0% found this document useful (0 votes)
71 views35 pages

Ongc Report

computr networks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views35 pages

Ongc Report

computr networks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

An Internship Report On

COMPUTOR NETWORKS
An Internship report is submitted in partial fulfillment of the requirement for
the degree of
Bachelor of Technology
in

Electronics and Communication Engineering


Submitted By
Arnipalli Bhanu Prakash
Reg. No: 228867603002

Under the Esteemed Guidance of


A. Vijaya Durga

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


ADIKAVI NANNAYA UNIVERSITY COLLEGE OF ENGINEERING
ADIKAVI NANNAYA UNIVERSITY, RAJAMAHENDRAVARAM, A.P.
RAJAMAHENDRAVARAM – 533296
A.Y:2024-2025
ADIKAVI NANNAYA UNIVERSITY COLLEGE ENGINEERING
ADIKAVI NANNAYA UNIVERSITY :: RAJAMAHENDRAVARAM
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

CERTIFICATE
This is to certify that the Summer Internship work in the field of “Computer Networks”
is being submitted by Arnipalli Bhanu prakash Reg.no: 228867603002 in partial
fulfillment for the award of Degree of B.Tech in ECE. This work is carried out in < Oil
and Natural Gas Corporation during the period of 08/05/2024 to 24/06/2024 to the
Adikavi Nannaya University, Rajamahendravaram during the period 2024-2025 is a record
of bonafide work carried out by under the guidance and supervision.

Internship Guide Internship Coordinator

A. Vijaya Durga Mr. B. Krishna


Assistant Professor, Assistant Professor,
Dept. of ECE, AKNUCE, RJY Dept. of ECE, AKNUCE, RJY

Course coordinator

Mr. B. SudhaKiran,
Assistant Professor,
Dept. of ECE, AKNUCE, RJY.
DECLARATION

I A. Bhanu Prakash (228867603002) hereby declare that the summer internship work
report in the field of Computer Networks done by me under the guidance of A. Vijaya
Durga Assistant. Prof., Department of Electronics and Communication Engineering,
Adikavi Nannaya University College of Engineering, Adikavi Nannaya University, is
submitted for the partial fulfillment of requirement for the award of the degree Bachelor of
Technology in Electronics and Communication Engineering in the academic year 2024-
2025.

A. Bhanu Prakash
228867603002
ACKNOWLEDGEMENT
I take immense pleasure to express my deep sense of gratitude to our beloved
Internship Guide A. Vijaya Durga, Assistant Professor in Electronics and
Communication Engineering, Adikavi Nannaya University College of Engineering,
Adikavi Nannaya University, Rajamahendravaram for his valuable suggestions and
rare insights, for constant source of encouragement and inspiration throughout my
internship work. This internship period was a great chance of learning and professional
development.
I express my deep sense of gratitude to my beloved Course Coordinator Mr. B
Sudha Kiran, Assistant Professor in Electronics and Communication Engineering,
Adikavi Nannaya University College of Engineering, Adikavi Nannaya University,
Rajamahendravaram for the valuable guidance and suggestions, keen interest and
through encouragement extended throughout period of Summer Internship work.

I express my deep sense of gratitude to my beloved Principal Dr. P Venkateswara


Rao, Adikavi Nannaya University College of Engineering, Adikavi Nannaya
University, Rajamahendravaram for the valuable guidance and for permitting me to
carry out this Summer Internship work at National Institute of Technology Warangal.

I grateful to my Internship coordinator Mr. B Krishna, Assistant Professor in


Electronics and Communication Engineering, Adikavi Nannaya University College of
Engineering for providing organizational support in enthusiastic discussion, in-depth
review, and providing valuable references.

I express my thanks to all the Teaching and Non-Teaching those who contributed
for their generous support and help in various ways for the successful completion of my
internship work.
Finally, I also extend thanks to my friends for their support in carrying out this work
successfully.

With gratitude,
A. Bhanu Prakash
228867603002
ABSTRACT
INDEX

CHAPTER 1: INTRODUCTION

CHAPTER 2: NETWORKING
.
.
.
.
.
CHAPTER: 3
.
.
.
.
RESULT
CONCLUSION
REFERENCES
CHAPTER 1
Introduction
CHAPTER 2

NETWORKING

Networking definition: Networking refers to the process of connecting computers or other

electronic devices together so they can share resources like files or printers, or communicate

with each other, often using cables or wireless signals. It's like creating a digital highway that

allows devices to interact and exchange information.

Computer networking: A computer networking is a set of computers sharing resources

located on or provide by network nodes. Computer use common communication protocols

over digital Interconnections to communicate each other.

2.1 TYPES OF NETWORKS

1.Local Area Network (LAN): As its name implies, A LAN is a network which is limited to

local area only for example home, office building, school, or campus. Hence, any network

that exists within a single building, or even a group of adjacent buildings, is considered as

LAN. It is often used to connect separate LANs together so they can communicate and

exchange data. In a LAN, limited computer and networking devices are connected because its

geographical area is small; it is specifically design for shorter distance and used for sharing

resources like files, printers, and internet connections among connected devices; the devices

are physically connected with cables in wired LAN while in wireless LAN; devices are

connected using wireless media.


Overall, LANs are essential for communication, sharing of resources and communication
between devices within a given area and facilitate its users for file sharing, printing,
multimedia and streaming, which are common tasks for commercial and home networks.

Characteristics of LANs
 Limited Geographic Area − A LAN network is dedicated for small area like a single
building, campus, school, hospital.
 High Data Transfer Rates − A LAN network covers a short distance so the data
transmits with high speed as compare to MANs and WANs.
 Ownership and Control − Because of its local network and small size; they are
owned, controlled, and managed by individuals or organizations with full control over
the network, access and security policies.
 Connectivity − Generally, A LAN connects using Ethernet cables, Wi-Fi, or both.
 Topology − It’s a method to making a LAN; some common topologies are bus, star,
ring, or mesh.

2. Wide Area Network (WAN)

A network which combines multiple MANs and LANs is known as Wide Area Network; a
WAN network covers wide geographical area typically covering multiple cities, regions,
countries, or even continents.

Example

A company may have its corporate headquarters and manufacturing plant located in one city
and marketing office in another city. Each site needs resources, data and programs locally, but
it also needs to share data with other sites. To accomplish this, the company can attach
devices that connect over public utilities to create a WAN.
Characteristics of WANs
Large Geographical Coverage − WANs includes cities, regions, and countries network and
span it over the time as per the requirements increases. This covers worldwide geographical
coverage.
Interconnection of LANs − WANs interconnect geographically dispersed LANs. Users in
one area can communicate with another whose location is different as well as access
resources located in other locations.
Use of Public and Private Telecommunication Infrastructure − WANs use leased lines,
fibre optic cables, satellite links, and microwave links. The WAN's infrastructure allows long-
distance data transfer.
High Bandwidth and Long-Distance Communication − WANs provide quick data transfer
and communication across vast distances with high-bandwidth connectivity. WAN bandwidth
and speed depend on transmission medium and network technology.
Multiprotocol Support − To fulfil communication needs, WANs enable multiple networking
protocols and technologies. It includes TCP/IP, MPLS, Frame Relay, ATM etc.
Centralized Management and Control − WANs use centralised administration and control
to optimise performance, manage network resources, and enforce security regulations across
different locations. Centralised management ensures network efficiency and consistency.
Security Considerations − Encryption, virtual private networks (VPNs), firewalls, intrusion
detection/prevention systems (IDS/IPS), and access control mechanisms are the security
measures used by WANs to protect data and network resources against cyber threats and
unauthorised access.
Scalability and Flexibility − WANs are flexible and scalable, allows network growth, traffic
volume, and new locations or users. WAN technologies can meet changing business needs
and technology development.

3. Metropolitan Area Network (MAN):


Metropolitan Area Network (MAN) is an extensive network that connects two or more LANs
together within a specific geographical area, such as a city or a town. Usually MANs are not
owned by sole organization. Their communication devices and equipment are maintained by a
group or single network provider that sells its networking services to corporate customers.
MANs often take the role of high-speed network that allows sharing of regional resources.
MANs also can provide a mutual connection between two or more local networks.

Characteristics of MANs
Geographical Coverage − MANs cover a larger geographical as it combines multiple LANs
across different locations; for example - a network of a city.
High-Speed Connectivity − MANs provide high-speed data transmission between
multiple LANs within interconnected devices in the metropolitan area.
Public or Private Ownership − Municipal governments and telecommunications firms
can own and operate MANs.
Scalability − MANs are scalable networks, whenever network needs to span, MANs can
be expanded or upgraded.
Reliability and Redundancy − MANs use redundant network components and backup
solutions to reduce network failure and down network. In case of equipment failure or
network disturbances, alternate network paths, backup power sources, and failover
processes preserve network availability.
Support for Various Technologies − MANs support network technologies like Ethernet,
fiber optics, wireless communication, and microwave links.
Service Provisioning − A MAN provides services to its users like network access, data
transfer, voice communication, video conferencing, and cloud services.
Security Measures − MANs implement security measures to protect network resources,
data, and communications from unauthorized access, cyber threats, and other security
risks.

Overall, MANs are well-suited to providing fast, reliable, and scalable connectivity to users
and organisations in metropolitan regions, allowing for efficient communication,
collaboration, and access to network resources.
3. Personal Area Network (PAN)

A Personal Area Network (PAN) is a network for individual use, usually covering a small
area, typically within the reach of an individual (like a few meters). It connects personal
devices such as smartphones, laptops, tablets, and Bluetooth-enabled devices like wireless
headphones or smartwatches. PANs often use Bluetooth or Wi-Fi for connectivity.

Characteristics of PANs:

Limited Range: Typically, PANs cover a range of about 10 meters, allowing connectivity
within a room or immediate personal space.

Device Connection: PANs support Bluetooth, infrared, or Wi-Fi to connect personal devices.

Low Power Consumption: PAN devices often have limited battery capacity, so PAN
technologies prioritize low power usage.

Simple Setup: PANs are easy to set up, often automatically connecting compatible devices.

4. Campus Area Network (CAN)

A Campus Area Network (CAN) is larger than a LAN but smaller than a MAN, typically
spanning multiple buildings within a campus, like a university, business park, or hospital.
CANs connect various LANs across a campus to facilitate communication and resource
sharing among users within the area.

Characteristics of CANs:

Moderate Geographic Area: CANs cover a large site, often with several buildings within a
limited geographic range.

High-Speed Connectivity: Because of the limited area, CANs usually provide high-speed
connectivity to support data-intensive applications.

Centralized Management: CANs are often centrally managed by the organization, ensuring
consistent security and access policies.

Interconnection of Multiple LANs: CANs interconnect various LANs within the campus,
providing shared access to resources like databases, servers, and printers.

6. Virtual Private Network (VPN)


A Virtual Private Network (VPN) is a secure network connection that enables users to send
and receive data across public or shared networks as if their devices were directly connected
to a private network. VPNs are widely used for securing communications over the internet,
especially for remote workers accessing company resources.

Characteristics of VPNs:

Security and Privacy: VPNs use encryption protocols to secure data and ensure privacy,
protecting data from unauthorized access and interception.

Remote Access: VPNs enable remote users to connect to a central network securely, ideal for
employees accessing corporate resources remotely.

Tunneling Protocols: VPNs use tunneling protocols like IPsec, L2TP, and OpenVPN to
create a secure connection over the internet.

Access to Restricted Resources: VPNs allow users to access resources that are
geographically restricted or limited to specific IP addresses.

Public and Private Network Integration: VPNs enable secure communication between public
and private networks, leveraging public infrastructure while maintaining private
communication.

These types of networks each serve specific needs and have unique characteristics that make
them suitable for different applications, from personal use to large-scale corporate and
international communication.

2.2 NETWORKING DEVICES

1.HUB: A hub is a basic networking device that allows multiple devices to connect to each
other within a network. It works by broadcasting data it receives from one device to all other
devices connected to it, making it a simple and straightforward way to link devices together.
• It is connected in star topology.
• It is half duplex.
• It is send to information all devices.

2.SWITCH: A switch is a device that connects multiple devices in a network, like computers
and printers, and intelligently directs data between them. Unlike a hub, which broadcasts data
to all connected devices, a switch sends data only to the intended recipient, optimizing
network performance and security.

• It is a hard ware device, that connect multiple devices.


• It directly pass to the message to correct destination.

TYPES:

L2 (Layer 2) Switches: Operate at the Data Link layer of the OSI model, handling data
frames based on MAC addresses.

L3 (Layer 3) Switches: Operate at the Network layer, capable of routing based on IP


addresses in addition to switching.
3.ROUTER: A router is a networking device that connects multiple networks together and
directs traffic between them. It operates at the network layer (Layer 3) of the OSI model and
uses routing tables to determine the best path for data packets to reach their destination.
Routers are commonly used in homes and businesses to connect to the internet and enable
communication between devices on different networks.

• It is connected to LAN.
• It is routeing the packets.

4.Fire wall: A "firewall" is a security system designed to monitor and control incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier between a
trusted internal network and untrusted external networks, like the internet, to prevent
unauthorized access while allowing legitimate communication.

5.Bridge: In networking, a "bridge" is a device that connects and passes data between two or
more network segments, effectively extending a local network. It operates at the data link
layer (Layer 2) of the OSI model and can filter and forward traffic based on MAC addresses.
Essentially, a bridge helps create larger networks by joining smaller ones together while
managing data flow efficiently.

6.Repeater: A "repeater" in networking is a device that amplifies or regenerates signals in a


network, allowing data to travel longer distances without losing strength or clarity. It operates
at the physical layer (Layer 1) of the OSI model and helps extend the reach of network
connections by boosting signals so that they can reach their intended destinations reliably.

2.3 Networking Topologies:


"Topologies" in networking refer to the physical or logical layout of how devices are
interconnected within a network. It describes how nodes (such as computers, printers,
or other devices) are arranged and how they communicate with each other.

Common network topologies include:

1.BUS Topology: Bus Topology is a type of network topology where all


devices (nodes) are connected to a single central cable (the bus), which acts
as the backbone to transmit data. In a bus topology, data is transmitted in
both directions to all devices on the bus.
2.RING Topology: Ring Topology is a type of network topology where
each device (node) is connected to exactly two other devices, forming a
circular pathway or ring. Data travels from one device to the next in a
unidirectional manner until it reaches its destination. In a ring topology, the
last device is typically connected back to the first device to complete the
loop.

3.STAR Topology: Star Topology is a type of network topology where


each device (node) is connected directly to a central hub or switch. In a star
topology, all data transmitted from one device to another must pass through
the central hub or switch. The central hub acts as a repeater for the data
flow.

4.MESH Topology: Mesh Topology is a type of network topology where


each device
(node) is interconnected with every other device in the network. In a mesh
topology, each node has a direct point-to-point connection to every other
node. This creates multiple paths for data to travel between devices.

5.HYBRID Topology: Hybrid Topology is a combination of two or more


different types of network topologies. In a hybrid topology, the network is
formed by combining characteristics of various basic topologies like star,
bus, ring, and mesh. This approach allows organizations to design a
network that meets specific needs, leveraging the advantages of different
topologies while minimizing their disadvantages.

2.2 Leased lines:


A leased line is a dedicated telecommunications connection between two points,
typically rented by a business or organization from a telecommunications
service provider. It provides exclusive, always-on connectivity with guaranteed
bandwidth and is used for reliable data transfer, voice communication, video
conferencing, and other critical applications requiring secure and consistent
performance. It is maintains the private organizations.

ONGC uses leased lines to establish secure and dedicated communication links
between its offices, data centers, and remote sites. These leased lines ensure
reliable transmission of critical data, support high-quality voice and video
communications, facilitate access to central resources such as applications and
databases, and provide robust connectivity for operations across different
geographical locations. This infrastructure helps ONGC maintain efficient and
seamless operations while ensuring data integrity and security throughout its network.
ONGC is used BSNL leased lies.

2.3 GSM (Global System for Mobile Communications):


GSM (Global System for Mobile Communications) is a standard for mobile
telecommunications that revolutionized global connectivity. It operates on radio
frequencies to enable wireless communication between mobile devices and
networks. The GSM network is structured into three main subsystems: the Base
Station Subsystem (BSS), which manages the radio interface between mobile
devices and the network; the Network Switching Subsystem (NSS), responsible
for call routing, switching, and mobility management; and the Operation and
Support Subsystem (OSS), which oversees network operation and maintenance.
GSM supports various services such as voice calls, SMS messaging, and basic
data services.

ONGC likely utilizes GSM technology primarily for communication needs in


remote and offshore operations. GSM enables reliable voice communication,
SMS messaging, and basic data services across its operational sites, ensuring
connectivity for personnel and operational efficiency. This technology supports
critical communications such as emergency alerts, logistics coordination, and
remote monitoring, crucial for maintaining safety and operational continuity in
challenging environments.

2.4 VSAT (Very Small Aperture Terminal)


VSAT (Very Small Aperture Terminal) is a satellite communication technology used to
provide reliable and high-speed internet connectivity in remote or isolated locations. It
consists of a small satellite dish antenna, modem, and transceiver that communicate with a
geostationary satellite. VSAT networks enable businesses and organizations to establish
connectivity for voice, data, and video communication, bridging the digital divide in
underserved areas worldwide.

2.5 HTS (High Throughput Satellite)


This refers to a type of satellite designed to provide significantly higher data
transmission speeds and capacity compared to traditional satellites. HTS
systems use multiple spot beams and frequency reuse to achieve higher
throughput.

Usage: Used for highspeed internet access and video streaming

Applications: Higher data rates, increased capacity, and cost-effective


connectivity solutions.

3. IP ADDRESS

An IP address, or Internet Protocol address, is a numerical label assigned to


each device connected to a computer network that uses the Internet Protocol for
communication. IP addresses serve two main purposes in network
communication: identifying the host or network interface and providing the
location of the device in the network topology. Here’s an overview of IP
addresses and their key aspects:

Types of IP Addresses:

1. IPv4 Address: o Format: Consists of four sets of numbers


separated by periods (dots). e.g. 192.168.1.1. o
Range: IPv4 addresses are 32-bit addresses, allowing for
approximately 4.3 billion unique addresses.
o Example: Used extensively worldwide, but due to address
exhaustion, new devices may receive IPv6 addresses.
2. IPv6 Address: o Format: Uses hexadecimal notation and colons
to separate groups.
e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
o Range: IPv6 addresses are 128-bit addresses, providing an
enormous number of possible unique addresses (about 340
undecillion).
o Purpose: Designed to replace IPv4 and accommodate the
growing number of devices connected to the internet.

Functionality of IP Addresses:

1. Identification: o Host Identification: Each device connected to a


network, such as computers, smartphones, servers, and network
devices, is assigned a unique IP address.
o Network Identification: Helps routers and other networking
equipment determine where to forward data packets based on
destination IP addresses.
2. Addressing and Routing: o Routing Protocol: IP addresses are
essential for routing protocols that direct traffic across interconnected
networks, ensuring packets reach their intended destination.
o Subnetting: Networks can be subdivided into smaller subnets using
subnet masks, allowing efficient use of IP address space within
organizations.
3. Addressing Types: o Static IP Address: Manually assigned to a
device and remains fixed unless changed by network administrators.
o Dynamic IP Address: Automatically assigned by a DHCP
(Dynamic Host Configuration Protocol) server and may change
periodically.
o Public and Private IP Addresses: Public addresses are routable
on the internet, while private addresses are used within private
networks (e.g., 192.168.x.x or 10.x.x.x ranges).

Usage and Applications:

• Internet Communication: Essential for devices to communicate over


the internet, enabling web browsing, email, file transfers, and other
online activities.
• Network Administration: Used by network administrators to manage
and troubleshoot network connectivity, monitor traffic, and implement
security measures.
• Device Identification: Enables network devices to be uniquely
identified within local area networks (LANs) and wide area networks
(WANs).

IP Address Management (IPAM):

• IP Address Allocation: Managed by network administrators to ensure


efficient allocation and utilization of IP addresses within an
organization.
• Monitoring and Tracking: Tools and software are used for tracking IP
address usage, detecting conflicts, and planning for future address
requirements.

4. SERVERS
Servers are specialized computers or software systems designed to provide
functionality or services to other computers, known as clients, within a network.
They typically handle requests from clients and respond with the necessary data
or services.

Types: Web servers, database servers, file servers, application servers.

Usage: Data Storage and File Sharing, Application Hosting, Email Communication,
Security and Authentication, Backup and Recovery and Virtualization and Cloud
Services.

DHCP (Dynamic Host Configuration Protocol)


A DHCP (Dynamic Host Configuration Protocol) server is a network server that
automatically assigns IP addresses and other network configuration information to
devices on a network.
Functions: IP Address Allocation, Network Configuration, Automatically
assigns IP addresses, IP address allocation efficiently, Centralized
Configuration, Scalability and Scalability.

NAC (Network Access Control)


NAC (Network Access Control) servers are specialized network security
devices or software solutions that enforce security policies on devices seeking to
access a network.

Functions: Authentication and Authorization, Policy Enforcement, Endpoint


Compliance Checking,
Integration with Identity Management Systems, Monitoring and Reporting, Real-time
security assessments and Guest Access Management.

Directory Services

Directory Services, in the context of computing and networking, refer to


centralized systems that store, organize, and provide access to information about
users, devices, applications, and other resources within a network.

Functions: User Authentication, Resource Management and Policy


Enforcement, Auditing and Reporting.

NAS (Network Attached Storage)

A NAS (Network Attached Storage) server is a specialized device or software


solution that provides centralized file storage and sharing capabilities to clients
on a network.

Functions: File Storage, File Sharing, Data Backup and Recovery, Remote Access,
RAID Support, Data Protection and Security, Media Streaming, Scalability and Power
Efficiency.

5. COMPUTER NETWORK MODELS


• A communication sub system is complex piece of hardware and
software.
• To implement the software for such subsystems we based on single,
complex, unstructured program with many interacting components.
• Then ISO has developed a layered approach.
• In this approach all concepts divided into different layers.
• Every particular task is assigned to one layer.

Advantages:

• It is divide the design into small pieces.


• Every layer adds service to the higher layer.
• It provides modularity and clear interfaces.
• It provides interaction between sub systems.
• Every layer varies from other layers regarding functions, content.

5.1 OSI ARCHITECTURE

The OSI (Open Systems Interconnection) model is a conceptual framework


used to understand and implement standard protocols in networking. It divides
the networking process into seven distinct layers, each with specific functions
and protocols. This layered approach helps standardize network communication
and ensures interoperability between different systems and devices.
1. Physical Layer (Layer 1)
In the OSI (Open Systems Interconnection) model, the physical layer is the
lowest layer, represented by Layer 1. Its primary function is to transmit raw data
bits over a physical medium.

The physical layer manages the transfer of raw data in the form of digital bits,
optical signals, electromagnetic waves across the different network transmission
media, such as optical fibers and wireless technologies.

Functions: Line configuration, Data transmission, Topology and signal


transmitting.

Examples: DSL (Digital Subscriber Line), Fiber Optics, Wireless Technologies (Wi-
Fi, Bluetooth, Cellular), etc.
2. Data Link Layer (Layer 2)
In the OSI (Open Systems Interconnection) model, the Data Link Layer is
the second layer, sitting above the Physical Layer (Layer 1) and below the
Network Layer (Layer 3).

The data link layer is responsible for establishing communication rules or


protocols on the physical layer operations. This layer as also perform to encode
and decode and organize the both data.

This layer function forwards packets from one device to another device until
they reach their destination.

Functions: framing, physical addressing, flow control, error control and access
control.

Examples: Ethernet, IEEE 802.11 (Wi-Fi), HDLC (High-Level Data Link Control),
etc.

3. Network Layer (Layer 3)


In the OSI (Open Systems Interconnection) model, the network layer is the
third layer from the bottom, sitting above the data link layer and below the
transport layer.

The network layer responsible for packet routing. Routing means selection of
the shortest path to transmit the packets, from the number of router available. In
header both senders and receivers IP address are placed.

Functions: Routing, Internet working, Logical addressing and packetizing.

Examples: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Address
Resolution Protocol (ARP), etc.

4. Transport Layer (Layer 4)


In the OSI (Open Systems Interconnection) model, the transport layer is the
fourth layer from the bottom, positioned above the network layer and below the
session layer.

The basic function of the transport layer is to accept data from above, split it up
into smaller units. That smaller units are known as segments. The main type of
transport connection is an error free point-to-point channel that delivers
messages or bytes.

Functions: service point addressing, segmentation, error control, flow control


and connection control.
Examples: TCP (Transmission Control Protocol), UDP (User Datagram Protocol),
etc.

5. Session Layer (Layer 5)

The Session Layer is the fifth layer in the OSI (Open Systems Interconnection)
model, which conceptualizes and standardizes the functions of a
telecommunication or computing system into seven distinct layers.

The Session Layer establishes, manages, and terminates communication


sessions between applications. A session can be thought of as a period of
communication between two or more devices that lasts for some duration. This
layer ensures that data exchanges between these sessions are coordinated and
orderly.

Functions: dialog control and synchronization.

Examples: RPC (Remote Procedure Call), NetBIOS (Network Basic Input/Output


System), PPTP (Point-toPoint Tunneling Protocol), etc.

6. Presentation Layer (Layer 6)


The Presentation Layer is the sixth layer in the OSI (Open Systems
Interconnection) model, responsible for ensuring that data exchanged between
systems is properly formatted, encrypted, compressed, or converted as required
by the receiving application.

This layer is connected with the syntax and semantics of the information
transmitted. It acts as a data translator for a network. This layer is also known as
the syntax layer. This layer converts data from one presentation to other
presentation format.
Functions: Data Translation, Encryption and Decryption, Compression and
Compression.
Examples: JPEG, GIF (image file and images), MPEG, MP3(video and audio data),
ASCII, UTF-8, etc.

7. Application Layer (Layer 7)


The Application Layer is the seventh and topmost layer in the OSI (Open Systems
Interconnection) model, responsible for providing network services directly to end-user
applications. It interacts with software applications that implement a specific network
protocol stack and provides a means for applications to access network services.

Functions: Interface to User Applications, Data Exchange, User Authentication, File


Transfer and Management, Email Services and Remote Access and Management.
Examples: HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), SMTP
(Simple Mail Transfer Protocol), DNS (Domain Name System), etc.

The OSI model is fundamental to understanding modern networking. By dividing the


networking process into seven layers, it simplifies the design, implementation, and
management of networks. Each layer has distinct responsibilities and protocols,
ensuring efficient and reliable communication across diverse systems and technologies.
Computer Science Engineers at ONGC, and in the broader IT field, leverage this model
to develop, troubleshoot, and optimize networking solutions.

6. Networking and Communication at ONGC


Networking and communication at ONGC are integral to ensuring smooth and
efficient operations across their extensive infrastructure. This section details the
components and systems used in ONGC's networking environment, focusing on server
and network racks, communication services, and industrial communication protocols.

6.1 ONGC used servers

1. Nessus Server
Nessus is a widely used vulnerability assessment tool that helps
organizations identify and manage vulnerabilities in their computer systems,
networks, and applications. When someone mentions a "Nessus server,"
they typically refer to the central server component of the Nessus
vulnerability scanner platform.
Role: Regularly scans ONGC's network for vulnerabilities, helping to maintain
network security and compliance by identifying and mitigating potential threats.

2. HIS (Health Information System) server


A Health Information System (HIS) is a comprehensive system designed to manage
and store medical, administrative, and financial information in healthcare settings.
It plays a crucial role in improving healthcare delivery by facilitating efficient
management, processing, and dissemination of health information.
Role: Stores and processes medical records, facilitates health monitoring, and
ensures secure access to health data, thereby supporting employee
wellbeing and regulatory compliance.

3. Antivirus Server
An antivirus server typically refers to a centralized system or software component
within a network infrastructure that manages and coordinates antivirus protection
across multiple devices and endpoints.
Role: Protects ONGC's network and devices from malware, ensuring real time
threat detection and mitigation to maintain a secure computing environment.

4. Intranet Private Network


An antivirus server typically refers to a centralized system or software component
within a network infrastructure that manages and coordinates antivirus protection
across multiple devices and endpoints.
Role: Provides a private and secure communication channel for internal
collaboration and data sharing, supporting efficient workflow and operational
integrity.

5. Local Meet Server


A "local meet server" typically refers to a server or a specific instance of software
used to facilitate local meetings or gatherings within a defined geographic area or
organization. This term can encompass various types of servers or platforms
depending on the context in which it's used. H A "local meet server" typically
refers to a server or a specific instance of software used to facilitate local meetings
or gatherings within a defined geographic area or organization. This term can
encompass various types of servers or platforms depending on the context in which
it's used.
Role: Facilitates remote meetings, enhancing collaboration among teams across
different locations, and reducing the need for physical travel.
6. Drilling Server
A "drilling server" typically refers to a specialized server or computing system used
in the context of drilling operations, particularly in industries such as oil and gas
exploration or mining. These servers are designed to support and optimize various
aspects of drilling processes, including data acquisition, monitoring, control, and
analysis.
Role: Supports decision making by providing detailed insights into drilling
performance and conditions, ensuring safe and efficient drilling operations.

7. Proxy Caching Server


A proxy caching server, often simply referred to as a caching server or proxy
cache, is a server that sits between clients (such as web browsers or applications)
and the internet. Its primary function is to store copies of frequently accessed web
resources, such as web pages, images, and other content, to improve access speed
and reduce bandwidth usage.
Role: Enhances internet performance and reduces load on external connections,
ensuring efficient use of network resources.

8. ClearPass Server
ClearPass is a network access control (NAC) and policy management solution
developed by Aruba Networks (a Hewlett Packard Enterprise company). It
provides secure network access and enforcement capabilities, allowing
organizations to manage and control network access based on user identity, device
type, and security posture.
Role: Ensures secure network access by managing user authentication,
authorization, and compliance, thus protecting the network from unauthorized
access and potential breaches.

6.2 ONGC used Network Components


1. Layer 2 (L2) Switches
A Layer 2 switch, also known as a data link layer switch or simply a switch, is a
networking device that operates at the data link layer (Layer 2) of the OSI (Open
Systems Interconnection) model. Its primary function is to forward Ethernet frames
between connected devices within the same network segment, based on the Media
Access Control (MAC) addresses in the frames.
Role: Forward frames based on MAC addresses, facilitating internal network
communication and ensuring efficient data transfer within local segments.

2. Layer 3 (L3) Switches

A Layer 3 switch, also known as a multilayer switch, is a networking device that


combines features of traditional Layer 2 switches (data link layer switching) with
routing functions typically performed by routers (network layer or Layer 3 of the OSI
model). Layer 3 switches are capable of forwarding traffic based not only on MAC
addresses (Layer 2) but also on IP addresses (Layer 3), allowing them to make routing
decisions and optimize traffic flows within a network.

Role: Route packets based on IP addresses, managing traffic between different subnets
and networks, and providing advanced routing capabilities.

3. Routers
Routers are fundamental networking devices that operate at the network layer (Layer 3)
of the OSI (Open Systems Interconnection) model. They are responsible for routing
data packets between different networks, making decisions based on IP addresses to
determine the best path for forwarding packets towards their destination.

Role: Determine the best path for data to travel, ensuring efficient and reliable network
communication across various segments of the organization.

6.3 Communication Services

1. EPABX (Electronic Private Automatic Branch Exchange)


EPABX stands for Electronic Private Automatic Branch Exchange. It is a
telecommunications system that serves as a private telephone network within an
organization or enterprise. EPABX systems are designed to efficiently manage
incoming and outgoing phone calls, facilitate internal communication, and provide
advanced features for handling calls within the organization.
Role: Provides a centralized phone system for internal communication, reducing
telephony costs and enhancing call management.

2. SLT (Subscriber Line Trunk)


In the context of telecommunications and networking, "SLT" typically refers to a
"Single-Line Telephone" or "Single-Line Terminal." This term is often used to describe
basic telephony equipment that connects to a private branch exchange (PBX) or a
telephone system.

Role: Manages multiple phone lines, ensuring efficient handling of calls within the
organization.

7. SCADA (Supervisory Control and Data Acquisition)


SCADA (Supervisory Control and Data Acquisition) is a system used for monitoring
and controlling industrial processes. It allows for real-time data acquisition, processing,
and control of equipment across various industries such as oil and gas, manufacturing,
utilities, and telecommunications

Components of SCADA Systems


1.Human-Machine Interface (HMI): The user interface through which operators interact
with the SCADA system. It provides graphical displays of the processes, control
panels, and data visualizations.
2.Supervisory System: The central system that collects and processes data from field
devices, and then presents this data to the HMI. It often includes servers and software
for data processing.

3.Remote Terminal Units (RTUs): Devices that collect data from field devices (such as
sensors and actuators) and transmit this data to the supervisory system. RTUs also
execute control commands from the supervisory system.

4.Programmable Logic Controllers (PLCs): Industrial computers that monitor inputs


and outputs, and make logic-based decisions for automatic control of processes.

5.Communication Infrastructure: The network and protocols used for communication


between the supervisory system, RTUs, PLCs, and other devices. This includes wired
and wireless communication technologies

Systems Types of SCADA


SCADA (Supervisory Control and Data Acquisition) systems are widely used in
various industries to monitor and control industrial processes. Over the years, SCADA
systems have evolved to meet the diverse needs of different industries, resulting in
various types of SCADA systems. Below are the main types:
1. Monolithic SCADA Systems
Monolithic SCADA systems are the earliest form of SCADA systems. These systems
were designed to run on mainframe computers and were standalone systems without
networked components.

Characteristics:
Centralized Architecture: All components of the SCADA system, including the
Human-Machine Interface (HMI), data acquisition, and control, were centralized on a
single mainframe computer.

Limited Connectivity: Lack of connectivity with other systems or devices outside the
mainframe computer.

Limited Scalability: Difficult to scale up or modify due to the monolithic nature of the
system.

Limited Redundancy: Single point of failure due to the centralized architecture.

Use Case: Monolithic SCADA systems were primarily used in industries where
limited automation and control were required, and standalone systems were sufficient
to meet operational needs.

2. Distributed SCADA Systems


Distributed SCADA systems introduced distributed computing, allowing multiple
systems to share control tasks. This architecture distributed processing power across
multiple machines, enhancing reliability and efficiency.

Characteristics:
Distributed Architecture: Components of the SCADA system, such as data
acquisition, control, and HMI, are distributed across multiple computers or servers.
Improved Reliability: Redundancy and fault tolerance are improved compared to
monolithic systems, as tasks can be distributed across multiple machines.

Improved Scalability: Easier to scale up or modify compared to monolithic systems


due to the distributed nature of the architecture.

Enhanced Connectivity: Improved connectivity with other systems or devices,


enabling better integration and interoperability.

Use Case: Distributed SCADA systems are suitable for industries with larger-scale
operations and more complex control requirements, where improved reliability,
scalability, and connectivity are essential.

3. Networked SCADA Systems


Networked SCADA systems utilize local area networks (LANs) and wide area
networks (WANs) to connect various SCADA components. This architecture enables
enhanced communication capabilities and data sharing across geographically dispersed
locations.
Characteristics:
Networked Architecture: Components of the SCADA system are connected via
LANs, WANs, or the internet, allowing for seamless communication and data sharing.

Geographical Distribution: Enables monitoring and control of processes across


multiple locations, including remote sites and facilities.

Enhanced Data Sharing: Allows for real-time data sharing and collaboration between
multiple users or stakeholders across different locations.

Improved Redundancy: Redundant communication paths and failover mechanisms


enhance system reliability and fault tolerance.

Use Case: Networked SCADA systems are suitable for industries with geographically
dispersed operations, such as utilities, oil and gas, and transportation, where real-time
data sharing and remote monitoring are critical.

4. IoT-Enabled SCADA Systems


IoT-enabled SCADA systems leverage Internet of Things (IoT) technologies to
integrate and monitor a wider range of devices and sensors. This architecture enables
increased data collection and analysis capabilities, enabling predictive maintenance and
advanced analytics.

Characteristics:
Integration with IoT Devices: Integrates with a wide range of IoT devices, sensors, and
actuators to collect real-time data from various sources.

Advanced Analytics: Utilizes machine learning and data analytics techniques to


analyze large volumes of data and derive actionable insights for optimization and
predictive maintenance.

Cloud Connectivity: Integrates with cloud platforms to enable remote access, storage,
and analysis of data from anywhere, at any time.

Scalability and Flexibility: Easily scalable to accommodate growing data volumes and
evolving business requirements.

Use Case: IoT-enabled SCADA systems are suitable for industries that require
advanced data analytics, predictive maintenance, and remote monitoring capabilities,
such as manufacturing, energy, and smart cities.

5. RTU (Remote Terminal Unit)


A Remote Terminal Unit (RTU) is a microprocessor-controlled device used in SCADA
systems for remote data acquisition and control. RTUs are placed in remote locations to
collect data from sensors, transmit this data to the central SCADA system, and execute
control commands from the supervisory system.
Functions of RTU
1. Data Acquisition: Collects data from various sensors and field devices,
including temperature, pressure, flow rates, and other relevant parameters.

2. Data Transmission: Transmits the collected data to the central SCADA


system or HMI using various communication protocols.

3. Remote Control: Executes control commands received from the central


SCADA system, such as opening/closing valves, starting/stopping motors, and
adjusting setpoints.

4. Signal Processing: Converts analog signals from sensors into digital data for
processing and communication.

5. Monitoring and Alarming: Continuously monitors the status of connected


devices and generates alarms or alerts in case of abnormal conditions or failures.

Types of RTUs
1. Stand-alone RTUs

- Independent units that perform data acquisition and control tasks without the need for
additional components.

- Use Case: Suitable for small-scale applications where a single RTU can manage all
necessary functions.

2. Modular RTUs

- Composed of various modules that can be customized and expanded based on


specific needs.

- Use Case: Ideal for larger or more complex applications requiring scalability and
flexibility.

3. Integrated RTUs

- Combine RTU functions with other control elements such as PLCs within a single
unit.

- Use Case: Used in environments where space is limited or integrated functionality is


preferred.

SCADA systems are essential for modern industrial automation, providing


comprehensive monitoring and control capabilities. The various types of SCADA
systems have evolved to meet increasing demands for connectivity, reliability, and data
analysis. RTUs play a crucial role in SCADA systems by enabling remote data
acquisition and control, ensuring efficient and effective management of industrial
processes. Understanding the functions and types of SCADA systems and RTUs helps
organizations leverage these technologies.
7.CONCLUSION:
In conclusion, this report has provided a comprehensive overview of networking,
communication, and industrial automation technologies at ONGC (Oil and Natural Gas
Corporation).

Starting with an exploration of ONGC's history and operations, we delved into the
essential role played by computer science engineers in leveraging technology to support
the company's mission. From overseeing the exploration and extraction of natural
resources to facilitating efficient operations through data management and analysis,
electronic & communication engineering contribute significantly to ONGC's success.
Examined the basics of networking, covering a wide range of technologies and
concepts, including leased lines, GSM, VSAT, HTS, servers, DHCP, NAC, directory
services, NAS, switches, routers, firewalls, WAN, and LAN. Understanding these
fundamentals is crucial for maintaining a robust and secure networking infrastructure at
ONGC.

SCADA systems play a crucial role in enhancing the operational efficiency, safety, and
reliability of ONGC's infrastructure by providing real-time monitoring, control, and
data acquisition capabilities. Through SCADA, ONGC can remotely monitor and
manage its extensive network of oil and gas assets, pipelines, and facilities, ensuring
optimal performance and swift response to any operational issues or emergencies. The
integration of SCADA with advanced analytics and predictive maintenance further
empowers ONGC to improve decision-making, reduce downtime, and enhance overall
productivity across its operations. Thus, SCADA stands as a cornerstone technology
supporting ONGC's mission to maintain leadership in the energy sector through
innovation and operational excellence.

Networking is a critical component of ONGC's operational infrastructure, facilitating


seamless communication, data transfer, and collaboration across its extensive network
of oil rigs, refineries, pipelines, and administrative offices. The company relies on
robust networking solutions to support realtime monitoring, control, and management
of its assets, ensuring operational efficiency and safety. ONGC leverages advanced
networking technologies such as WAN (Wide Area Network), LAN (Local Area
Network), and wireless networks to enable reliable data transmission and connectivity
between remote locations and central control centers. Additionally, the integration of
networking with cybersecurity measures strengthens ONGC's ability to protect
sensitive data and maintain the integrity of its operations against evolving threats.
Overall, networking plays a pivotal role in enhancing ONGC's operational agility,
responsiveness, and competitiveness in the global energy market.

You might also like