimum delay, while inter –Vlan
packets are processed by the routing function built into the switch.
In this way, an inter-Vlan packet does not have to make a special
trip to external router, eliminating a extra hop. There are three
other major advantages to this architecture.
First, unlike solution have central routing, there is no single point
of failure with edge routing architecture.
Second several solutions featuring edge routing is available today.
Third, edge routing will function in multivendor environment if
each vendor equipment supports LAN emulation.
The primary disadvantage of edge routing is the difficulty of
managing the multiple devices relating to having centralized
management of a consolidated router function. Additionally, edge
routing solutions may be more expensive than centralized routing
solutions made up of centralized router and multiple, less
expensive edge switches.
Page | 70
The One-Armed router:
The concept of the so called “one-armed router” has become
particularly attractive because it removes the more processing
intensive, higher latency routing function fro the primary data
path. A One Armed router sits off the side of an ATM backbone
switch with a single ATM link, allowing packets that do not need
to transverse the router to pass through he ATM backbone
unimpeded. Another advantage of the One Armed router is that,
relative to other configurations, it is less complex to configure and
administer.
the key to the One armed router structure, is shown in figure-5, is
to keep as much traffic as possible out of the one armed router. By
structuring Vlans to support the 80/20 rule, the router I not
required to handle most traffic. For this to work well, optimal
configuration of Vlans to minimize the inter Vlan traffic is critical.
There are several vendors presently shipping one armed router
solutions.
One of the disadvantages of the one armed router is that it
represents a single point of failure the network. For this reason,
two or more redundant one router is generally preferred. However,
perhaps the most significant drawback of the one armed router is
that its one arm can develop into a backbone if Vlan traffic does
not support the 80/20 rule. This can occur particularly in networks
with large amounts of peer to peer traffic.
Virtual Workgroups:
one of the more ambitious Vlan objectives is the establishment of
the virtual workgroup models. The concept is that, with full Vlan
implementation across the campus network environment,
members of the same department or section can all appear to share
the same LAN with most of the network traffic saying within the
same VLAN broadcast domain. Someone moving to a new
physical location but remaining in the same department could
move without having workstations reconfigured. Conversely, a
user would not have to change his or her physical location when
changing departments- the network manager would simply change
the user’s Vlan membership. This functionality promises to enable
a more dynamic organizational environment, enhancing the recent
trend toward cross functional teams. The logic of the virtual
workgroup model goes like this: team formed on temporary,
project basis could be virtually connected to same LAN without
requiring the people to physically move in order to minimize the
traffic network across the collapsed backbone. Additionally these
workgroups would be dynamic: Vlans corresponding to these
cross functional project teams could be set for the duration of
project and torn down when the project was completed, all the
while allowing users to remain in the same physical locations.
Although this scenario seems attractive, reality is that Vlans
cannot alone pave the way for full utilizations of virtual
workgroup model. There are several managerial and architectural
Page | 72
issues that at this point, pose problems for the virtual workgroup
model. There are several managerial and architectural issues that,
at this point, pose problems for the virtual workgroup model.
Page | 74
Vlans in the first place to avoid the delay introduced by the
routers.
MPOA
There is at least one development that ma eventually standardize
the route server approach. The multi protocol over ATM (MPOA)
Page | 77
standards working group of the ATM forum is currently working
out the details of n implementation model for MPOA service.
While a variety of models have been proposed, MPOA is expected
to provide a direct virtual circuit connectivity between ATM
networks attached devices that may belong to different routing
subnets. In other words MPOA can let logical end stations that are
part of different ELANS that communicate directly across an
ATM network without requiring an intervening router. Since
ELANs are subnets of Vlans, MPOA holds the promise of
enabling an ATM backbone to connect Vlans without the need for
an external router. MPOA can be considered an enhancement
beyond LANE that integrates routing functionality into the LAN-
ATM edge switch. All inter VLAN traffic would be able to
leverage this capability, and network latency would be reduced.
An MPOA standard is not expected to be finalized until at least
1997, and the initial implementation will most likely support only
TCP/IP. It should be noted that some f the disadvantages of the
route server approach, such as cost and management complexity,
would remain in MPOA solutions.
DHCP Functionality
When considering the ability of Vlans to deal with ever changing
networks, it should be remembered that most of the difficulty in
supporting adds, moves, and changes occur in IP networks. In
order to deal with reconfiguring IP addresses, Microsoft has
developed DHCP, a TCP/IP based solution incorporated into
windows NTtm server and most windows clients. Rather than
establishing location independent broadcast domains as Vlans do,
DHCP dynamically allocates IP address to logical end stations for
fixed period of time. When he DHCP server detects a workstation
Page | 78
whose physical location no longer corresponds to its allocated IP
address, it simply allocates that end station a new address. By
doing so , DHCP enables workstations to be moved from subnet to
subnet without network administrator having to manually
reconfigure the workstation’s IP address or update host table
information. The element of DHCP that equates most closely to
Vlan functionality in the network administrator ability to specify a
range of IP address available for a particular logical workgroup.
These logical groups are termed as “scopes” in a Microsoft
Lexicon. However scopes should not be equated with Vlans,
because members of single scope are still bound by their physical
subnet. Although there an be multiple scopes residing in each
subnet. Consequently, DHCP implementation may reduce the
labors intensive administration of TCP/IP network broadcasts in
the same way as Vlans do.
Infrastructural VLANs
An infrastructural approach to Vlans is based on the functional
groups (that is the departments, workgroups, sections, etc.) that
make up the organization. Each functional group, such as
accounting, sales, and engineering, is assigned to its own uniquely
defined Vlan. Based on the 80/20 rule, the majority of network
traffic is assumed to be within these functional groups, a thus
within each Vlan. In this model, Vlan overlap occurs at network
resources that must be share by multiple workgroups. These
resources are normally servers, but could not include printers,
routers providing WAN access, workstations functioning as
gateways, a so forth. The amount of Vlan overlap in the
infrastructure model is minimal, involving only servers rather than
user workstations-making Vlan administration relatively straight
forward. In general, this approach fits well in those organizations
Page | 81
that maintain clean, discrete organizational boundaries. The
infrastructural model is also the approach most easily enabled by
presently available solutions and fits more easily with networks
deployed today. Moreover, this approach does not require network
administrator to alter hoe they view the network, and entails a
lower cost of deployment. For these reasons, most organizations
should begin with an infrastructural approach to Vlan
implantation. As can be seen in the example in figure 7, the e-mail
server is a member of all the departments Vlans, while the
accounting database server is only a member of the accounting
Vlan.
Service-Based VLANs
A service-based approach to Vlan implementation looks, not at
organizational or functional groups, but an individual server
access to servers and applications-that Is, network resources. In
this model, each Vlan corresponds to server or service on the
network. Servers do not belong to multiple Vlans-groups of users.
In a typical organization, all users would belong to the e-mail
server Vlan. While only a specified group such as the accounting
department plus top level executives would be member of
accounting database server’s Vlan.
By its nature, the service based approach creates a much more
complex set of Vlan membership relations to be managed. Given
the level of most Vlan visualization tools presently available, a
large number of overlapping Vlans using the service based
approach could generate incomprehensible multilevel network
diagrams at a management console. Therefore to be practical,
service based Vlan solutions must include a high level of
automatic configuration features. However in response to types of
applications organizations want to deploy in future, as well as he
shift away fro the traditional, more rigid organizational structures,
the trend in Vlan implementation will be toward the service based
approach, and figure 8 depicts the service based Vlan model. s
bandwidth to desktop increases and s vendor solutions becomes
available to better mange greater Vlan overlap, the size of group
that belongs to a particular set of Vlan may become smaller and
smaller. At the same time, the number of these groups becomes
larger and larger, to the point where each individual could have a
Page | 82
customized mix of services delivered to his or her workstation.
Taking that concept a step further, control over what services are
delivered at a given time could be left upto each individual user.
At that point, the network structure begins to take on the multiple-
channel characteristics of a cable TV network. In fact, at this
stage, this model finds the greatest degree of similarity in Vlans
defined by IP multicast group-each workstation has the choice of
which IP multicast or “channel” it wants to belong to. In such a
future environment, Vlans lose the characteristics of static or semi
static broadcast domains defined by the network manager, and
become channels to which users subscribe. Users simply sign up
for the applications they need delivered to them at a particular
time. Applications use could be accounted for, enabling precise
and automated chargeback for network services. Network mangers
could also retain control in order to block access to specific
channels b certain users for security purposes.
Page | 83
An organization where broadcast traffic is not yet a problem or
where the cost of network moves and changes is tolerable, may
want to forgo implementing Vlans for the time being. However
the majority of large enterprise networks are now experiencing
new or both of these problems. In organizations that are rapidly
replacing routers with switches and may soon face broadcast
traffic containment issues, element architecture should be
considered: the degree to which the network has evolved toward a
single user/port switched LAN architecture. If the majority of
users are still on shared LAN segments, the ability of Vlans to
contain broadcasts is greatly reduced.
If multiple users belong to different Vlans on the same shared
LAN segment would receive broadcast from each Vlan- defeating
the goal of broadcast containment. Having determined that Vlans
need to be a part of network planning in the immediate future,
server access, server location, and application utilization must all
be thoroughly analyzed to determine the nature of traffic flow in
the network. This analysis should answer the remaining questions
about where Vlan broadcast domains should be deployed, what
role ATM needs to play, and where the routing functions should
be placed. Because f the limitations of the present Vlan
technology, initials Vlans are likely to employ an infrastructural
approach.
Page | 85
CONCLUSION
Page | 86
in the network may also be able to justify VLAN
implementation. This is simply because VLANs, if
implemented as a part of strategic solution, may be
able to substantially reduce the cost of dealing with
moves and changes. For these organizations, the
switching infrastructure upon which most VLAN
solutions are based can be seen as an added and quite
valuable benefit.
Page | 87