122
TRAINING REPORT OF SIX MONTHS INDUSTRIAL TRAINING, UNDERTAKEN AT NESTLE INDIA LTD.MOGA IN NETWORKING ON IPv6 OF BACHELOR OF TECHNOLOGY IN Computer Science and Engineering Under the Guidance of: Submitted By: Name: Mr.V.S CHAUHAN Name: RITESH KUMAR

report.docx

Embed Size (px)

Citation preview

TRAINING REPORT

OF

SIX MONTHS INDUSTRIAL TRAINING, UNDERTAKEN

AT

NESTLE INDIA LTD.MOGA

IN

NETWORKING

ON

IPv6

OF

BACHELOR OF TECHNOLOGY

IN

Computer Science and Engineering

Under the Guidance of: Submitted By:

Name: Mr.V.S CHAUHAN Name: RITESH KUMAR

Designation: IT MANAGER College Roll No.:E101091

Department: IT University Roll No.:100180305226

CHANDIGARH-PATIALA NATIONAL HIGHWAY,

VILL. JHANSLA, TEHSIL RAJPURA, DISTT. PATIALA 140401

ACKNOWLEDGEMENT

The 16 weeks Industrial Training is a part of my course curriculum of B. TECH (COMPUTER SCIENCE), which I am pursuing at DEPARTMENT OF COMPUTER SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY, RAJPURA (PUNJAB).so I am thankful to all the authorities of my institute, who design our course curriculum, as this training helps us to update our knowledge & built a practical approach.

I would like to express my indebtedness to Mr. S. Srinivasan (Factory Manager), Dr. B.S. Bhullar (Sr. Manager -Corporate Affairs & I.R)Ms. Rupika Singh (H.R manager) for permitting me to undergo my training at Nestle India Ltd., Moga Factory.

I shall be failing in my duty if I do not acknowledge the help extended by Mr V.S CHAUHAN(IT MANAGER) ER PANKAJ &Mr DALJEET SINGH , other officers and supervisors.

I would like to acknowledge the warmth, affection and co-operation by the operators and workers of Nestle India Ltd.

Finally I would like to say that without the help of above-mentioned people, my stay at industry would not have been such a memorable period itched in my memory as sweet experience.

EXECUTIVE SUMMARY

This document dwells upon my project training at esteemed and worldwide organization NESTLE INDIA LTD. from 6.1.2014 to 15.05.2014. This training is a part of my course curriculum pursuing at DEPARTMENT OF COMPUTER SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY,RAJPURA(PUNJAB). In these four months of my training I learnt about the commitment of the company towards quality of the food stuff it produces, more than sufficient efforts are made by the company and its employees at every critical point of production that assures the quality of the products that reaches to the consumers. It gives me immense pleasure to present this project report.

My training in this esteemed organization helped me to know & learn the practical aspects of industrial performance, theoretical part of which we studied in our course books. Learning in nestle was not limited to doing project. I was involved in understanding the culture of company, learning various processes, way the people co-ordinate with each other & effects of teamwork. Some other results of my training are better communication, enhanced confidence & more practical outlook towards life.

In the end, I would like to say that my experience in this factory would be an indispensable one throughout my life & I would like to thank all of them once again who have made it that way.

TO WHOM IT MAY CONCERN:

Mr. RITESH KUMAR is the student of, DEPARTMENT OF COMPUTER SCIENCE ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY, RAJPURA(PUNJAB). I learnt and he has completed his Industrial Training (from 6th January, 2014 to 15th MAY, 2014) in Nestle India Ltd, Moga Factory under my guidance. I have checked this report & the information contained in the report is genuine to my knowledge.

Mr . V.S CHAUHAN

(IT MANAGER)

TABLE OF CONTENTS

Introduction to company

Nestle History

Nestle logo

Operation In INDIA

MOGA Factory

Various Deptt. In Nestle MOGA Factory

1.Acknowledgement

Chapter-1

INTERNETWORKING BASICS

What is Computer Network?

Types of networks

1.2(a) Local area network (LAN)

1.2(b) Wide Area Network (WAN)

1.2(e) Metropolitan area network (MAN)

1.2(f) Virtual private network (VPN)

CHAPTER-2

DEVICES

2.1 DEVICES-:

2.1(a) Router

2.1(b) Switches

2.1(c)Hub

2.1(d)Bridge

CHAPTER-3

ROUTING BASICS

3.1 ROUTING

3.2 STATIC ROUTING

3.3 Default Routing

3.4 Dynamic Routing

3.5 Autonomous system

3.6 Distance Vector Routing

3.7 Metric of Dynamic Routing

CHAPTER-4

PROTOCOLS

4.1 Routing Protocols

4.2 Routed Protocols

4.2(a) Categories of Routing Protocols

4.3 IGRP

4.4 OSPF (Open Shortest Path First) Protocol

4.5 EIGRP

CHAPTER-5

DHCP

5.1 DHCP

5.2(a) Dynamic Allocation

5.2(b) Automatic Allocation

5.2(c) Static Allocation

5.3 DORA PROCESS

CHAPTER-6

ACL

6.1 ACL (Access Control List)

6.2 Applying ACLs

6.3 Types of IP ACLs

6.3(a) Standard ACLs

6.3(b) Extended ACLs

CHAPTER-7

INTER-VLAN

7.1 Understanding How InterVLAN Routing Works

CHAPTER-8

NAT

8.1 NAT

8.2 How Network Address Translation Works??

CHAPTER-9

SWITCHING

9.1 Switching

9.2 Classification of switches-

9.3 Basic Switch Administration

9.4 Following function and options are not similar in router and switch.

9.5 Switch Cofiguration

CHAPTER-10

VTP(VIRTUAL TRUNKING PORT)

10.1 VTP (VLAN Trunking Protocols)

10.2 VTP Modes of Operation

10.3 VTP Servers Configuration

CHAPTER-11

VLANs

11.1 VLANs

11.2 INTER-VLAN

11.2(a) Understanding How Inter-VLAN Routing Works

11.3 Trunking

11.4VLAN Configuration

CHAPTER-12

CONCLUSION

(LIST OF FIGURES)

Figure-2.1 Router

Figure-2.2 Switches

Figure-2.3 Hub

Figure-2.4 Bridge

Figure-3.1 Configuring Static Routes by Specifying Outgoing Interfaces

Figure-3.2(a) & Figure-3.2(b) Configuring Static Routes by Specifying Next-Hop Addresses

Figure-3.3 Router

Figure-4.1 Routed protocol transport

Figure-4.2 Configuring RIP example

Figure-4.3 Configuring OSPF on Internal Routers of a Single Area

Figure-4.4 Configuring EIGRP

Figure-5.1 Snapshot Of DHCP

Figure-6.1 Applying ACLs

Figure:-7.1 Basic InterVLAN Routing Topology

Figure-8.1 NAT purposes

Figure-8.2 How Network Address Translation Works??

Figure-9.1 MAC Address table

Figure-9.2 Switch Configuration

Figure-10.1 VTPs Server Configuration

Figure-11.1 VLANs Configuration

(LIST OF TABLES)

Table-4.1 Comparing routing methods

Table-4.2 Characteristics of routing protocols

Introduction To Company

(MR. HENRY NESTLEFOUNDEROF NESTLE)

1.1 Company Profile:

A WORD ABOUT NESTL - THE NEST

Nestl India is a multinational company with its worldwide operations in over 70 countries .The founder of Nestl was Henry Nestle who from a modest beginning founded the company in 1866 at Switzerland for manufacturing milk powders for babies. At that time Switzerland faced one of the highest infant mortality rates and the milk formula saved the lives of many infants whose mothers were unable to breast feed successfully.

At present Nestl is the worlds largest food company with its international headquarters at Vevey, Switzerland, with almost 500 factories world wide it employs almost 2 30,000 people.

Nestl is often quoted by most as multinational of multinationals. There is a good reason, as less than 2% of the turnover comes from the domestic market in Switzerland.

Nestl is much decentralized in its operations and most of the markets are given considerable autonomy in its operation. It is more of a people and products oriented company rather than systems oriented company there are unwritten guidelines which are to be followed, based on common senses and a strong set of moral principals emphasizing a lot of respect for fellow beings.

Nestl has always adapted to the local conditions and at the same time integrates its Swiss heritage. It has always taken a long-term view in the countries in which it operates.

Therefore, one can see a lot of investment R&D and risk taken in new product areas. There is a great emphasis placed on training by the company. It believes in rewarding and promoting people from within.

Today its product brand name Nestl is associated with quality products in worldwide consumer markets.

When Henry Nestle introduced the first commercial infant formula in 1867, he also created a symbol of the Birds nest, graphic translation of his name, which personifies the companys business. The symbol, which is universally understood, evokes security, motherhood and affection, nature and nourishment, family and tradition. Today it is the central element of Nestls corporate identity and closely parallels the companys corporate values and culture.

1.2 NESTLE STORY

Nestl was founded in 1867 on the shores of Lake Geneva in Vevey, Switzerland and its first product was FarineLacte Nestl, an infant cereal specially formulated by Henri Nestl to provide and improve infant nutrition. From its first historic merger with the Anglo-Swiss Condensed Milk Company in 1905, Nestl has grown to become the worlds largest and most diversified food Company, and is about twice the size of its nearest competitor in the food and beverages sector.

Nestls trademark of birds in a nest, derived from Henri Nestls personal coat of arms, evokes the values upon which he founded his Company. Namely, the values of security, maternity and affection, nature and nourishment, family and tradition. Today, it is not only the central element of Nestls corporate identity but serves to define the Companys products, responsibilities, business practices, ethics and goals.

In 2004, Nestl had around 247,000 employees worldwide, operated 500 factories in approx. 100 countries and offered over 8,000 products to millions of consumers universally. The Companys transparent business practices, pioneering environment policy and respect for the fundamental values of different cultures have earned it an enviable place in the countries it operates in. Nestls activities contribute to and nurture the sustainable economic development of people, communities and nations. Above all, Nestl is dedicated to bringing the joy of Good Food, Good Life to people throughout their lives, throughout the world.

1.3 NESTLE HISTORY

The Nestl Company was Henry Nestl's search for a healthy, economical alternative to breastfeeding for mothers who could not feed their infants at the breast.

The Company formed by the 1905 merger was called the Nestl and Anglo- Swiss Milk Company. The close of World War II marked the beginning of the most dynamic phase of Nestl's history.

In 1947, Nestl merged with Alimentana S.A., the manufacturer of Maggi seasonings and soups, becoming Nestl Alimentana Company. After the agreement with LOreal in 1974, Nestl's overall position changed rapidly.

Between 1975 and 1977, the price of coffee beans quadrupled, and the price of cocoa tripled.

Nestl approached the 1980s with a renewed flexibility and determination to evolve. Thus, between 1980 and 1984, the Company divested a number of non-strategic or unprofitable businesses. Nestl managed to put an end to a serious controversy over its marketing of infant formula.

Nestl opened the 20th century by merging with the Anglo-Swiss Condensed Milk Company to broaden its product range and widen its geographical scope. In the new millennium, Nestl is the undisputed leader in the food industry, with more than 470 factories around the world. Nestl's existing products will grow through innovation and renovation.

1.3.1 Historical Development

Sr.No.

Year

Achievements

1

1866

Company's foundation

2

1905

Merger between Nestl and Anglo-Swiss Condensed Milk Company

3

1929

Merger with Peter-Cailler-Kohler Chocolates Suisses S.A.

4

1947

Merger with Alimentana S.A. (Maggi)

5

1971

Merger with Ursina-Franck (Switzerland)

6

1985

Acquisition of Carnation (USA)

7

1988

Acquisition of Buitoni-Perugina (Italy)

8

1988

Acquisition of Rowntree (GB)

9

1992

Acquisition of Perrier (France)

10

1995

Nestl acquires Victor Schmidt &Shne, Austria's oldest producer of confectionery, including the famous 'Mozartkugeln'.

11

1997

Nestl, through the Perrier Vittel Group, expands its mineral water activities with the outright acquisition of San Pellegrino.

12

1998

Nestl acquires Spillers Pet foods of the UK and strengthens position in the pet food business which began in 1985 with the acquisition of the Carnation Friskies brand.

13

1999

Divestiture of Findus brand (except in Switzerland and Italy) and parts of Nestl's frozen food business in Europe.

14

1999

Divestiture of Hills Bros, MJB and Chase & Sanborn roast and ground coffee brands (USA).

15

2000

Acquisition of Power Bar.

16

2001

Nestl acquires Ralston Purina - Nestl Purina Pet Care Company established.

17

2002

Perrier Vittel Group re-named as Nestl Waters.

18

2006

Pantnagar plant starts manufacturing noodles.

19

2008

Cup noodle starts at Moga plant

1.4 NESTLE MISSION STATEMENT

At Nestl,we believe that research can help us makebetter foodso that people live a better life.

Good Food is the primary source of Good Health throughout life. We strive to bring consumers foods that are safe, of high quality and provide optimal nutrition to meet physiological needs. In addition to nutrition, health and wellness, Nestl products bring consumers the vital ingredients of taste and pleasure.

As consumers continue to make choices regarding foods and beverages they consume, Nestl helps provide selections for all individual taste and lifestyle preferences.

Research is a key part of our heritage at Nestl and an essential element our future. We know there is still much to discover about health, wellness and the role of food in our lives, and we continue to search for answers to bring consumers Good Food for Good Life.

1.5 NESTLE LOGO

The Nestl logo was launched by Henri Nestl in 1868 on the basis of the meaning of his name in German, i.e. little nest, and of his family emblem (that you cansee here).

Henriobtained a 15-year French patent for his logoin 1868. After he retired, it was registered in Vevey in 1875 by the new owners of his company.

In 1938, the traditional nest design was combined with the "Nestl" name to form what is called the combined mark.

In 1966 the design was simplified.

In 1988, the worm in the mother bird's beak was removed and the fledglings became two instead ofthree. It is said that it was meant to better illustrate the activities of the company, no longeractive onlyin utrition, and to reflect the averagemodern family oftwo children.

The logo we know now has just been simplified.

The tree is supposed to represent an oak and the birds thrushes.

1.6 NESTL -TODAY

Some names seem to belong to legend and Nestl now synonymous with a prestigious trademark and worlds foremost food group originally consisted of two companies Henry Nestle of Vevey Switzerland & Anglo Swiss Condensed Milk Company in Cham. Both companies competed vigorously from 1866- 1905. These groups merged in 1905 and become the starting point of the recent food group.

Nestl is now the No. 1 Food Company. It is present on all five continents has an annual turnover of nearly 89.2 Billion Swiss Francs is present on all five continents. At present there are around 508 factories spread over 80 countries with around 260 operating companies One basic research center and 17 technological development groups and has in excess of 2,30,000 employees.

Nestl operations worldwide are divides into 3 zones:-

ZONE EUR : Europe

ZONE AOA : Asia and Oceanic

ZONE AMS : Americas

India comes under zone AOA which includes South- East Asian trading giants of the likes of Thailand, Indonesia, Malaysia, Singapore, China etc. besides Australia. Mr. M.W. Garret currently heads ZONE AOA.

(Beverages28%% Milk Products Nutrition Ice Cream27% Cooking Aids Prepared dishes Pet Care25%Chocolate Confectionery Biscuits14%Pharmaceuticals6%)Currently Mr. Peter Brabeck heads the Nestle group worldwide and Mr. M.W. Garret heads zone AOA

(SALE BY PRODUCT GROUP)

Fig1.1: Sale By product Group

1.7 NESTLE INDIA

Nestls relationship with India dates back to 1912, when it began trading as The Nestl Anglo-Swiss Condensed Milk Company (Export) Limited, importing and selling finished products in the Indian market.

After Indias independence in 1947, the economic policies of the Indian Government emphasized the need for local production. Nestl responded to Indias aspirations by forming a company in India and set up its first factory in 1961 at Moga, Punjab, where the Government wanted Nestl to develop the milk economy. Progress in Moga required the introduction of Nestls Agricultural Services to educate advice and help the farmer in a variety of aspects. From increasing the milk yield oftheir cows through improved dairy farming methods, to irrigation, scientific crop management practices and helping with the procurement of bank loans. Nestl set up milk collection centers that would not only ensure prompt collection and pay fair prices, but also instill amongst the community, a confidence in the dairy business.

Nestl has been a partner in Indias growth for over nine decades now and has built a very special relationship of trust and commitment with the people of India. The Companys activities in India have facilitated direct and indirect employment and provides livelihood to about one million people including farmers, suppliers of packaging materials, services and other goods.

Nestl India manufactures products of truly international quality under internationally famous brand names such as NESCAFE, MAGGI, MILKY BAR, MILO, KIT KAT, BAR-ONE, MILKMAID and NESTEA and in recent years the Company has also introduced products of daily consumption and use such as NESTL Milk, NESTL SLIM Milk, NESTL Fresh n Natural Dahi and NESTL JeeraRaita.

1.7.1 OPERATIONS IN INDIA

Nestl set up its operations in India, as a trading company in 1912 and began manufacturing at the Moga factory in 1962. The production started with the manufacture of Milkmaid and other product was gradually brought into the fold. Nestl India Limited was formally incorporated in 1978 prior to which the manufacturing license was issued in the name of the Food Specialties Limited. The corporate office is located at Gurgaon and the registered office at M-5A, Connaught Circus, and New Delhi

At present Nestl have 7 manufacturing units countrywide which are successfully engaged in meeting the domestic as well as the exports demand. In addition there are several co packing units.

Fig 1.2: Factory

The Moga factory is the largest and the oldest in producing the widest range of food products.

Presently Nestl India employs over 3000 employees. In addition, thousands of people are associated with Nestl, having indirect employment as Milk suppliers, Vendors, Contractors and Distributions etc.

The production group first incepted under the name Food Specialties Ltd. started production at the Nestl Moga Factory in early 1962.At the time, with the help of Nestle International; the company shot into prominence as the countrys foremost producer of milk products, particularly baby foods.

The other factories are located at: -

Choladi (Tamilnadu) --Instant Tea Export 1969

Nanjangud (Karnataka) --Coffee & Milo 1989

Samalkha (Haryana) --Cereals, Milkmaid Deserts 1992

Ponda (Goa) --Chocolates & Confectionery 1995

Bicholim(Goa) --Noodles and Cold Sauces 1997

Pantnagar (Uttrakhand) --Noodles and Cold Sauces 2006

The distribution comprises of six branches located in Calcutta, Delhi, Mumbai, Chennai, Bangalore and Chandigarh. The distribution network functions efficiently with the transfer of goods from the factories to the mother godowns, which in turn are transferred to the clearing and the sales agents. The C&S agents sell it to the cash distribution, which makes the secondary sale in the market.

With time, the nature & extent of the company expanded. The product range, since then, has now diversified so much and to such an extent that it is really a tough task to enumerate all the products of the company on a single sheet of paper After 28 Years of working under the name of Food Specialties Ltd.

The company realized that in order to survive in the international competition and to keep up with the changing time a better and closer relationship was required between Nestl International and its Indian counterpart. So in 1990, a unified production and marketing front, under the name of Nestl India was conceived

1.7.2 Nestle India-Presence across India

Beginning with its first investment in Moga in 1961, Nestls regular and substantial investments established that it was here to stay. In 1967, Nestl set up its next factory at Choladi (Tamil Nadu) as a pilot plant to process the tea grown in the area into soluble tea. The Nanjangud factory (Karnataka), became operational in 1989, the Samalkha factory (Haryana), in 1993 and in 1995 and 1997, Nestl commissioned two factories in Goa at Ponda and Bicholim respectively. Nestl India has commissioned in 2006 its 7th factory at Pant Nagar in Uttrakhand.

Figure: Presence across India

Fig 1.3: Locations

1.7.3 Nestle India has 8 Factories in Our Country

(MOGA FactoryMoga factory started production in1962. Today, Moga contributing almost 75% of Nestle Indias total production volume and manufacturing 109671 tons of food products. It employs around 1600 people. Dairy creamers, IMF, SCM, Cereals, Vending Mixes, Noodles, Ketchups, Bouillon are manufactured in Moga Factory. Moga is located in Punjab State about 400 kilometers North of Delhi.)

(Nanjangud FactoryProduction in Nanjangud Factory started in 1989 with the manufacturing of Nescafe and Sunrise. Milo manufacture at Nanjangud begun in 1996. It situated 160 kilometers south of Bangalore; the factory has around 245 employees. It manufactures 15500 tons of Nescafe mixes, Milo.)

(Bicholim FactoryA satellite factory of Ponda at Bicholim for manufacturing of Noodles and Cold Sauces, It started their operational activity in 1997.)

(Ponda FactoryPonds Factory started production of Kit Kat in 1995. It is located 40 kilometers from Panji the capital of Goa. It manufactures Chocolates. Ponda currently employed around 250 people.)

(Samalkha FactorySamalkha Factory started production in 1993 situated 70 kilometers from Delhi. It has 260 employees and manufactures about 35000 tons of food products comprising IMFs, Infant Cereals, Noodles, Chilled dairy.)

(Pant Nagar FactoryThis is the one of the newly situated and the 7th factory of the Nestle in the India. Pantnagar Factory began production of Noodles in 2006.)

Tahliwal Factory:

The 8thFactory was set up at Tahliwal, Himachal Pradesh, in 2012. It will manufacture confectionery and chocolates.

Choladi Factory

The factory ion Choladi started production in 1967, Situated in South Asia, about 275 kilometers from Bangalore. The factory today has around 80 employees. It processes about 725 tons of soluble tea, which is all exported.

Beside this Nestle, India has the co-packing arrangements also:

Chocolates

Campco, Puttur

Toffees

Nutrine, Surendranagar

Cold Sauce 200g

Nijjer Agro Pvt. Ltd., Amritsar

Every Day Dairy Creamer

Brar Co-Packer Unit, Moga

Nestl Polo

Bakemans (Nagpur)

Pickles

Choride foods Ltd.(Puna)

Tasters Choice

Williamson Major company (Silliguri)

Dosa&Samber mix

Indian foods & fermentation Ltd. Nagpur

CHAPTER- 2

INTRODUCTION TO PRODUCT RANGE

Its activities include manufacturing and marketing of: -

B.B.S.B.E.C, Fg.S. BALJINDER SINGH

MECHANICAL ENGINEERINGRoll no.: 6121112358

Condensed milk

Powdered milk

Ice creams

Milk and Deities

Culinary

Cereal

Instant Drink

Chocolates & Confectionery

Other dairy products

Infant foods

Chocolates & Confectionery items

Tea

Coffee

Culinary products

Frozen products

Fruit juices

Mineral water

Pet foods

Pharmaceuticals& Cosmetics

Cerevita

2.1 BRANDS AND PRODUCTS

(NESCAFE CLASSIC is a 100% pure coffee and is made from carefully selected coffee beans picked from the finest plantations, blended and roasted to perfection to create the unique rich and smooth NESCAFE taste.)Beverages

(NESCAFE SUNRISE is an Instant Coffee-Chicory blend, popular for its robust body and a flavor akin to fresh roast-and-ground coffee. The secret lies in the right blend of flavorful coffee and roasted chicory to give you an incomparable experience.)

(NESTEA Tea Bags are made from the finest blend of Assam Teas, which give a refreshing cup of bright, coloury tea of fair strength and superior taste. They are available both in individually enveloped and non-enveloped formats.)

(A wide range of premixes for the vending machines. The basket of products include NESCAF Classic, NESCAF Frappe, Tea Premix (Plain, Cardamom), Hot Chocolate, Iced Tea (Lemon, Peach, Apple), and Badam (Almond) Milk vending mixes.)

(We manufacture high quality Hot & Cold Water Soluble Black and Green Tea Powders at ourstate-of-the-art factory in Choladi, located in the midst of tea plantations which ensure availability of fresh green leaves. With their high polyphenol content resulting in enhanced anti-oxidant properties, our teas can be used to produce premium products, available in bulk quantitiesonly.)

Chocolates and Confectionary

(NESTL KIT KAT is delicious crisp wafer fingers covered with Choc layer. Our special tropical zed recipe ensures that NESTL KIT KAT is preserved even in warmer climates.)

(NESTL MILKY BAR is a delicious milky treat which kids love. With its Calcium Rich recipe, NESTL MILKY BAR is a favorite with parents to treat their kids with.)

(Extremely popular in India, NESTL MUNCH is wafer layer covered with delicious Choc layer. A crispy light irresistible snack!)

(NESTL Milk Chocolate is a milk chocolate with a delicious taste for you to savors.)

(NESTL BAR-ONE is a luscious nougat and caramel core covered with a delicious Choc layer.)

(POLO is a mint roll popularly described as The Mint with the hole. Now also in the new extra strong singles format as POLO Power mint.)

Nestle Dishes & Cooking Aids

(MAGGI 2-MINUTE Noodles is one of the most popular brand of instant noodles in India. Available for export in 5 authentic Indian flavors (spicy Masala, tangy Chatpata, Chicken, Tomato and Curry), it is a delicious anytime snack thats ready in just 2 minutes.)

(MAGGI Vegetable Atta Noodles is a unique innovative product with the goodness of whole wheat and real vegetables. Available in the popular Masala flavor.) (MAGGI Chinese Noodles makes it so simple to prepare delicious Indian Style Chinese Noodles at home in a jiffy! Offered in two exciting flavors, Veg Chowmeinand Lemon Chicken. These packs are for export )

(In addition to the nutrition from whole wheat, MAGGI Dal Atta Noodles offers the goodness of Dal (lentils) in the deliciously ethnic Samber Tastemaker.)

(MAGGI offers a wide range of specialty Indian Sauces which are relished for their unique taste. Available in the following delightful variants: Tomato Ketchup, Tomato Sauce, Tomato Chilly, Masala Chilly, Chilly Garlic, Tamarina, Tomato Chatpata, Tomato Pudina and the all-time-favorite MAGGI Hot & Sweet Sauce.)

(MAGGI Taste of India Pastes are a delicate blend of traditional spices and freshly ground pastes, offering the convenience of preparing authentic Indian recipes at home, in no time at all! The range includes Biryani Paste, Curry Paste, Korma Paste, Tandoori Paste and Tikka Masala Paste.)

(New MAGGI Healthy Soups are even more delicious, quick to prepare, convenient and healthy. They contain real vegetables, are low fat and cholesterol free. They also do not have added MSG, preservatives or artificial colours.)

(NESTL EVERYDAY Ghee is 100% pure Clarified Butter hygienically packed to preserve its rich aroma and granular texture. As a cooking medium, NESTL EVERYDAY Ghee helps you add that authentic ethnic aroma and flavor to Indian preparations every time, everyday. )

(A Partly Skimmed Sweetened Condensed Milk, NESTL MILKMAID is a versatile product and excellent as a dessert ingredient. With MILKMAID, you can whip up lip-smacking desserts for your family in the shortest possible time)

(NESTL EVERYDAY Dairy Whitener is a creamy Dairy Whitener specially made to add a rich, smooth taste to your tea. Every time, every day.)

2.2 MOGA FACTORY

In the Malwa region of Punjab State, there is a small town, which is popularly known among the famous grain markets of the world. However the credit of bringing this town on the industrial map of the world goes to Nestle a Swiss Multinational company engaged in the largest food processing operation in the world. When in 1959 Nestl took decision to establish a milk processing factory, a very little could the people of Moga town and the farmers in the surrounding villages realize that the company now as Nestl India ltd. would play such an important role in economic & social development of the area.

Fig 2.1: Moga Factory

Nestl Moga factory is the one of the oldest factory of Nestl in India. It is the first factory of Nestl in India. It is the largest factory of Nestl in India as well as in the whole Asia Continent. This factory is the worlds Second largest factory of the Nestl Company. The Moga factory spreads over 57acres of area.

Nestl Company set up its operations in India, as a trading company in 1912 and began manufacturing at the Moga factory in 1961.The production starts at Moga factory on 15th Nov, 1962. The production started with the manufacture of Milkmaid and other products were gradually brought into the fold.

Today; Moga contributes almost 75% of Nestle Indias total production volume, manufacturing 80,000 tons of food products. It consumes approximately 9-10 lakhs litres of milk. It employs 2000 people. The entire range of milks, culinary products and cereals are manufactured in Moga. Moga is located in the state of Punjab about 400Kms.North of New Delhi.

In the Malwa region of Punjab State, there is a small town, which is popularly known among the famous grain markets of the world. However the credit of bringing this town on the industrial map of the world goes to Nestle a Swiss Multinational company engaged in the largest food processing operation in the world. When in 1959 Nestl took decision to establish a milk processing factory, a very little could the people of Moga town and the farmers in the surrounding villages realize that the company now as Nestl India ltd. would play such an important role in economic & social development of the area.

The company is not only an industrial and a commercial house but has make sustained efforts to improve economic and social environment of the people in the area of its operation be its farmers or residents of Moga. In the initial stages company faced many problems including procurements of milk sales of which was considered a sin at that time. But the team that surveyed that area found the area quite suitable for development of milk and it has been proved to be a right decision.

The company started its operation in 1961 with a capacity of 40,000 Kg of milk per day kept on expanding on regular intervals and at present handling capacity of 1100000 lts. 1300000 lts of milk per day. Many more products have been introduced.

Company started milk collection in Moga area on 15 Nov 1961 and on the first day 510lts of milk was collected from four villages. From that the day onwards company is collecting milk continuously both morning and evening without break. The total procurement in 1962 was 2,054 million kg from 4,660 milk suppliers of 66 villages and in 1962 fresh milk reception are 102, 33 Million kg from 46,308 farmers delivering milk at 650 collection centres in 574 villages and 10 milk chilling centres. In 1998 the milk chilling centres have increased from 10 to 186.

Nestl India Ltd. Moga factory is their oldest factory in India. With a layout spread over nearly 57 acres & having six plants within the factory, and it is also the largest factory of the Asia continental region.

The Company started milk collection in Moga area on 15th Nov. 1961 and on the first day 510 litres of milk was collected as from four villages. From that day onwards company is collecting milk in the morning and night. The capacity raised from 40,000 litters of milk per day in 1962 to over 1,200,000 litres of milk till date.

2.2.1 Various departments in the Nestle Moga factory

Supply Chain

NQAC

IP( Industrial performance)

FMR

Cereals

PFP

Culinary

QA

Engineering

Agri Services

Milk- LP

Milk- Egrons

HR

2.3 The factory consists of four production plants:

MILK OPERATIONS

CEREALS

INSTANT DRINKS (VENDING MIXES)

CULINARY

Project Requirements

LAN Hardware:

Core Layer Switches: catalyst 3550

Distribution Layer : catalyst 2960

Access Layer :Access point and Cisco 2950

WAN Hardware:

Routers: Cisco 1841 integrated services router

1 FE Card

1 WIC 1T card

Server Hardware requirements:-

The following table lists the minimum and recommended hardware requirements for deploying Linux and Windows Servers.

Main Difference will be in file system used by the OS. Linux will use ext3 and windows will use NTFS file system.:-

Component

Minimum

Recommended

Processor

2.5 gigahertz (GHz)

Dual processors that are each 3 GHz or faster

RAM

1 gigabyte (GB)

2 GB

Disk

EXT-3 File System /NTFS

EXT-3 File System/NTFS

Drive

DVD drive

DVD drive or the source copied to a local or network-accessible drive

Display

1024 768

1024 768 or higher resolution monitor

Network

56 kilobits per second (Kbps) connection between client computers and server

512Kbps or faster connection between client computers and server

FEASIBILITY STUDY

The various issues related to feasibility study are as follows:-

1. Technology

The various technologies used for this project are:-

Cisco Packet Tracer or GNS 3

ACL

NAT

Routing

Switching

InterVLAN

2. Economic

The technological and system requirements of the project would not require much of a cost. As we are doing the project at student level for the partial fulfilment of Btech.degree so the technologies mentioned were taken through the internet.

3. Schedule

The project is divided in a time span of 6 weeks so the project completion will not be an issue.

The project deadline will be easily met and all the activities necessary to be performed will be completed within the fixed time.

CHAPTER-1

INTRODUCTION TO INTERNETWORKING BASICS

Chapter-1

INTRODUCTION TO INTERNETWORKING BASICS

1.1 What is Computer Network?

A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the world. [1] Development of the network began in 1969, based on designs developed during the 1960s.

Computer networks can be used for a variety of purposes:

Facilitating communications. Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing.

Sharing hardware. In a networked environment, each computer on a network may access and use hardware resources on the network, such as printing a document on a shared network printer.

Sharing files, data, and information. In a network environment, authorized user may access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.

Sharing software. Users connected to a network may run application programs on remote computers.

Information preservation.

Security.

Speed up.

1.2 Types of networks

1.2(a) Local area network (LAN)

LAN stands for Local Area Network. The scope of the LAN is within one building, one school or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each computer sense the carrier before sending the data over the n/w. if carrier is free then you can transmit otherwise you have to wait or you have to listen. In multiple access each computer have right that they can access each other. If two computers sense the carrier on same time then the collision occur. Each computer, in the network, aware about the collision. Now this stop transmitting and they will use back off algorithm. In which random number is generated. This number or algorithm is used by each computer. Who has short number or small number, he has first priority to transmit the data over the network and other computers will wait for their turn.

1.2(b) Wide Area Network (WAN)

WAN stands for Wide Area Network, in which two local area networks are connected through public n/w. it may be through telecommunication infrastructure or dedicated lines. For e.g.: - ISDN lines, Leased lines etc. In which we can use WAN devices and WAN technology. You can also connect with your remote area through existing Internetwork called Internet.

1.2(c)Metropolitan area network (MAN)

A Metropolitan area network is a large computer network that usually spans a city or a large campus.

1.2(d)Virtual private network (VPN)

A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

CHAPTER-2

DEVICES

2.1 DEVICES-:

2.1(a)Router

Router is hardware device, which is used to communicate two different networks. Router performs routing and path determination. It does not perform broadcast information. There are two types of routers: -

(i) Hardware Routers are developed by Cisco, HP.

(ii) Software Routers is configured with the help of routing and remote access. This feature is offered by Microsoft. This feature is by default installed, but you have to enable or configure it.

Hardware routers are dedicated routers. They are more efficient.

But in case of software routers, it has less features, slow performance. They are not very much efficient.

Figure-2.1

2.1(b) Switches

Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has special kind of memory called mac address/filter/lookup table. Switch reads mac addresses. Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the destination mac address and consult with its filter table. If he has entry in its filter table then he forwards the frame to that particular mac address, if not found then it performs broadcasting to all its connected nodes.

Every port has its own buffer memory. A port has two queues one is input queue and second is output queue. When switch receives the frame, the frame is received in input queue and forward from output queue. So in case of switch there is no chance or place for collisions. In case of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance). Switches provide more efficiency, more speed and security.

There are two types of switches: -

(i) Manageable switches (can be configured with console cable).

(ii) Non-manageable switches.

Figure-2.2

2.1(c)Hub

Hub is centralized device, which is used to connect multiple workstations. There are two types of Hub: -

(i) Active Hub

(ii) Passive Hub

It has no special kind of memory. It simply receives the frame (data) and forwards it to all its nodes except the receiving node. It always performs broadcasting. In case of hub, there is one collision domain and one broadcast domain. In case of hub, the media access method is used CSMA/CD (Carrier Sense Multiple Access/Collision Detection).

(i) Active Hub

In Active hub, it receives the frame regenerate and then forward to all its nodes.

(ii) Passive Hub

In Passive hub, it simply receives the frame and forward to all its connected nodes.

You cannot perform LAN segmentation using hub.

Figure-2.3

2.1(d)Bridge

Bridge is a hardware device, which is used to provide LAN segmentation means it is used for break the collision domain. It has same functionality as performed by switch. We can use bridge between two different topologies. It has fewer ports. Each port has a own buffer memory. It works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table. In case of bridge there is one broadcast domain.

Figure-2.4

Chapter-3

ROUTING

3.1 ROUTING

Routing is the process that a router uses to forward packets toward the destination network. A router makes decisions based upon the destination IP address of a packet. All devices along the way use the destination IP address to point the packet in the correct direction so that the packet eventually arrives at its destination. In order to make the correct decisions, routers must learn the direction to remote networks.

3.2 STATIC ROUTING

In this routing, we have to use IP route commands through which we can specify routes for different networks. The administrator will analyze whole internetwork topology and then specify the route for each n/w that is not directly connected to the router.

3.2(a) Steps to perform static routing-

(1) Create a list of all n/w present in internetwork.

(2) Remove the n/w address from list, which is directly connected to n/w.

(3) Specify each route for each routing n/w by using IP route command.

Router(config)#ip route

Next hop IP it is the IP address of neighbor router that is directly connected our router.

Configuring Static Routes by Specifying Outgoing Interfaces

Figure-3.1

Configuring Static Routes by Specifying Next-Hop Addresses

Figure-3.2(a)

Figure-3.2(b)

3.2(b) Advantages of static routing

(1) Fast and efficient.

(2) More control over selected path.

(3) Less overhead for router.

(4) Bandwidth of interfaces is not consumed in routing updates.

3.2(c) Disadvantages of static routing

(1) More overheads on administrator.

(2) Load balancing is not easily possible.

(3) In case of topology change routing table has to be change manually.

3.3 Default Routing

Default routing means a route for any n/w. these routes are specify with the help of following syntax: -

Router(config)#ip route 0.0.0.0 0.0.0.0

Or

This type of routing is used in following scenario.

Scenario 1: -

Stub network

A n/w which has only one exit interface is called stub network.

If there is one next hop then we can use default routing.

Scenario 2

Internet connectivity

On Internet, million of n/ws are present. So we have to specify default routing on our router.

Default route is also called gateway of last resort. This route will be used when no other routing protocol is available.

Router(config)#ip route 10.0.0.0 255.0.0.0 172.16.0.5

Router(config)#ip route 0.0.0.0 0.0.0.0 200.100.100.11

To display routing table

Router#ship route

To display static routes only

Router#ship route static

S 192.168.10.0/28 [1/0] via 172.16.0.5

To display connected n/ws only

Router#ship route connected

To check all the interface of a router

Router#sh interface brief

3.4 Dynamic Routing

In dynamic routing, we will enable a routing protocol on router. This protocol will send its routing information to the neighbor router. The neighbors will analyze the information and write new routes to the routing table.

The routers will pass routing information receive from one router to other router also. If there are more than one path available then routes are compared and best path is selected. Some examples of dynamic protocol are: RIP, IGRP, EIGRP, OSPF

3.4(a) Types of Dynamic Routing Protocols

According to the working there are two types of Dynamic Routing Protocols.

(1) Distance Vector

(2) Link State

3.4(b) According to the type of area in which protocol is used there are again two types of protocol: -

(1) Interior Routing Protocol

(2) Exterior Routing Protocol

3.5 Autonomous system

Autonomous system is the group of contiguous routers and n/w, which will share their routing information directly with each other. If all routers are in single domain and they share their information directly with each other then the size of routing updates will depend on the no. of n/w present in the Internetwork. Update for each n/w may take 150 200 bytes information.

For example: - if there are 1000 n/ws then size of update will be

200*1000 = 200000 bytes

The routing information is send periodically so it may consume a large amount of bandwidth in our n/w.

3.6 Distance Vector Routing

The Routing, which is based on two parameters, that is distance and direction is called Distance Vector Routing. The example of Distance Vector Routing is RIP & IGRP.

Operation: -

(1) Each Router will send its directly connected information to the neighbor router. This information is send periodically to the neighbors.

(2) The neighbor will receive routing updates and process the route according to following conditions: -

(i) If update of a new n/w is received then this information is stored in routing table.

(ii) If update of a route is received which is already present in routing table then route will be refresh that is route times are reset to zero.

(iii) If update is received for a route with lower metric then the route, which is already present in our routing table. The router will discard old route and write the new route in the routing table.

(iv) If update is received with higher metric then the route that is already present in routing table, in this case the new update will be discard.

(3) A timer is associated with each route. The router will forward routing information on all interfaces and entire routing table is send to the neighbor. There are three types of timers associated with a route.

(i) Route update timer

It is the time after which the router will send periodic update to the neighbor.

(ii) Route invalid timer

It is the time after which the route is declared invalid, if there are no updates for the route. Invalid route are not forwarded to neighbor routers but it is still used to forward the traffic.

(iii) Route flush timer

It is the time after which route is removed from the routing table, if there are no updates about the router.

3.7 Metric of Dynamic Routing

Metric are the measuring unit to calculate the distance of destination n/w. A protocol may use a one or more than one at a time to calculate the distance. Different types of metric are: -

(1) Hop Count

(2) Band Width

(3) Load

(4) Reliability

(5) Delay

(6) MTU

1.Hop Count

It is the no. of Hops (Routers) a packet has to travel for a destination n/w.

2.Bandwidth

Bandwidth is the speed of link. The path with higher bandwidth is preferred to send the data.

3.Load

Load is the amount of traffic present in the interface. Paths with lower load and high throughput are used to send data.

4.Reliability

Reliability is up time of interface over a period of time.

5. Delay

Delay is the time period b/w a packet is sent and received by the destination.

6. MTU(Maximum Transmission Unit)

It is the maximum size of packet that can be sent in a frame mostly MTU is set to 1500.

3.8 Routers Configuration

Figure-3.3

CHAPTER-4

PROTOCOLS

4.1 Routing Protocols

Routing protocols includes the following processes for sharing route information allows routers to communicate with other routers to update and maintain the routing tables

Examples of routing protocols that support the IP routed protocol are:

RIP, IGRP,

OSPF, BGP,

And EIGRP.

4.2 Routed Protocols

Protocols used at the network layer that transfer data from one host to another across a router are called routed or routable protocols. The Internet Protocol (IP) and Novell's Internetwork Packet Exchange (IPX) are examples of routed protocols. Routers use routing protocols to exchange routing tables and share routing information. In other words, routing protocols enable routers to route routed protocols e.x. IPX(Internet Packet Exchanger) and IP(Internet Protocol ).

IGP and EGP

Figure-4.1

4.2(a)Categories of Routing Protocols

Most routing algorithms can be classified into one of two categories:

distance vector

link-state

The distance vector routing approach determines the direction (vector) and distance to any link in the internetwork.

The link-state approach, also called shortest path first, recreates the exact topology of the entire internetwork.

Comparing Routing Methods

TYPES OF ROUTING PROTOCOLS

RIPv1

Table-4.1

CHARACTERISTICS

Table-4.2

Configuring RIP Example

Figure-4.2

4.3 IGRP

Interior Gateway Routing Protocol (IGRP) is a proprietary protocol developed by Cisco.

Some of the IGRP key design characteristics emphasize the following:

It is a distance vector routing protocol.

Routing updates are broadcast every 90 seconds.

Bandwidth, load, delay and reliability are used to

create a composite metric.

4.3(a) IGRP Stability Features

IGRP has a number of features that are designed to enhance its stability, such as:

Holddowns

Split horizons

Poison reverse updates

HolddownsHolddowns are used to prevent regular update messages from inappropriately reinstating a route that may not be up.

Split horizonsSplit horizons are derived from the premise that it is usually not useful to send information about a route back in the direction from which it came.

Poison reverse updatesSplit horizons prevent routing loops between adjacent routers, but poison reverse updates are necessary to defeat larger routing loops.

Today, IGRP is showing its age, it lacks support for variable length subnet masks (VLSM). Rather than develop an IGRP version 2 to correct this problem, Cisco has built upon IGRP's legacy of success with Enhanced

4.4 OSPF (Open Shortest Path First) Protocol

OSPF is a Link-State Routing Protocols

Link-state (LS) routers recognize much more information about the network than their distance-vector counterparts,Consequently LS routers tend to make more accurate decisions.

Link-state routers keep track of the following:

Their neighbours

All routers within the same area

Best paths toward a destination

Neighbor table:

Also known as the adjacency database (list of recognized neighbors)

Topology table:

Typically referred to as LSDB (routers and links in the area or network)

All routers within an area have an identical LSDB

Routing table:

Commonly named a forwarding database (list of best paths to destinations)

4.4(a) Configuring Basic OSPF: Single Area

Router(config)#

routerospfprocess-id

Router(config-router)#

networkaddress inverse-maskarea [area-id]

Router OSPF subordinate command that defines the interfaces (by network number) that OSPF will run on. Each network number must be defined to a specific area.

Configuring OSPF on Internal Routers of a Single Area

Figure-4.3

4.5 EIGRP

Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-proprietary routing protocol based on Interior Gateway Routing Protocol (IGRP).

Unlike IGRP, which is a classful routing protocol, EIGRP supports CIDR and VLSM.

Compared to IGRP, EIGRP boasts faster convergence times, improved scalability, and superior handling of routing loops.

Furthermore, EIGRP can replace Novell Routing Information Protocol (RIP) and AppleTalk Routing Table Maintenance Protocol (RTMP), serving both IPX and AppleTalk networks with powerful efficiency.

EIGRP is often described as a hybrid routing protocol, offering the best of distance vector and link-state algorithms.

4.5(a) Configuring EIGRP

Figure-4.4

CHAPTER-5

DHCP

5.1 DHCP

Dynamic Host Configuration Protocol automates network-parameter assignment to network devices from one or more DHCP servers. Even in small networks, DHCP is useful because it makes it easy to add new machines to the network.

When a DHCP-configured client (a computer or any other network-aware device) connects to a network, the DHCP client sends a [[Broadcasting (computing)|broadcast]] query requesting necessary information from a DHCP server. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as [[default gateway]], [[domain name]], the [[name server]]s, other servers such as [[time server]]s, and so forth. On receiving a valid request, the server assigns the computer an IP address, a lease (length of time the allocation is valid), and other IP configuration parameters, such as the [[subnet mask]] and the [[default gateway]]. The query is typically initiated immediately after [[booting]], and must complete before the client can initiate [[Internet Protocol|IP]]-based communication with other hosts.

5.2 Depending on implementation, the DHCP server may have three methods of allocating IP-addresses:

5.(a) ''Dynamic Allocation'': A [[network administrator]] assigns a range of IP addresses to DHCP, and each client computer on the LAN is configured to request an IP address from the DHCP [[Server (computing)|server]] during network initialization. The request-and-grant process uses a lease concept with a controllable time period, allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not renewed.

5.2(b) ''Automatic Allocation'': The DHCP server permanently assigns a free IP address to a requesting client from the range defined by the administrator. This is like dynamic allocation, but the DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.

5.2(c) ''Static Allocation'': The DHCP server allocates an IP address based on a table with [[MAC address]]/[[IP address]] pairs, which are manually filled in (perhaps by a [[network administrator]]). Only requesting clients with a MAC address listed in this table will be allocated an IP address. This feature (which is not supported by all DHCP servers) is variously called ''Static DHCP Assignment'' (by [[DD-WRT]]), ''fixed-address'' (by the dhcpd documentation), ''Address Reservation'' (by Netgear), ''DHCP reservation'' or ''Static DHCP'' (by Cisco/[[Linksys]]), and ''IP reservation'' or ''MAC/IP binding'' (by various other router manufacturers).

5.3 DORA PROCESS

DHCP operations fall into four basic phases: IP discovery, IP lease offer, IP request, and IP lease acknowledgement.

DHCP clients and servers on the same subnet communicate via UDP broadcasts. If the client and server are on different subnets, IP discovery and IP request messages are sent via UDP broadcasts, but IP lease offer and IP lease acknowledgement messages are [[unicast]].

5.3(a) DHCP discovery

The client broadcasts messages on the physical subnet to discover available DHCP servers. Network administrators can configure a local router to forward DHCP packets to a DHCP server from a different subnet. This client-implementation creates a [[User Datagram Protocol]] (UDP) packet with the broadcast destination of 255.255.255.255 or the specific subnet broadcast address.

A DHCP client can also request its last-known IP address (in the example below, 192.168.1.100). If the client remains connected to a network for which this IP is valid, the server might grant the request. Otherwise, it depends whether the server is set up as authoritative or not. An authoritative server will deny the request, making the client ask for a new IP address immediately. A non-authoritative server simply ignores the request, leading to an implementation-dependent timeout for the client to give up on the request and ask for a new IP address.

5.3(b) DHCP offer

When a DHCP server receives an IP lease request from a client, it reserves an IP address for the client and extends an IP lease offer by sending a DHCPOFFER message to the client. This message contains the client's MAC address, the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer.

The server determines the configuration based on the client's hardware address as specified in the CHADDR (Client Hardware Address) field. Here the server, 192.168.1.1, specifies the IP address in the YIADDR (Your IP Address) field.

5.3(c) DHCP request

A client can receive DHCP offers from multiple servers, but it will accept only one DHCP offer and broadcast a DHCP request message. Based on the Transaction ID field in the request, servers are informed whose offer the client has accepted. When other DHCP servers receive this message, they withdraw any offers that they might have made to the client and return the offered address to the pool of available addresses. The DHCP request message is broadcast, instead of being unicast to a particular DHCP server, because the DHCP client has still not received an IP address. Also, this way one message can let all other DHCP servers know that another server will be supplying the IP address without missing any of the servers with a series of unicast messages.

5.3(d) DHCP acknowledgement

When the DHCP server receives the DHCPREQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a DHCPACK packet to the client. This packet includes the lease duration and any other configuration information that the client might have requested. At this point, the IP configuration process is completed.

Snapshot of DHCP

Figure-5.1

CHAPTER-6

ACL (Acceess Control List)

6.1 ACL (Acceess Control List)

Access Control List is a list of conditions that are used to control the network traffic or packet filtering.We can use ACL for filtering the unwanted packets when implementing security policy.

6.2 Applying ACLs

You can define ACLs without applying them. But, the ACLs have no effect until they are applied to the interface of the router. It is a good practice to apply the ACL on the interface closest to the source of the traffic. As shown in this example, when you try to block traffic from source to destination, you can apply an inbound ACL to E0 on router A instead of an outbound list to E1 on router C. An access-list has adeny ip any anyimplicitly at the end of any access-list. If traffic is related to a DHCP request and if it is not explicity permitted, the traffic is dropped because when you look at DHCP request in IP, the source address is s=0.0.0.0 (Ethernet1/0), d=255.255.255.255, len 604, rcvd 2 UDP src=68, dst=67. Note that the source IP address is 0.0.0.0 and destination address is 255.255.255.255. Source port is 68 and destination 67. Hence, you should permit this kind of traffic in your access-list else the traffic is dropped due to implicit deny at the end of the statement.

Note:For UDP traffic to pass through, UDP traffic must also be permited explicitly by the ACL.

Figure-6.1

Define In, Out, Inbound, Outbound, Source, and Destination

The router uses the terms in, out, source, and destination as references. Traffic on the router can be compared to traffic on the highway. If you were a law enforcement officer in Pennsylvania and wanted to stop a truck going from Maryland to New York, the source of the truck is Maryland and the destination of the truck is New York. The roadblock could be applied at the PennsylvaniaNew York border (out) or the MarylandPennsylvania border (in).

6.3 Types of IP ACLs

This section of the document describes ACL types.

6.3(a) Standard ACLs

Standard ACLs are the oldest type of ACL. They date back to as early as Cisco IOS Software Release 8.3. Standard ACLs control traffic by the comparison of the source address of the IP packets to the addresses configured in the ACL.

This is the command syntax format of a standard ACL.

access-listaccess-list-number {permit|deny}

{host|sourcesource-wildcard|any}

In all software releases, theaccess-list-numbercan be anything from 1 to 99. In Cisco IOS Software Release 12.0.1, standard ACLs begin to use additional numbers (1300 to 1999). These additional numbers are referred to as expanded IP ACLs. Cisco IOS Software Release 11.2 added the ability to use listnamein standard ACLs.

Asource/source-wildcardsetting of 0.0.0.0/255.255.255.255 can be specified asany. The wildcard can be omitted if it is all zeros. Therefore, host 10.1.1.2 0.0.0.0 is the same as host 10.1.1.2.

After the ACL is defined, it must be applied to the interface (inbound or outbound). In early software releases, out was the default when a keyword out or in was not specified. The direction must be specified in later software releases.

interface

ip access-group number {in|out}

This is an example of the use of a standard ACL in order to block all traffic except that from source 10.1.1.x.

interface Ethernet0/0

ip address 10.1.1.1 255.255.255.0

ip access-group 1 in

access-list 1 permit 10.1.1.0 0.0.0.255

6.3(b) Extended ACLs

Extended ACLs were introduced in Cisco IOS Software Release 8.3. Extended ACLs control traffic by the comparison of the source and destination addresses of the IP packets to the addresses configured in the ACL.

This is the command syntax format of extended ACLs. Lines are wrapped here for spacing considerations.

IP

access-list access-list-number

[dynamic dynamic-name [timeout minutes]]

{deny|permit} protocol source source-wildcard

destination destination-wildcard [precedence precedence]

[tostos] [log|log-input] [time-range time-range-name]

ICMP

access-list access-list-number

[dynamic dynamic-name [timeout minutes]]

{deny|permit} icmpsource source-wildcard

destination destination-wildcard

[icmp-type [icmp-code] |icmp-message]

[precedence precedence] [tostos] [log|log-input]

[time-range time-range-name]

TCP

access-list access-list-number

[dynamic dynamic-name [timeout minutes]]

{deny|permit} tcpsource source-wildcard [operator [port]]

destination destination-wildcard [operator [port]]

[established] [precedence precedence] [tostos]

[log|log-input] [time-range time-range-name]

UDP

access-list access-list-number

[dynamic dynamic-name [timeout minutes]]

{deny|permit} udpsource source-wildcard [operator [port]]

destination destination-wildcard [operator [port]]

[precedence precedence] [tostos] [log|log-input]

[time-range time-range-name]

CHAPTER-7

INTER-VLAN

7.1 Understanding How InterVLAN Routing Works

Network devices in different VLANs cannot communicate with one another without a router to route traffic between the VLANs. In most network environments, VLANs are associated with individual networks or subnetworks.

For example, in an IP network, each subnetwork is mapped to an individual VLAN. In a NovellIPX network, each VLAN is mapped to an IPX network number. In an AppleTalk network, each VLAN is associated with a cable range and AppleTalk zone name.

Configuring VLANs helps control the size of the broadcast domain and keeps local traffic local. However, when an end station in one VLAN needs to communicate with an end station in another VLAN, interVLAN communication is required. This communication is supported by interVLAN routing. You configure one or more routers to route traffic to the appropriate destination VLAN.

Shows a basic interVLAN routing topology. SwitchA is in VLAN 10 and SwitchB is in VLAN20. The router has an interface in each VLAN.

Figure:-7.1 Basic InterVLAN Routing Topology

When HostA in VLAN10 needs to communicate with HostB in VLAN10, it sends a packet addressed to that host. SwitchA forwards the packet directly to HostB, without sending it to the router.

When HostA sends a packet to HostC in VLAN20, SwitchA forwards the packet to the router, which receives the traffic on the VLAN10 interface. The router checks the routing table, determines the correct outgoing interface, and forwards the packet out the VLAN20 interface to SwitchB. SwitchB receives the packet and forwards it to HostC.

shows another common scenario, interVLAN routing over a single trunk connection to the router. The switch has ports in multiple VLANs. InterVLAN routing is performed by a Cisco7505 router connected to the switch through a full-duplex Fast Ethernet trunk link.

CHAPTER-8

NAT

8.1 NAT-:Short for Network Address Translation, an Internet standard that enables a local-area network (LAN) to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all necessary IP address translations.

NAT serves three main purposes:

Provides a type of firewall by hiding internal IP addresses

Enables a company to use more internal IP addresses. Since they're used internally only, there's no possibility of conflict with IP addresses used by other companies and organizations.

Allows a company to combine multiple ISDN connections into a single Internet connection.

Figure-8.1

8.2 How Network Address Translation Works??

Figure-8.2

Network Address Translation helps improve security by reusing IP addresses. The NAT router translates traffic coming into and leaving the private network. See more pictures of computer networking.

If you are reading this article, you are most likely connected to the Internet and viewing it at the HowStuffWorks Web site. There's a very good chance that you are using Network Address Translation (NAT) right now.

The Internet has grown larger than anyone ever imagined it could be. Although the exact size is unknown, the current estimate is that there are about 100 million hosts and more than 350 million users actively on the Internet. That is more than the entire population of the United States! In fact, the rate of growth has been such that the Internet is effectively doubling in size each year.

So what does the size of the Internet have to do with NAT? Everything! For a computer to communicate with other computers and Web servers on the Internet, it must have an IP address. An IP address (IP stands for Internet Protocol) is a unique 32-bit number that identifies the location of your computer on a network. Basically, it works like your street address -- as a way to find out exactly where you are and deliver information to you.

When IP addressing first came out, everyone thought that there were plenty of addresses to cover any need. Theoretically, you could have 4,294,967,296 unique addresses (232). The actual number of available addresses is smaller (somewhere between 3.2 and 3.3 billion) because of the way that the addresses are separated into classes, and because some addresses are set aside for multicasting, testing or other special uses.

CHAPTER-9

SWITCHING CONCEPTS

9.1 Switching

Switches occupy the same place in the network as hubs. Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports. Switches map the Ethernet addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass through the switch. When a packet is received by the switch, the switch examines the destination and source hardware addresses and compares them to a table of network segments and addresses. If the segments are the same, the packet is dropped ("filtered"); if the segments are different, then the packet is "forwarded" to the proper segment. Additionally, switches prevent bad or misaligned packets from spreading by not forwarding them.

MAC Address Table

Figure-9.1

9.2 Classification of switches-

Switches are classified according to the following criteria: -

9.2(a) Types of switches based on working-

(1) Store & Forward

This switch receives entire frame then perform error checking and start forwarding data to the destination.

(2) Cut through

This switch starts forwarding frame as soon as first six bytes of the frame are received.

(3) Fragment-free

This switch receives 64 bytes of the frame, perform error checking and then start forwarding data.

(4) Adaptive cut-through

It changes its mode according the condition. If it see there are errors in many frames then it changes to Store & Forward mode from Cut through or Fragment-free.

9.2(b) Types of switches based on management-

(1) Manageable switches

(2) Non-Manageable switches

(3) Semi-Manageable switches

Types of switches based on OSI layer -

(1) Layer 2 switches (only switching)

(2) Layer 3 switches (switching & routing)

9.2(c) Types of switches based on command mode (only in Cisco)-

(1) IOS based

(2) CLI based

9.2(d) Type of switches based on hierarchical model-

(1) Core layer switches

(2) Distribution layer switches

(3) Access layer switches

9.2(e) Qualities of switch-

- No. of ports

- Speed of ports

- Type of media

- Switching or wire speed or throughput

9.3 Basic Switch Administration-

IOS based switches are similar to the routers. We can perform following function on switches in a similar manner as performed on router.

(1) Access switch using console

(2) Commands to enter & exit from different mode

(3) Commands to configure passwords

(4) Manage configuration

(5) Backup IOS and configuration

(6) Configuring and resolving hostnames

(7) Managing telnet

(8) Configuring CDP

(9) Configuring time clock

(10) Configuring Banners

(11) Command line shortcuts and editing shortcuts

(12) Managing history

(13) Configure logging

(14) Boot system commands

9.4 Following function and options are not similar in router and switch.-

(1) Default hostname is Switch

(2) Auxiliary port is not present

(3) VTY ports are mostly 0 to 15

(4) By default interfaces are enabled

(5) IP address cannot be assign to interfaces

(6) Routing configuration mode is not present

(7) Interface no. starts from 1

(8) Web access is by default enabled

(9) Configuration registry is not present in similar manner

(10) Flash memory may contain multiple files and startup-configuration is also saved in flash

9.5 Switch Cofiguration

Figure-9.2

CHAPTER-10

VTP (VLAN Trunking Protocols)

10.1 VTP(VLAN Trunking Protocols)

Cisco created this one too. The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows you to add, delete, and rename VLANsinformation that is then

propagated to all other switches in the VTP domain.

Heres a list of some of the cool features VTP has to offer:

Consistent VLAN configuration across all switches in the network

VLAN trunking over mixed networks, such as Ethernet to ATM LANE or even FDDI

Accurate tracking and monitoring of VLANs

Dynamic reporting of added VLANs to all switches in the VTP domain

Adding VLANs using Plug and Play

With the help of VTP,we can simplify the process of creating the Vlans.In multiple switches,we can configure one switch as VTP Server and all the switches will be configured as VTP clients. We will create the vlans on VTP Server switch. The Server will send periodic updates to the VTP client switches. The client will create the vlan from the updates received from the server

10.2 VTP Modes of Operation

10.2(a) Server

This is the default mode for all Catalyst switches. You need at least one server in your VTP domain to propagate VLAN information throughout that domain. Also important: The switch must be in server mode to be able to create, add, and delete VLANs in a VTP domain.

VLAN information has to be changed in server mode, and any change made to VLANs on a switch in server mode will be advertised to the

entire VTP domain. In VTP server mode, VLAN configurations are saved in NVRAM on the switch.

10.2(b) Client

In client mode, switches receive information from VTP servers, but they also receive and forward updates, so in this way, they behave

like VTP servers. The difference is that they cant create, change, or delete VLANs. Plus, none of the ports on a client switch can be added to

a new VLAN before the VTP server notifies the client switch of the new VLAN and the VLAN exists in the clients VLAN database. Also good

to know is that VLAN information sent from a VTP server isnt stored in NVRAM, which is important because it means that if the switch is reset

or reloaded, the VLAN information will be deleted. Heres a hint: If you want a switch to become a server, first make it a client so it receives all

the correct VLAN information, then change it to a serverso much easier!

So basically, a switch in VTP client mode will forward VTP summary advertisements and process them. This switch will learn about but wont

save the VTP configuration in the running configuration, and it wont save it in NVRAM. Switches that are in VTP client mode will only learn

about and pass along VTP informationthats it!

10.2(c) Transparent

Switches in transparent mode dont participate in the VTP domain or share its VLAN database, but theyll still forward VTP

advertisements through any configured trunk links. They can create, modify, and delete VLANs because they keep their own databaseone

they keep secret from the other switches. Despite being kept in NVRAM, the VLAN database in transparent mode is actually only locally

significant. The whole purpose of transparent mode is to allow remote switches to receive the VLAN database from a VTP server-configured

switch through a switch that is not participating in the same VLAN assignments.

VTP only learns about normal-range VLANs, with VLAN IDs 1 to 1005; VLANs with IDs greater than 1005 are called extended-range VLANs

and theyre not stored in the VLAN database. The switch must be in VTP transparent mode when you create VLAN IDs from 1006 to 4094, so

it would be pretty rare that youd ever use these VLANs. One other thing: VLAN IDs 1 and 1002 to 1005 are automatically created on all

switches and cant be removed.

10.3 VTP Servers Configuration

Figure-10.1

CHAPTER-11

VLANs

11.1VLANs-A VLAN is singe broadcast domain. All devices connected to the vlan receive broadcasts sent by any other VLAN members. However, devices connected to a different VLAN will not receive those same broadcasts. A VLAN consists of hosts defined as members communicating as a logical network segment. A VLAN can have connected members located anywhere in the campus network, as long as VLAN connectivity is provided among all the members.

11.2 INTER-VLAN

11.2(a) Understanding How Inter-VLAN Routing Works

Network devices in different VLANs cannot communicate with one another without a router to route traffic between the VLANs. In most network environments, VLANs are associated with individual networks or sub-networks.

For example, in an IP network, each sub-network is mapped to an individual VLAN. In a NovellIPX network, each VLAN is mapped to an IPX network number. In an AppleTalk network, each VLAN is associated with a cable range and AppleTalk zone name.

Configuring VLANs helps control the size of the broadcast domain and keeps local traffic local. However, when an end station in one VLAN needs to communicate with an end station in another VLAN, inter-VLAN communication is required. This communication is supported by inter-VLAN routing. You configure one or more routers to route traffic to the appropriate destination VLAN.

When HostA in VLAN10 needs to communicate with HostB in VLAN10, it sends a packet addressed to that host. SwitchA forwards the packet directly to HostB, without sending it to the router.

When HostA sends a packet to HostC in VLAN20, SwitchA forwards the packet to the router, which receives the traffic on the VLAN10 interface. The router checks the routing table, determines the correct outgoing interface, and forwards the packet out the VLAN20 interface to SwitchB. SwitchB receives the packet and forwards it to HostC.

It shows another common scenario, inter-VLAN routing over a single trunk connection to the router. The switch has ports in multiple VLANs. Inter-VLAN routing is performed by a Cisco7505 router connected to the switch through a full-duplex Fast Ethernet trunk link.

11.3 Trunking

A trunk is a point-to-point link that transmits and receives traffic between switches or between switches and routers. Trunks carry the traffic of multiple VLANs and can extend VLANs across an entire network.

11.4VLAN Configuration

Figure-11.1

CHAPTER-12

Conclusion

The Enterprise network is the lifeblood of any Small to Medium Enterprise (SME) with more than one site or supply chain partner. It enables access to business information and allows for profitable and effective communication flows between employees in different enterprise sites. Network enterprise network equipment are mature and ubiquitous, but the quality of services provided by similar networks varies from city to city and from country to country. In particular, the quality variation gap between most of the cities in some developing nations and their counterparts in advanced nations is very wide. This is due to the lack in developing nations of an adequate IT infrastructure, which is taken for granted in developed nations. Planning an enterprise network in a developing nation is almost like planning it in the middle of a desert. This project briefly discusses the architecture of an enterprise network. It examines the barriers to planning, designing and implementing an enterprise network. This project also covers the methods to implement enterprise level networks.

In this project weve started from working on Basics of routers and switches then covering the Routing technologies required to route data between branches. In large LAN it is required to perform segmentation. So we have to implement technologies like VLAN, TRUNKING, STP, PORT SECURITY & INTER-VLAN etc.