Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
OF
SIX MONTHS INDUSTRIAL TRAINING, UNDERTAKEN
AT
IN
NETWORKING
ON
IPv6
OF
BACHELOR OF TECHNOLOGY
IN
Computer Science and Engineering
Submitted By:
Designation: IT MANAGER
Department: IT
ACKNOWLEDGEMENT
The 16 weeks Industrial Training is a part of my course curriculum of B. TECH
(COMPUTER SCIENCE), which I am pursuing at DEPARTMENT OF COMPUTER
SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND
TECHNOLOGY, RAJPURA (PUNJAB).so I am thankful to all the authorities of my
institute, who design our course curriculum, as this training helps us to
update our knowledge & built a practical approach.
I would like to express my indebtedness to Mr. S. Srinivasan (Factory
Manager), Dr. B.S. Bhullar (Sr. Manager -Corporate Affairs & I.R)Ms. Rupika
Singh (H.R manager) for permitting me to undergo my training at Nestle
India Ltd., Moga Factory.
I shall be failing in my duty if I do not acknowledge the help extended by
Mr V.S CHAUHAN(IT MANAGER) ER PANKAJ &Mr DALJEET SINGH , other
officers and supervisors.
I would like to acknowledge the warmth, affection and co-operation by the
operators and workers of Nestle India Ltd.
Finally I would like to say that without the help of above-mentioned people,
my stay at industry would not have been such a memorable period itched in
my memory as sweet experience.
EXECUTIVE SUMMARY
This document dwells upon my project training at esteemed and worldwide
organization NESTLE INDIA LTD. from 6.1.2014 to 15.05.2014. This training is
a part of my course curriculum pursuing at DEPARTMENT OF COMPUTER
SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND
TECHNOLOGY,RAJPURA(PUNJAB). In these four months of my training I learnt
about the commitment of the company towards quality of the food stuff it
produces, more than sufficient efforts are made by the company and its
employees at every critical point of production that assures the quality of the
products that reaches to the consumers. It gives me immense pleasure to
present this project report.
My training in this esteemed organization helped me to know & learn the
practical aspects of industrial performance, theoretical part of which we
studied in our course books. Learning in nestle was not limited to doing
project. I was involved in understanding the culture of company, learning
various processes, way the people co-ordinate with each other & effects of
teamwork. Some other results of my training are better communication,
enhanced confidence & more practical outlook towards life.
In the end, I would like to say that my experience in this factory would be an
indispensable one throughout my life & I would like to thank all of them once
again who have made it that way.
Mr . V.S CHAUHAN
(IT MANAGER)
TABLE OF CONTENTS
Introduction to company
Nestle History
Nestle logo
Operation In INDIA
MOGA Factory
Various Deptt. In Nestle MOGA Factory
1.Acknowledgement
Chapter-1
INTERNETWORKING BASICS
o What is Computer Network?
Types of networks
o 1.2(a) Local area network (LAN)
o 1.2(b) Wide Area Network (WAN)
o 1.2(e) Metropolitan area network (MAN)
o 1.2(f) Virtual private network (VPN)
CHAPTER-2
o DEVICES
2.1 DEVICES-:
2.1(a) Router
2.1(b) Switches
2.1(c)Hub
2.1(d)Bridge
CHAPTER-3
o ROUTING BASICS
3.1 ROUTING
3.2 STATIC ROUTING
3.3 Default Routing
3.4 Dynamic Routing
3.5 Autonomous system
3.6 Distance Vector Routing
3.7 Metric of Dynamic Routing
CHAPTER-4
o PROTOCOLS
4.1 Routing Protocols
4.2 Routed Protocols
4.2(a) Categories of Routing Protocols
4.3 IGRP
4.4 OSPF (Open Shortest Path First) Protocol
4.5 EIGRP
CHAPTER-5
o
DHCP
5.1 DHCP
5.2(a) Dynamic Allocation
5.2(b) Automatic Allocation
LIST OF FIGURES
Figure-2.1 Router
Figure-2.2 Switches
Figure-2.3 Hub
Figure-2.4 Bridge
Figure-3.1 Configuring Static Routes by Specifying Outgoing
Interfaces
Figure-3.2(a) & Figure-3.2(b) Configuring Static Routes by
LIST OF TABLES
Introduction To Company
Nestl is dedicated to bringing the joy of Good Food, Good Life to people
throughout their lives, throughout the world.
The Nestl Company was Henry Nestl's search for a healthy, economical
alternative to breastfeeding for mothers who could not feed their infants
at the breast.
The Company formed by the 1905 merger was called the Nestl and
Anglo- Swiss Milk Company. The close of World War II marked the
beginning of the most dynamic phase of Nestl's history.
Between 1975 and 1977, the price of coffee beans quadrupled, and the
price of cocoa tripled.
Year
Achievements
1866
Company's foundation
1905
1929
1947
1971
1985
1988
1988
1992
1995
1997
1998
1999
10
11
12
13
14
199
9
15
2000
16
2001
17
2002
18
2006
19
2008
28%
Beverages
6%AMS : Americas
ZONE
Pharmaceuticals
India comes under zone AOA which includes South- East Asian
27%trading giants of
14%
the likes of Thailand,
Indonesia, Malaysia, Singapore,
etc. besides
MilkChina
Products
Chocolate
Australia. Mr.
M.W. Garret currently heads ZONE AOA.
Confectionery
Nutrition
Ice Cream
Currently Biscuits
Mr. Peter Brabeck heads the Nestle group worldwide and Mr. M.W.
Garret heads zone AOA
25%
Cooking Aids
Prepared dishes
Pet Care
Samalkha (Haryana)
Ponda (Goa)
Bicholim(Goa)
Pantnagar (Uttrakhand)
MOGA Factory
Moga factory started production in1962.
Today, Moga contributing almost 75% of
Nestle Indias total production volume and
manufacturing
109671
tons
of
food
Nanjangud Factory
Production in Nanjangud Factory started
in 1989 with the manufacturing of
Nescafe and Sunrise. Milo manufacture
at Nanjangud begun in 1996. It situated
160 kilometers south of Bangalore; the
factory has around 245 employees. It
manufactures 15500 tons of Nescafe
Bicholim Factory
A satellite factory of Ponda at Bicholim
for manufacturing of Noodles and Cold
Sauces, It started their operational
activity in 1997.
Ponda Factory
Ponds Factory started production of Kit
Kat in 1995. It is located 40 kilometers
from
Panji
the
manufactures
capital
of
Chocolates.
Goa.
Ponda
Samalkha Factory
Samalkha Factory started production
in 1993 situated 70 kilometers from
Delhi. It has 260 employees and
manufactures about 35000 tons of
food
Infant
products
Cereals,
comprising
Noodles,
IMFs,
Chilled
Pantnagar
Factory
It
began
Tahliwal Factory:
The 8th Factory was set up at Tahliwal,
Himachal
Pradesh,
in
2012.
It
will
Choladi Factory
The factory ion Choladi started production in 1967, Situated in
South Asia, about 275 kilometers from Bangalore. The factory
today has around 80 employees. It processes about 725 tons of
soluble tea, which is all exported.
Chocolates
Campco, Puttur
Toffees
Nutrine, Surendranagar
Creamer
Nestl Polo
Pickles
Tasters Choice
Bakemans (Nagpur)
Choride foods Ltd.(Puna)
Dosa&Samber mix
CHAPTER- 2
INTRODUCTION TO PRODUCT RANGE
Condensed milk
Powdered milk
Tea
Ice creams
Coffee
Milk and Deities
Culinary products
Culinary
Frozen products
Cereal
Fruit juices
Instant Drink
Mineral water
Pet foods
Pharmaceuticals&
Cosmetics
Infant foods
Cerevita
Ghee
is
100%
pure
Clarified
Butter
Partly
Skimmed
Sweetened
Condensed
Milk,
NESTL
2.3 The factory consists of four production plants:
MILK OPERATIONS
CEREALS
INSTANT DRINKS (VENDING MIXES)
CULINARY
Project Requirements
LAN Hardware:
Distribution Layer :
catalyst 2960
WAN Hardware:
1 FE Card
1 WIC 1T card
The
following
table
lists
the
minimum
and
Componen
t
Processor
Recommende
Minimum
2.5 gigahertz
(GHz)
Dual
processors
that are each
3
GHz
or
faster
RAM
gigabyte
2 GB
(GB)
Disk
EXT-3
System
File
EXT-3
File
System/NTFS
/NTFS
Drive
DVD drive
DVD drive or
the
copied
source
to
local
or
networkaccessible
drive
Display
1024 768
1024 768
or
higher
resolution
monitor
Network
56
per
kilobits
512Kbps
second
faster
(Kbps)
connection
connection
between
between
client
client
computers
computers
and server
and server
FEASIBILITY STUDY
1. Technology
or
2. Economic
The technological and system requirements of the project would not
require much of a cost. As we are doing the project at student level for the
partial fulfilment of Btech.degree so the technologies
mentioned were
3. Schedule
The project is divided in a time span of 6 weeks so the project
completion will not be an issue.
The project deadline will be easily met and all the activities necessary
to be performed will be completed within the fixed time.
CHAPTER-1
INTRODUCTION TO
INTERNETWORKING
BASICS
Chapter-1
INTRODUCTION TO INTERNETWORKING
BASICS
communications.
Using
network,
people
can
Information preservation.
Security.
Speed up.
WAN stands for Wide Area Network, in which two local area
networks are connected through public n/w. it may be through
telecommunication infrastructure or dedicated lines. For e.g.: - ISDN
lines, Leased lines etc. In which we can use WAN devices and WAN
technology. You can also connect with your remote area through
existing Internetwork called Internet.
CHAPTER-2
DEVICES
2.1 DEVICES-:
2.1(a)Router
Router is hardware device, which is used to communicate two
different networks. Router performs routing and path determination. It
does not perform broadcast information. There are two types of
routers: (i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and
remote access. This feature is offered by Microsoft. This feature is by
default installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient.
But in case of software routers, it has less features, slow performance.
They are not very much efficient.
Figure-2.1
2.1(b) Switches
Switch is also used to connect multiple workstations. Switch is more
intelligent than hub. It has special kind of memory called mac
address/filter/lookup table. Switch reads mac addresses. Switch stores
mac addresses in its filter address table. Switch when receives frame,
it reads the destination mac address and consult with its filter table. If
he has entry in its filter table then he forwards the frame to that
particular mac address, if not found then it performs broadcasting to
all its connected nodes.
Every port has its own buffer memory. A port has two queues one is
input queue and second is output queue. When switch receives the
frame, the frame is received in input queue and forward from output
queue. So in case of switch there is no chance or place for collisions.
In case of switch, the media access method is used CSMA/CA
(Carrier Sense Multiple Access/ Collision Avoidance). Switches
provide more efficiency, more speed and security.
There are two types of switches: (i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.
Figure-2.2
2.1(c)Hub
Hub is centralized device, which is used to connect multiple
workstations. There are two types of Hub: (i) Active Hub
(ii) Passive Hub
It has no special kind of memory. It simply receives the frame (data)
and forwards it to all its nodes except the receiving node. It always
performs broadcasting. In case of hub, there is one collision domain
and one broadcast domain. In case of hub, the media access method is
used CSMA/CD (Carrier Sense Multiple Access/Collision Detection).
(i) Active Hub
In Passive hub, it simply receives the frame and forward to all its
connected nodes.
Figure-2.3
2.1(d)Bridge
Bridge is a hardware
device,
Figure-2.4
CHAPTER-3
ROUTING
3.1 ROUTING
Routing is the process that a router uses to forward packets toward the
destination network. A router makes decisions based upon the
destination IP address of a packet. All devices along the way use the
destination IP address to point the packet in the correct direction so
that the packet eventually arrives at its destination. In order to make
the correct decisions, routers must learn the direction to remote
networks.
3.2(a) Steps to perform static routing (1) Create a list of all n/w present in internetwork.
(2) Remove the n/w address from list, which is directly connected to
n/w.
(3) Specify each route for each routing n/w by using IP route
command.
Router(config)#ip route <destination n/w><mask><next hop ip>
Figure-3.1
Figure-3.2(a)
Figure-3.2(b)
Or
<exit interface>
The routers will pass routing information receive from one router to
other router also. If there are more than one path available then routes
are compared and best path is selected. Some examples of dynamic
protocol are: RIP, IGRP, EIGRP, OSPF
3.4(a) Types of Dynamic Routing Protocols
According to the working there are two types of Dynamic Routing
Protocols.
(1) Distance Vector
(2) Link State
3.4(b) According to the type of area in which protocol is used there
are again two types of protocol: -
(2) The neighbor will receive routing updates and process the route
according to following conditions: (i) If update of a new n/w is received then this information is stored in
routing table.
(ii) If update of a route is received which is already present in routing
table then route
(iii) If update is received for a route with lower metric then the route,
which is already present in our routing table. The router will discard
old route and write the new route in the routing table.
(iv) If update is received with higher metric then the route that is
already present in routing table, in this case the new update will be
discard.
(3) A timer is associated with each route. The router will forward
routing information on all interfaces and entire routing table is send to
the neighbor. There are three types of timers associated with a route.
(i) Route update timer
It is the time after which the router will send periodic update to the
neighbor.
(ii) Route invalid timer
It is the time after which the route is declared invalid, if there are no
updates for the route. Invalid route are not forwarded to neighbor
routers but it is still used to forward the traffic.
1.Hop Count
It is the no. of Hops (Routers) a packet has to travel for a destination
n/w.
2.Bandwidth
Bandwidth is the speed of link. The path with higher bandwidth is
preferred to send the data.
3.Load
Load is the amount of traffic present in the interface. Paths with lower
load and high throughput are used to send data.
4.Reliability
Reliability is up time of interface over a period of time.
5. Delay
Delay is the time period b/w a packet is sent and received by the
destination.
Figure-3.3
CHAPTER-4
PROTOCOLS
4.1 Routing Protocols
Routing protocols includes the following processes for sharing route
information allows routers to communicate with other routers to
update and maintain the routing tables
Examples of routing protocols that support the IP routed protocol are:
RIP, IGRP,
OSPF, BGP,
And EIGRP.
Figure-4.1
distance vector
link-state
Table-4.1
CHARACTERISTICS
Table-4.2
Figure-4.2
4.3 IGRP
Interior Gateway Routing Protocol (IGRP) is a proprietary protocol
developed by Cisco.
Some of the IGRP key design characteristics emphasize the following:
Holddowns
Split horizons
Holddowns
Holddowns are used to prevent regular update messages from
inappropriately reinstating a route that may not be up.
Split horizons
Split horizons are derived from the premise that it is usually not useful
to send information about a route back in the direction from which it
came.
Poison reverse updates
Split horizons prevent routing loops between adjacent routers, but
poison reverse updates are necessary to defeat larger routing loops.
Today, IGRP is showing its age, it lacks support for variable length
subnet masks (VLSM). Rather than develop an IGRP version 2 to
correct this problem, Cisco has built upon IGRP's legacy of success
with Enhanced
Each network
Figure-4.3
4.5 EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Ciscoproprietary routing protocol based on Interior Gateway Routing
Protocol (IGRP).
Unlike IGRP, which is a classful routing protocol, EIGRP supports
CIDR and VLSM.
Compared to IGRP, EIGRP boasts faster convergence times, improved
scalability, and superior handling of routing loops.
Furthermore, EIGRP can replace Novell Routing Information Protocol
(RIP) and AppleTalk Routing Table Maintenance Protocol (RTMP),
serving both IPX and AppleTalk networks with powerful efficiency.
EIGRP is often described as a hybrid routing protocol, offering the
best of distance vector and link-state algorithms.
4.5(
a) Configuring EIGRP
Figure-4.4
CHAPTER-5
DHCP
5.1 DHCP
Dynamic Host Configuration Protocol automates network-parameter
assignment to network devices from one or more DHCP servers. Even
in small networks, DHCP is useful because it makes it easy to add
new machines to the network.
When a DHCP-configured client (a computer or any other networkaware device) connects to a network, the DHCP client sends a
[[Broadcasting (computing)|broadcast]] query requesting necessary
information from a DHCP server. The DHCP server manages a pool
of IP addresses and information about client configuration parameters
such as [[default gateway]], [[domain name]], the [[name server]]s,
other servers such as [[time server]]s, and so forth. On receiving a
valid request, the server assigns the computer an IP address, a lease
(length of time the allocation is valid), and other IP configuration
parameters, such as the [[subnet mask]] and the [[default gateway]].
The query is typically initiated immediately after [[booting]], and
must complete before the client can initiate [[Internet Protocol|IP]]based communication with other hosts.
Only requesting clients with a MAC address listed in this table will be
allocated an IP address. This feature (which is not supported by all
DHCP servers) is variously called ''Static DHCP Assignment'' (by
[[DD-WRT]]), ''fixed-address'' (by the dhcpd documentation),
''Address Reservation'' (by Netgear), ''DHCP reservation'' or ''Static
DHCP'' (by Cisco/[[Linksys]]), and ''IP reservation'' or ''MAC/IP
binding'' (by various other router manufacturers).
A DHCP client can also request its last-known IP address (in the
example below, 192.168.1.100). If the client remains connected to a
network for which this IP is valid, the server might grant the request.
Otherwise, it depends whether the server is set up as authoritative or
not. An authoritative server will deny the request, making the client
ask for a new IP address immediately. A non-authoritative server
simply ignores the request, leading to an implementation-dependent
timeout for the client to give up on the request and ask for a new IP
address.
A client can receive DHCP offers from multiple servers, but it will
accept only one DHCP offer and broadcast a DHCP request message.
Based on the Transaction ID field in the request, servers are informed
whose offer the client has accepted. When other DHCP servers receive
this message, they withdraw any offers that they might have made to
the client and return the offered address to the pool of available
addresses. The DHCP request message is broadcast, instead of being
unicast to a particular DHCP server, because the DHCP client has still
not received an IP address. Also, this way one message can let all
other DHCP servers know that another server will be supplying the IP
address without missing any of the servers with a series of unicast
messages.
Snapshot of DHCP
Figure-5.1
CHAPTER-6
ACL (Acceess Control List)
6.1 ACL (Acceess Control List)
Access Control List is a list of conditions that are used to control the
network traffic or packet filtering.We can use ACL for filtering the
unwanted packets when implementing security policy.
Figure-6.1
IP
access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} protocol source source-wildcard
destination destination-wildcard [precedence precedence]
[tostos] [log|log-input] [time-range time-range-name]
ICMP
access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} icmpsource source-wildcard
destination destination-wildcard
[icmp-type [icmp-code] |icmp-message]
[precedence precedence] [tostos] [log|log-input]
[time-range time-range-name]
TCP
access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} tcpsource source-wildcard [operator [port]]
destination destination-wildcard [operator [port]]
[established] [precedence precedence] [tostos]
UDP
access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} udpsource source-wildcard [operator [port]]
destination destination-wildcard [operator [port]]
[precedence precedence] [tostos] [log|log-input]
[time-range time-range-name]
CHAPTER-7
INTER-VLAN
7.1 Understanding How InterVLAN Routing Works
CHAPTER-8
NAT
8.1 NAT-:Short for Network Address Translation, an Internet
standard that enables a local-area network (LAN) to use one set of IP
addresses for internal traffic and a second set of addresses for external
traffic. A NAT box located where the LAN meets the Internet makes
all necessary IP address translations.
NAT serves three main purposes:
Figure-8.1
8.2
How
Works??
Network
Address
Translation
Figure-8.2
If you are reading this article, you are most likely connected to
could be. Although the exact size is unknown, the current estimate is
that there are about 100 million hosts and more than 350 million users
actively on the Internet. That is more than the entire population of the
United States! In fact, the rate of growth has been such that the
Internet is effectively doubling in size each year.
CHAPTER-9
SWITCHING CONCEPTS
9.1 Switching
Switches occupy the same place in the network as hubs. Unlike hubs,
switches examine each packet and process it accordingly rather than
simply repeating the signal to all ports. Switches map the Ethernet
Figure-9.1
9.2 Classification of switches Switches are classified according to the following criteria:
This switch receives entire frame then perform error checking and
start forwarding data to the destination.
This switch starts forwarding frame as soon as first six bytes of the
frame are received.
(3) Fragment-free
9.2(d) Type of switches based on hierarchical model (1) Core layer switches
(2) Distribution layer switches
(3) Access layer switches
9.3 Basic Switch Administration IOS based switches are similar to the routers. We can perform
following function on switches in a similar manner as performed on
router.
(1) Access switch using console
(2) Commands to enter & exit from different mode
(3) Commands to configure passwords
(4) Manage configuration
(5) Backup IOS and configuration
(6) Configuring and resolving hostnames
(7) Managing telnet
(8) Configuring CDP
(9) Configuring time clock
(10) Configuring Banners
(11) Command line shortcuts and editing shortcuts
(12) Managing history
(13) Configure logging
(14) Boot system commands
Figure-9.2
CHAPTER-10
VTP (VLAN Trunking Protocols)
10.1 VTP(VLAN Trunking Protocols)
Cisco created this one too. The basic goals of VLAN Trunking
Protocol (VTP) are to manage all configured VLANs across a
switched internetwork and to maintain consistency throughout that
network. VTP allows you to add, delete, and rename VLANs
information that is then
propagated to all other switches in the VTP domain.
updates to the VTP client switches. The client will create the vlan
from the updates received from the server
10.2(c) Transparent
Switches in transparent mode dont participate in the VTP domain or
share its VLAN database, but theyll still forward VTP
advertisements through any configured trunk links. They can create,
modify, and delete VLANs because they keep their own database
one
they keep secret from the other switches. Despite being kept in
NVRAM, the VLAN database in transparent mode is actually only
locally
significant. The whole purpose of transparent mode is to allow remote
switches to receive the VLAN database from a VTP server-configured
switch through a switch that is not participating in the same VLAN
assignments.
Figure-10.1
CHAPTER-11
VLANs
11.2 INTER-VLAN
11.2(a)
Understanding
How
Inter-VLAN
Routing Works
Network
devices
in
different
VLANs
cannot
domain
and
keeps
local
traffic
local.
communication
is
required.
This
11.3 Trunking
A trunk is a point-to-point link that transmits and
receives traffic between switches or between switches
and routers. Trunks carry the traffic of multiple VLANs
and can extend VLANs across an entire network.
11.4VLAN Configuration
CHAPTER-12
Conclusion
briefly
discusses
the
architecture
of
an
enterprise
network.
It
examines
the
barriers
to