RJ Infotech Pvt Ltd Communication Methods

Modified: 23rd Sep 2019
Wordcount: 5846 words

Disclaimer: This is an example of a student written essay. Click here for sample essays written by our professional writers.
Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.ae.

Cite This

Advance Data Communication & Networks

Assignment

Summary

This report includes the communication methods and how the services are works in RJ Infotech Pvt Ltd. It also includes the tools used to configure and establish a supple and strong network. The report also includes the security methods which can be execute in future and which are currently used by organization. The security of the network and the network diagram is also included in the report.

This organization provides middleware solutions for banking customer delivery channel, Applications for E-Commerce and updating/maintaining banking database, providing front end service to many corporate banks.

Table of Contents

Summary

Table of Figures

Introduction

About RJ Infotech Pvt Ltd

Company Data Centers

Data center Logic diagram

What is three tier architecture?

RJ Infotech Pvt Ltd. 3 Tier Architecture

Company’s services and Application design

Advantages of 3-tier Architecture:

Network Security& Connectivity

Virtual private network (VPN)

VPN PROTOCOLS

Multiprotocol Label Switching (MPLS)

Technical capabilities and features:

Network diagram

How a client demands applications/work on company servers:

1. Web Portal interface and GTM

Redundancy in Web portal

2. IVR Interface

3. API request processing

Interchange gateway service:

Application deployment in RJ Infotech Pvt Ltd:

Network devices

Network switch:

Router:

Firewall:

Load balancer:

Server:

Routing Protocols used

BGP

EIGRP

OSPF

Company future aspects

Analysis and Recommendation

Recommendation & Conclusion

References

Appendix

Table of Figures

Figure 2:  data center

Figure 1: data center

Figure 3: Data Center logical diagram

Figure 4: Three tier architecture

Figure 5: Request and response in 3-tier structure

Figure 6: Company’s services illustration

Figure 7 VPN

Figure 8:  Company’s Network diagram

Figure 9:  Web Portal URL request

Figure 10:  Web portal URL Network flow

Figure 11 IVR network flow

Figure 12:  API network Flow and redundancy

Figure 13: Interchange for VISA AMEX cards

Figure 14: Application services Deployment

Introduction

Data Communication and networking are changing the arena of enterprise and each day lives. Before industrial revolution sharing and changing statistics are executed in a conventional manner.

A network is combination of computer systems, gadgets and printers. An internet which is most common thing in today’s world is nothing but just a combination of thousands of interconnected networks. At present time private sectors, government sectors and people, all are depending on the internet.

The organization about which we will discussed in this report has been working since last 10 years in India. When the company was started they have only staff of few people. As the new technologies started to come in the market, it also brings the threats too. So, the organization hired new technicians to provide the securities related to online attacks, frauds. As the time passes, they have expanded their business by providing security services to corporate banks. They have around 2000 of employees including all the branches.

About RJ Infotech Pvt Ltd

While we contacted one of the employees of this company for this assignment report, he was ready to help us by giving the information as much as he can but without reveal the name of the organization. So, we have used ‘RJ Infotech Pvt Ltd’ as company name instead of real name.

RJ Infotech Pvt Ltd provides explanation regarding to online transactions, banking solutions payment gateways for how to do transaction process, transaction authorization, providing front-end services.

The company’s main agenda is providing security for customer/clients. This includes:

  • E-Commerce Payment Gateways.
  • Internet based solutions.
  • Aiding and solution of transaction process.
  • Transaction Authorization.
  • Business solutions related to Smart/Debit/Credit card.
  • Design and develop online transaction processing systems.

Company Data Centers

Data Centers of RJ Infotech Pvt Ltd. are deployed and operated under GPX Global Data center and network distributor

Data Centers of GPX Global are present across the world and developed with the standard of 3 tier architecture.

All the Data Center are individual in nature, means if something happens to the data center then other data center can take over the load from that data center.

Live failover tests are being performed regularly on regular intervals on every data center. Report server/ IVR server (Redundant servers in active-passive mode) Active-active mode is applied for database storage for 100% redundancy.

Figure 1: data center

Figure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagram

Figure 4: Three tier architectureFigure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagram

Figure 4: Three tier architectureFigure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagramFigure 1: data center

Figure 2:  data center

Figure 1: data centerFigure 2:  data center

Figure 1: data center

Figure 3: Data Center logical diagram Figure 1: data centerFigure 2:  data center

Figure 1: data centerFigure 2:  data center

Figure 1: data center

Figure 3: Data Center logical diagram Figure 1: data center

Figure 3: Data Center logical diagram

Figure 4: Three tier architectureFigure 3: Data Center logical diagramFigure 1: data center

Figure 3: Data Center logical diagramFigure 1: data centerFigure 2:  data center

Figure 1: data centerFigure 2:  data center

Figure 1: data center

Figure 3: Data Center logical diagramFigure 1: data centerFigure 2:  data center

Figure 1: data centerFigure 2:  data center

Data center Logic diagram

What is three tier architecture?

 “3-tier architecture is that in which presentation, logic and data layers along with user interface are deployed and maintained as separate modules for each platform”

The three tiers in a three-tier architecture are:

  1. Presentation Tier: The presentation tier is the front-end layer in the 3-tier system and consists of the user interface. Web languages and scripts such as HTML, Java CSS and other development frameworks are used to build presentation layer.
  2. Application Tier: Application tier contains the utilitarian logic that gives an application’s main strengths. It’s developed using C, java C++.
  3. Data Tier: The data tier includes the data base and “data access layer”. This is written and functions on languages namely SQL, Oracle DBMS etc. (JReport, n.d.)

 

RJ Infotech Pvt Ltd. 3 Tier Architecture

For all the 3 layers of 3 tier architecture and data managing activities of organization is uses one client/server architecture.

For physical structuring the tier system structure mechanism is used.

The structure is made upon 3 cluster:

  • A front-end server provides control & store dynamic data. In electronic application, front end content is published by internet browser.
  • Application server for main data computing and propagating.
  • A back-end database server has information sets as well as the database managing database management system software.

Company’s services and Application design

Data center application of the company has been planned, fabricated and positioned on 3 tier structure. All tiers are deployed for failover. And accessibility had been made across all the tiers for failover.

Advantages of 3-tier Architecture:

  • It makes the sensible distinguishing on between business layer and presentation layer and database layer.
  • Migration to new graphical condition at a quicker environment
  • As entry level tier is autonomous it is conceivable to empower parallel improvement of by utilizing diverse arrangements of designers.
  • Easy to keep up and see substantial undertaking and complex task.
  • Database security can be implemented at application layer.
  • Published information from the presentation layer can be checked at application layer before refreshing and relinquishing it to database.
  • Application layer can be a shield to the information database.
  • We can publish only vital techniques from business layer in the presentation layer.
  • We can conceal superfluous strategies from the business layer in the presentation layer.

.

In this model all server nodes are logically separated and linked through TCP/IP protocol. (programming tutorial place, 2014)

Network Security& Connectivity

MPLS and VPN technology is being implemented for connection across all Data centers and operation centers.

Virtual private network (VPN)

A virtual private network (VPN) is that which carries forward a private network onto a public network, and defines clients to transmit information across public networks as if their connectivity appliances are directly disbursed onto the private network. 

 

(VPN, n.d.) 

VPN PROTOCOLS

“Open VPN is prolifically known as open source VPN protocol. This suggests that clients can explore its source code for security breaches. It is considered as one of the most important VPN services, and one of the most guarded protocols”.

“Layer 2 Tunnel Protocol known as L2TP Protocol it is developed after decline of PPTP protocol, deployed by Microsoft, designed and architecture by Cisco. However, no encryption is enabled on L2TP protocol.”

“Point-to-Point Tunneling Protocol is the earliest of all the VPN protocols. Though it’s been extinct since long but still some of clients still use it and is in force”. (VPN Protocols, n.d.)

Multiprotocol Label Switching (MPLS)

A network packet is assigned as a unique character for MPLS to function. Information such as routing table host and destination IP addresses, bandwidth is contained in this label. Routing decision is taken by the router by looking in to the label but not having a total look onto the routing table. IP, Asynchronous Transfer Mode (ATM), frame relay, are supported by MPLS. MPLS works on packet switching as well as circuit switching.

Designed for security RJ Infotech Pvt Ltd run VPN services over a dedicated MPLS infrastructure that is physically separate from any internet backbone service provider network, to help and ensure that your business data is always protected and controlled while still offering you a cost effective MPLS based solution (MPLS , n.d.)

Technical capabilities and features:

Dedicated carrier MPLS core for VPN offers network isolation from the internet for enhanced privacy and security.

Last mile Ethernet or fiber services offer you control of your routing and addressing environment, so you don’t risk exchanging sensitive or secure information on our network.

RJ Infotech Pvt Ltd support high levels of security regulations across government financial and other industries.

Reliable solutions

RJ Infotech carrier portal reports show extensive network details and services routinely exceeded SLA requirements.

They provide diverse network paths for redundancy and business continuity and offers multiple options on both levels of redundancy. (Last Mile, carrier POP, Provider)

Network diagram

How a client demands applications/work on company servers:

1.      Web Portal interface and GTM

•         RJ Infotech offers Domain deployment Service the two clients.

•         Register and manage Domains on behalf of client or under the name of RJ Infotech Pvt Ltd and assign to a specific client.

•         Map the domains to RJ Infotech Pvt Ltd data centers through our Global Traffic Selector (GTM) solution. It enables domain to be routed to the available data center through the available ISP.

•         Procure and manage SSL certificates

•         Configure the same through Web Application Firewall (WAF) and Web Accelerator.

 

 

 

 

Redundancy in Web portal

 

2.      IVR Interface

•         RJ Infotech Pvt Ltd has IVR solution supported on both Chennai & Singapore Data Centre

•         They have direct partnered IVR number providers and through them number’s will be procured for the clients

•         Numbers can be procured country to country basis

•         All type of numbers can be supported by our partner provider like DID, Toll Free & ITFS

•         Customer can also provide or share their own numbers and we can integrate on our solution

•         Call Centre call transfer is also a part of the entire IVR solution.

•         RJ Infotech IVR Service Providers

      Delacon & X-on 

•         From Delacon TFN, ITFN, DID numbers are obtained for all countries.

•         They use X-on to support UK IVR number and routing requirements.

•          Both Inbound/Outbound call routing are performed from RJ Infotech Pvt Ltd over Delacon Network

•          3rd Party call transfer options available

3.      API request processing

RJ InfoTech Pvt Ltd provides banking solutions to more than 20 banks across the world. As a part of the service the company authenticates customer’s username and password for transactions. Database of RJ Infotech has of 1.7 crore products of customers.

For every attempt request made. Probing into client’s page for the search API request is created updates for merchant and network are automatically implemented each year

 

Interchange gateway service:

VitzVs is a patented interchange that enables to have gateway to financial transaction interchanges such as (MASTER CARD, AMEX, and VISA) and other national interchanges 

A payment authorizer is a third-party application selected by a client to manage transactions from different sources such as credit and debit cards and online payment gateways

As the card association such as AMEX, VISA etc. receives any transaction from bank then a reply of approval or denial of transaction gateway is immediately sent as a part of the interchange service

Application deployment in RJ Infotech Pvt Ltd:

The above figure represents the implementation of various services provided by the company on their patented service switching application and it is a core payment engine that financial transactions authorizing from different gateways such as ATM, point of sale (POS), internet banking, Telephonic etc.

The service has been differentiated into two segments

1. Authorization services:

ATM, POS and internet banking transactions service are being authorized in this

2. Web Services:

IVR, API, Email, SMS and mobile authorization are carried over web services.

Network devices

Network switch:

 A device in a network that connects all devices with one another. It monitors the transmission of information over communicating channel by sending and acquiring data to the devices that are meant to share the data with.

Router:

 “A router is a device that is used for networking purpose. It sends data packets between computers and networks”. Routers perform traffic directing functions on the internet, such as a web page or email in the form of data packets from source node to destination node (Router, n.d.)

Firewall:

“A firewall is a network security device that scrutinizes traffic on coming and outgoing and decides whether to allow or block the traffic accordingly following the rules that are predefined. A proxy firewall acts as the gateway from an application or a communicating device to a specific network to give permission or denial”.  (Firewall, n.d.)

Load balancer:

“A load balancer is a device/ that acts as a reverse proxy and distributes network or application traffic across several servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications. They improve the overall performance of applications by decreasing the burden on servers associated with managing and maintaining application and network sessions, as well as by performing application-specific tasks”. (Load balance, n.d.)

Server:

A server is a computer program that provides a service to another computer programs. In a data center, the physical computer that a server program runs in is also frequently referred to as a server. That machine may be a dedicated server or it may be used for other purposes as well. (Server, n.d.)

Types of servers

•         Application server

•         Client server

•         Webserver

•         Proxy server

•         Mail server

•         File server

Routing Protocols used

BGP, EIGRP and OSPF are the protocols that are being implemented in the company’s network configuration.

BGP

It is a dynamic routing protocol, the characteristics of BGP are it is complex and hard for the network administrator its complex configuration to understand & it is exterior routing protocol

EIGRP

“EIGRP is a considered as reciprocate to RIP. The latest introduced IGRP (EIGRP) made IGRP extinct. It is a classless IP addressing routing protocol and enhance the efficiency of the routing algorithms compared to previous IGRP”. It does not assist routing hierarchies, like RIP.

OSPF

Called as Open shortest path first, it is introduced to subdue the restraints caused in other routing protocol strategies

•         It is a dynamic routing protocol

•         It uses link state algorithm

•         Interior gateway routing protocol which is used in autonomous system

•         Sends only routing updates info not the whole table

•         Support CIDR

‘OSPF-enabled routers determine the network by sending identification messages to each other tracked by messages that capture special routing items rather than the entire routing table’. It is the only link state routing protocol listed in this category. (Routing protocols, n.d.)

Company future aspects

The company as of now provides employment to around two thousand individuals and has around 20 banks in their portfolio and as future aspects they are been in few more banking institutions to add to their company and to handle the requirement they are planning to upgrade the software architecture and incorporate few more data centers across various cities to handle client’s data.

Find Out How UKEssays.com Can Help You!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our academic writing services

Analysis and Recommendation

Since the company is into operation from a decade back they are using PC to implement and backup financial transactions, this made the data vulnerable which happens to be most important data for each customer/client as there banking information is at risk. Though still there is no impeccable procedure to defend or protect information from security breaches day by day new tech comes into action, hackers have even more prolific ways to manipulate the data and abduct information.

The company implements MPLS to enable security across the connectivity, though MPLS has great efficiency, bandwidth utilization, and less network congestion, it has glitch which as a result makes companies data vulnerable and puts it at risk is that it doesn’t provide end-end encryption. Even though MPLS depends on VPN.

As the technology advances, more adaptation on the cloud technology to have access on their information. It is suggested to go cloud based security solutions

Recommendation & Conclusion

As a part our understanding about the organization connectivity and security we would like to suggest the company to implement SD-WAN sidelining MPLS, this allows operator to react ASAP to the enhancing technology according to the business demand. The prolific uses of implementing this method is, its functional, network virtualization and automation that becomes quite handy in a cloud base architecture.

References

  • Firewall. (n.d.). Retrieved from cisco: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
  • JReport. (n.d.). Retrieved from www.jinfonet.com: https://www.jinfonet.com/resources/bi-defined/3-tier-architecture-complete-overview/
  • Load balance. (n.d.). Retrieved from f5: https://www.f5.com/services/resources/glossary/load-balancer
  • MPLS . (n.d.). Retrieved from Techopedia: https://www.techopedia.com/definition/527/multiprotocol-label-switching-mpls
  • programming tutorial place. (2014, dec 6). Retrieved from asp-net-by-parijat.blogspot.com: http://asp-net-by-parijat.blogspot.com/2014/12/advantages-and-disadvantages-of-using-3.html
  • Router. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Router_(computing)
  • Routing protocols. (n.d.). Retrieved from lifewire: https://www.lifewire.com/top-network-routing-protocols-explained-817965
  • Server. (n.d.). Retrieved from techtarget: //whatis.techtarget.com/definition/server
  • VPN. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Virtual_private_network
  • VPN Protocols. (n.d.). Retrieved from makeuseof: https://www.makeuseof.com/tag/major-vpn-protocols-explained/

Appendix

For this project report as a part of our second semester assignment we have contacted the company through a friend and accordingly we have gathered regularly to shape out the report in a way according to our understanding there were few hiccups in between but still we managed to complete on time and as a group of 2. We gathered at Akshit’s residence for working off days and on the day we had class we used to meet in library.

Meeting Schedule:

      All the meetings were attended by Akshit & Raj.

      Date: 26/8/2018

Location: Akshit house

Duration: 30 minutes

Purpose: Discussion about finding company, to whom we can contact.

      Date: 8/9/2018

Location: Unitec library

Duration: 1 hour

Purpose: To which company we have applied & from whom we got reply. (None)

      Date: 14/9/2018

Location: Unitec Library

Duration: 2 hours

Purpose: Raj found a company. We started discussion about the topics.

      Date: 22/9/2018

Location: Akshit house

Duration: 4 hours

Purpose: The information gathered and shared. Tasks has been divided between group members.

      Date: 6/10/2018

Location: Akshit house

Duration: 3 hours

Purpose: The follow ups on given task. Discussion about how much information we have covered.

      Date: 14/10/2018

Location: Akshit house

Duration: 2 hours

Purpose: Compiled and discuss the given task. Assignment submitted.

 

Cite This Work

To export a reference to this article please select a referencing style below:

Give Yourself The Academic Edge Today

  • On-time delivery or your money back
  • A fully qualified writer in your subject
  • In-depth proofreading by our Quality Control Team
  • 100% confidentiality, the work is never re-sold or published
  • Standard 7-day amendment period
  • A paper written to the standard ordered
  • A detailed plagiarism report
  • A comprehensive quality report
Discover more about our
Essay Writing Service

Essay Writing
Service

AED558.00

Approximate costs for Undergraduate 2:2

1000 words

7 day delivery

Order An Essay Today

Delivered on-time or your money back

Reviews.io logo

1858 reviews

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider