CANDIDATES DECLARATION
I, Kshitij Chaudhary, bearing roll number:1212043 student of B. Tech (ECE) hereby declared
that I own the full responsibility for the information, result etc. provided in this project titled
MPLS- ISP NETWORK CONSOLIDATION. I have taken care to honor the intellectual
property right and have acknowledged the contributions of other for using them in this
academic purpose. I further declared that in case of any violation of intellectual property right
or copyright I as the candidate would be fully responsible for the same. My supervisor and
institute should not be held for full or partial violation of copyright if found at any stage of
my degree.
Kshitij Chaudhary
1212043
ECE
6th SEMESTER.
2
It is certified that this thesis report titled MPLS- ISP NETWORK CONSOLIDATION
by Kshitij Chaaudhary in the partial fulfillment of requirement for the award of Bachelor of
Technology (Electronics and communication Engineering ) is a record of students own work
carried out under my supervision and guidance. The work contained in this dissertation is at
per university standards. I wish her good success in life.
ACKNOWLEDGEMENT
Completing a task is never a one mans effort. It is the result of invaluable contribution of a
number of individuals.
From the depth of my heart, I wish to express my thanks to Mr. Ankit Chauhan , Senior
Engineer not only for his valuable guidance but also for inspiration, encouragement,
patience, interest and pain staking fortitude during the entire period of industrial training. It
has been a matter of great pride and satisfaction for me to work under him.
Words cannot express my gratitude to Mr. Sandeep Mehta, GM who helped me in this
endeavor. I take this opportunity to express my sincere thanks to him. Their knowledge and
professional management style created friendly environment. They provided whatever help
was required at all time to keep the training work on right course and towards the right target.
It has been a privilege and pleasure to take guidance from them.
I wish to record my heartiest thanks for Mr. Krishankumar, HR Department, for granting
me the permission to work as a trainee in this esteemed organization.
I would also thank entire staff of Bharti Airtel Ltd. who has directly or indirectly helped in
making my training a success and making it an educational experience.
Kshitij Chaudhary
INDEX
CHAPTER 1
INTRODUCTION TO BHARTI
AIRTEL
1.1 ABOUT BHARTI AIRTEL
1.2 HISTORY OF BHARTI AIRTEL
1.3 COORPORATE STRUCTURE
1.4 ORGANISATION STRUCTURE
1.5 WORLDWIDE PRESENCE
1.6 ACHIEVEMENTS
1.7 DEPARTMENT OF TRAINING
1.8 TEAMS IN NOC
1.81DATA NOC-NS
CHAPTER 2
CHAPTER 3
CHAPTER 4
CHAPTER 4
CHAPTER 5
CHAPTER 6
3.11.1 CLASSIFICATION
3.11.2 BASIC NETWORK
3.12 MPLS
3.12.1 HISTORY
3.12.2 LABEL SWITCHING
3.12.3 ARCHITECTURE
3.12.4 REASONS TO CHOOSE MPLS
4.1 COMMONLY USED PROTOCOLS
4.11 Is-Is
4.12 BGP
4.13 LDP
4.2 PuTTY
4.21 ROUTER LOGGIN
4.22 FEATURES
4.1 COMMANDS USED
4.11CISCO/JUNIPER COMMANDS
4.2 SOME COMMANDS AND RESULTS
4.3 PING
4.31PING COMMAND
5.1 DAY TO DAY TASKS
6.1CONCLUSION
6.2BIBLIOGRAPHY
CHAPTER-1
COMPANY PROFILE
BHARTI AIRTEL LTD.
1.1.
Company Information
Full name
Bharti Airtel Ltd.
Status: Listed
Legal Form: Public Limited Company
Operational Status: Operational
Legal Address
ISIN CODE : INE397D01016
Bharti Crescent, 1 , Nelson Mandela Road,
Financial Auditors: SR Batliboi & Associates
Vasant Kunj , Phase - II; Delhi; Delhi; 110070 (2011)
Incorporation Date: July 7, 1995
Total Employees: 18,354
Tel: +91-11-46666100
1.2.
Company Description
Airtel is credited with pioneering the business strategy of outsourcing all of its business
operations except marketing, sales and finance and building the 'minutes factory' model of
low cost and high volumes. The strategy has since been copied by several operators. Its
networkbase stations, microwave links, etc.is maintained by Ericsson and Nokia
Siemens Networkwhereas business support is provided by IBM, and transmission towers are
maintained by another company (Bharti Infratel Ltd. in India). Ericsson agreed for the first
time to be paid by the minute for installation and maintenance of their equipment rather than
being paid up front, which allowed Airtel to provide low call rates of 1/minute
(US$0.02/minute). During the last financial year (200910), Bharti negotiated for its strategic
partner Alcatel-Lucent to manage the network infrastructure for the tele-media business. On
31 May 2012, Bharti Airtel awarded the three-year contract to Alcatel-Lucent for setting up
an Internet Protocol access network (mobile backhaul) across the country. This would help
consumers access internet at faster speed and high quality internet browsing on mobile
handsets.
The company is structured into four strategic business units - Mobile, Telemedia, Enterprise
and Digital TV. The Telemedia business provides broadband, IPTV and telephone services in
89 Indian cities. The Digital TV business provides Direct-to-Home TV services across India.
The Enterprise business provides end-to-end telecom solutions to corporate customers and
national and international long distance services to telecom. Today, Airtel is the largest
cellular service provider in India and fifth largest in the world.
1.3.
Sunil Bharti Mittal founded the Bharti Group. In 1983, Sunil Mittal was into an agreement
with Germany's Siemens to manufacture the company's push-button telephone models for the
Indian market. In 1986, Sunil Bharti Mittal incorporated Bharti Telecom Limited (BTL) and
his company became the first in India to offer push-button telephones, establishing the basis
of Bharti Enterprises. This first-mover advantage allowed Sunil Mittal to expand his
manufacturing capacity elsewhere in the telecommunications market. By the early 1990s,
Sunil Mittal had also launched the country's first fax machines and its first cordless
telephones. In 1992, Sunil Mittal won a bid to build a cellular phone network in Delhi. In
1995, Sunil Mittal incorporated the cellular operations as Bharti Tele-Ventures and launched
service in Delhi. In 1996, cellular service was extended to Himachal Pradesh. In 1999, Bharti
Enterprises acquired control of JT Holdings, and extended cellular operations to Karnataka
and Andhra Pradesh. In 2000, Bharti acquired control of Sky cell Communications, in
Chennai. In 2001, the company acquired control of Spice Cell in Calcutta. Bharti Enterprises
went public in 2002, and the company was listed on Mumbai Stock Exchange and National
Stock Exchange of India. In 2003, the cellular phone operations were rebranded under the
single Airtel brand. In 2004, Bharti acquired control of Hexagon and entered Rajasthan. In
2005, Bharti extended its network to Andaman and Nicobar.
In 2009, Airtel launched its first international mobile network in Sri Lanka. In 2010, Airtel
began operating in Bangladesh and 16 African countries.
1.4.
A network operations center (NOC) is a place from which administrators supervise, monitor
and maintain a telecommunications network. Large enterprises with large networks as well as
large network service providers typically have a network operations center, a room containing
visualizations of the network or networks that are being monitored, workstations at which the
detailed status of the network can be seen, and the necessary software to manage the
networks. The network operations center is the focal point for network troubleshooting,
software distribution and updating, router and domain name management, performance
monitoring, and coordination with affiliated networks.
NOC are frequently laid out with several rows of desks, all facing a video wall, which
typically shows details of highly significant alarms, ongoing incidents and general network
performance; a corner of the wall is sometimes used for showing a news or weather TV
channel, as this can keep the NOC technicians aware of current events which may have an
impact on the network or systems they are responsible for. The back wall of a NOC is
sometimes glazed; there may be a room attached to this wall which is used by members of the
team responsible for dealing with serious incidents to meet while still able to watch events
unfolding within the NOC. Individual desks are generally assigned to a specific network,
technology or area. A technician may have several computer monitors on their desk, with the
9
extra monitors used for monitoring the systems or networks covered from that desk. The
location housing a NOC may also contain many or all of the primary servers and other
equipment essential to running the network, although it is not uncommon for a single NOC to
monitor and control a number of geographically dispersed sites.
Various departments which come under DATA NOC in Airtel office manesar where I am
going to be present during my training session are:
Network Surveillance,
Change Management,
Traffic engineer.
NOC Engineers
A NOC engineer has several duties in order to ensure the smooth running of the network.
They deal with things such as network failures. There are of course the basic roles, such as
remote hands, support, and configuration of hardware (such as firewalls and routers,
purchased by a client). NOC engineers, also have to ensure the core network is stable. This
can be done by configuring hardware in a way that makes the network more secure, but still
have optimal performance. NOC Engineers are also responsible for monitoring activity, such
as network usage, temperatures etc. The majority of NOC engineers are also on call and have
a 7 day rota, working both day and night, on and off respectively.
Functions-NOCs analyze problems, perform troubleshooting, communicate with site
technicians and other NOCs, and track problems through resolution. When necessary, NOCs
escalate problems to the appropriate stakeholders. For severe conditions that are impossible
to anticipate, such as a power failure or a cut optical fiber cable, NOCs have procedures in
place to immediately contact technicians to remedy the problem.
Primary responsibilities of NOC personnel may include: Network monitoring, Incident
response, Communications management, reporting. NOCs often escalate issues in a
hierarchic manner, so if an issue is not resolved in a specific time frame, the next level is
informed to speed up problem remediation. NOCs sometimes have multiple tiers of
personnel, which define how experienced and/or skilled a NOC technician is. A newly-hired
NOC technician might be considered a "tier 1", whereas a technician that has several years of
experience may be considered "tier 3" or "tier 4". As such, some problems are escalated
within a NOC before a site technician or other network engineer is contacted.
NOC personnel may perform extra duties; a network with equipment in public areas (such as
a mobile network Base Transceiver Station) may be required to have a telephone number
10
attached to the equipment for emergencies; as the NOC may be the only continuously staffed
part of the business, these calls will often be answered there.
1.5.
1.5.1.
DATA NOC-NS
There are various alarms which are being monitored by NS-DATA related to router and switches.
These alarms are used to monitor the link/backbone while it goes down. They are:
a
b
c
d
e
f
g
h
Trunk Alarm
Memory Alarm
Hardware Alarm
MPLS, ISP, DCN, MEN Device Availability
BGP Peering Status
Label Distribution Protocol Alarm
ISIS Alarm
Temperature, CPU Process Alarm
1.5.2.
This department helps to solve any customer related issues. These issues are raised at the customer
end point. So, fault helps in resolving all that issues. There is various kinds of fault issues. On these
issues are resolved on the bases of severities. There are many functions performed by Fault
department to maintain the network in proper order.
1.5.3.
1.5.4.
TAC3 is another team present in data NOC which performs various important role in managing the
connection in between the router and switch.
11
TAC3 manages the limit of traffic on a particular router. If in case the limit of traffic increases they
are used to increase the capacity of that interfaces so that traffic can smoothly flow without any
interruption.TAC3 useful in Bandwidth upgradationTAC3 also controls all the international peering
data that is present in Info Vista. International peering here means is that connection in between the
India and foreign country to set a communication in between them in proper way without any damage.
1.5.5.
The performance done by provisioning tem is it approves the customer to share the network. If any
new customer wants to join the network this team is responsible to allow them to use it by providing
suitable interfaces to the customer. This team adds a new customer to the network, the network in
which adding is already in working process. So, it is required to work in proper way otherwise there
will be a drawback.
12
CHAPTER-2
THEORTICAL PORTION
2.1.
IP Addressing
Class A
The designers of the IP address scheme said that the first bit of the first byte in a Class
A network address must always be off, or 0. This means a Class A address must be between 0
and 127. Here is how those numbers are defined: 0xxxxxxx: If we turn the other 7 bits all off
and then turn them all on, we will find your Class A range of network addresses.
00000000=0
01111111=127
So, a Class A network is defined in the first octet between 0 and 127. It cant be less or more.
Class B
In a Class B network, the RFCs state that the first bit of the first byte must always be
turned on, but the second bit must always be turned off. If you turn the other six bits all off
and then all on, you will find the range for a Class B network:
13
10000000=128
10111111=191
As you can see, this means that a Class B network can be defined when the first byte is
configured from 128 to 191.
Class C
For Class C networks, the RFCs define the first two bits of the first octet always
turned on, but the third bit can never be on. Following the same process as the previous
classes, convert from binary to decimal to find the range. Here is the range for a Class C
network:
11000000=192
11011111=223
So, if you see an IP address that starts at 192 and goes to 223, youll know it is a Class C IP
address.
Classes D and E
The addresses between 224 and 255 are reserved for Class D and E networks. Class D
is used for multicast addresses and Class E for scientific purposes. We will not discuss Class
D and E addresses in this book.
2.2.
NETWORKING DEVICES
Networking devices do various kinds of jobs like transferring the data to signals, providing
connectivity to different network devices, transferring the data in form of packets or frames
form one device to other. These are the central connections for all the network equipments
and handle a data type known as frame or packet. Actually frames/ packet contain data and
the destination address of where it is going. When a frame is received, it is amplified and then
transmitted on to port of destination PC. But different networking components do this job in
diff form at diff layers.
2.2.1. Network Interface Card
A Network Interface Card (NIC) is a circuit board that plugs into both clients and servers and
controls the exchange of data between them (A specific softwaredriver must be installed
depending on the make of the NIC. A physical transmission medium, such as twisted pair or
14
coaxial cable interconnects all network interface cards to network hubs or switches. Ethernet
and Token Ring are common network interface cards. Todays cards supports 10baseT and
100baseT with automatic recognition.
2.2.2. HUB
When the need for interconnecting more than two devices together then a device known as
hub comes to picture. Basically hub is a layer one device. i.e. it operates on the physical layer
of the OSI model. It is designed to do broadcasting i.e when it gets any frame it broadcasts it
to every port irrespective that whether it is destined for that port or not. Hub has no way of
distinguishing which port a frame should be sent. Broadcasting results in lot of traffic on the
network which lead to poor network response. If two PC simultaneously transmit there data
packets and both are connected to a HUB, then collision will occur, so we can say, it creates a
single collision domain. On the other hand all PCs connected to a hub will get a same
message so a single broadcast domain will be created.
A 100/1000 Mbps hub must share its bandwidth with each and every one of its ports. So
when only one PC is broadcasting, it will have access to the max available bandwidth. If,
however, multiple PCs are broadcasting, then that bandwidth will need to be divided
between all of these systems, which will degrade the performance. They are usually HalfDuplex in nature.
2.2.3. SWITCH
Hubs are capable of joining more than two PC but having some demerits like if two PC
would want to communicate at a time then there would be a collision and the both PC would
have to send the data once again. This shortcoming of Hub is overcame by Switches.
Switches are intelligent devices which work on the Layer2 of the OSI model. Basically a
switch keeps a record of MAC addresses of all the devices connected to it. Using this
information, it builds a MAC address table.
So when a frame is received, it knows exactly which port to send it to, which increases the
network response time.
Basic Working Principle of Switch:
15
1. At the time of initializing the switch the MAC address table is yet to be built
up. When a frame is send by some of the PC, it recognizes the source MAC
address and update the MAC address table.
2. If the destination is available in the MAC table then forward to the
corresponding PC.
3. If the destination MAC address is not present in the table then forwards in all
the port available expect the incoming one. The designated PC will respond
for the data and it will send the acknowledgement for the data received. This
acknowledged data will be examined by the switch and the MAC address table
would be up dated accordingly.
If two PC simultaneously transmit there data packets and both are connected to a SWITCH,
then collision will not occur, so we can say, it creates a multiple collision domain.
The switch supports broadcast. Hence we can call switches create single broadcast domain
and multiple collision domains.
A 100/1000Mbps switch will allocate a full 100/1000 Mbps to each of its ports. So regardless
of the no of PCs transmitting user will always have access to max amt of bandwidth. They
are usually Full-Duplex in nature.
Switches are of two types:
Managed
Unmanaged
2.2.4. ROUTER
Switch and the Hub can only interconnect devices in a single LAN. For interconnecting two
LAN or two or more different networks anther device known as router is used. Its main job is
to route (sends) packets to other networks and to do the routing (establishing paths between
networks) it uses the IP address.
A router is typically connected to at least two networks, commonly two LANs or WANs or a
LAN and its ISPs network. Routers are located at gateways, the places where two or more
16
networks connect. Routers to determine the best path for forwarding the packet are using
forwarding tables.
2.3.
It is a layer 3 device i.e it operates at network layer of OSI model. The working
principle of the router is totally different from a switch. Router makes a table known
as routing table, which contains all the IP address in the network, the information for
IP address router obtains directly ( all configured IP address on it ) or indirectly ( from
neighbor routers ). When a packet is received it compares the destination IP address of
the packet with the available IP addresses in its Routing table. If the IP address is not
available in the routing table then it simply discard the packet instead of flooding in
all the ports like a switch pilfered management.
Facilitated spanning of large geographical distances
Subnetting
Sub netting is a process of dividing large network into the smaller networks based on layer 3 IP
address. Every computer on network has an IP address that represents its location on network.
The half-and-double size concept is the very basic of sub netting
1 x2=2
2 x2=4
4 x2=8
8 x 2 = 16
16 x 2 = 32
32 x 2 = 64
64 x 2 = 128
128 x 2 = 256
V
double the size
|
|
17
1 = /32 = 255.255.255.255
2 = /31 = 255.255.255.254
4 = /30 = 255.255.255.252
8 = /29 = 255.255.255.248
16 = /28 = 255.255.255.240
32 = /27 = 255.255.255.224
64 = /26 = 255.255.255.192
128 = /25 = 255.255.255.128
256 = /24 = 255.255.255.0
/32: 2^0 = 1
2.3.1.
Subnet mask
Subnet mask is a 32 bits long address used to distinguish between network address and host address in
IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to
identify which part of an IP address is network address and which part is host address.
18
In decimal notation subnet mask value 1 to 255 represent network address and value 0 [Zero]
represent host address.
In binary notation subnet mask on bit [1] represent network address while off bit[0] represent host
address.
In decimal notation
IP address
192.168.1.10
Subnet mask
255.255.255.0
Network address is 192.168.1 and host address is 10.
In binary notation
IP address 11000000.10101000.00000001.00001010
Subnet mask 11111111.11111111.11111111.00000000
P Class
Default Subnet
Network bits
Host bits
Total hosts
Valid hosts
255.0.0.0
First 8 bits
Last 24 bits
255.255.0.0
First 16 bits
Last 16 bits
65,536
65,534
255.255.255.0
First 24 bits
Last 8 bits
256
254
1 = /32 = 255.255.255.255
2 = /31 = 255.255.255.254
4 = /30 = 255.255.255.252
8 = /29 = 255.255.255.248
16 = /28 = 255.255.255.240
32 = /27 = 255.255.255.224
64 = /26 = 255.255.255.192
128 = /25 = 255.255.255.128
256 = /24 = 255.255.255.0
Another format of displaying subnet mask is by using CIDR (Classless Inter-Domain Routing) format. Where the 4-tup
above table rightmost column, the CIDR format is shown on the above table leftmost column. To clarify, check out foll
IP Address Quantity
Within Subnet
1
2
4
8
16
32
64
128
256
2.4.
/30
/29
/28
/27
/26
/25
/24
255.255.255.252
255.255.255.248
255.255.255.240
255.255.255.224
255.255.255.192
255.255.255.128
255.255.255.0
2.4.1. IS-IS
Intermediate System To Intermediate System (IS-IS), sometimes called is-is, is a routing
protocol designed to move information efficiently within a computer network, a group of
physically connected computers or similar devices. It accomplishes this by determining the
best route for datagrams through a packet-switched network. The protocol was defined in
ISO/IEC 10589:2002 as an international standard within the Open Systems Interconnection
(OSI) reference design. Though originally an ISO standard, the IETF republished the protocol
as an Internet Standard in RFC 1142. IS-IS has been called "the de facto standard for large
service provider network backbones.
IS-IS (pronounced "i-s i-s") is an interior gateway protocol, designed for use within an
administrative domain or network. This is in contrast to Exterior Gateway Protocols,
primarily Border Gateway Protocol (BGP), which is used for routing between autonomous
systems (RFC 1930).
IS-IS is a link-state routing protocol, operating by reliably flooding link state information
throughout a network of routers. Each IS-IS router independently builds a database of the
network's topology, aggregating the flooded network information. Like the OSPF protocol,
IS-IS uses Dijkstra's algorithm for computing the best path through the network. Packets
(datagrams) are then forwarded, based on the computed ideal path, through the network to the
destination.
2.4.2. MPLS
20
Multiprotocol
Label
Switching
(MPLS)
is
mechanism
in
high-performance
telecommunications networks that directs data from one network node to the next based on
short path labels rather than long network addresses, avoiding complex lookups in a routing
table. The labels identify virtual links (paths) between distant nodes rather than endpoints.
MPLS can encapsulate packets of various network protocols. MPLS supports a range of
access technologies, including T1/E1, ATM, Frame Relay, and DSL.
MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS
network, data packets are assigned labels. Packet-forwarding decisions are made solely on the
contents of this label, without the need to examine the packet itself. This allows one to create
end-to-end circuits across any type of transport medium, using any protocol. The primary
benefit is to eliminate dependence on a particular OSI model data link layer technology, such
as Asynchronous Transfer Mode (ATM), Frame Relay, Synchronous Optical Networking
(SONET) or Ethernet, and eliminate the need for multiple layer-2 networks to satisfy
different types of traffic. MPLS belongs to the family of packet-switched networks.
MPLS operates at a layer that is generally considered to lie between traditional definitions of
layer 2 (data link layer) and layer 3 (network layer), and thus is often referred to as a "layer
2.5" protocol. It was designed to provide a unified data-carrying service for both circuit-based
clients and packet-switching clients which provide a datagram service model. It can be used
to carry many different kinds of traffic, including IP packets, as well as native ATM, SONET,
and Ethernet frames.
2.4.3. ISP
An Internet service provider (ISP) is an organization that provides access to the Internet.
Internet service providers can be either community-owned and non-profit, or privately owned
and for-profit.
Access ISPs directly connect clients to the Internet using copper wires, wireless or fiber-optic
connections.[1] Hosting ISPs lease server space for smaller businesses and other people
(colocation). Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs to
access ISPs.
21
The Internet started off as a closed network between government research laboratories and
relevant parts of universities. As it became more popular, universities and colleges started
giving more of their members access to it. As a result of its popularity, commercial Internet
service providers sprang up to offer access to the Internet to anyone willing to pay for the
service, mainly to those who missed their university accounts. In 1990, Brookline,
Massachusetts-based The World became the first commercial ISP.
2.4.4. DCN
A dynamic circuit network (DCN) is an advanced computer networking technology that
combines traditional packet-switched communication based on the Internet Protocol, as used
in the Internet, with circuit-switched technologies that are characteristic of traditional
telephone network systems. This combination allows user-initiated ad-hoc dedicated
allocation of network bandwidth for high-demand, real-time applications and network
services, delivered over an optical fibre infrastructure. Dynamic circuit networks were
pioneered by the Internet2 advanced networking consortium. The experimental Internet2
HOPI infrastructure, decommissioned in 2007, was a forerunner to the current SONET-based
Ciena Network underlying the Internet2 DCN. The Internet2 DCN began operation in late
2007 as part of the larger Internet2 network. It provides advanced networking capabilities and
resources to the scientific and research communities, such as the Large Hadron Collider
(LHC) project.
The Internet2 DCN is based on open-source, standards-based software, the Inter-domain
Controller (IDC) protocol, developed in cooperation with ESnet and GANT2. The entire
software set is known as the Dynamic Circuit Network Software Suite (DCN SS).
22
CHAPTER-3
PROCESS OF GETTING LINKS
3.1.
How the customer takes the network connection from the Airtel?
Your request goes through many internal processes like planning, implementation,
configuration etc. First customer demands for the network connection to the AES (Airtel
Enterprise Service) according to their requirements like type of connection or speed. After
taking orders from the customers AES forward those details to the TNG (Transport Network
Group) and TNG forwards the details of connection or the capacity of links to
ANG(Administrative network group). Then ANG gives the detail of free E1 links back to the
TNG and then TNG configure those links and then connection will establish from company
to customer end.
3.2.
History of ISP
The internet started off as a closed network between government research laboratories
and relevant parts of universities. It became popular and then universities and colleges started
giving more of their members access to it. As a result, commercial Internet Service Providers
occurred to provide access for mainly those who missed their university accounts. In 1990,
Brookline, Massachusetts-based The World became the 1st commercial ISP.
23
O Access ISP
ISPs employ a range of technologies to enable consumers to connect to their
network.For users and small businesses, the most popular options include dial-up, DSL
(typically Asymmetric Digital Subscriber Line, ADSL), broadband wireless, cable modem,
fiber to the premises (FTTH), and Integrated Services Digital Network (ISDN) (typically
basic rate interface). For customers with more demanding requirements, such as medium-tolarge businesses, or other ISPs, DSL (often SHDSL or ADSL), Ethernet, Metro Ethernet,
Gigabit Ethernet, Frame Relay, ISDN (BRI or PRI), ATM, satellite Internet access and
synchronous optical networking (SONET) are more likely to be used.
Typical home user connection
Broadband wireless access
Cable Internet
Dial-up
ISDN
Modem
DSL
24
MPLS
Multiprotocol Label Switching (MPLS) is a mechanism in high-performance
telecommunications networks which directs and carries data from one network node to the
next with the help of labels. MPLS makes it easy to create "virtual links" between distant
nodes. It can encapsulate packets of various network protocols.
MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS
network, data packets are assigned labels. Packet-forwarding decisions are made solely on the
contents of this label, without the need to examine the packet itself. This allows one to create
end-to-end circuits across any type of transport medium, using any protocol. The primary
benefit is to eliminate dependence on a particular Data Link Layer technology, such as ATM,
frame relay, SONET or Ethernet, and eliminate the need for multiple Layer 2 networks to
satisfy different types of traffic. MPLS belongs to the family of packet-switched networks.
MPLS operates at an OSI Model layer that is generally considered to lie between traditional
definitions of Layer 2 (Data Link Layer) and Layer 3 (Network Layer), and thus is often
referred to as a "Layer 2.5" protocol. It was designed to provide a unified data-carrying
service for both circuit-based clients and packet-switching clients which provide a datagram
service model. It can be used to carry many different kinds of traffic, including IP packets, as
well as native ATM, SONET, and Ethernet frames.
A number of different technologies were previously deployed with essentially identical goals,
such as frame relay and ATM. MPLS technologies have evolved with the strengths and
weaknesses of ATM in mind. Many network engineers agree that ATM should be replaced
with a protocol that requires less overhead, while providing connection-oriented services for
variable-length frames. MPLS is currently replacing some of these technologies in the
marketplace. It is highly possible that MPLS will completely replace these technologies in the
future, thus aligning these technologies with current and future technology needs.
o History of MPLS
25
MPLS was originally proposed by a group of engineers from Ipsilon Networks, but their "IP
Switching" technology, which was defined only to work over ATM, did not achieve market
dominance. Cisco Systems, Inc., introduced a related proposal, not restricted to ATM
transmission, called "Tag Switching". It was a Cisco proprietary proposal, and was renamed
"Label Switching". It was handed over to the IETF for open standardization. The IETF work
involved proposals from other vendors, and development of a consensus protocol that
combined features from several vendors' work.
One original motivation was to allow the creation of simple high-speed switches, since for a
significant length of time it was impossible to forward IP packets entirely in hardware.
However, advances in VLSI have made such devices possible. Therefore the advantages of
MPLS primarily revolve around the ability to support multiple service models and perform
traffic management. MPLS also offers a robust recovery framework that goes beyond the
simple protection rings of synchronous optical networking.
26
3.3.
Software requirement
(a) PuTTY V-0.60
(B) METASOLV SOLUTIONS
(C) IBM TIVOLI NETCOOL
27
3.3.1. PuTTY
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols: logging in to a
multiuser computer from another, over a network. These protocols are all used to run a
remote session on a computer, over a network. PuTTY implements the client end of that
session: the end at which the session is displayed, rather than the end at which it runs. In
really simple terms: you run PuTTY on a Windows machine, and tell it to connect to (for
example) a Unix machine. PuTTY opens a window. Then, anything you type into that
window is sent straight to the Unix machine, and everything the Unix machine sends back is
displayed in the window. So you can work on the Unix machine as if you were sitting at its
console, while actually sitting somewhere else.
3.3.2.
ROUTER LOGGING
After double click on PuTTY software you will get this window named PuTTY
Configuration. In this window the two things are main one is Host Name (or IP address) and
second is Connection type, it may be Raw, Telnet, Rlogin, SSH and Serial. When we will
select the connection type it automatically select the Port number. After clicking on open
28
button we will get the Command Line Interface window. After that it will ask for the
Username and Password for the user access verification. If entered username or password
goes wrong, it will again ask for right username and password. If access verification goes
right then you are able to apply the commands for configure/handle the Router/Switch.
29
3.3.3. FEATURES
3.3.4. APPLICATIONS
Main functions are realized by PuTTY files themselves:
(a) PuTTY - the Telnet and SSH client itself,
(b) PSCP - an SCP client, i.e. command-line secure file copy,
(c) PSFTP - an SFTP client, i.e. general file transfer sessions much like FTP,
(d) PuTTYtel - a Telnet-only client,
(e) Plink - a command-line interface to the PuTTY back ends,
(f) Pageant - an SSH authentication agent for PuTTY, PSCP and Plink,
(g) PuTTY gen - an RSA and DSA key generation utility
30
CHAPTER-4
VARIOUS COMMANDS REQUIRED
When we get any link down alarm then we have to login that router/switch for seeing that
link became down or it was a flapping. For this we used many commands. There are different
commands used for Juniper and Cisco devices. The description of different commands is
given below.
4.1.
Cisco/Juniper Command
Cisco Command
show run
Juniper Command
sh configuration
Co-Ordinating Definition
Show running configuration
Sh ver
Sh ver
Show version
show interfaces
detail
show interfaces
extensive
about
show ip route
show route
show route protocol bgp will show you how that route is
prefix
being advertised, look for the first
line
show ip bgp regexp AS-regexp show route aspath-regexp displays routes matching the
"AS-regexp"
autonomous system (AS) path
31
regular expression
show ipbgp neighbors neigh show
route
receive- Shows whether a neighbor supports
received-routes
protocol
bgp
neigh the route refresh capability
show
route
sourcegateway neigh protocol
bgp
show ip bgp neighbor neigh show route advertising- Shows whether a neighbor supports
advertised-routes
protocol bgp neigh
the route refresh capabilty
show clns neighbors
show isisspf
show version
show
version,
system uptime
show diags
show tech-support
show logging
32
configure,
display routes that are permitted by
show
policy-options BGP community list
community name
Show
intrfc
Sh run vrf
show
environment
ping dest
33
34
35
36
37
38
39
40
41
42
4.3.
Ping
4.3.1.
Ping command
The ping command is a Command Prompt command used to test the ability of the source computer to
reach a specified destination computer. The ping command is usually used as a simple way verify that
a computer can communicate over the network with another computer or network device. The ping
command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to
the destination computer and waiting for a response. How many of those responses are returned, and
how long it takes for them to return, are the two major pieces of information that the ping command
provides.Ping can also be defines as the tools which is used to check the communication of between
43
the systems, routers switches and also the Internet". The abbreviation of PING is: "Packet Internet
Gopher". Depending on the implementation, the ping command can be run with various command
line switches to enable special operational modes. Example options include: specifying the packet size
used as the probe, automatic repeated operation for sending a specified count of probes, and time
stamping
44
CHAPTER 6
6.1.
During my training session in AIRTEL under DATA-NOC, There are various live tasks on
which I have worked in this training session. Some of them are listed below.
6.1.1.
Under this task I was given a device list. This device list as shown below lists routers of
different locations. I was supposed to make detailed topology for the same showing
connection of router with other routers and switches enlisting the interfaces involved too.
45
46
This is beneficial graphical record for the company to know how their network is connected and is
beneficial for tracking source of problem.
6.1.2.
In this task I was assigned two destination routers and I had to track down the connection from given
source routers to the destination.
The same is performed as follows1. Open the given router.
2. In the same type command ship route destination ip
3. Telnet to the address obtained above.
4, Now repeat the same till destination is reached.
The series of router encountered from source to destination form the path between the same.
I was given a list of devices and I had to determine the maximum amount of data that can be
transmitted without fragmentation. The same was compared with the mtu specified in the description.
48
One more project which I completed during my training session is that I collected all the
circuit id database of all the routers of ISP, MPLS and DCN. Circuit id is used to mark the
path between the two connectivitys. Suppose, one interface is provided from Mumbai side to
communicate at Kolkata side with one interface present over that side, thus Circuit id is used
so that we can mark the route number to that connection.
1. Using command shisis neigh (adj in juniper) find the interfaces.
2. Using shintint name determine the circuit-id
49
6.1.7.
I was given a list of juniper routers of which I had to store hardware details like card, slot no
etc.as text files.
1. Login to the desired device.
2. Right click on the top edge of putty screen and go to change settings.
3. Select the option capture all and browse the location where the file is supposed to be
stored.
4. Save the file with .txt extension,
5. Run the command sh chassis hardware |display xml
50
51
I was given a list of cases for which I had to study the notes and attachment to list the
problem and take the captures for further reference.
52
1.
2.
3.
4.
5.
53
54
This database is to ease the problem solving mechanism for future needs.
6.1.9.
I was given a list of routers for which I had to obtain FCP,PIC values and links associated for
specified type of card specified.
1.
2.
3.
4.
56
CONCLUSION
My experience of training in Bharti Airtel has indeed been a fruitful one. It has not only enhanced my
technical knowhow but has also led to development on social front.
My short term at Airtel gave me a taste of office environment. It gave me a look how on how these
big organizations maintain the decorum and upholds their rules and regulations which is the key to
their smooth running.
During my term I got an opportunity to learn and use different software's and utilities which are used
by the organization. It helped me boost my practical skills, Plus it gave me a insight into company's
network.
I discovered how the links are made and maintained. More than anything it was an eye opener as to
how much the technology has developed and eased otherwise tedious tasks.
It also gave me an opportunity to study how well structured hierarchy in workplace , healthy
interactions between employees, regular discussions and meetings, and the team spirit is necessary to
resolve all problems with ease.
Like mentioned above the experience was equally fulfilling on social font. I got to meet and interact
with some amazingly knowledgeable and experienced professionals during my term. It was wonderful
opportunity for me as a student interact and learn from them every day All of them were king enough
to help me out as and when they found time.
.
There were few downfalls to the otherwise wonderful experience. The interaction with the mentor was
very less. Due to heavy work load my mentor was unable to guide me in the way desired. The nature
of work was uncertain. Sometimes there was lot to do and sometimes there was nothing
to do for days. Most of the work revolved around database maintaining, which was
rather boring and not very informative. Plus Bharti Airtel is a Govt. Undertaking Company, so
interface with the equipments is not allowed to students.
But on the whole it was an honor to work for Airtel as an intern
BIBLIOGRAPHY
57
www.wikipedia.org
www.cisco.com
tcpipguide.com
computer.howstuffworks.com
www.techrepublic.com
www.Airtel.co.in
Cisco Study Guide by Todd Lammle
.............and many others
58