RJ Infotech Pvt Ltd Communication Methods

Table of Contents

Don't use plagiarized sources. Get Your Custom Essay on
RJ Infotech Pvt Ltd Communication Methods
Just from $13/Page
Order Essay

Summary

Table of Figures

Introduction

About RJ Infotech Pvt Ltd

Company Data Centers

Data center Logic diagram

What is three tier architecture?

RJ Infotech Pvt Ltd. 3 Tier Architecture

Company’s services and Application design

Advantages of 3-tier Architecture:

Network Security& Connectivity

Virtual private network (VPN)

VPN PROTOCOLS

Multiprotocol Label Switching (MPLS)

Technical capabilities and features:

Network diagram

How a client demands applications/work on company servers:

1. Web Portal interface and GTM

Redundancy in Web portal

2. IVR Interface

3. API request processing

Interchange gateway service:

Application deployment in RJ Infotech Pvt Ltd:

Network devices

Network switch:

Router:

Firewall:

Load balancer:

Server:

Routing Protocols used

BGP

EIGRP

OSPF

Company future aspects

Analysis and Recommendation

Recommendation & Conclusion

References

Appendix

Figure 2:  data center

Figure 1: data center

Figure 3: Data Center logical diagram

Figure 4: Three tier architecture

Figure 5: Request and response in 3-tier structure

Figure 6: Company’s services illustration

Figure 7 VPN

Figure 8:  Company’s Network diagram

Figure 9:  Web Portal URL request

Figure 10:  Web portal URL Network flow

Figure 11 IVR network flow

Figure 12:  API network Flow and redundancy

Figure 13: Interchange for VISA AMEX cards

Figure 14: Application services Deployment

Data Communication and networking are changing the arena of enterprise and each day lives. Before industrial revolution sharing and changing statistics are executed in a conventional manner.

A network is combination of computer systems, gadgets and printers. An internet which is most common thing in today’s world is nothing but just a combination of thousands of interconnected networks. At present time private sectors, government sectors and people, all are depending on the internet.

The organization about which we will discussed in this report has been working since last 10 years in India. When the company was started they have only staff of few people. As the new technologies started to come in the market, it also brings the threats too. So, the organization hired new technicians to provide the securities related to online attacks, frauds. As the time passes, they have expanded their business by providing security services to corporate banks. They have around 2000 of employees including all the branches.

About RJ Infotech Pvt Ltd

While we contacted one of the employees of this company for this assignment report, he was ready to help us by giving the information as much as he can but without reveal the name of the organization. So, we have used ‘RJ Infotech Pvt Ltd’ as company name instead of real name.

RJ Infotech Pvt Ltd provides explanation regarding to online transactions, banking solutions payment gateways for how to do transaction process, transaction authorization, providing front-end services.

The company’s main agenda is providing security for customer/clients. This includes:

E-Commerce Payment Gateways.

Internet based solutions.

Aiding and solution of transaction process.

Transaction Authorization.

Business solutions related to Smart/Debit/Credit card.

Design and develop online transaction processing systems.

Data Centers of RJ Infotech Pvt Ltd. are deployed and operated under GPX Global Data center and network distributor

Data Centers of GPX Global are present across the world and developed with the standard of 3 tier architecture.

All the Data Center are individual in nature, means if something happens to the data center then other data center can take over the load from that data center.

Live failover tests are being performed regularly on regular intervals on every data center. Report server/ IVR server (Redundant servers in active-passive mode) Active-active mode is applied for database storage for 100% redundancy.

 “3-tier architecture is that in which presentation, logic and data layers along with user interface are deployed and maintained as separate modules for each platform”

The three tiers in a three-tier architecture are:

Presentation Tier: The presentation tier is the front-end layer in the 3-tier system and consists of the user interface. Web languages and scripts such as HTML, Java CSS and other development frameworks are used to build presentation layer.

Application Tier: Application tier contains the utilitarian logic that gives an application’s main strengths. It’s developed using C, java C++.

Data Tier: The data tier includes the data base and “data access layer”. This is written and functions on languages namely SQL, Oracle DBMS etc. (JReport, n.d.)

 

For all the 3 layers of 3 tier architecture and data managing activities of organization is uses one client/server architecture.

For physical structuring the tier system structure mechanism is used.

The structure is made upon 3 cluster:

A front-end server provides control & store dynamic data. In electronic application, front end content is published by internet browser.

Application server for main data computing and propagating.

A back-end database server has information sets as well as the database managing database management system software.

Data center application of the company has been planned, fabricated and positioned on 3 tier structure. All tiers are deployed for failover. And accessibility had been made across all the tiers for failover.

Advantages of 3-tier Architecture:

It makes the sensible distinguishing on between business layer and presentation layer and database layer.

Migration to new graphical condition at a quicker environment

As entry level tier is autonomous it is conceivable to empower parallel improvement of by utilizing diverse arrangements of designers.

Easy to keep up and see substantial undertaking and complex task.

Database security can be implemented at application layer.

Published information from the presentation layer can be checked at application layer before refreshing and relinquishing it to database.

Application layer can be a shield to the information database.

We can publish only vital techniques from business layer in the presentation layer.

We can conceal superfluous strategies from the business layer in the presentation layer.

.

In this model all server nodes are logically separated and linked through TCP/IP protocol. (programming tutorial place, 2014)

MPLS and VPN technology is being implemented for connection across all Data centers and operation centers.

A virtual private network (VPN) is that which carries forward a private network onto a public network, and defines clients to transmit information across public networks as if their connectivity appliances are directly disbursed onto the private network. 

 

(VPN, n.d.) 

“Open VPN is prolifically known as open source VPN protocol. This suggests that clients can explore its source code for security breaches. It is considered as one of the most important VPN services, and one of the most guarded protocols”.

“Layer 2 Tunnel Protocol known as L2TP Protocol it is developed after decline of PPTP protocol, deployed by Microsoft, designed and architecture by Cisco. However, no encryption is enabled on L2TP protocol.”

“Point-to-Point Tunneling Protocol is the earliest of all the VPN protocols. Though it’s been extinct since long but still some of clients still use it and is in force”. (VPN Protocols, n.d.)

A network packet is assigned as a unique character for MPLS to function. Information such as routing table host and destination IP addresses, bandwidth is contained in this label. Routing decision is taken by the router by looking in to the label but not having a total look onto the routing table. IP, Asynchronous Transfer Mode (ATM), frame relay, are supported by MPLS. MPLS works on packet switching as well as circuit switching.

Designed for security RJ Infotech Pvt Ltd run VPN services over a dedicated MPLS infrastructure that is physically separate from any internet backbone service provider network, to help and ensure that your business data is always protected and controlled while still offering you a cost effective MPLS based solution (MPLS , n.d.)

Dedicated carrier MPLS core for VPN offers network isolation from the internet for enhanced privacy and security.

Last mile Ethernet or fiber services offer you control of your routing and addressing environment, so you don’t risk exchanging sensitive or secure information on our network.

RJ Infotech Pvt Ltd support high levels of security regulations across government financial and other industries.

Reliable solutions

RJ Infotech carrier portal reports show extensive network details and services routinely exceeded SLA requirements.

They provide diverse network paths for redundancy and business continuity and offers multiple options on both levels of redundancy. (Last Mile, carrier POP, Provider)

1.      Web Portal interface and GTM

•         RJ Infotech offers Domain deployment Service the two clients.

•         Register and manage Domains on behalf of client or under the name of RJ Infotech Pvt Ltd and assign to a specific client.

•         Map the domains to RJ Infotech Pvt Ltd data centers through our Global Traffic Selector (GTM) solution. It enables domain to be routed to the available data center through the available ISP.

•         Procure and manage SSL certificates

•         Configure the same through Web Application Firewall (WAF) and Web Accelerator.

 

 

 

 

 

2.      IVR Interface

Figure 10:  Web portal URL Network flow

•         RJ Infotech Pvt Ltd has IVR solution supported on both Chennai & Singapore Data Centre

•         They have direct partnered IVR number providers and through them number’s will be procured for the clients

•         Numbers can be procured country to country basis

•         All type of numbers can be supported by our partner provider like DID, Toll Free & ITFS

•         Customer can also provide or share their own numbers and we can integrate on our solution

•         Call Centre call transfer is also a part of the entire IVR solution.

•         RJ Infotech IVR Service Providers

      Delacon & X-on 

•         From Delacon TFN, ITFN, DID numbers are obtained for all countries.

•         They use X-on to support UK IVR number and routing requirements.

•          Both Inbound/Outbound call routing are performed from RJ Infotech Pvt Ltd over Delacon Network

•          3rd Party call transfer options available

3.      API request processing

RJ InfoTech Pvt Ltd provides banking solutions to more than 20 banks across the world. As a part of the service the company authenticates customer’s username and password for transactions. Database of RJ Infotech has of 1.7 crore products of customers.

For every attempt request made. Probing into client’s page for the search API request is created updates for merchant and network are automatically implemented each year

 

VitzVs is a patented interchange that enables to have gateway to financial transaction interchanges such as (MASTER CARD, AMEX, and VISA) and other national interchanges 

A payment authorizer is a third-party application selected by a client to manage transactions from different sources such as credit and debit cards and online payment gateways

As the card association such as AMEX, VISA etc. receives any transaction from bank then a reply of approval or denial of transaction gateway is immediately sent as a part of the interchange service

The above figure represents the implementation of various services provided by the company on their patented service switching application and it is a core payment engine that financial transactions authorizing from different gateways such as ATM, point of sale (POS), internet banking, Telephonic etc.

The service has been differentiated into two segments

1. Authorization services:

ATM, POS and internet banking transactions service are being authorized in this

2. Web Services:

IVR, API, Email, SMS and mobile authorization are carried over web services.

 A device in a network that connects all devices with one another. It monitors the transmission of information over communicating channel by sending and acquiring data to the devices that are meant to share the data with.

 “A router is a device that is used for networking purpose. It sends data packets between computers and networks”. Routers perform traffic directing functions on the internet, such as a web page or email in the form of data packets from source node to destination node (Router, n.d.)

“A firewall is a network security device that scrutinizes traffic on coming and outgoing and decides whether to allow or block the traffic accordingly following the rules that are predefined. A proxy firewall acts as the gateway from an application or a communicating device to a specific network to give permission or denial”.  (Firewall, n.d.)

“A load balancer is a device/ that acts as a reverse proxy and distributes network or application traffic across several servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications. They improve the overall performance of applications by decreasing the burden on servers associated with managing and maintaining application and network sessions, as well as by performing application-specific tasks”. (Load balance, n.d.)

A server is a computer program that provides a service to another computer programs. In a data center, the physical computer that a server program runs in is also frequently referred to as a server. That machine may be a dedicated server or it may be used for other purposes as well. (Server, n.d.)

Types of servers

•         Application server

•         Client server

•         Webserver

•         Proxy server

•         Mail server

•         File server

BGP, EIGRP and OSPF are the protocols that are being implemented in the company’s network configuration.

It is a dynamic routing protocol, the characteristics of BGP are it is complex and hard for the network administrator its complex configuration to understand & it is exterior routing protocol

“EIGRP is a considered as reciprocate to RIP. The latest introduced IGRP (EIGRP) made IGRP extinct. It is a classless IP addressing routing protocol and enhance the efficiency of the routing algorithms compared to previous IGRP”. It does not assist routing hierarchies, like RIP.

Called as Open shortest path first, it is introduced to subdue the restraints caused in other routing protocol strategies

‘OSPF-enabled routers determine the network by sending identification messages to each other tracked by messages that capture special routing items rather than the entire routing table’. It is the only link state routing protocol listed in this category. (Routing protocols, n.d.)

The company as of now provides employment to around two thousand individuals and has around 20 banks in their portfolio and as future aspects they are been in few more banking institutions to add to their company and to handle the requirement they are planning to upgrade the software architecture and incorporate few more data centers across various cities to handle client’s data.

Since the company is into operation from a decade back they are using PC to implement and backup financial transactions, this made the data vulnerable which happens to be most important data for each customer/client as there banking information is at risk. Though still there is no impeccable procedure to defend or protect information from security breaches day by day new tech comes into action, hackers have even more prolific ways to manipulate the data and abduct information.

The company implements MPLS to enable security across the connectivity, though MPLS has great efficiency, bandwidth utilization, and less network congestion, it has glitch which as a result makes companies data vulnerable and puts it at risk is that it doesn’t provide end-end encryption. Even though MPLS depends on VPN.

As the technology advances, more adaptation on the cloud technology to have access on their information. It is suggested to go cloud based security solutions

As a part our understanding about the organization connectivity and security we would like to suggest the company to implement SD-WAN sidelining MPLS, this allows operator to react ASAP to the enhancing technology according to the business demand. The prolific uses of implementing this method is, its functional, network virtualization and automation that becomes quite handy in a cloud base architecture.

Firewall. (n.d.). Retrieved from cisco: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

JReport. (n.d.). Retrieved from www.jinfonet.com: https://www.jinfonet.com/resources/bi-defined/3-tier-architecture-complete-overview/

Load balance. (n.d.). Retrieved from f5: https://www.f5.com/services/resources/glossary/load-balancer

MPLS . (n.d.). Retrieved from Techopedia: https://www.techopedia.com/definition/527/multiprotocol-label-switching-mpls

programming tutorial place. (2014, dec 6). Retrieved from asp-net-by-parijat.blogspot.com: http://asp-net-by-parijat.blogspot.com/2014/12/advantages-and-disadvantages-of-using-3.html

Router. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Router_(computing)

Routing protocols. (n.d.). Retrieved from lifewire: https://www.lifewire.com/top-network-routing-protocols-explained-817965

Server. (n.d.). Retrieved from techtarget: //whatis.techtarget.com/definition/server

VPN. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Virtual_private_network

VPN Protocols. (n.d.). Retrieved from makeuseof: https://www.makeuseof.com/tag/major-vpn-protocols-explained/

For this project report as a part of our second semester assignment we have contacted the company through a friend and accordingly we have gathered regularly to shape out the report in a way according to our understanding there were few hiccups in between but still we managed to complete on time and as a group of 2. We gathered at Akshit’s residence for working off days and on the day we had class we used to meet in library.

Meeting Schedule:

      All the meetings were attended by Akshit & Raj.

      Date: 26/8/2018

Location: Akshit house

Duration: 30 minutes

Purpose: Discussion about finding company, to whom we can contact.

      Date: 8/9/2018

Location: Unitec library

Duration: 1 hour

Purpose: To which company we have applied & from whom we got reply. (None)

      Date: 14/9/2018

Location: Unitec Library

Duration: 2 hours

Purpose: Raj found a company. We started discussion about the topics.

      Date: 22/9/2018

Location: Akshit house

Duration: 4 hours

Purpose: The information gathered and shared. Tasks has been divided between group members.

      Date: 6/10/2018

Location: Akshit house

Duration: 3 hours

Purpose: The follow ups on given task. Discussion about how much information we have covered.

      Date: 14/10/2018

Location: Akshit house

Duration: 2 hours

Purpose: Compiled and discuss the given task. Assignment submitted.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy