Académique Documents
Professionnel Documents
Culture Documents
Submitted To
Dr. Ali Hammad Akbar
Submitted By
Saira Batool (2013-MS-TN-08)
Basit khan (2013-MS-TN-09)
Rida Ali (2013-MS-TN-21)
Shahid Ali Qureshi (2013-MS-TN-24)
Zainab Malik (2013-MS-TN-38)
Table of Contents
Introduction:.................................................................................................................................................. 2
Rescue 1122 Proposed Network Design ....................................................................................................... 2
Business Goals .......................................................................................................................................... 2
Scope of Project ........................................................................................................................................ 2
Identifying Network Applications ............................................................................................................ 3
Table 1 Network Applications .............................................................................................................. 3
Technical Goals ........................................................................................................................................ 4
Availability ........................................................................................................................................... 4
Scalability ............................................................................................................................................. 4
Manageability ....................................................................................................................................... 4
Performance .......................................................................................................................................... 4
Security ................................................................................................................................................. 4
Usability ................................................................................................................................................ 5
Adaptability........................................................................................................................................... 5
Table 2 Network Applications Technical Requirements ...................................................................... 5
Characterizing network ............................................................................................................................. 6
Table 3 Response-Time Measurements ................................................................................................ 6
Characterizing Network Traffic ................................................................................................................ 6
Table 4 User Communities ................................................................................................................... 7
Table 4 Data Stores ............................................................................................................................... 7
Table 4 Network Applications Traffic Characteristics ......................................................................... 8
Control room network diagram ................................................................................................................. 9
WAN links ............................................................................................................................................ 9
LAN Links ............................................................................................................................................ 9
VLAN & IP scheme defined based on User Community ..................................................................... 9
Connectivity ............................................................................................................................................ 10
Call Flow in Rescue 1122 ....................................................................................................................... 12
Introduction:
Rescue 1122 is the largest life rescuing organization in Pakistan with infrastructure in all
36 districts of Punjab and is providing technical assistance to other provinces and having a
well talented and flexible workforce which hit on time in order to save injured and battered
people running through any disaster and accidents.
To expand and better its network further with innovative ideas which may help save
peoples lives more effectively, Dr. Ali Hammad Akbar analyzed its whole infrastructure
and provided with a solution so as to upgrade its IT System
Right after understanding and going through the report rendered by Dr. Ali Hammad
Akbar, Now while following the Top-Down Network Design book , We are up to define
all purposes of IT System up gradation step by step in this report.
Scope of Project
The time when Rescue 1122 started its scope was limited only few district of the
Punjab, Pakistan.
It expended time by time and now Rescue 1122 provides their services in 36
District in Punjab as well as also providing technical assistance to other provinces.
Type of Application
Call Management
Software (CMS)
C-Track
Cell Broadcast Service (CBS)
GPS Tracking
Web Portal
IP Telephony
Interactive Questionnaire
Database Entry
Route Guidance
Multimedia Sharing
Application on cloud
Database Servers
IP Cameras
VPN
Telemetry
Telemetry
Web browsing, File
Access sharing &
transfer
Database access &
updating
Web browsing
Surveillance and
security camera
Database access &
updating
Surveillance and
Imaging
Security
New Application?
(Yes or No)
No
Criticality
No
Yes
Yes
Yes
Extremely Critical
Extremely Critical
Somewhat Critical
Extremely Critical
Yes
Yes
Somewhat Critical
Not Critical
Yes
Yes
Not Critical
Not Critical
Yes
Extremely Critical
Yes
Somewhat Critical
Yes
Extremely Critical
Extremely Critical
Technical Goals
Now we will behold the technical goals of Rescue1122.Below mentioned are Rescue
1122 technical goals
Availability
The availability of the network should be ensured 24/7 because a medical or any
other emergency could happen at any point in time,
The telephone lines will be backed up by the mobile phones automatically so that
in case of telephone lines are unavailable at any time due to power failure or line
damages the calls can be routed to the mobile phones.
By using the multi homing technologies based on the redundant ISP,s ensures the
network availability all the time
Data/Application will always available to network based on replication of data from
local office to head office by using SAN to SAN replication over WAN links, so
that the data can be preserve in case of any major disaster situation
Efficient routing system for the ambulances will be implemented on more than one
wireless technologies so that in case of failure of one the other works and helps the
driver to take the correct safest and shortest route.
Scalability
By using the modular approach, the new IT system will be able to adapt large
number of regional offices and each office have the similar infrastructure.
Manageability
The management of the network will be easy enough in the time of crisis and ensures
that there will be minimum malfunction during heavy load or traffic in case of major
disaster.
Performance
The selected devices & equipment based on the new IT infrastructure will be
highly efficient so that there will be no performance degradation under any kind of
application or database activity under any kind of disaster or emergency.
Security
Protection & security policies of IT System will provide maximum resistance
against attempts of hackers or viruses, also it will incorporate strict intrusion
detection system against any pre planned terrorism attack that will create hurdles
for the rescuers to reach at the disaster location.
Usability
The proposed IT system will grant specific access to internal system and data stores
according to administrator and their roles, this ensures the maximum security and
performance.
Adaptability
New IT system will be flexible enough that it would be able to adapt the ever
increasing IT technologies and applications.
After recognizing Rescue 1122 business goals and network applications. Now we will
motivated further and fill the technical application goals chart shown in Table 2
This tables shows how important or critical an application is to the network, or if the
network can work without it or not.
Table 2 Network Applications Technical Requirements
Name of Application
Type of Application
CMS
IP Telephony
New
Application?
(Yes or No)
No
CTrack
Telemetry
No
CBS
Broadcast
Yes
GPS Tracking
Telemetry
Yes
Web Portal
Yes
Interactive
Questionnaire
Database Entry
Route Guidance
Multimedia Sharing
Application on cloud
Database Servers
IP Cameras
VPN
Criticality
Cost of
Downtime
Extremely
Critical
Extremely
Critical
Extremely
Critical
Somewhat
Critical
Extremely
Critical
99.999%
99%
Yes
Somewhat
Critical
Not Critical
Yes
Yes
Not Critical
Not Critical
99%
95%
Yes
Extremely
Critical
Somewhat
Critical
Extremely
Critical
99.999%
Yes
Yes
Yes
99.9%
99.99%
99.9%
99.999%
90%
95%
99.999%
Characterizing network
After the detailed analysis and based on different tests we concluded that how much
downtime we can tolerate for a specific application working rescue 1122. Here we will
scrutinize that how much response time the application we have proposed can bear.
Following table show response time among the applications.
Table 3 Response-Time Measurements
Defining all the nodes first
Node A = Desktop Computers
Node B = Web Servers
Node C = Application Servers
Node D = Database Servers
Node E = Printers
Node F = Notepads/Laptops in Ambulances
Node G = Storage Server (Multimedia Sharing)
Node H = Voice Server/Tracking
Node A
Node B
Node C
Node D
Node E
Node F
Node G
Node H
Node A
Node B
Node C
X
400ms
200ms
400ms
X
10ms
200ms
10ms
X
200ms
10ms
50ms
5sec
X
5sec
X
500ms
240ms
240ms
50ms
500ms
100ms
X
X
Node D
Node E
Node F
Node G
Node H
200ms
5sec
X
240ms
100ms
10ms
X
500ms
50ms
X
50ms
5sec
240ms
500ms
X
X
X
250ms
25ms
X
X
X
5sec
X
X
250ms
5sec
X
250ms
X
25ms
X
250ms
X
X
X
X
X
X
X
The first step is identifying the user community of the network, which comprises of all the
people or user who have the access and can access the network or some specific network
application.
Table 4 User Communities
User Community
Name
CTWO
Size of Community
(Number of Users)
10-15
Locations of Community
WO
Control Room
Focal Person
1 per hospital
Hospital
Drivers
EMTs
Callers
Patients Relatives
General Public
CRI
SI
Control Room
Surveillance
Data Entry
2
3
Control Room
Office
Control Room
Applications Used by
Community
CMS, Web Portal, Database
Servers
CMS, CBS, Web Portal, Database
Servers
Web Portal, Database Servers,
VPN
Multimedia Sharing Application
on cloud
Web Portal, VPN
CMS
Web Portal, Database Servers
Web Portal, Database Servers
CMS, CTrack, CBS, GPS
Tracking, Web Portal, Interactive
Questionnaire, Database Entry,
Database Servers
CTrack, GPS Tracking, Web
Portal, Interactive Questionnaire,
Database Servers
IP Cameras, VPN
Database Servers
The second step in network identification is defining all the data stores or data sinks where
all the data will be store and used by user communities.
Table 4 Data Stores
Data Store
Location
Applications
NAS
Control Room
All Applications
NVRs
Control Room
IP Cameras
DVRs
Control Room
IP Cameras
BNAS
Remote Location
All Applications
Type of
Traffic
Flow
Protocols
Used by
Application
User
Communities
That Use the
Application
CMS
P2P
RS232
CTrack
Client
Server
Client
Server
Client
Server
Server to
Server,
Client
Server
IP
CTWO, WO,
Callers, CRI
CRI,SI
RS232
Interactive
Questionnaire
Database
Entry
Route
Guidance
Multimedia
Sharing
Application
on cloud
Database
Servers
Client
Server
Client
Server
P2P
IP Cameras
CBS
GPS Tracking
Web Portal
VPN
Data
Stores
(Servers,
Hosts, and
So On)
NAS
Approximate
Bandwidth
Requirement
for the
Application
1Mbps
QOS
Requirements
NAS
512kbps
rt-VBR
WO,CRI
NAS
512kbps
ABR
IP
SI,CRI
NAS
512kbps
rt-VBR
SHTTP
NAS
512kbps
rt-VBR
HTTP
CTWO, WO,
Focal Person,
EMT,s CRI,SI
Patients
Relatives,
General
Public,
CRI,SI
NAS
10Mbps
nrt-VBR
MS Office,
Skydive
HTTP
Database
Servers
Drivers
NAS
10Mbps
UBR
NAS
1Mbps
UBR
Server to
Server
ISCSI, RTSP
Drivers
NAS
5Mbps
CBR
Server to
Server
Mysql
NAS
100Mbps
rt-VBR
Client
Server
Server to
Server,
Client
Server
H232, IP,
HTTP, RSTP
PPTP, open
VPN
Data Entry
CTWO,WO,
CRI,SI
Patients
Relatives,
General
Public,
Surveillance
NAS
20Mbps
GFR
Focal Person,
EMT,s
Surveillance,
NAS
5Mbps
CBR
CBR
Connectivity
Rescue 1122 providing their services in 36 districts
All local offices are connected with Head Office using fiber over MPLS and VPN
for security and the backup links are on wireless Microwave Links (ISP to Local
Office)
Different persons access applications and data stores differently from different
locations.
Driver only have to access the Multimedia sharing application or service by using
available internet from his location.
EMT, s have to access different application so he will connect through a VPN form
remote location to Local office through wireless internet.
10
Focal person who will be available in hospital perform its connectivity with office
via VPN using any available internet
Below are Head office to district office and district office to other persons connectivity
diagram.
11
12