Sei sulla pagina 1di 105

TRAINING REPORT

OF
SIX MONTHS INDUSTRIAL TRAINING, UNDERTAKEN
AT

NESTLE INDIA LTD.MOGA

IN
NETWORKING
ON
IPv6
OF
BACHELOR OF TECHNOLOGY
IN
Computer Science and Engineering

Under the Guidance of:

Submitted By:

Name: Mr.V.S CHAUHAN

Name: RITESH KUMAR

Designation: IT MANAGER

College Roll No.:E101091

Department: IT

University Roll No.:100180305226

CHANDIGARH-PATIALA NATIONAL HIGHWAY,


VILL. JHANSLA, TEHSIL RAJPURA, DISTT. PATIALA 140401

ACKNOWLEDGEMENT
The 16 weeks Industrial Training is a part of my course curriculum of B. TECH
(COMPUTER SCIENCE), which I am pursuing at DEPARTMENT OF COMPUTER
SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND
TECHNOLOGY, RAJPURA (PUNJAB).so I am thankful to all the authorities of my
institute, who design our course curriculum, as this training helps us to
update our knowledge & built a practical approach.
I would like to express my indebtedness to Mr. S. Srinivasan (Factory
Manager), Dr. B.S. Bhullar (Sr. Manager -Corporate Affairs & I.R)Ms. Rupika
Singh (H.R manager) for permitting me to undergo my training at Nestle
India Ltd., Moga Factory.
I shall be failing in my duty if I do not acknowledge the help extended by
Mr V.S CHAUHAN(IT MANAGER) ER PANKAJ &Mr DALJEET SINGH , other
officers and supervisors.
I would like to acknowledge the warmth, affection and co-operation by the
operators and workers of Nestle India Ltd.
Finally I would like to say that without the help of above-mentioned people,
my stay at industry would not have been such a memorable period itched in
my memory as sweet experience.

EXECUTIVE SUMMARY
This document dwells upon my project training at esteemed and worldwide
organization NESTLE INDIA LTD. from 6.1.2014 to 15.05.2014. This training is
a part of my course curriculum pursuing at DEPARTMENT OF COMPUTER
SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND
TECHNOLOGY,RAJPURA(PUNJAB). In these four months of my training I learnt
about the commitment of the company towards quality of the food stuff it
produces, more than sufficient efforts are made by the company and its
employees at every critical point of production that assures the quality of the
products that reaches to the consumers. It gives me immense pleasure to
present this project report.
My training in this esteemed organization helped me to know & learn the
practical aspects of industrial performance, theoretical part of which we
studied in our course books. Learning in nestle was not limited to doing
project. I was involved in understanding the culture of company, learning
various processes, way the people co-ordinate with each other & effects of
teamwork. Some other results of my training are better communication,
enhanced confidence & more practical outlook towards life.
In the end, I would like to say that my experience in this factory would be an
indispensable one throughout my life & I would like to thank all of them once
again who have made it that way.

TO WHOM IT MAY CONCERN:


Mr. RITESH KUMAR is the student of, DEPARTMENT OF COMPUTER SCIENCE
ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY,
RAJPURA(PUNJAB). I learnt and he has completed his Industrial Training (from
6th January, 2014 to 15th MAY, 2014) in Nestle India Ltd, Moga Factory under
my guidance. I have checked this report & the information contained in the
report is genuine to my knowledge.

Mr . V.S CHAUHAN
(IT MANAGER)

TABLE OF CONTENTS

Introduction to company
Nestle History
Nestle logo

Operation In INDIA
MOGA Factory
Various Deptt. In Nestle MOGA Factory

1.Acknowledgement
Chapter-1
INTERNETWORKING BASICS
o What is Computer Network?
Types of networks
o 1.2(a) Local area network (LAN)
o 1.2(b) Wide Area Network (WAN)
o 1.2(e) Metropolitan area network (MAN)
o 1.2(f) Virtual private network (VPN)
CHAPTER-2
o DEVICES
2.1 DEVICES-:
2.1(a) Router
2.1(b) Switches
2.1(c)Hub
2.1(d)Bridge
CHAPTER-3
o ROUTING BASICS
3.1 ROUTING
3.2 STATIC ROUTING
3.3 Default Routing
3.4 Dynamic Routing
3.5 Autonomous system
3.6 Distance Vector Routing
3.7 Metric of Dynamic Routing
CHAPTER-4
o PROTOCOLS
4.1 Routing Protocols
4.2 Routed Protocols
4.2(a) Categories of Routing Protocols
4.3 IGRP
4.4 OSPF (Open Shortest Path First) Protocol
4.5 EIGRP

CHAPTER-5
o

DHCP
5.1 DHCP
5.2(a) Dynamic Allocation
5.2(b) Automatic Allocation

5.2(c) Static Allocation


5.3 DORA PROCESS
CHAPTER-6
o ACL
6.1 ACL (Access Control List)
6.2 Applying ACLs
6.3 Types of IP ACLs
6.3(a) Standard ACLs
6.3(b) Extended ACLs
CHAPTER-7
o INTER-VLAN
7.1 Understanding How InterVLAN Routing Works
CHAPTER-8
o NAT
8.1 NAT
8.2 How Network Address Translation Works??
CHAPTER-9
o SWITCHING
9.1 Switching
9.2 Classification of switches 9.3 Basic Switch Administration
9.4 Following function and options are not similar in
router and switch.
9.5 Switch Cofiguration
CHAPTER-10
o VTP(VIRTUAL TRUNKING PORT)
10.1 VTP (VLAN Trunking Protocols)
10.2 VTP Modes of Operation
10.3 VTP Servers Configuration
CHAPTER-11
o VLANs
o 11.1 VLANs
o 11.2 INTER-VLAN
11.2(a) Understanding How Inter-VLAN Routing Works
o 11.3 Trunking
o 11.4VLAN Configuration
CHAPTER-12
CONCLUSION

LIST OF FIGURES
Figure-2.1 Router
Figure-2.2 Switches
Figure-2.3 Hub
Figure-2.4 Bridge
Figure-3.1 Configuring Static Routes by Specifying Outgoing
Interfaces
Figure-3.2(a) & Figure-3.2(b) Configuring Static Routes by

Specifying Next-Hop Addresses


Figure-3.3 Router
Figure-4.1 Routed protocol transport
Figure-4.2 Configuring RIP example
Figure-4.3 Configuring OSPF on Internal Routers of a Single Area
Figure-4.4 Configuring EIGRP
Figure-5.1 Snapshot Of DHCP
Figure-6.1 Applying ACLs
Figure:-7.1 Basic InterVLAN Routing Topology
Figure-8.1 NAT purposes
Figure-8.2 How Network Address Translation Works??
Figure-9.1 MAC Address table
Figure-9.2 Switch Configuration
Figure-10.1 VTPs Server Configuration
Figure-11.1 VLANs Configuration

LIST OF TABLES

Table-4.1 Comparing routing methods


Table-4.2 Characteristics of routing protocols

Introduction To Company

MR. HENRY NESTLE


FOUNDEROF NESTLE

1.1 Company Profile:

A WORD ABOUT NESTL - THE NEST


Nestl India is a multinational company with its worldwide operations
in over 70 countries .The founder of Nestl was Henry Nestle who from
a modest beginning founded the company in 1866 at Switzerland for
manufacturing milk powders for babies. At that time Switzerland faced
one of the highest infant mortality rates and the milk formula saved
the lives of many infants whose mothers were unable to breast feed
successfully.
At present Nestl is the worlds largest food company with its
international headquarters at Vevey, Switzerland, with almost 500
factories world wide it employs almost 2 30,000 people.
Nestl is often quoted by most as multinational of multinationals.
There is a good reason, as less than 2% of the turnover comes from the
domestic market in Switzerland.
Nestl is much decentralized in its operations and most of the markets
are given considerable autonomy in its operation. It is more of a people
and products oriented company rather than systems oriented company
there are unwritten guidelines which are to be followed, based on
common senses and a strong set of moral principals emphasizing a lot
of respect for fellow beings.
Nestl has always adapted to the local conditions and at the same time
integrates its Swiss heritage. It has always taken a long-term view in
the countries in which it operates.
Therefore, one can see a lot of investment R&D and risk taken in new
product areas. There is a great emphasis placed on training by the
company. It believes in rewarding and promoting people from within.
Today its product brand name Nestl is associated with quality
products in worldwide consumer markets.

When Henry Nestle introduced the first commercial infant formula in


1867, he also created a symbol of the Birds nest, graphic translation
of his name, which personifies the companys business. The symbol,
which is universally understood, evokes security, motherhood and
affection, nature and nourishment, family and tradition. Today it is the
central element of Nestls corporate identity and closely parallels the
companys corporate values and culture.

1.2 NESTLE STORY


Nestl was founded in 1867 on the shores of Lake Geneva in Vevey,
Switzerland and its first product was FarineLacte Nestl, an infant cereal
specially formulated by Henri Nestl to provide and improve infant nutrition.
From its first historic merger with the Anglo-Swiss Condensed Milk Company
in 1905, Nestl has grown to become the worlds largest and most diversified
food Company, and is about twice the size of its nearest competitor in the
food and beverages sector.

Nestls trademark of birds in a nest, derived from Henri Nestls personal


coat of arms, evokes the values upon which he founded his Company.
Namely, the values of security, maternity and affection, nature and
nourishment, family and tradition. Today, it is not only the central element of
Nestls corporate identity but serves to define the Companys products,
responsibilities, business practices, ethics and goals.

In 2004, Nestl had around 247,000 employees worldwide, operated 500


factories in approx. 100 countries and offered over 8,000 products to millions
of consumers universally. The Companys transparent business practices,
pioneering environment policy and respect for the fundamental values of
different cultures have earned it an enviable place in the countries it
operates in. Nestls activities contribute to and nurture the sustainable
economic development of people, communities and nations. Above all,

Nestl is dedicated to bringing the joy of Good Food, Good Life to people
throughout their lives, throughout the world.

1.3 NESTLE HISTORY

The Nestl Company was Henry Nestl's search for a healthy, economical
alternative to breastfeeding for mothers who could not feed their infants
at the breast.

The Company formed by the 1905 merger was called the Nestl and
Anglo- Swiss Milk Company. The close of World War II marked the
beginning of the most dynamic phase of Nestl's history.

In 1947, Nestl merged with Alimentana S.A., the manufacturer of Maggi


seasonings and soups, becoming Nestl Alimentana Company. After the
agreement with LOreal in 1974, Nestl's overall position changed rapidly.

Between 1975 and 1977, the price of coffee beans quadrupled, and the
price of cocoa tripled.

Nestl approached the 1980s with a renewed flexibility and determination


to evolve. Thus, between 1980 and 1984, the Company divested a number
of non-strategic or unprofitable businesses. Nestl managed to put an end
to a serious controversy over its marketing of infant formula.

Nestl opened the 20th century by merging with the Anglo-Swiss


Condensed Milk Company to broaden its product range and widen its
geographical scope. In the new millennium, Nestl is the undisputed
leader in the food industry, with more than 470 factories around the world.
Nestl's existing products will grow through innovation and renovation.

1.3.1 HISTORICAL DEVELOPMENT


Sr.No.

Year

Achievements

1866

Company's foundation

1905

Merger between Nestl and Anglo-Swiss Condensed


Milk Company

1929

Merger with Peter-Cailler-Kohler Chocolates Suisses


S.A.

1947

Merger with Alimentana S.A. (Maggi)

1971

Merger with Ursina-Franck (Switzerland)

1985

Acquisition of Carnation (USA)

1988

Acquisition of Buitoni-Perugina (Italy)

1988

Acquisition of Rowntree (GB)

1992

Acquisition of Perrier (France)

1995

Nestl acquires Victor Schmidt &Shne, Austria's


oldest producer of confectionery, including the
famous 'Mozartkugeln'.

1997

Nestl, through the Perrier Vittel Group, expands its


mineral water activities with the outright acquisition
of San Pellegrino.

1998

Nestl acquires Spillers Pet foods of the UK and


strengthens position in the pet food business which
began in 1985 with the acquisition of the Carnation
Friskies brand.

1999

Divestiture of Findus brand (except in Switzerland


and Italy) and parts of Nestl's frozen food business
in Europe.

10

11

12

13

14

199
9

15

2000

Acquisition of Power Bar.

16

2001

Nestl acquires Ralston Purina - Nestl Purina Pet


Care Company established.

17

2002

Perrier Vittel Group re-named as Nestl Waters.

18

2006

Pantnagar plant starts manufacturing noodles.

19

2008

Cup noodle starts at Moga plant

Divestiture of Hills Bros, MJB and Chase & Sanborn roast


and ground coffee brands (USA).

1.4 NESTLE MISSION STATEMENT


At Nestl, we believe that research can help us make better food so that
people live a better life.
Good Food is the primary source of Good Health throughout life. We strive to
bring consumers foods that are safe, of high quality and provide optimal
nutrition to meet physiological needs. In addition to nutrition, health and
wellness, Nestl products bring consumers the vital ingredients of taste and
pleasure.
As consumers continue to make choices regarding foods and beverages they
consume, Nestl helps provide selections for all individual taste and lifestyle
preferences.
Research is a key part of our heritage at Nestl and an essential element our
future. We know there is still much to discover about health, wellness and
the role of food in our lives, and we continue to search for answers to bring
consumers Good Food for Good Life.

1.5 NESTLE LOGO

The Nestl logo was launched by Henri Nestl in 1868


on the basis of the meaning of his name in German, i.e.
little nest, and of his family emblem (that you can see
here).
Henri obtained a 15-year French patent for his logo in
1868.
After he retired, it was registered in Vevey in 1875 by
the new owners of his company.

In 1938, the traditional nest design was combined with


the "Nestl" name to form what is called the combined
mark.

In 1966 the design was simplified.

In 1988, the worm in the mother bird's beak was


removed and the fledglings became two instead
of three. It is said that it was meant to better illustrate
the activities of the company, no longer active only in

utrition, and to reflect the average modern family


of two children.

The logo we know now has just been simplified.

The tree is supposed to represent an oak and the birds


thrushes.

1.6 NESTL -TODAY


Some names seem to belong to legend and Nestl now synonymous with a
prestigious trademark and worlds foremost food group originally consisted of
two companies Henry Nestle of Vevey Switzerland & Anglo Swiss Condensed
Milk Company in Cham. Both companies competed vigorously from 1866- 1905.
These groups merged in 1905 and become the starting point of the recent food
group.
Nestl is now the No. 1 Food Company. It is present on all five continents has an
annual turnover of nearly 89.2 Billion Swiss Francs is present on all five
continents. At present there are around 508 factories spread over 80 countries
with around 260 operating companies One basic research center and 17
technological development groups and has in excess of 2,30,000 employees.
Nestl operations worldwide are divides into 3 zones: ZONE EUR : Europe
ZONE AOA : Asia and Oceanic

28%
Beverages

6%AMS : Americas
ZONE
Pharmaceuticals

India comes under zone AOA which includes South- East Asian
27%trading giants of
14%
the likes of Thailand,
Indonesia, Malaysia, Singapore,
etc. besides
MilkChina
Products
Chocolate

Australia. Mr.
M.W. Garret currently heads ZONE AOA.
Confectionery

Nutrition
Ice Cream

Currently Biscuits
Mr. Peter Brabeck heads the Nestle group worldwide and Mr. M.W.
Garret heads zone AOA

25%
Cooking Aids
Prepared dishes
Pet Care

SALE BY PRODUCT GROUP

Fig1.1: Sale By product Group

1.7 NESTLE INDIA


Nestls relationship with India dates back to 1912, when it began trading as
The Nestl Anglo-Swiss Condensed Milk Company (Export) Limited, importing
and selling finished products in the Indian market.
After Indias independence in 1947, the economic policies of the Indian
Government emphasized the need for local production. Nestl responded to
Indias aspirations by forming a company in India and set up its first factory
in 1961 at Moga, Punjab, where the Government wanted Nestl to develop
the milk economy. Progress in Moga required the introduction of Nestls
Agricultural Services to educate advice and help the farmer in a variety of
aspects. From increasing the milk yield of their cows through improved dairy
farming methods, to irrigation, scientific crop management practices and
helping with the procurement of bank loans. Nestl set up milk collection
centers that would not only ensure prompt collection and pay fair prices, but
also instill amongst the community, a confidence in the dairy business.
Nestl has been a partner in Indias growth for over nine decades now and
has built a very special relationship of trust and commitment with the people
of India. The Companys activities in India have facilitated direct and indirect
employment and provides livelihood to about one million people including
farmers, suppliers of packaging materials, services and other goods.

Nestl India manufactures products of truly international quality under


internationally famous brand names such as NESCAFE, MAGGI, MILKY BAR,
MILO, KIT KAT, BAR-ONE, MILKMAID and NESTEA and in recent years the
Company has also introduced products of daily consumption and use such as
NESTL Milk, NESTL SLIM Milk, NESTL Fresh n Natural Dahi and NESTL
JeeraRaita.

1.7.1 OPERATIONS IN INDIA


Nestl set up its operations in India, as a trading company in 1912 and
began manufacturing at the Moga factory in 1962. The production
started with the manufacture of Milkmaid and other product was
gradually brought into the fold. Nestl India Limited was formally
incorporated in 1978 prior to which the manufacturing license was
issued in the name of the Food Specialties Limited. The corporate offi ce
is located at Gurgaon and the registered offi ce at M-5A, Connaught
Circus, and New Delhi
At present Nestl have 7 manufacturing units countrywide which are
successfully engaged in meeting the domestic as well as the exports
demand. In addition there are several co packing units.

Fig 1.2: Factory


The Moga factory is the largest and the oldest in producing the widest
range of food products.
Presently Nestl India employs over 3000 employees. In addition,
thousands of people are associated with Nestl, having indirect
employment as Milk suppliers, Vendors, Contractors and Distributions
etc.
The production group first incepted under the name Food Specialties
Ltd. started production at the Nestl Moga Factory in early 1962.At the
time, with the help of Nestle International; the company shot into
prominence as the countrys foremost producer of milk products,
particularly baby foods.
The other factories are located at: Choladi (Tamilnadu)
Nanjangud (Karnataka)

--Instant Tea Export 1969


--Coffee & Milo 1989

Samalkha (Haryana)

--Cereals, Milkmaid Deserts 1992

Ponda (Goa)

--Chocolates & Confectionery 1995

Bicholim(Goa)

--Noodles and Cold Sauces 1997

Pantnagar (Uttrakhand)

--Noodles and Cold Sauces 2006

The distribution comprises of six branches located in Calcutta, Delhi,


Mumbai, Chennai, Bangalore and Chandigarh. The distribution network
functions effi ciently with the transfer of goods from the factories to the
mother godowns, which in turn are transferred to the clearing and the
sales agents. The C&S agents sell it to the cash distribution, which
makes the secondary sale in the market.
With time, the nature & extent of the company expanded. The product
range, since then, has now diversified so much and to such an extent
that it is really a tough task to enumerate all the products of the
company on a single sheet of paper After 28 Years of working under the
name of Food Specialties Ltd.

The company realized that in order to survive in the international


competition and to keep up with the changing time a better and closer
relationship was required between Nestl International and its Indian
counterpart. So in 1990, a unified production and marketing front,
under the name of Nestl India was conceived

1.7.2 Nestle India-Presence across India


Beginning with its first investment in Moga in 1961, Nestls regular and
substantial investments established that it was here to stay. In 1967, Nestl
set up its next factory at Choladi (Tamil Nadu) as a pilot plant to process the
tea grown in the area into soluble tea. The Nanjangud factory (Karnataka),
became operational in 1989, the Samalkha factory (Haryana), in 1993 and in
1995 and 1997, Nestl commissioned two factories in Goa at Ponda and
Bicholim respectively. Nestl India has commissioned in 2006 its 7th factory
at Pant Nagar in Uttrakhand.

Figure: Presence across India

Fig 1.3: Locations

1.7.3 Nestle India has 8 Factories in Our Country

MOGA Factory
Moga factory started production in1962.
Today, Moga contributing almost 75% of
Nestle Indias total production volume and
manufacturing

109671

tons

of

food

products. It employs around 1600 people.


Dairy creamers, IMF, SCM, Cereals, Vending

Nanjangud Factory
Production in Nanjangud Factory started
in 1989 with the manufacturing of
Nescafe and Sunrise. Milo manufacture
at Nanjangud begun in 1996. It situated
160 kilometers south of Bangalore; the
factory has around 245 employees. It
manufactures 15500 tons of Nescafe

Bicholim Factory
A satellite factory of Ponda at Bicholim
for manufacturing of Noodles and Cold
Sauces, It started their operational
activity in 1997.

Ponda Factory
Ponds Factory started production of Kit
Kat in 1995. It is located 40 kilometers
from

Panji

the

manufactures

capital

of

Chocolates.

Goa.

Ponda

Samalkha Factory
Samalkha Factory started production
in 1993 situated 70 kilometers from
Delhi. It has 260 employees and
manufactures about 35000 tons of
food
Infant

products
Cereals,

comprising
Noodles,

IMFs,
Chilled

Pant Nagar Factory


This is the one of the newly situated
and the 7th factory of the Nestle in the
India.

Pantnagar

Factory

production of Noodles in 2006.

It

began

Tahliwal Factory:
The 8th Factory was set up at Tahliwal,
Himachal

Pradesh,

in

2012.

It

will

manufacture confectionery and chocolates.

Choladi Factory
The factory ion Choladi started production in 1967, Situated in
South Asia, about 275 kilometers from Bangalore. The factory
today has around 80 employees. It processes about 725 tons of
soluble tea, which is all exported.

Beside this Nestle, India has the co-packing


arrangements also:

Chocolates

Campco, Puttur

Toffees

Nutrine, Surendranagar

Cold Sauce 200g

Nijjer Agro Pvt. Ltd., Amritsar

Every Day Dairy

Brar Co-Packer Unit, Moga

Creamer
Nestl Polo
Pickles
Tasters Choice

Bakemans (Nagpur)
Choride foods Ltd.(Puna)

Williamson Major company


(Silliguri)

Dosa&Samber mix

Indian foods & fermentation Ltd.


Nagpur

CHAPTER- 2
INTRODUCTION TO PRODUCT RANGE

Its activities include manufacturing and marketing of: -

Condensed milk

Chocolates & Confectionery


items

Powdered milk
Tea
Ice creams
Coffee
Milk and Deities

Culinary products

Culinary

Frozen products

Cereal

Fruit juices

Instant Drink

Mineral water
Pet foods

Chocolates & Confectionery


Other dairy products

Pharmaceuticals&
Cosmetics

Infant foods

Cerevita

2.1 BRANDS AND PRODUCTS


Beverages
NESCAFE CLASSIC is a 100% pure coffee and is made from carefully
selected coffee beans picked from the finest plantations, blended and
roasted to perfection to create the unique rich and smooth NESCAFE taste.

NESCAFE SUNRISE is an Instant Coffee-Chicory blend, popular for its


robust body and a flavor akin to fresh roast-and-ground coffee. The secret
lies in the right blend of flavorful coffee and roasted chicory to give you an
incomparable
NESTEA
Tea experience.
Bags are made from the finest blend of Assam Teas, which
give a refreshing cup of bright, coloury tea of fair strength and superior
taste. They are available both in individually enveloped and non-enveloped
formats.
A wide range of premixes for the vending machines. The basket of products
include NESCAF Classic, NESCAF Frappe, Tea Premix (Plain,
Cardamom), Hot Chocolate, Iced Tea (Lemon, Peach, Apple), and Badam
(Almond) Milk vending mixes.
We manufacture high quality Hot & Cold Water Soluble Black and Green
Tea Powders at ourstate-of-the-art factory in Choladi, located in the midst of
tea plantations which ensure availability of fresh green leaves. With their
high polyphenol content resulting in enhanced anti-oxidant properties, our
teas can be used to produce premium products, available in bulk quantities
only.

Chocolates and Confectionary

NESTL KIT KAT is delicious crisp wafer fingers covered with


Choc layer. Our special tropical zed recipe ensures that
NESTL KIT KAT is preserved even in warmer climates.

NESTL MILKY BAR is a delicious milky treat which kids love.


With its Calcium Rich recipe, NESTL MILKY BAR is a favorite
with parents to treat their kids with.

Extremely popular in India, NESTL MUNCH is wafer layer


covered with delicious Choc layer. A crispy light irresistible
snack!

NESTL Milk Chocolate is a milk chocolate with a delicious taste


for you to savors.
NESTL BAR-ONE is a luscious nougat and caramel core
covered with a delicious Choc layer.

POLO is a mint roll popularly described as The Mint with the


hole. Now also in the new extra strong singles format as POLO
Power mint.

Nestle Dishes & Cooking Aids

MAGGI 2-MINUTE Noodles is one of the most popular brand of


instant noodles in India. Available for export in 5 authentic Indian
flavors (spicy Masala, tangy Chatpata, Chicken, Tomato and Curry),
it is a delicious anytime snack thats ready in just 2 minutes.
MAGGI Vegetable Atta Noodles is a unique innovative product with
MAGGI
Chinese
makes
it so
to prepare
delicious
the goodness
of Noodles
whole wheat
and
realsimple
vegetables.
Available
in the
Indian Style
popular
MasalaChinese
flavor. Noodles at home in a jiffy! Offered in two
exciting flavors, Veg Chowmein

In addition to the nutrition from whole wheat, MAGGI Dal Atta


Noodles offers the goodness of Dal (lentils) in the deliciously
ethnic Samber Tastemaker.

MAGGI offers a wide range of specialty Indian Sauces which are


relished for their unique taste. Available in the following delightful
variants: Tomato Ketchup, Tomato Sauce, Tomato Chilly, Masala
Chilly, Chilly Garlic, Tamarina, Tomato Chatpata, Tomato Pudina
and the all-time-favorite MAGGI Hot & Sweet Sauce.

MAGGI Taste of India Pastes are a delicate blend of traditional


spices and freshly ground pastes, offering the convenience of
preparing authentic Indian recipes at home, in no time at all! The
range includes Biryani Paste, Curry Paste, Korma Paste, Tandoori
New MAGGI Healthy Soups are even more delicious, quick to prepare,
Paste and Tikka Masala Paste.
convenient and healthy. They contain real vegetables, are low fat and
cholesterol free. They also do not have added MSG, preservatives or
artificial colours.
NESTL EVERYDAY

Ghee

is

100%

pure

Clarified

Butter

hygienically packed to preserve its rich aroma and granular


texture. As a cooking medium, NESTL EVERYDAY Ghee helps
you add that authentic ethnic aroma and flavor to Indian
preparations every time, everyday.
A

Partly

Skimmed

Sweetened

Condensed

Milk,

NESTL

MILKMAID is a versatile product and excellent as a dessert


ingredient. With MILKMAID, you can whip up lip-smacking
desserts for your family in the shortest possible time
NESTL EVERYDAY Dairy Whitener is a creamy Dairy Whitener
specially made to add a rich, smooth taste to your tea. Every
time, every day.

2.2 MOGA FACTORY


In the Malwa region of Punjab State, there is a small town, which is
popularly known among the famous grain markets of the world.
However the credit of bringing this town on the industrial map of the
world goes to Nestle a Swiss Multinational company engaged in the
largest food processing operation in the world. When in 1959 Nestl
took decision to establish a milk processing factory, a very little could
the people of Moga town and the farmers in the surrounding villages
realize that the company now as Nestl India ltd. would play such an
important role in economic & social development of the area.

Fig 2.1: Moga Factory


Nestl Moga factory is the one of the oldest factory of Nestl in India. It
is the first factory of Nestl in India. It is the largest factory of Nestl in
India as well as in the whole Asia Continent. This factory is the worlds
Second largest factory of the Nestl Company. The Moga factory
spreads over 57acres of area.
Nestl Company set up its operations in India, as a trading company in
1912 and began manufacturing at the Moga factory in 1961.The
production starts at Moga factory on 15th Nov, 1962. The production
started with the manufacture of Milkmaid and other products were
gradually brought into the fold.
Today; Moga contributes almost 75% of Nestle Indias total production
volume, manufacturing 80,000 tons of food products. It consumes
approximately 9-10 lakhs litres of milk. It employs 2000 people. The
entire range of milks, culinary products and cereals are manufactured
in Moga. Moga is located in the state of Punjab about 400Kms.North of
New Delhi.
In the Malwa region of Punjab State, there is a small town, which is
popularly known among the famous grain markets of the world.
However the credit of bringing this town on the industrial map of the
world goes to Nestle a Swiss Multinational company engaged in the
largest food processing operation in the world. When in 1959 Nestl
took decision to establish a milk processing factory, a very little could
the people of Moga town and the farmers in the surrounding villages
realize that the company now as Nestl India ltd. would play such an
important role in economic & social development of the area.
The company is not only an industrial and a commercial house but has
make sustained efforts to improve economic and social environment of
the people in the area of its operation be its farmers or residents of
Moga. In the initial stages company faced many problems including

procurements of milk sales of which was considered a sin at that time.


But the team that surveyed that area found the area quite suitable for
development of milk and it has been proved to be a right decision.
The company started its operation in 1961 with a capacity of 40,000 Kg
of milk per day kept on expanding on regular intervals and at present
handling capacity of 1100000 lts. 1300000 lts of milk per day. Many
more products have been introduced.
Company started milk collection in Moga area on 15 Nov 1961 and on
the first day 510lts of milk was collected from four villages. From that
the day onwards company is collecting milk continuously both morning
and evening without break. The total procurement in 1962 was 2,054
million kg from 4,660 milk suppliers of 66 villages and in 1962 fresh
milk reception are 102, 33 Million kg from 46,308 farmers delivering
milk at 650 collection centres in 574 villages and 10 milk chilling
centres. In 1998 the milk chilling centres have increased from 10 to
186.
Nestl India Ltd. Moga factory is their oldest factory in India. With a
layout spread over nearly 57 acres & having six plants within the
factory, and it is also the largest factory of the Asia continental region.
The Company started milk collection in Moga area on 15th Nov. 1961
and on the first day 510 litres of milk was collected as from four
villages. From that day onwards company is collecting milk in the
morning and night. The capacity raised from 40,000 litters of milk per
day in 1962 to over 1,200,000 litres of milk till date.

2.2.1 Various departments in the Nestle Moga factory


Supply Chain
NQAC
IP( Industrial performance)
FMR
Cereals
PFP
Culinary
QA
Engineering
Agri Services
Milk- LP
Milk- Egrons
HR


2.3 The factory consists of four production plants:
MILK OPERATIONS
CEREALS
INSTANT DRINKS (VENDING MIXES)
CULINARY

Project Requirements
LAN Hardware:

Core Layer Switches: catalyst 3550

Distribution Layer :

Access Layer : Access point and Cisco 2950

catalyst 2960

WAN Hardware:

Routers: Cisco 1841 integrated services router

1 FE Card

1 WIC 1T card

Server Hardware requirements:-

The

following

table

lists

the

minimum

and

recommended hardware requirements for deploying


Linux and Windows Servers.
Main Difference will be in file system used by the OS.
Linux will use ext3 and windows will use NTFS file
system.:

Componen
t
Processor

Recommende
Minimum

2.5 gigahertz
(GHz)

Dual
processors
that are each
3

GHz

or

faster
RAM

gigabyte

2 GB

(GB)
Disk

EXT-3
System

File

EXT-3

File

System/NTFS

/NTFS
Drive

DVD drive

DVD drive or
the
copied

source
to

local

or

networkaccessible
drive
Display

1024 768

1024 768
or

higher

resolution
monitor
Network

56
per

kilobits

512Kbps

second

faster

(Kbps)

connection

connection

between

between

client

client

computers

computers

and server

and server

FEASIBILITY STUDY

The various issues related to feasibility study are as follows:-

1. Technology

The various technologies used for this project are:-

or

Cisco Packet Tracer or GNS 3


ACL
NAT
Routing
Switching
InterVLAN

2. Economic
The technological and system requirements of the project would not

require much of a cost. As we are doing the project at student level for the
partial fulfilment of Btech.degree so the technologies

mentioned were

taken through the internet.

3. Schedule
The project is divided in a time span of 6 weeks so the project
completion will not be an issue.
The project deadline will be easily met and all the activities necessary
to be performed will be completed within the fixed time.

CHAPTER-1

INTRODUCTION TO
INTERNETWORKING
BASICS

Chapter-1
INTRODUCTION TO INTERNETWORKING
BASICS

1.1 What is Computer Network?


A computer network allows sharing of resources and information
among interconnected devices. In the 1960s, the Advanced Research
Projects Agency (ARPA) started funding the design of the Advanced
Research Projects Agency Network (ARPANET) for the United States
Department of Defense. It was the first computer network in the
world. [1] Development of the network began in 1969, based on
designs developed during the 1960s.
Computer networks can be used for a variety of purposes:
Facilitating

communications.

Using

network,

people

can

communicate efficiently and easily via email, instant messaging, chat


rooms, telephone, video telephone calls, and video conferencing.
Sharing hardware. In a networked environment, each computer on a
network may access and use hardware resources on the network, such
as printing a document on a shared network printer.
Sharing files, data, and information. In a network environment,
authorized user may access data and information stored on other
computers on the network. The capability of providing access to data
and information on shared storage devices is an important feature of
many networks.
Sharing software. Users connected to a network may run application
programs on remote computers.

Information preservation.
Security.
Speed up.

1.2 Types of networks


1.2(a) Local area network (LAN)
LAN stands for Local Area Network. The scope of the LAN is within
one building, one school or within one lab. In LAN (Hub), media
access method is used CSMA/CD in which each computer sense the
carrier before sending the data over the n/w. if carrier is free then you
can transmit otherwise you have to wait or you have to listen. In
multiple access each computer have right that they can access each
other. If two computers sense the carrier on same time then the
collision occur. Each computer, in the network, aware about the
collision. Now this stop transmitting and they will use back off
algorithm. In which random number is generated. This number or
algorithm is used by each computer. Who has short number or small
number, he has first priority to transmit the data over the network and
other computers will wait for their turn.

1.2(b) Wide Area Network (WAN)


WAN stands for Wide Area Network, in which two local area
networks are connected through public n/w. it may be through
telecommunication infrastructure or dedicated lines. For e.g.: - ISDN
lines, Leased lines etc. In which we can use WAN devices and WAN
technology. You can also connect with your remote area through
existing Internetwork called Internet.

1.2(c)Metropolitan area network (MAN)


A Metropolitan area network is a large computer network that usually
spans a city or a large campus.

1.2(d)Virtual private network (VPN)


A virtual private network (VPN) is a computer network in which some
of the links between nodes are carried by open connections or virtual
circuits in some larger network (e.g., the Internet) instead of by
physical wires. The data link layer protocols of the virtual network are
said to be tunneled through the larger network when this is the case.
One common application is secure communications through the public
Internet, but a VPN need not have explicit security features, such as
authentication or content encryption. VPNs, for example, can be used
to separate the traffic of different user communities over an
underlying network with strong security features.

CHAPTER-2
DEVICES

2.1 DEVICES-:
2.1(a)Router
Router is hardware device, which is used to communicate two
different networks. Router performs routing and path determination. It
does not perform broadcast information. There are two types of
routers: (i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and
remote access. This feature is offered by Microsoft. This feature is by
default installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient.
But in case of software routers, it has less features, slow performance.
They are not very much efficient.

Figure-2.1


2.1(b) Switches
Switch is also used to connect multiple workstations. Switch is more
intelligent than hub. It has special kind of memory called mac
address/filter/lookup table. Switch reads mac addresses. Switch stores
mac addresses in its filter address table. Switch when receives frame,
it reads the destination mac address and consult with its filter table. If
he has entry in its filter table then he forwards the frame to that
particular mac address, if not found then it performs broadcasting to
all its connected nodes.

Every port has its own buffer memory. A port has two queues one is
input queue and second is output queue. When switch receives the
frame, the frame is received in input queue and forward from output
queue. So in case of switch there is no chance or place for collisions.
In case of switch, the media access method is used CSMA/CA
(Carrier Sense Multiple Access/ Collision Avoidance). Switches
provide more efficiency, more speed and security.

There are two types of switches: (i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.

Figure-2.2

2.1(c)Hub
Hub is centralized device, which is used to connect multiple
workstations. There are two types of Hub: (i) Active Hub
(ii) Passive Hub
It has no special kind of memory. It simply receives the frame (data)
and forwards it to all its nodes except the receiving node. It always
performs broadcasting. In case of hub, there is one collision domain
and one broadcast domain. In case of hub, the media access method is
used CSMA/CD (Carrier Sense Multiple Access/Collision Detection).
(i) Active Hub

In Active hub, it receives the frame regenerate and then forward to


all its nodes.

(ii) Passive Hub

In Passive hub, it simply receives the frame and forward to all its
connected nodes.

You cannot perform LAN segmentation using hub.

Figure-2.3

2.1(d)Bridge
Bridge is a hardware

device,

which is used to provide LAN segmentation means it is used for break


the collision domain. It has same functionality as performed by
switch. We can use bridge between two different topologies. It has
fewer ports. Each port has a own buffer memory. It works on Data
Link Layer of OSI model. It also read mac address and stores it in its
filter table. In case of bridge there is one broadcast domain.

Figure-2.4

CHAPTER-3
ROUTING
3.1 ROUTING
Routing is the process that a router uses to forward packets toward the
destination network. A router makes decisions based upon the
destination IP address of a packet. All devices along the way use the
destination IP address to point the packet in the correct direction so
that the packet eventually arrives at its destination. In order to make
the correct decisions, routers must learn the direction to remote
networks.

3.2 STATIC ROUTING


In this routing, we have to use IP route commands through which we
can specify routes for different networks. The administrator will
analyze whole internetwork topology and then specify the route for
each n/w that is not directly connected to the router.

3.2(a) Steps to perform static routing (1) Create a list of all n/w present in internetwork.
(2) Remove the n/w address from list, which is directly connected to
n/w.
(3) Specify each route for each routing n/w by using IP route
command.
Router(config)#ip route <destination n/w><mask><next hop ip>

Next hop IP it is the IP address of neighbor router that is directly


connected our router.

Configuring Static Routes by Specifying Outgoing


Interfaces

Figure-3.1

Configuring Static Routes by Specifying Next-Hop


Addresses

Figure-3.2(a)

Figure-3.2(b)

3.2(b) Advantages of static routing


(1) Fast and efficient.
(2) More control over selected path.
(3) Less overhead for router.
(4) Bandwidth of interfaces is not consumed in routing updates.

3.2(c) Disadvantages of static routing


(1) More overheads on administrator.
(2) Load balancing is not easily possible.
(3) In case of topology change routing table has to be change
manually.

3.3 Default Routing


Default routing means a route for any n/w. these routes are specify
with the help of following syntax: -

Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>

Or

<exit interface>

This type of routing is used in following scenario.


Scenario 1: Stub network
A n/w which has only one exit interface is called stub network.
If there is one next hop then we can use default routing.
Scenario 2
Internet connectivity
On Internet, million of n/ws are present. So we have to specify default
routing on our router.
Default route is also called gateway of last resort. This route will be
used when no other routing protocol is available.
Router(config)#ip route 10.0.0.0 255.0.0.0 172.16.0.5
Router(config)#ip route 0.0.0.0 0.0.0.0 200.100.100.11
To display routing table
Router#ship route
To display static routes only
Router#ship route static

S 192.168.10.0/28 [1/0] via 172.16.0.5


To display connected n/ws only
Router#ship route connected
To check all the interface of a router
Router#sh interface brief

3.4 Dynamic Routing

In dynamic routing, we will enable a routing protocol on router.


This protocol will send its routing information to the neighbor router.
The neighbors will analyze the information and write new routes to
the routing table.

The routers will pass routing information receive from one router to
other router also. If there are more than one path available then routes
are compared and best path is selected. Some examples of dynamic
protocol are: RIP, IGRP, EIGRP, OSPF
3.4(a) Types of Dynamic Routing Protocols
According to the working there are two types of Dynamic Routing
Protocols.
(1) Distance Vector
(2) Link State
3.4(b) According to the type of area in which protocol is used there
are again two types of protocol: -

(1) Interior Routing Protocol


(2) Exterior Routing Protocol

3.5 Autonomous system


Autonomous system is the group of contiguous routers and n/w, which
will share their routing information directly with each other. If all
routers are in single domain and they share their information directly
with each other then the size of routing updates will depend on the no.
of n/w present in the Internetwork. Update for each n/w may take 150
200 bytes information.
For example: - if there are 1000 n/ws then size of update will be
200*1000 = 200000 bytes

The routing information is send periodically so it may consume a


large amount of bandwidth in our n/w.
3.6 Distance Vector Routing
The Routing, which is based on two parameters, that is distance and
direction is called Distance Vector Routing. The example of Distance
Vector Routing is RIP & IGRP.
Operation: (1) Each Router will send its directly connected information to the
neighbor router. This information is send periodically to the
neighbors.

(2) The neighbor will receive routing updates and process the route
according to following conditions: (i) If update of a new n/w is received then this information is stored in
routing table.
(ii) If update of a route is received which is already present in routing
table then route

will be refresh that is route times are reset to zero.

(iii) If update is received for a route with lower metric then the route,
which is already present in our routing table. The router will discard
old route and write the new route in the routing table.
(iv) If update is received with higher metric then the route that is
already present in routing table, in this case the new update will be
discard.
(3) A timer is associated with each route. The router will forward
routing information on all interfaces and entire routing table is send to
the neighbor. There are three types of timers associated with a route.
(i) Route update timer
It is the time after which the router will send periodic update to the
neighbor.
(ii) Route invalid timer
It is the time after which the route is declared invalid, if there are no
updates for the route. Invalid route are not forwarded to neighbor
routers but it is still used to forward the traffic.

(iii) Route flush timer


It is the time after which route is removed from the routing table, if
there are no updates about the router.

3.7 Metric of Dynamic Routing


Metric are the measuring unit to calculate the distance of destination
n/w. A protocol may use a one or more than one at a time to calculate
the distance. Different types of metric are: (1) Hop Count
(2) Band Width
(3) Load
(4) Reliability
(5) Delay
(6) MTU

1.Hop Count
It is the no. of Hops (Routers) a packet has to travel for a destination
n/w.

2.Bandwidth
Bandwidth is the speed of link. The path with higher bandwidth is
preferred to send the data.

3.Load
Load is the amount of traffic present in the interface. Paths with lower
load and high throughput are used to send data.

4.Reliability
Reliability is up time of interface over a period of time.

5. Delay
Delay is the time period b/w a packet is sent and received by the
destination.

6. MTU(Maximum Transmission Unit)


It is the maximum size of packet that can be sent in a frame mostly
MTU is set to 1500.

3.8 Routers Configuration

Figure-3.3

CHAPTER-4

PROTOCOLS
4.1 Routing Protocols
Routing protocols includes the following processes for sharing route
information allows routers to communicate with other routers to
update and maintain the routing tables
Examples of routing protocols that support the IP routed protocol are:
RIP, IGRP,
OSPF, BGP,
And EIGRP.

4.2 Routed Protocols


Protocols used at the network layer that transfer data from one host to
another across a router are called routed or routable protocols. The
Internet Protocol (IP) and Novell's Internetwork Packet Exchange
(IPX) are examples of routed protocols. Routers use routing protocols
to exchange routing tables and share routing information. In other
words, routing protocols enable routers to route routed protocols e.x.
IPX(Internet Packet Exchanger) and IP(Internet Protocol ).

IGP and EGP

Figure-4.1

4.2(a)Categories of Routing Protocols


Most routing algorithms can be classified into one of two categories:

distance vector

link-state

The distance vector routing approach determines the direction (vector)


and distance to any link in the internetwork.
The link-state approach, also called shortest path first, recreates the
exact topology of the entire internetwork.

Comparing Routing Methods

TYPES OF ROUTING PROTOCOLS


RIPv1

Table-4.1

CHARACTERISTICS

Maximum network size is limited


by the number of hops

Table-4.2

Configuring RIP Example

Figure-4.2

4.3 IGRP
Interior Gateway Routing Protocol (IGRP) is a proprietary protocol
developed by Cisco.
Some of the IGRP key design characteristics emphasize the following:

It is a distance vector routing protocol.

Routing updates are broadcast every 90 seconds.

Bandwidth, load, delay and reliability are used to

create a composite metric.

4.3(a) IGRP Stability Features


IGRP has a number of features that are designed to enhance its
stability, such as:

Holddowns

Split horizons

Poison reverse updates

Holddowns
Holddowns are used to prevent regular update messages from
inappropriately reinstating a route that may not be up.

Split horizons
Split horizons are derived from the premise that it is usually not useful
to send information about a route back in the direction from which it
came.
Poison reverse updates
Split horizons prevent routing loops between adjacent routers, but
poison reverse updates are necessary to defeat larger routing loops.
Today, IGRP is showing its age, it lacks support for variable length
subnet masks (VLSM). Rather than develop an IGRP version 2 to
correct this problem, Cisco has built upon IGRP's legacy of success
with Enhanced

4.4 OSPF (Open Shortest Path First) Protocol


OSPF is a Link-State Routing Protocols
Link-state (LS) routers recognize much more information about the
network than their distance-vector counterparts,Consequently LS routers
tend to make more accurate decisions.
Link-state routers keep track of the following:
Their neighbours

All routers within the same area


Best paths toward a destination
Neighbor table:
Also known as the adjacency database
(list of recognized neighbors)
Topology table:
Typically referred to as LSDB
(routers and links in the area or network)
All routers within an area have an identical LSDB
Routing table:
Commonly named a forwarding database
(list of best paths to destinations)

4.4(a) Configuring Basic OSPF: Single Area


Router(config)#
routerospfprocess-id
Router(config-router)#
networkaddress inverse-maskarea [area-id]
Router OSPF subordinate command that defines the interfaces
(by network number) that OSPF will run on.
number must be defined to a specific area.

Each network

Configuring OSPF on Internal Routers of a Single Area

Figure-4.3

4.5 EIGRP

Enhanced Interior Gateway Routing Protocol (EIGRP) is a Ciscoproprietary routing protocol based on Interior Gateway Routing
Protocol (IGRP).
Unlike IGRP, which is a classful routing protocol, EIGRP supports
CIDR and VLSM.
Compared to IGRP, EIGRP boasts faster convergence times, improved
scalability, and superior handling of routing loops.
Furthermore, EIGRP can replace Novell Routing Information Protocol
(RIP) and AppleTalk Routing Table Maintenance Protocol (RTMP),
serving both IPX and AppleTalk networks with powerful efficiency.
EIGRP is often described as a hybrid routing protocol, offering the
best of distance vector and link-state algorithms.

4.5(

a) Configuring EIGRP

Figure-4.4

CHAPTER-5
DHCP
5.1 DHCP
Dynamic Host Configuration Protocol automates network-parameter
assignment to network devices from one or more DHCP servers. Even
in small networks, DHCP is useful because it makes it easy to add
new machines to the network.
When a DHCP-configured client (a computer or any other networkaware device) connects to a network, the DHCP client sends a
[[Broadcasting (computing)|broadcast]] query requesting necessary
information from a DHCP server. The DHCP server manages a pool
of IP addresses and information about client configuration parameters
such as [[default gateway]], [[domain name]], the [[name server]]s,
other servers such as [[time server]]s, and so forth. On receiving a
valid request, the server assigns the computer an IP address, a lease
(length of time the allocation is valid), and other IP configuration
parameters, such as the [[subnet mask]] and the [[default gateway]].
The query is typically initiated immediately after [[booting]], and

must complete before the client can initiate [[Internet Protocol|IP]]based communication with other hosts.

5.2 Depending on implementation, the DHCP server may


have three methods of allocating IP-addresses:
5.(a) ''Dynamic Allocation'': A [[network administrator]] assigns
a range of IP addresses to DHCP, and each client computer on the
LAN is configured to request an IP address from the DHCP [[Server
(computing)|server]] during network initialization. The request-andgrant process uses a lease concept with a controllable time period,
allowing the DHCP server to reclaim (and then reallocate) IP
addresses that are not renewed.
5.2(b) ''Automatic Allocation'': The DHCP server permanently
assigns a free IP address to a requesting client from the range defined
by the administrator. This is like dynamic allocation, but the DHCP
server keeps a table of past IP address assignments, so that it can
preferentially assign to a client the same IP address that the client
previously had.
5.2(c) ''Static Allocation'': The DHCP server allocates an IP
address based on a table with [[MAC address]]/[[IP address]] pairs,
which are manually filled in (perhaps by a [[network administrator]]).

Only requesting clients with a MAC address listed in this table will be
allocated an IP address. This feature (which is not supported by all
DHCP servers) is variously called ''Static DHCP Assignment'' (by
[[DD-WRT]]), ''fixed-address'' (by the dhcpd documentation),
''Address Reservation'' (by Netgear), ''DHCP reservation'' or ''Static
DHCP'' (by Cisco/[[Linksys]]), and ''IP reservation'' or ''MAC/IP
binding'' (by various other router manufacturers).

5.3 DORA PROCESS


DHCP operations fall into four basic phases: IP discovery, IP lease
offer, IP request, and IP lease acknowledgement.
DHCP clients and servers on the same subnet communicate via UDP
broadcasts. If the client and server are on different subnets, IP
discovery and IP request messages are sent via UDP broadcasts, but IP
lease offer and IP lease acknowledgement messages are [[unicast]].

5.3(a) DHCP discovery


The client broadcasts messages on the physical subnet to discover
available DHCP servers. Network administrators can configure a local
router to forward DHCP packets to a DHCP server from a different
subnet. This client-implementation creates a [[User Datagram
Protocol]] (UDP) packet with the broadcast destination of
255.255.255.255 or the specific subnet broadcast address.

A DHCP client can also request its last-known IP address (in the
example below, 192.168.1.100). If the client remains connected to a
network for which this IP is valid, the server might grant the request.
Otherwise, it depends whether the server is set up as authoritative or
not. An authoritative server will deny the request, making the client
ask for a new IP address immediately. A non-authoritative server
simply ignores the request, leading to an implementation-dependent
timeout for the client to give up on the request and ask for a new IP
address.

5.3(b) DHCP offer


When a DHCP server receives an IP lease request from a client, it
reserves an IP address for the client and extends an IP lease offer by
sending a DHCPOFFER message to the client. This message contains
the client's MAC address, the IP address that the server is offering, the
subnet mask, the lease duration, and the IP address of the DHCP
server making the offer.
The server determines the configuration based on the client's hardware
address as specified in the CHADDR (Client Hardware Address) field.
Here the server, 192.168.1.1, specifies the IP address in the YIADDR
(Your IP Address) field.

5.3(c) DHCP request

A client can receive DHCP offers from multiple servers, but it will
accept only one DHCP offer and broadcast a DHCP request message.
Based on the Transaction ID field in the request, servers are informed
whose offer the client has accepted. When other DHCP servers receive
this message, they withdraw any offers that they might have made to
the client and return the offered address to the pool of available
addresses. The DHCP request message is broadcast, instead of being
unicast to a particular DHCP server, because the DHCP client has still
not received an IP address. Also, this way one message can let all
other DHCP servers know that another server will be supplying the IP
address without missing any of the servers with a series of unicast
messages.

5.3(d) DHCP acknowledgement


When the DHCP server receives the DHCPREQUEST message from
the client, the configuration process enters its final phase. The
acknowledgement phase involves sending a DHCPACK packet to the
client. This packet includes the lease duration and any other
configuration information that the client might have requested. At this
point, the IP configuration process is completed.

Snapshot of DHCP

Figure-5.1

CHAPTER-6
ACL (Acceess Control List)
6.1 ACL (Acceess Control List)
Access Control List is a list of conditions that are used to control the
network traffic or packet filtering.We can use ACL for filtering the
unwanted packets when implementing security policy.

6.2 Applying ACLs


You can define ACLs without applying them. But, the ACLs have no
effect until they are applied to the interface of the router. It is a good
practice to apply the ACL on the interface closest to the source of the
traffic. As shown in this example, when you try to block traffic from
source to destination, you can apply an inbound ACL to E0 on router
A instead of an outbound list to E1 on router C. An access-list has
a deny ip any any implicitly at the end of any access-list. If traffic is
related to a DHCP request and if it is not explicity permitted, the
traffic is dropped because when you look at DHCP request in IP, the
source address is s=0.0.0.0 (Ethernet1/0), d=255.255.255.255, len
604, rcvd 2 UDP src=68, dst=67. Note that the source IP address is
0.0.0.0 and destination address is 255.255.255.255. Source port is 68
and destination 67. Hence, you should permit this kind of traffic in
your access-list else the traffic is dropped due to implicit deny at the
end of the statement.
Note: For UDP traffic to pass through, UDP traffic must also be
permited explicitly by the ACL.

Figure-6.1

Define In, Out, Inbound, Outbound, Source, and


Destination
The router uses the terms in, out, source, and destination as
references. Traffic on the router can be compared to traffic on the
highway. If you were a law enforcement officer in Pennsylvania and
wanted to stop a truck going from Maryland to New York, the source
of the truck is Maryland and the destination of the truck is New York.
The roadblock could be applied at the PennsylvaniaNew York border
(out) or the MarylandPennsylvania border (in).

6.3 Types of IP ACLs


This section of the document describes ACL types.

6.3(a) Standard ACLs


Standard ACLs are the oldest type of ACL. They date back to as early
as Cisco IOS Software Release 8.3. Standard ACLs control traffic by
the comparison of the source address of the IP packets to the
addresses configured in the ACL.
This is the command syntax format of a standard ACL.
access-listaccess-list-number {permit|deny}
{host|sourcesource-wildcard|any}

In all software releases, the access-list-number can be anything from 1


to 99. In Cisco IOS Software Release 12.0.1, standard ACLs begin to
use additional numbers (1300 to 1999). These additional numbers are
referred to as expanded IP ACLs. Cisco IOS Software Release 11.2
added the ability to use list name in standard ACLs.
A source/source-wildcard setting of 0.0.0.0/255.255.255.255 can be
specified as any. The wildcard can be omitted if it is all zeros.
Therefore, host 10.1.1.2 0.0.0.0 is the same as host 10.1.1.2.
After the ACL is defined, it must be applied to the interface (inbound
or outbound). In early software releases, out was the default when a
keyword out or in was not specified. The direction must be specified
in later software releases.
interface<interface>
ip access-group number {in|out}
This is an example of the use of a standard ACL in order to block all
traffic except that from source 10.1.1.x.
interface Ethernet0/0
ip address 10.1.1.1 255.255.255.0
ip access-group 1 in
access-list 1 permit 10.1.1.0 0.0.0.255

6.3(b) Extended ACLs

Extended ACLs were introduced in Cisco IOS Software Release 8.3.


Extended ACLs control traffic by the comparison of the source and
destination addresses of the IP packets to the addresses configured in
the ACL.
This is the command syntax format of extended ACLs. Lines are
wrapped here for spacing considerations.

IP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} protocol source source-wildcard
destination destination-wildcard [precedence precedence]
[tostos] [log|log-input] [time-range time-range-name]

ICMP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} icmpsource source-wildcard
destination destination-wildcard
[icmp-type [icmp-code] |icmp-message]
[precedence precedence] [tostos] [log|log-input]
[time-range time-range-name]

TCP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} tcpsource source-wildcard [operator [port]]
destination destination-wildcard [operator [port]]
[established] [precedence precedence] [tostos]

[log|log-input] [time-range time-range-name]

UDP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} udpsource source-wildcard [operator [port]]
destination destination-wildcard [operator [port]]
[precedence precedence] [tostos] [log|log-input]
[time-range time-range-name]

CHAPTER-7
INTER-VLAN
7.1 Understanding How InterVLAN Routing Works

Network devices in different VLANs cannot communicate with one


another without a router to route traffic between the VLANs. In most
network environments, VLANs are associated with individual
networks or subnetworks.
For example, in an IP network, each subnetwork is mapped to an
individual VLAN. In a Novell IPX network, each VLAN is mapped to
an IPX network number. In an AppleTalk network, each VLAN is
associated with a cable range and AppleTalk zone name.
Configuring VLANs helps control the size of the broadcast domain
and keeps local traffic local. However, when an end station in one
VLAN needs to communicate with an end station in another VLAN,
interVLAN communication is required. This communication is
supported by interVLAN routing. You configure one or more routers
to route traffic to the appropriate destination VLAN.
Shows a basic interVLAN routing topology. Switch A is in VLAN 10
and Switch B is in VLAN 20. The router has an interface in each
VLAN.

Figure:-7.1 Basic InterVLAN Routing Topology

When Host A in VLAN 10 needs to communicate with Host B in


VLAN 10, it sends a packet addressed to that host. Switch A forwards
the packet directly to Host B, without sending it to the router.

When Host A sends a packet to Host C in VLAN 20, Switch A


forwards the packet to the router, which receives the traffic on the
VLAN 10 interface. The router checks the routing table, determines
the correct outgoing interface, and forwards the packet out the
VLAN 20 interface to Switch B. Switch B receives the packet and
forwards it to Host C.
shows another common scenario, interVLAN routing over a single
trunk connection to the router. The switch has ports in multiple
VLANs. InterVLAN routing is performed by a Cisco 7505 router
connected to the switch through a full-duplex Fast Ethernet trunk link.

CHAPTER-8
NAT
8.1 NAT-:Short for Network Address Translation, an Internet
standard that enables a local-area network (LAN) to use one set of IP

addresses for internal traffic and a second set of addresses for external
traffic. A NAT box located where the LAN meets the Internet makes
all necessary IP address translations.
NAT serves three main purposes:

Provides a type of firewall by hiding internal IP addresses

Enables a company to use more internal IP addresses. Since

they're used internally only, there's no possibility of conflict with IP


addresses used by other companies and organizations.
Allows a company to combine multiple ISDN connections

into a single Internet connection.

Figure-8.1

8.2

How

Works??

Network

Address

Translation

Figure-8.2

Network Address Translation helps improve security by reusing

IP addresses. The NAT router translates traffic coming into and


leaving the private network. See more pictures of computer
networking.

If you are reading this article, you are most likely connected to

the Internet and viewing it at the HowStuffWorks Web site. There's a


very good chance that you are using Network Address Translation
(NAT) right now.

The Internet has grown larger than anyone ever imagined it

could be. Although the exact size is unknown, the current estimate is
that there are about 100 million hosts and more than 350 million users
actively on the Internet. That is more than the entire population of the
United States! In fact, the rate of growth has been such that the
Internet is effectively doubling in size each year.

So what does the size of the Internet have to do with NAT?

Everything! For a computer to communicate with other computers and


Web servers on the Internet, it must have an IP address. An IP address
(IP stands for Internet Protocol) is a unique 32-bit number that
identifies the location of your computer on a network. Basically, it
works like your street address -- as a way to find out exactly where
you are and deliver information to you.

When IP addressing first came out, everyone thought that there

were plenty of addresses to cover any need. Theoretically, you could


have 4,294,967,296 unique addresses (232). The actual number of
available addresses is smaller (somewhere between 3.2 and 3.3
billion) because of the way that the addresses are separated into
classes, and because some addresses are set aside for multicasting,
testing or other special uses.

CHAPTER-9

SWITCHING CONCEPTS
9.1 Switching
Switches occupy the same place in the network as hubs. Unlike hubs,
switches examine each packet and process it accordingly rather than
simply repeating the signal to all ports. Switches map the Ethernet

addresses of the nodes residing on each network segment and then


allow only the necessary traffic to pass through the switch. When a
packet is received by the switch, the switch examines the destination
and source hardware addresses and compares them to a table of
network segments and addresses. If the segments are the same, the
packet is dropped ("filtered"); if the segments are different, then the
packet is "forwarded" to the proper segment. Additionally, switches
prevent bad or misaligned packets from spreading by not forwarding
them.
MAC Address Table

Figure-9.1

9.2 Classification of switches Switches are classified according to the following criteria:

9.2(a) Types of switches based on working (1) Store & Forward

This switch receives entire frame then perform error checking and
start forwarding data to the destination.

(2) Cut through

This switch starts forwarding frame as soon as first six bytes of the
frame are received.

(3) Fragment-free

This switch receives 64 bytes of the frame, perform error checking


and then start forwarding data.

(4) Adaptive cut-through

It changes its mode according the condition. If it see there are


errors in many frames then it changes to Store & Forward mode from
Cut through or Fragment-free.

9.2(b) Types of switches based on management (1) Manageable switches


(2) Non-Manageable switches
(3) Semi-Manageable switches
Types of switches based on OSI layer (1) Layer 2 switches (only switching)

(2) Layer 3 switches (switching & routing)

9.2(c) Types of switches based on command mode (only in


Cisco) (1) IOS based
(2) CLI based

9.2(d) Type of switches based on hierarchical model (1) Core layer switches
(2) Distribution layer switches
(3) Access layer switches

9.2(e) Qualities of switch - No. of ports


- Speed of ports
- Type of media
- Switching or wire speed or throughput

9.3 Basic Switch Administration IOS based switches are similar to the routers. We can perform
following function on switches in a similar manner as performed on
router.
(1) Access switch using console
(2) Commands to enter & exit from different mode
(3) Commands to configure passwords
(4) Manage configuration
(5) Backup IOS and configuration
(6) Configuring and resolving hostnames
(7) Managing telnet
(8) Configuring CDP
(9) Configuring time clock
(10) Configuring Banners
(11) Command line shortcuts and editing shortcuts
(12) Managing history
(13) Configure logging
(14) Boot system commands

9.4 Following function and options are not similar in


router and switch. (1) Default hostname is Switch
(2) Auxiliary port is not present
(3) VTY ports are mostly 0 to 15
(4) By default interfaces are enabled
(5) IP address cannot be assign to interfaces
(6) Routing configuration mode is not present
(7) Interface no. starts from 1
(8) Web access is by default enabled
(9) Configuration registry is not present in similar manner
(10) Flash memory may contain multiple files and startupconfiguration is also saved in flash

9.5 Switch Cofiguration

Figure-9.2

CHAPTER-10
VTP (VLAN Trunking Protocols)
10.1 VTP(VLAN Trunking Protocols)
Cisco created this one too. The basic goals of VLAN Trunking
Protocol (VTP) are to manage all configured VLANs across a
switched internetwork and to maintain consistency throughout that
network. VTP allows you to add, delete, and rename VLANs
information that is then
propagated to all other switches in the VTP domain.

Heres a list of some of the cool features VTP has to offer:


Consistent VLAN configuration across all switches in the network
VLAN trunking over mixed networks, such as Ethernet to ATM
LANE or even FDDI
Accurate tracking and monitoring of VLANs
Dynamic reporting of added VLANs to all switches in the VTP
domain
Adding VLANs using Plug and Play
With the help of VTP,we can simplify the process of creating the
Vlans.In multiple switches,we can configure one switch as VTP
Server and all the switches will be configured as VTP clients. We will
create the vlans on VTP Server switch. The Server will send periodic

updates to the VTP client switches. The client will create the vlan
from the updates received from the server

10.2 VTP Modes of Operation


10.2(a) Server
This is the default mode for all Catalyst switches. You need at least
one server in your VTP domain to propagate VLAN information
throughout that domain. Also important: The switch must be in server
mode to be able to create, add, and delete VLANs in a VTP domain.
VLAN information has to be changed in server mode, and any change
made to VLANs on a switch in server mode will be advertised to the
entire VTP domain. In VTP server mode, VLAN configurations are
saved in NVRAM on the switch.
10.2(b) Client
In client mode, switches receive information from VTP servers, but
they also receive and forward updates, so in this way, they behave
like VTP servers. The difference is that they cant create, change, or
delete VLANs. Plus, none of the ports on a client switch can be added
to
a new VLAN before the VTP server notifies the client switch of the
new VLAN and the VLAN exists in the clients VLAN database. Also
good
to know is that VLAN information sent from a VTP server isnt stored
in NVRAM, which is important because it means that if the switch is
reset

or reloaded, the VLAN information will be deleted. Heres a hint: If


you want a switch to become a server, first make it a client so it
receives all
the correct VLAN information, then change it to a serverso much
easier!
So basically, a switch in VTP client mode will forward VTP summary
advertisements and process them. This switch will learn about but
wont
save the VTP configuration in the running configuration, and it wont
save it in NVRAM. Switches that are in VTP client mode will only
learn
about and pass along VTP informationthats it!

10.2(c) Transparent
Switches in transparent mode dont participate in the VTP domain or
share its VLAN database, but theyll still forward VTP
advertisements through any configured trunk links. They can create,
modify, and delete VLANs because they keep their own database
one
they keep secret from the other switches. Despite being kept in
NVRAM, the VLAN database in transparent mode is actually only
locally
significant. The whole purpose of transparent mode is to allow remote
switches to receive the VLAN database from a VTP server-configured
switch through a switch that is not participating in the same VLAN
assignments.

VTP only learns about normal-range VLANs, with VLAN IDs 1 to


1005; VLANs with IDs greater than 1005 are called extended-range
VLANs
and theyre not stored in the VLAN database. The switch must be in
VTP transparent mode when you create VLAN IDs from 1006 to
4094, so
it would be pretty rare that youd ever use these VLANs. One other
thing: VLAN IDs 1 and 1002 to 1005 are automatically created on all
switches and cant be removed.

10.3 VTP Servers Configuration


Figure-10.1

CHAPTER-11
VLANs

11.1VLANs-A VLAN is singe broadcast domain. All devices


connected to the vlan receive broadcasts sent by any other VLAN
members. However, devices connected to a different VLAN will not
receive those same broadcasts. A VLAN consists of hosts defined as
members communicating as a logical network segment. A VLAN can
have connected members located anywhere in the campus network, as
long as VLAN connectivity is provided among all the members.

11.2 INTER-VLAN
11.2(a)

Understanding

How

Inter-VLAN

Routing Works
Network

devices

in

different

VLANs

cannot

communicate with one another without a router to


route traffic between the VLANs. In most network

environments, VLANs are associated with individual


networks or sub-networks.
For example, in an IP network, each sub-network is
mapped to an individual VLAN. In a Novell IPX network,
each VLAN is mapped to an IPX network number. In an
AppleTalk network, each VLAN is associated with a
cable range and AppleTalk zone name.
Configuring VLANs helps control the size of the
broadcast

domain

and

keeps

local

traffic

local.

However, when an end station in one VLAN needs to


communicate with an end station in another VLAN,
inter-VLAN

communication

is

required.

This

communication is supported by inter-VLAN routing. You


configure one or more routers to route traffic to the
appropriate destination VLAN.
When Host A in VLAN 10 needs to communicate with
Host B in VLAN 10, it sends a packet addressed to that
host. Switch A forwards the packet directly to Host B,
without sending it to the router.
When Host A sends a packet to Host C in VLAN 20,
Switch A forwards the packet to the router, which
receives the traffic on the VLAN 10 interface. The router
checks the routing table, determines the correct
outgoing interface, and forwards the packet out the

VLAN 20 interface to Switch B. Switch B receives the


packet and forwards it to Host C.
It shows another common scenario, inter-VLAN routing
over a single trunk connection to the router. The switch
has ports in multiple VLANs. Inter-VLAN routing is
performed by a Cisco 7505 router connected to the
switch through a full-duplex Fast Ethernet trunk link.

11.3 Trunking
A trunk is a point-to-point link that transmits and
receives traffic between switches or between switches
and routers. Trunks carry the traffic of multiple VLANs
and can extend VLANs across an entire network.

11.4VLAN Configuration

CHAPTER-12
Conclusion

The Enterprise network is the lifeblood of any Small to


Medium Enterprise (SME) with more than one site or
supply chain partner. It enables access to business
information and allows for profitable and effective
communication flows between employees in different
enterprise sites. Network enterprise network equipment
are mature and ubiquitous, but the quality of services
provided by similar networks varies from city to city and
from country to country. In particular, the quality
variation gap between most of the cities in some
developing nations and their counterparts in advanced
nations is very wide. This is due to the lack in
developing nations of an adequate IT infrastructure,
which is taken for granted in developed nations.
Planning an enterprise network in a developing nation
is almost like planning it in the middle of a desert. This
project

briefly

discusses

the

architecture

of

an

enterprise

network.

It

examines

the

barriers

to

planning, designing and implementing an enterprise


network. This project also covers the methods to
implement enterprise level networks.

In this project weve started from working on

Basics of routers and switches then covering the Routing


technologies required to route data between branches. In
large LAN it is required to perform segmentation. So we have
to implement technologies like VLAN, TRUNKING, STP, PORT
SECURITY & INTER-VLAN etc.

Potrebbero piacerti anche