Vous êtes sur la page 1sur 13

1/8/2014

Proposed Upgradation of infrastructure of


IT systems in RESCUE 1122

Submitted To
Dr. Ali Hammad Akbar

Submitted By
Saira Batool (2013-MS-TN-08)
Basit khan (2013-MS-TN-09)
Rida Ali (2013-MS-TN-21)
Shahid Ali Qureshi (2013-MS-TN-24)
Zainab Malik (2013-MS-TN-38)

Table of Contents
Introduction:.................................................................................................................................................. 2
Rescue 1122 Proposed Network Design ....................................................................................................... 2
Business Goals .......................................................................................................................................... 2
Scope of Project ........................................................................................................................................ 2
Identifying Network Applications ............................................................................................................ 3
Table 1 Network Applications .............................................................................................................. 3
Technical Goals ........................................................................................................................................ 4
Availability ........................................................................................................................................... 4
Scalability ............................................................................................................................................. 4
Manageability ....................................................................................................................................... 4
Performance .......................................................................................................................................... 4
Security ................................................................................................................................................. 4
Usability ................................................................................................................................................ 5
Adaptability........................................................................................................................................... 5
Table 2 Network Applications Technical Requirements ...................................................................... 5
Characterizing network ............................................................................................................................. 6
Table 3 Response-Time Measurements ................................................................................................ 6
Characterizing Network Traffic ................................................................................................................ 6
Table 4 User Communities ................................................................................................................... 7
Table 4 Data Stores ............................................................................................................................... 7
Table 4 Network Applications Traffic Characteristics ......................................................................... 8
Control room network diagram ................................................................................................................. 9
WAN links ............................................................................................................................................ 9
LAN Links ............................................................................................................................................ 9
VLAN & IP scheme defined based on User Community ..................................................................... 9
Connectivity ............................................................................................................................................ 10
Call Flow in Rescue 1122 ....................................................................................................................... 12

Introduction:
Rescue 1122 is the largest life rescuing organization in Pakistan with infrastructure in all
36 districts of Punjab and is providing technical assistance to other provinces and having a
well talented and flexible workforce which hit on time in order to save injured and battered
people running through any disaster and accidents.
To expand and better its network further with innovative ideas which may help save
peoples lives more effectively, Dr. Ali Hammad Akbar analyzed its whole infrastructure
and provided with a solution so as to upgrade its IT System
Right after understanding and going through the report rendered by Dr. Ali Hammad
Akbar, Now while following the Top-Down Network Design book , We are up to define
all purposes of IT System up gradation step by step in this report.

Rescue 1122 Proposed Network Design


Business Goals
Now moving on the main objective first of all we will see what main business goals of
rescue 1122 are. Prime job of Rescue1122 is to rescue the peoples life voluntarily within
the slightest time span. Beside this there are some other goals that Rescue1122 does have,
as mentioned below.
Since Rescue 1122 is a government funded enterprise so its business goals would be
slightly different from a typical business Enterprise.
The internal transection & management of the system should be efficient enough to
perform all data generation & retrieval queries in minimum span of time so that
crisis events can be handled with ease and as quick as possible.
System should be efficient in order to trace the caller, verify the given information
and its validation, till dispatch of ambulance following the standard operation
policies with time logging and inspection.
IT System provide the real time progress of each and every person that uses the
network with complete tracking records and logs so that their performance can be
judge and verify on time.

Scope of Project
The time when Rescue 1122 started its scope was limited only few district of the
Punjab, Pakistan.
It expended time by time and now Rescue 1122 provides their services in 36
District in Punjab as well as also providing technical assistance to other provinces.

In order to archive the above mentioned business goals internal infrastructure in


each local office was not sufficient to meet the requirement of developing
technologies and their applications
The entire enterprise network will incorporate Metro Fiber, Wireless Links,
MPLS, VPN and many more LAN and WAN technologies in order for better
communication and process the records and data manipulation.

Identifying Network Applications


After identifying the chief goals of Rescue 1122 IT system, we are going to emphasis on
network application.
The following table comprises of both current and innovative network applications which
are or are proposed to be used for the network up gradation and efficiency.
Table 1 Network Applications
Name of Application

Type of Application

Call Management
Software (CMS)
C-Track
Cell Broadcast Service (CBS)
GPS Tracking
Web Portal

IP Telephony

Interactive Questionnaire
Database Entry
Route Guidance
Multimedia Sharing
Application on cloud
Database Servers
IP Cameras
VPN

Telemetry
Telemetry
Web browsing, File
Access sharing &
transfer
Database access &
updating
Web browsing
Surveillance and
security camera
Database access &
updating
Surveillance and
Imaging
Security

New Application?
(Yes or No)
No

Criticality

No
Yes
Yes
Yes

Extremely Critical
Extremely Critical
Somewhat Critical
Extremely Critical

Yes
Yes

Somewhat Critical
Not Critical

Yes
Yes

Not Critical
Not Critical

Yes

Extremely Critical

Yes

Somewhat Critical

Yes

Extremely Critical

Extremely Critical

Technical Goals
Now we will behold the technical goals of Rescue1122.Below mentioned are Rescue
1122 technical goals
Availability
The availability of the network should be ensured 24/7 because a medical or any
other emergency could happen at any point in time,
The telephone lines will be backed up by the mobile phones automatically so that
in case of telephone lines are unavailable at any time due to power failure or line
damages the calls can be routed to the mobile phones.
By using the multi homing technologies based on the redundant ISP,s ensures the
network availability all the time
Data/Application will always available to network based on replication of data from
local office to head office by using SAN to SAN replication over WAN links, so
that the data can be preserve in case of any major disaster situation
Efficient routing system for the ambulances will be implemented on more than one
wireless technologies so that in case of failure of one the other works and helps the
driver to take the correct safest and shortest route.
Scalability
By using the modular approach, the new IT system will be able to adapt large
number of regional offices and each office have the similar infrastructure.
Manageability
The management of the network will be easy enough in the time of crisis and ensures
that there will be minimum malfunction during heavy load or traffic in case of major
disaster.
Performance
The selected devices & equipment based on the new IT infrastructure will be
highly efficient so that there will be no performance degradation under any kind of
application or database activity under any kind of disaster or emergency.
Security
Protection & security policies of IT System will provide maximum resistance
against attempts of hackers or viruses, also it will incorporate strict intrusion
detection system against any pre planned terrorism attack that will create hurdles
for the rescuers to reach at the disaster location.

Usability
The proposed IT system will grant specific access to internal system and data stores
according to administrator and their roles, this ensures the maximum security and
performance.
Adaptability
New IT system will be flexible enough that it would be able to adapt the ever
increasing IT technologies and applications.

After recognizing Rescue 1122 business goals and network applications. Now we will
motivated further and fill the technical application goals chart shown in Table 2
This tables shows how important or critical an application is to the network, or if the
network can work without it or not.
Table 2 Network Applications Technical Requirements
Name of Application

Type of Application

CMS

IP Telephony

New
Application?
(Yes or No)
No

CTrack

Telemetry

No

CBS

Broadcast

Yes

GPS Tracking

Telemetry

Yes

Web Portal

Web browsing, File


Access sharing &
transfer
Database

Yes

Database access &


updating
Web browsing
Surveillance and
security camera
Database access &
updating
Surveillance and
Imaging
Security

Interactive
Questionnaire
Database Entry
Route Guidance
Multimedia Sharing
Application on cloud
Database Servers
IP Cameras
VPN

Criticality

Cost of
Downtime

Extremely
Critical
Extremely
Critical
Extremely
Critical
Somewhat
Critical
Extremely
Critical

99.999%

99%

Yes

Somewhat
Critical
Not Critical

Yes
Yes

Not Critical
Not Critical

99%
95%

Yes

Extremely
Critical
Somewhat
Critical
Extremely
Critical

99.999%

Yes

Yes
Yes

99.9%
99.99%
99.9%
99.999%

90%

95%
99.999%

Characterizing network
After the detailed analysis and based on different tests we concluded that how much
downtime we can tolerate for a specific application working rescue 1122. Here we will
scrutinize that how much response time the application we have proposed can bear.
Following table show response time among the applications.
Table 3 Response-Time Measurements
Defining all the nodes first
Node A = Desktop Computers
Node B = Web Servers
Node C = Application Servers
Node D = Database Servers
Node E = Printers
Node F = Notepads/Laptops in Ambulances
Node G = Storage Server (Multimedia Sharing)
Node H = Voice Server/Tracking
Node A

Node B

Node C

Node D

Node E

Node F

Node G

Node H

Node A
Node B
Node C

X
400ms
200ms

400ms
X
10ms

200ms
10ms
X

200ms
10ms
50ms

5sec
X
5sec

X
500ms
240ms

240ms
50ms
500ms

100ms
X
X

Node D
Node E
Node F
Node G
Node H

200ms
5sec
X
240ms
100ms

10ms
X
500ms
50ms
X

50ms
5sec
240ms
500ms
X

X
X
250ms
25ms
X

X
X
5sec
X
X

250ms
5sec
X
250ms
X

25ms
X
250ms
X
X

X
X
X
X
X

Characterizing Network Traffic


As there are different application used in network by different users, it is important to
identify the users, application used by different users, data stores, location, connectivity
methods, network, protocols used by different applications.
Furthermore detailed analysis based characterize traffic flow, network application flow
between devices and observation of each flow behavior with traffic load.

The first step is identifying the user community of the network, which comprises of all the
people or user who have the access and can access the network or some specific network
application.
Table 4 User Communities
User Community
Name
CTWO

Size of Community
(Number of Users)
10-15

Locations of Community

WO

Control Room

Focal Person

1 per hospital

Hospital

Drivers
EMTs
Callers
Patients Relatives
General Public
CRI

Depends on number Ambulance


of ambulances
2 per ambulance
Ambulance
Multiple Locations
Multiple Locations
Multiple Locations
3
Control Room

SI

Control Room

Surveillance
Data Entry

2
3

Control Room
Office

Control Room

Applications Used by
Community
CMS, Web Portal, Database
Servers
CMS, CBS, Web Portal, Database
Servers
Web Portal, Database Servers,
VPN
Multimedia Sharing Application
on cloud
Web Portal, VPN
CMS
Web Portal, Database Servers
Web Portal, Database Servers
CMS, CTrack, CBS, GPS
Tracking, Web Portal, Interactive
Questionnaire, Database Entry,
Database Servers
CTrack, GPS Tracking, Web
Portal, Interactive Questionnaire,
Database Servers
IP Cameras, VPN
Database Servers

The second step in network identification is defining all the data stores or data sinks where
all the data will be store and used by user communities.
Table 4 Data Stores
Data Store

Location

Applications

Used by User Community (or


Communities)
All the Staff, Hospital Focal
Person and General Public

NAS

Control Room

All Applications

NVRs

Control Room

IP Cameras

Surveillance and CRI

DVRs

Control Room

IP Cameras

Surveillance and CRI

BNAS

Remote Location

All Applications

All the Staff, Hospital Focal


Person and General Public

Following are the traffic characteristics of the proposed network applications


Table 4 Network Applications Traffic Characteristics
Name of
Application

Type of
Traffic
Flow

Protocols
Used by
Application

User
Communities
That Use the
Application

CMS

P2P

RS232

CTrack

Client
Server
Client
Server
Client
Server
Server to
Server,
Client
Server

IP

CTWO, WO,
Callers, CRI
CRI,SI

RS232

Interactive
Questionnaire
Database
Entry
Route
Guidance
Multimedia
Sharing
Application
on cloud
Database
Servers

Client
Server
Client
Server
P2P

IP Cameras

CBS
GPS Tracking
Web Portal

VPN

Data
Stores
(Servers,
Hosts, and
So On)
NAS

Approximate
Bandwidth
Requirement
for the
Application
1Mbps

QOS
Requirements

NAS

512kbps

rt-VBR

WO,CRI

NAS

512kbps

ABR

IP

SI,CRI

NAS

512kbps

rt-VBR

SHTTP

NAS

512kbps

rt-VBR

HTTP

CTWO, WO,
Focal Person,
EMT,s CRI,SI
Patients
Relatives,
General
Public,
CRI,SI

NAS

10Mbps

nrt-VBR

MS Office,
Skydive
HTTP

Database
Servers
Drivers

NAS

10Mbps

UBR

NAS

1Mbps

UBR

Server to
Server

ISCSI, RTSP

Drivers

NAS

5Mbps

CBR

Server to
Server

Mysql

NAS

100Mbps

rt-VBR

Client
Server
Server to
Server,
Client
Server

H232, IP,
HTTP, RSTP
PPTP, open
VPN

Data Entry
CTWO,WO,
CRI,SI
Patients
Relatives,
General
Public,
Surveillance

NAS

20Mbps

GFR

Focal Person,
EMT,s
Surveillance,

NAS

5Mbps

CBR

CBR

Control room network diagram


WAN links
We are using 3 ISP, s for WAN connectivity having MPLS and VPNs.
WAN links are connected through different wired & wireless technologies like
Metro Fiber & Microwave links, through which multi homing is achieved.
LAN Links
Internal infrastructure based on Gigabit Ethernet and Wi-Fi are connected to access
switch and defined VLAN,s according to user community, access switches are
directly connected to core switches by using ether channel, core switch has
redundant active / backup switch.
VLAN & IP scheme defined based on User Community
There are multiple VLANs,
Management Vlan is 1000 for all the switches include Core switches & access
switches For all the servers there is separate subnet that is 172.16.1.0/24 and using
Vlan 20
The user using Desktop computers or Laptops are on separate Vlan that is Vlan 40
and having the IP scheme as 172.16.3.0/24
Security camera and biometric devices related to Surveillance system defined IP
scheme is 172.16.2.0/24 and assigned with Vlan 30
For wireless Wi-Fi Network 172.16.4.0/24 and using Vlan 50 for Mobile and guest
users

Below mentioned is the Rescue 1122 control room network diagram.

Connectivity
Rescue 1122 providing their services in 36 districts
All local offices are connected with Head Office using fiber over MPLS and VPN
for security and the backup links are on wireless Microwave Links (ISP to Local
Office)
Different persons access applications and data stores differently from different
locations.
Driver only have to access the Multimedia sharing application or service by using
available internet from his location.
EMT, s have to access different application so he will connect through a VPN form
remote location to Local office through wireless internet.

10

Focal person who will be available in hospital perform its connectivity with office
via VPN using any available internet

Below are Head office to district office and district office to other persons connectivity
diagram.

11

Call Flow in Rescue 1122


Following is the proposed procedure to explain that how a query from a caller can be served
and processed by different person in order to provide the rescue service at desired location
with minimum span of time.

12

Vous aimerez peut-être aussi