Sunteți pe pagina 1din 81

A

PROJECT REPORT
ON

COMPUTER NETWORKING PROCESS


At

Submitted in partial fulfillment for the requirement of the award of the degree of

MASTER OF BUSINESS ADMINISTRATION


By
Mr. AHMED MUNEEBUDDIN
Roll No: 11D51E0055

VIF COLLEGE OF ENGG & TECH


(Affiliated to JNTU, Hyderbad)
1

2015
DECLARATION

I hereby declare that this project report titled "COMPUTER NETWORKING


PROCESS" submitted by me to the DEPARTMENT OF BUSINESS MANAGEMENT,
VIF COLLEGE OF ENGG & TECH is a bonafide work undertaken by me and it is not
submitted to any other university or institution for the award of any degree/certificate or
published any time before.

Mr. AHMED MUNEEBUDDIN


Roll No: 11D51E0055

ACKNOWLEDGEMENT

The Project Report Titled "COMPUTER NETWORKING PROCESS" is done by


me at Wipro Technologies in partial fulfillment for the award of degree of Master of Business
Administration.

I would like to thank Mr. Abhishek Jain (Asst. Manager) of Wipro Technologies
for providing me an opportunity to pursue my project work in the esteemed organization.

I convey my sincere thanks to all the staff of VIF COLLEGE OF ENGG. WORK
under whose supervision the study has been successfully completed.

Mr. AHMED MUNEEBUDDIN


Roll No: 11D51E0055

ABSTRACT
Computer of data communication refer to protocol involved in transmission of
digitized data between two or more online processing locations and is an integral part of the
modern information and retrieval systems in terms of their online access. The modern
information system, unlike their precursor which worked in an offline mode, operate in an
online interactive mode where in a user can interact with a host from a remote terminal using
a communication link. The article, before describing the computer communication networks,
touches upon the basic concepts, types, techniques and protocols involved in data
communication.
Communication networks are broadly classified into six categories based on the
geographical locations of its computers and terminals, namely (i) Remote Data Entry
Stations (RJES); (ii) Local Area Network (LAN); (iii) Wide Area Network (WAN); (iv)
Metropolitan Area Network (MAN); (v) Distributed Data Processing Network (DDPN); and
(vi) Gateways. Further computer communication networks are grouped into three categories
based on technology and communication media used, namely, (i) Public Switched Data
Network (PSDN); (ii) Public Switched Telephone Network (PSTN); and (iii) Integrated
Service Data Network (ISDN). The article proposes to briefly describe all these categories
with the examples as they exist in India.
The existing national and international telecommunication services based on their
scope and function have further been grouped into three categories, namely common carriers,
specialized common carriers and value added carriers. Common carriers provide large public
telephone and telegraph networks and other broad range services, specialize common carriers
offer public networks to provide limited number of services using broadband facilities such
as microwave/satellite systems. Value added carriers generally use the telephone lines and
transmission facilities of other carriers, often establishing their own private bypass networks
so as to avoid some of the facilities of local telephone companies and large-distance systems.
The article then proposes to briefly describe TYMNET, TELE-NET, ESA/IRS, ChIN and
STN as an important example of international data communication network.
4

TABLE OF CONTENTS

CONTENTS

PAGE NO

CHAPTER-1
INTRODUCTION

1-15

CHAPTER-2
LITERATURE REVIEW

16-38

CHAPTER-3
COMPANY PROFILE

39-49

CHAPTER-4
DATA ANALYSIS AND INTERPRETATION

50-63

CHAPTER-5
FINDINGS, SUGGESTIONS AND CONCLUSION

64-69

CHAPTER-6
BIBLIOGRAPHY

70

CHAPTER - I
INTRODUCTION

INTRODUCTION
COMPUTER NETWORKING
A computer network or data network is a telecommunications network that allows computers to
exchange data. In computer networks, networked computing devices pass data to each other
along data connections. Data is transferred in the form of packets. The connections (network
links) between nodes are established using either cable media or wireless media. The best-known
computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network nodes.
Nodes can include hosts such as personal computers, phones, servers as well as networking
hardware. Two such devices are said to be networked together when one device is able to
exchange information with the other device, whether or not they have a direct connection to each
other.
Computer networks support applications such as access to the World Wide Web, shared use of
application and storage servers, printers, and fax machines, and use of email and instant
messaging applications. Computer networks differ in the physical media used to transmit their
signals, the communications protocols to organize network traffic, the network's size, topology
and organizational intent.
A computer network, or simply a network, is a collection of computers and other hardware
components interconnected by communication channels that allow sharing of resources and
information. Today, computer networks are the core of modern communication. All modern
aspects of the public switched telephone network (PSTN) are computer-controlled. Telephony
increasingly runs over the Internet Protocol, although not necessarily the public Internet. The
scope of communication has increased significantly in the past decade. This boom in
communications would not have been possible without the progressively advancing computer
network. Computer networks, and the technologies that make communication between
networked computers possible, continue to drive computer hardware, software, and peripherals
industries. The expansion of related industries is mirrored by growth in the numbers and types of
people using networks, from the researcher to the home user.
7

Computer networking may be considered a branch of electrical engineering, telecommunications,


computer science, information technology or computer engineering, since it relies upon the
theoretical and practical application of the related disciplines.
A computer network facilitates interpersonal communications allowing people to communicate
efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls,
and video conferencing. Providing access to information on shared storage devices is an
important feature of many networks. A network allows sharing of files, data, and other types of
information giving authorized users the ability to access information stored on other computers
on the network. A network allows sharing of network and computing resources. Users may
access and use resources provided by devices on the network, such as printing a document on a
shared network printer. Distributed computing uses computing resources across a network to
accomplish tasks.

Computer Networks

BASIC COMMUNICATION MODEL


Communication model is used to exchange the data between two parties for Ex: The
communication between a computer, server and telephone through modem.

MEANING OF INTERNET
A means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers. When two computers are connected over the Internet, they can send and
receive all kinds of information such as text, graphics, voice, video, and computer programs.
No one owns Internet, although several organizations the world over collaborate in its
functioning and development. The high-speed, fiber-optic cables (called backbones) through
which the bulk of the Internet data travels are owned by telephone companies in their respective
countries.
The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then
called ARPANET) established by the US Department Of Defense in 1960s for collaboration in
military research among business and government laboratories. Later universities and other US
institutions connected to it. This resulted in ARPANET growing beyond everyone's expectations
and acquiring the name 'Internet.'
The development of hypertext based technology (called World Wide web, WWW, or just the
Web) provided means of displaying text, graphics, and animations, and easy search and
navigation tools that triggered Internet's explosive worldwide growth.

OBJECTIVES OF THE STUDY


These provided the necessary computer assistance in the activities pertaining to the respective
department. It was not possible to share information among the departments. As a result, the
information was replicated wherever needed. This increased redundancy caused increased in
storage space, less data consistency etc.

Resource sharing is the main objective of the computer network. The goal is to provide
all the program, date and hardware is available to everyone on the network without
regard to the physical location of the resource and the users.

The second objective is to provide the high Reliability. It is achieved by replicating the
files on two or more machines, so in case of unavailability (due to fail of hardware) the
other copies can be used.

Computer organization has helped organization in saving money. This is due to the fact
that the small computer has much better price to the performance ratio comparison than
the large computer like mainframe. Mainframe computer are approximately ten times
faster that the microcomputers, but they cost thousands times more. As a result of this
imbalance, organization has preferred to install interconnected microcomputer connected
to the mainframe computer.

Computer network have provided means to increase system performance as the work
load increases (load balancing). In the days of mainframe when the system was full it
was to replace with the other large mainframe computer, usually at and expensive rate not
convenience for user.

Computer network help people who live or work apart to report together. So, when one
user prepared some documentation, he can make the document online enabling other to
read and convey their opinions. Thus computer network is a powerful communication
medium.

10

Only authorized user can access resource in a computer network. Users are authenticated
by their user name and password. Hence it is not possible to access the data without
proper account. This increases security.

11

LIMITATION OF THE STUDY


o Network Hardware, Software and Setup Costs: Computers don't just magically
network themselves, of course. Setting up a network requires an investment in hardware
and software, as well as funds for planning, designing and implementing the network.
o Hardware and Software Management and Administration Costs: In all but the
smallest of implementations, ongoing maintenance and management of the network
requires the care and attention of an IT professional.
o Undesirable Sharing: With the good comes the bad; while networking allows the easy
sharing of useful information, it also allows the sharing of undesirable data. One
significant sharing problem in this regard has to do with viruses, which are easily
spread over networks and the Internet.
o Illegal or Undesirable Behavior: Similar to the point above, networking facilitates
useful connectivity and communication, but also brings difficulties with it..
o Data Security Concerns: If a network is implemented properly, it is possible to greatly
improve the security of important data.

12

NETWORKING
Introduction to networking
Networking is a practice of linking of two or more computing devices such as PCs, printers,
faxes etc., with each other Connection between two devices is through physical media or logical
media to share information, data and resources. Networks are made with the hardware and
software. Cable/media

Computer Networks

Models of Networking
Model means the connectivity of two computers. We have many types of networking models.(i)
Client Server Model(ii) Peer to Peer Model (Workgroup Model)(iii)Domain Model
Client Server Model:
In a Client server model we have one server and many clients. A Client can share the
resources of server, but a server cannot share the resources on clients. On the point of view of
administrator its very easy to control the network because we combine with the server also at
security point of view. It is very useful because it uses user level security in which users have to
remember only one password toshare the resources.

13

Peer to Peer Model (Workgroup Model)


In Peer to Peer networking model all computers are in equal status, that is wecannot
manage centralization, administration secutity. In Peer to Perr networking clientuse operating
system like Window 98, Window XP, Window 2000, Window Vista.
Domain Model
It is a mixture of client server and peer-to-peer model. In this clients can sharetheir
resources as peer-to-peer but with the permission of the server as in client server model therefore
it is commonly used model because in this security is more as we can putrestriction on both
server and clients.

TYPES OF COMMUNICATION NETWORS


Networks can be categorized as per geographical area to be covered by the network.
Computer network are divided into four categories includes: Local Area Network (LAN),
Metropolitan Area Network (MAN), Wide Area Network (WAN), Wireless (Wi-fi) and Inter
network.

14

LOCAL AREA NETWORK (LAN


A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a home, school, computer laboratory, or office building, using network
media.[1] The defining characteristics of LANs, in contrast to wide area networks (WANs),
include their smaller geographic area, and non-inclusion of leased telecommunication lines. [citation
needed]

ARCNET, Token Ring and other technology standards have been used in the past, but Ethernet
over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to
build LANs.

15

METROPOLITAN AREA NETWORK (MAN)


A metropolitan area network (MAN) is computer network larger than a local area network,
covering an area of a few city blocks to the area of an entire city, possibly also including the
surrounding areas.

A MAN is optimized for a larger geographical area than a LAN, ranging from several
blocks of buildings to entire cities. MANs can also depend on communications
channels of moderate-to-high data rates. A MAN might be owned and operated by a
single organization, but it usually will be used by many individuals and
organizations. MANs might also be owned and operated as public utilities. They will
often provide means for inter networking of local networks.

A Metropolitan Area Network (MAN) is a large computer network that spans a


metropolitan area or campus. Its geographic scope falls between a WAN and LAN. MANs
provide Internet connectivity for LANs in a metropolitan region, and connect them to
wider area networks like the Internet.

16

WIDE AREA NETWORK (WAN)


A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications
network that links across metropolitan, regional, national or international boundaries) using
leased telecommunication lines. Business and government entities utilize WANs to relay data
among employees, clients, buyers, and suppliers from various geographical locations. In essence,
this mode of telecommunication allows a business to effectively carry out its daily function
regardless of location. The Internet can be considered a WAN as well, and is used by businesses,
governments, organizations, and individuals for almost any purpose imaginable.
Related terms for other types of networks are personal area networks (PANs), local area
networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which
are usually limited to a room, building, campus or specific metropolitan area (e.g., a city)
respectively.
WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in other locations. Many
WANs are built for one particular organization and are private. Others, built by Internet service
17

providers, provide connections from an organization's LAN to the Internet. WANs are often built
using leased lines. At each end of the leased line, a router connects the LAN on one side with a
second router within the LAN on the other. Leased lines can be very expensive. Instead of using
leased lines, WANs can also be built using less costly circuit switching or packet switching
methods. Network protocols including TCP/IP deliver transport and addressing functions.
Protocols including Packet over SONET/SDH, MPLS, ATM and Frame Relay are often used by
service providers to deliver the links that are used in WANs. X.25 was an important early WAN
protocol, and is often considered to be the "grandfather" of Frame Relay as many of the
underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame Relay.
Academic research into wide area networks can be broken down into three areas: mathematical
models, network emulation and network simulation.

18

19

WIRELESS COMMUNICATION NETWORK


Wireless communication is the transfer of information between two or more points that are not
connected by an electrical conductor.
The most common wireless technologies use radio. With radio waves distances can be short,
such as a few meters for television or as far as thousands or even millions of kilometers for deepspace radio communications. It encompasses various types of fixed, mobile, and portable
applications, including two-way radios, cellular telephones, personal digital assistants (PDAs),
and wireless networking. Other examples of applications of radio wireless technology include
GPS units, garage door openers, wireless computer mice, keyboards and headsets, headphones,
radio receivers, satellite television, broadcast television and cordless telephones.
Somewhat less common methods of achieving wireless communications include the use of other
electromagnetic wireless technologies, such as light, magnetic, or electric fields or the use of
sound
Wireless operations permit services, such as long-range communications,
that are impossible or impractical to implement with the use of wires. The
term is commonly used in the telecommunications industry to refer to
telecommunications systems (e.g. radio transmitters and receivers, remote
controls etc.) which use some form of energy (e.g. radio waves, acoustic
energy, etc.) to transfer information without the use of wires. Information is
transferred in this manner over both short and long distances

20

21

Wireless Communication Network

INTER NETWORKING
Internetworking is the practice of connecting a computer network with other networks through
the use of gateways that provide a common method of routing information packets between the
networks. The resulting system of interconnected networks is called an internetwork, or simply
an internet. Internetworking is a combination of the words inter ("between") and networking; not
internet-working or international-network.
The most notable example of internetworking is the Internet, a network of networks based on
many underlying hardware technologies, but unified by an internetworking protocol standard, the
Internet Protocol Suite, often also referred to as TCP/IP.
The smallest amount of effort to create an internet (an internetwork, not the Internet), is to have
two LANs of computers connected to each other via a router. Simply using either a switch or a
hub to connect two local area networks together doesn't imply internetworking; it just expands
the original LAN.
Two architectural models are commonly used to describe the protocols and methods used in
internetworking.
The Open System Interconnection (OSI) reference model was developed under the auspices of
the International Organization for Standardization (ISO) and provides a rigorous description for
layering protocol functions from the underlying hardware to the software interface concepts in
user applications. Internetworking is implemented in the Network Layer (Layer 3) of the model.
The Internet Protocol Suite, also called the TCP/IP model of the Internet was not designed to
conform to the OSI model and does not refer to it in any of the normative specifications in
Requests for Comment and Internet standards. Despite similar appearance as a layered model, it
uses a much less rigorous, loosely defined architecture that concerns itself only with the aspects
of logical networking. It does not discuss hardware-specific low-level interfaces, and assumes
22

availability of a Link Layer interface to the local network link to which the host is connected.
Internetworking is facilitated by the protocols of its Internet Layer.

CHAPTER II
REVIEW OF LITERATURE
23

24

REVIEW OF LITERATURE

TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) IS THE


BASIC COMMUNICATION LANGUAGE OR PROTOCOL OF THE INTERNET
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language
or protocol of the Internet. It can also be used as a communications protocol in a private network
(either an intranet or an extranet). When you are set up with direct access to the Internet, your
computer is provided with a copy of the TCP/IP program just as every other computer that you
may send messages to or get information from also has a copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the
assembling of a message or file into smaller packets that are transmitted over the Internet and
received by a TCP layer that reassembles the packets into the original message. The lower layer,
Internet Protocol, handles the address part of each packet so that it gets to the right destination.
Each gateway computer on the network checks this address to see where to forward the message.
Even though some packets from the same message are routed differently than others, they'll be
reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client)
requests and is provided a service (such as sending a Web page) by another computer (a server)
in the network. TCP/IP communication is primarily point-to-point, meaning each communication
is from one point (or host computer) in the network to another point or host computer. TCP/IP
and the higher-level applications that use it are collectively said to be "stateless" because each
client request is considered a new request unrelated to any previous one (unlike ordinary phone
conversations that require a dedicated connection for the call duration). Being stateless frees
network paths so that everyone can use them continuously. (Note that the TCP layer itself is not
stateless as far as any one message is concerned. Its connection remains in place until all packets
in a message have been received.)

25

Many Internet users are familiar with the even higher layer application protocols that use TCP/IP
to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP),
the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and
the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged
together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to
the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP).
These protocols encapsulate the IP packets so that they can be sent over the dial-up phone
connection to an access provider's modem.
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of
TCP for special purposes. Other protocols are used by network host computers for exchanging
router information. These include the Internet Control Message Protocol (ICMP), the Interior
Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway
Protocol (BGP)

26

TCP/IP, OSI REFRENCE MODEL


OPEN SYSTEM INTERCONNECTION (OSI)
Models are useful because they help us understand difficult concepts and complicated systems.
When it comes to networking, there are several models that are used to explain the roles played
by various technologies, and how they interact. Of these, the most popular and commonly used is
the Open Systems Interconnection (OSI) Reference Model.
The idea behind the OSI Reference Model is to provide a framework for both designing
networking systems and for explaining how they work. As you read about networking, you will
frequently find references to the various levels, or layers, of the OSI Reference Model. The
existence of the model makes it easier for networks to be analyzed, designed, built and
rearranged, by allowing them to be considered as modular pieces that interact in predictable
ways, rather than enormous, complex monoliths.
In fact, it's pretty much impossible to read a lot about networking without encountering
discussions that presume at least some knowledge of how the OSI Reference Model works. This
is why I strongly advise that if you are new to the OSI Reference Model, you read this chapter
carefully. While it is all arguably background material, reading it will help form an important
foundation in your understanding of networks, and will make the rest of the Guide make more
sense at the same time.
If you are quite familiar with the OSI Reference Model, you may wish to skip this chapter of the
Guide, or just skim through it. You can always return later to brush up on particular issues, as
needed. There are also many links that come back to the descriptions of the individual layers
from various parts of the Guide.
In the pages that follow, I describe the OSI Reference Model in detail. I begin with a history of
the model, and a discussion of some general concepts related to the OSI model and networking
models overall. I provide a useful analogy to help you understand how the reference model
works to explain the interaction of networks on multiple levels. I then describe each of the seven

27

layers of the OSI Reference Model, and conclude with a summary of the layers and their
respective functions.

OPEN SYSTEM INTERCONNECTION (OSI)

28

COMPARISON BETWEEN OSI MODEL AND TCP /IP MODEL

29

APPLICATION OF NETWORKS:
1. Marketing and sales: Marketing professional uses them to collect exchange and analyze data
relating to customer needs and product development cycles.
Sales application includes Teleshopping, which uses order entry computers or telephone
connected to an order processing network, and online reservation services for railways, hotels,
airlines, restaurants theatre etc.
2. Financial services: It include credit history searches, foreign exchange and investment
services and electronic fund transfer (EFT), which allow a user to transfer money without going
to bank.
3. Manufacturing: computer networks are used today in many aspects of manufacturing,
including the manufacturing processes itself. Two aspects that uses network to provide essential
services are computer Assisted design (CAD) and computer Assisted manufacturing (CAM),
both of which allow multiple user to work on a project simultaneously.
4. Electronic Messaging: E-mails transfer the messages between two and more users in a
network. With this application user can transfer the information in the form of text, picture and
voice.
5. Directory Services: It allows list of files to be stored in central location to speed up the world
wide search operation. E.g. search engines like Google, Britannia, and Yahoo etc.
6. Information Services: It includes Bulletin Boards and data bank. A www site offering the
technical specification for a new product in a information services.
7. Electronic Data Exchange (EDI): EDI allows business information (including documents
such as purchase orders and services) to be transferred without using paper.
8. Teleconferencing: It allows conference to occur without the participant being in the same
location. It includes:
Text Conferencing: Participant communicates through their keywords and computer monitors.
30

Voice Conferencing: Participant at a number of locations communicates simultaneously through


phone (talk).
Video Conferencing: Participant can see as well as talk to another.
9. Cellular Telephone: Wireless phone communication even while travelling through long
distance.
10. Cable TV: This is widest usable thing today throughout the world.

Network packet
Main article: Network packet
Most information in computer networks is carried in packets.
A network packet is a formatted unit of data (a list of bits or bytes) carried by a packet-switched
network. Computer communications links that do not support packets, such as traditional pointto-point telecommunications links, simply transmit data as a bit stream. When data is formatted
into packets, the bandwidth of the communication medium can be better shared among users
than if the network were circuit switched.
A packet consists of two kinds of data: control information and user data (also known as
payload). The control information provides data the network needs to deliver the user data, for
example: source and destination network addresses, error detection codes, and sequencing
information. Typically, control information is found in packet headers and trailers, with payload
data in between.

31

Network Topology
Main article: Network topology
The physical layout of a network is usually less important than the topology that connects
network nodes. Most diagrams that describe a physical network are therefore topological, rather
than geographic. The symbols on these diagrams usually denote network links and network
nodes.
Network Structure

Network links
The communication media used to link devices to form a computer network include electrical
cable (Home PNA, power line communication, G.hn), optical fiber (fiber-optic communication),
and radio waves (wireless networking). In the OSI model, these are defined at layers 1 and 2
the physical layer and the data link layer.
A widely adopted family of communication media used in local area network (LAN) technology
is collectively known as Ethernet. The media and protocol standards that enable communication
between networked devices over Ethernet are defined by IEEE 802.3. Ethernet transmit data over
both copper and fiber cables. Wireless LAN standards (e.g. those defined by IEEE 802.11) use
32

radio waves, or others use infrared signals as a transmission medium. Power line communication
uses a building's power cabling to transmit data.
Wired technologies

The orders of the following wired technologies are, roughly, from slowest to fastest transmission
speed.

Twisted pair wire is the most widely used medium for all telecommunication. Twistedpair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires
consist of two insulated copper wires twisted into pairs. Computer network cabling
(wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can
be utilized for both voice and data transmission. The use of two wires twisted together
helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges
from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in
two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form
comes in several category ratings, designed for use in various scenarios.

Coaxial cable is widely used for cable television systems, office buildings, and other
work-sites for local area networks. The cables consist of copper or aluminum wire
surrounded by an insulating layer (typically a flexible material with a high dielectric
constant), which itself is surrounded by a conductive layer.

33

ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power
lines) to create a high-speed (up to 1 Gigabit/s) local area network

An optical fiber is a glass fiber. It carries pulses of light that represent data. Some
advantages of optical fibers over metal wires are very low transmission loss and
immunity from electrical interference. Optical fibers can simultaneously carry multiple
wavelengths of light, which greatly increases the rate that data can be sent, and helps
enable data rates of up to trillions of bits per second. Optic fibers can be used for long
runs of cable carrying very high data rates, and are used for undersea cables to
interconnect continents.

Price is a main factor distinguishing wired- and wireless-technology options in a


business. Wireless options command a price premium that can make purchasing wired
computers, printers and other devices a financial benefit. Before making the decision to
purchase hard-wired technology products, a review of the restrictions and limitations of
the selections is necessary. Business and employee needs may override any cost
considerations.[5]

Wireless Technologies is the transfer of information between two or more points that are not
connected by an electrical conductor.

34

Main article: Wireless network

Terrestrial microwave Terrestrial microwave communication uses Earth-based


transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the
low-gigahertz range, which limits all communications to line-of-sight. Relay stations are
spaced approximately 48 km (30 mi) apart.

Communications satellites Satellites communicate via microwave radio waves, which


are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically
in geosynchronous orbit 35,400 km (22,000 mi) above the equator. These Earth-orbiting
systems are capable of receiving and relaying voice, data, and TV signals.

Cellular and PCS systems use several radio communications technologies. The
systems divide the region covered into multiple geographic areas. Each area has a lowpower transmitter or radio relay antenna device to relay calls from one area to the next
area.

Radio and spread spectrum technologies Wireless local area networks use a highfrequency radio technology similar to digital cellular and a low-frequency radio
technology. Wireless LANs use spread spectrum technology to enable communication
between multiple devices in a limited area. IEEE 802.11 defines a common flavor of
open-standards wireless radio-wave technology known as Wifi.

Free-space optical communication uses visible or invisible light for communications.


In most cases, line-of-sight propagation is used, which limits the physical positioning of
communicating devices.

35

Network nodes
Main article: Node (networking)
Apart from the physical communications media described above, networks comprise additional
basic system building blocks, such as network interface controller (NICs), repeaters, hubs,
bridges, switches, routers, modems, and firewalls.
Network interfaces

An ATM network interface in the form of an accessory card. A lot of network interfaces are builtin.
A network interface controller (NIC) is computer hardware that provides a computer with the
ability to access the transmission media, and has the ability to process low-level network
information. For example the NIC may have a connector for accepting a cable, or an aerial for
wireless transmission and reception, and the associated circuitry.
The NIC responds to traffic addressed to a network address for either the NIC or the computer as
a whole.
In Ethernet networks, each network interface controller has a unique Media Access Control
(MAC) addressusually stored in the controller's permanent memory. To avoid address conflicts
between network devices, the Institute of Electrical and Electronics Engineers (IEEE) maintains
and administers MAC address uniqueness. The size of an Ethernet MAC address is six octets.

36

Repeaters and hubs


A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise,
and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an
obstruction, so that the signal can cover longer distances without degradation. In most twisted
pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters.
With fiber optics, repeaters can be tens or even hundreds of kilometers apart.
A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the
OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a
propagation delay that affects network performance. As a result, many network architectures
limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.
Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance
links, notably undersea cabling.
Bridges
A network bridge connects and filters traffic between two network segments at the data link layer
(layer 2) of the OSI model to form a single network. This breaks the network's collision domain
but maintains a unified broadcast domain. Network segmentation breaks down a large, congested
network into an aggregation of smaller, more efficient networks.
Bridges come in three basic types:

Local bridges: Directly connect LANs

Remote bridges: Can be used to create a wide area network (WAN) link between LANs.
Remote bridges, where the connecting link is slower than the end networks, largely have
been replaced with routers.

Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

37

Switches
A network switch is a device that forwards and filters OSI layer 2 datagrams between ports based
on the MAC addresses in the packets. A switch is distinct from a hub in that it only forwards the
frames to the physical ports involved in the communication rather than all ports connected. It can
be thought of as a multi-port bridge. It learns to associate physical ports to MAC addresses by
examining the source addresses of received frames. If an unknown destination is targeted, the
switch broadcasts to all ports but the source. Switches normally have numerous ports, facilitating
a star topology for devices, and cascading additional switches.

Routers
A typical home or small office router showing the ADSL telephone line and Ethernet network
cable connections. A router is an internetworking device that forwards packets between networks
by processing the routing information included in the packet or datagram (Internet protocol
information from layer. The routing information is often processed in conjunction with the
routing table (or forwarding table).

38

Modems
Modems (Modulator Demodulator) are used to connect network nodes via wire not originally
designed for digital network traffic, or for wireless. To do this one or more frequencies are
modulated by the digital signal to produce an analog signal that can be tailored to give the
required properties for transmission. Modems are commonly used for telephone lines, using a
Digital Subscriber Line technology.
Firewalls
A firewall is a network device for controlling network security and access rules. Firewalls are
typically configured to reject access requests from unrecognized sources while allowing actions
from recognized ones. The vital role firewalls play in network security grows in parallel with the
constant increase in cyber attacks.
Overlay network

A sample overlay network

39

An overlay network is a virtual computer network that is built on top of another network. Nodes
in the overlay network are connected by virtual or logical links. Each link corresponds to a path,
perhaps through many physical links, in the underlying network. The topology of the overlay
network may (and often does) differ from that of the underlying one. For example, many peer-topeer networks are overlay networks. They are organized as nodes of a virtual system of links that
run on top of the Internet.[10]

40

Communications protocols

The TCP/IP model or Internet layering scheme and its relation to common protocols often
layered on top of it.
A communications protocol is a set of rules for exchanging information over network links. In a
protocol stack (also see the OSI model), each protocol leverages the services of the protocol
below it. An important example of a protocol stack is HTTP running over TCP over IP over IEEE
802.11. (TCP and IP are members of the Internet Protocol Suite. IEEE 802.11 is a member of the
Ethernet protocol suite.) This stack is used between the wireless router and the home user's
personal computer when the user is surfing the web.
Whilst the use of protocol layering is today ubiquitous across the field of computer networking,
it has been historically criticized by many researchers [12] for two principal reasons. Firstly,
abstracting the protocol stack in this way may cause a higher layer to duplicate functionality of a
lower layer, a prime example being error recovery on both a per-link basis and an end-to-end
basis.[13] Secondly, it is common that a protocol implementation at one layer may require data,
state or addressing information that is only present at another layer, thus defeating the point of
separating the layers in the first place. For example, TCP uses the ECN field in the IPv4 header
as an indication of congestion; IP is a network layer protocol whereas TCP is a transport layer
protocol.
Communication protocols have various characteristics. They may be connection-oriented or
connectionless, they may use circuit mode or packet switching, and they may use hierarchical
addressing or flat addressing.
41

There are many communication protocols, a few of which are described below.
Ethernet
Ethernet is a family of protocols used in LANs, described by a set of standards together called
IEEE 802 published by the Institute of Electrical and Electronics Engineers. It has a flat
addressing scheme. It operates mostly at levels 1 and 2 of the OSI model. For home users today,
the most well-known member of this protocol family is IEEE 802.11, otherwise known as
Wireless LAN (WLAN). The complete IEEE 802 protocol suite provides a diverse set of
networking capabilities. For example, MAC bridging (IEEE 802.1D) deals with the routing of
Ethernet packets using a Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and IEEE
802.1X defines a port-based Network Access Control protocol, which forms the basis for the
authentication mechanisms used in VLANs (but it is also found in WLANs) it is what the home
user sees when the user has to enter a "wireless access key".
Internet Protocol Suite
The Internet Protocol Suite, also called TCP/IP, is the foundation of all modern networking. It
offers connection-less as well as connection-oriented services over an inherently unreliable
network traversed by data-gram transmission at the Internet protocol (IP) level. At its core, the
protocol suite defines the addressing, identification, and routing specifications for Internet
Protocol Version 4 (IPv4) and for IPv6, the next generation of the protocol with a much enlarged
addressing capability.
Network service
Network services are applications hosted by servers on a computer network, to provide some
functionality for members or users of the network, or to help the network itself to operate.
The World Wide Web, E-mail, printing and network file sharing are examples of well-known
network services. Network services such as DNS (Domain Name System) give names for IP and
MAC addresses (people remember names like nm.lan better than numbers like
210.121.67.18), and DHCP to ensure that the equipment on the network has a valid IP address.
42

Services are usually based on a service protocol that defines the format and sequencing of
messages between clients and servers of that network service.
Network performance
Quality of service
Depending on the installation requirements, network performance is usually measured by the
quality of service of a telecommunications product. The parameters that affect this typically can
include throughput, jitter, bit error rate and latency.
The following list gives examples of network performance measures for a circuit-switched
network and one type of packet-switched network, viz. ATM:

Circuit-switched networks: In circuit switched networks, network performance is


synonymous with the grade of service. The number of rejected calls is a measure of how
well the network is performing under heavy traffic loads. [25] Other types of performance
measures can include the level of noise and echo.

ATM: In an Asynchronous Transfer Mode (ATM) network, performance can be measured


by line rate, quality of service (QoS), data throughput, connect time, stability, technology,
modulation technique and modem enhancements.[26]

There are many ways to measure the performance of a network, as each network is different in
nature and design. Performance can also be modelled instead of measured. For example, state
transition diagrams are often used to model queuing performance in a circuit-switched network.
The network planner uses these diagrams to analyze how the network performs in each state,
ensuring that the network is optimally designed.[27]

43

Security
Network security
Network security consists of provisions and policies adopted by the network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of the computer
network and its network-accessible resources.[29] Network security is the authorization of access
to data in a network, which is controlled by the network administrator. Users are assigned an ID
and password that allows them access to information and programs within their authority.
Network security is used on a variety of computer networks, both public and private, to secure
daily transactions and communications among businesses, government agencies and individuals.
Network surveillance
Network surveillance is the monitoring of data being transferred over computer networks such as
the Internet. The monitoring is often done surreptitiously and may be done by or at the behest of
governments, by corporations, criminal organizations, or individuals. It may or may not be legal
and may or may not require authorization from a court or other independent agency.
Computer and network surveillance programs are widespread today, and almost all Internet
traffic is or could potentially be monitored for clues to illegal activity.
Surveillance is very useful to governments and law enforcement to maintain social control,
recognize and monitor threats, and prevent/investigate criminal activity. With the advent of
programs such as the Total Information Awareness program, technologies such as high speed
surveillance computers and biometrics software, and laws such as the Communications
Assistance For Law Enforcement Act, governments now possess an unprecedented ability to
monitor the activities of citizens.[30]
However, many civil rights and privacy groupssuch as Reporters Without Borders, the
Electronic Frontier Foundation, and the American Civil Liberties Unionhave expressed
concern that increasing surveillance of citizens may lead to a mass surveillance society, with
limited political and personal freedoms.
44

Ethernet
Ethernet is the medium commonly used to build local area networks (LANs) of interconnected
machines within a limited area such as an office, company or university campus. Ethernet is
based on a bus structure to which many machines can connect to, and communication always
happens between two nodes at a time. When two or more nodes want to talk at the same time,
both will restart communication after some timeout. The technical term for this is CSMA/CD
(Carrier Sense w/ Multiple Access and Collision Detection).
Initially, Ethernet hardware consisted of a thick (yellow) cable that machines tapped into using
special connectors that poked through the cable's outer shielding. The successor of this was
called 10base5, which used BNC-type connectors for tapping in special T-connectors and
terminators on both ends of the bus. Today, ethernet is mostly used with twisted pair lines which
are used in a collapsed bus system that are contained in switches or hubs. The twisted pair lines
give this type of media its name - 10baseT for 10 Mbit/s networks, and 100baseT for 100 MBit/s
ones. In switched environments there's also the distinction if communication between the node
and the switch can happen in half- or in full duplex mode.
TCP/IP Address Format
TCP/IP uses 4-byte (32-bit) addresses in the current implementations (IPv4), also called IPnumbers (Internet-Protocol numbers), to address hosts.
TCP/IP allows any two machines to communicate directly. To permit this all hosts on a given
network must have a unique IP address. To assure this, IP addresses are administrated by one
central organisation, the InterNIC. They give certain ranges of addresses (network-addresses)
directly to sites which want to participate in the internet or to internet-providers, which give the
addresses to their customers.
If your university or company is connected to the Internet, it has (at least) one such networkaddress for its own use, usually not assigned by the InterNIC directly, but rather through an
Internet Service Provider (ISP).

45

If you just want to run your private network at home, see below on how to build your own IP
addresses. However, if you want to connect your machine to the (real :-) Internet, you should get
an IP addresses from your local network-administrator or -provider.
IP addresses are usually written in dotted quad-notation - the four bytes are written down in
decimal (most significant byte first), separated by dots. For example, 132.199.15.99 would be a
valid address. Another way to write down IP-addresses would be as one 32-bit hex-word, e.g.
0x84c70f63. This is not as convenient as the dotted-quad, but quite useful at times, too. (See
below!)

Domain Name Service (DNS)


/etc/hosts bears an inherent problem, especially in big networks: when one host is added or one
host's address changes, all the /etc/hosts files on all machines have to be changed! This is not
only time-consuming, it's also very likely that there will be some errors and inconsistencies,
leading to problems.
Another approach is to hold only one hostnames-table (-database) for a network, and make all
the clients query that nameserver. Updates will be made only on the nameserver.
This is the basic idea behind the Domain Name Service (DNS).
Usually, there's one nameserver for each domain (hence DNS), and every host (client) in that
domain knows which domain it is in and which nameserver to query for its domain.
When the DNS gets a query about a host which is not in its domain, it will forward the query to a
DNS which is either the DNS of the domain in question or knows which DNS to ask for the
specified domain. If the DNS forwarded the query doesn't know how to handle it, it will forward
that query again to a DNS one step higher. This is not ad infinitum, there are several rootservers, which know about any domain.
46

Network Information Service (NIS/YP)


Yellow Pages (YP) was invented by Sun Microsystems. The name has been changed into
Network Information Service (NIS) because YP was already a trademark of the British telecom.
So, when I'm talking about NIS you'll know what I mean. ;-)
There are quite some configuration files on a Unix-system, and often it's desired to maintain only
one set of those files for a couple of hosts. Those hosts are grouped together in a NIS-domain
(which has nothing to do with the domains built by using DNS!) and are usually contained in one
workstation cluster.
Examples for the config-files shared among those hosts are /etc/passwd, /etc/group and - last but
not least - /etc/hosts.
So, you can abuse NIS for getting a unique name-to-address-translation on all hosts throughout
one (NIS- ) domain.
There's only one drawback, which prevents NIS from actually being used for that translation: In
contrast to the DNS, NIS provides no way to resolve hostnames which are not in the hosts-table.
There's no hosts one level up which the NIS-server can query, and so the translation will fail!
Suns NIS+ takes measures against that problem, but as NIS+ is only available on Solarissystems, this is of little use for us now.
Don't get me wrong: NIS is a fine thing for managing e.g. user-information (/etc/password,) in
workstation-clusters, it's simply not too useful for resolving hostnames.

47

CHAPTER III
COMPANY PROFILE

48

COMPANY PROFILE

Wipro Limited (Western India Products Limited) is an Indian multinational IT Consulting


and System Integration services company headquartered in Bangalore, Karnataka. As of March
2014, the company has 147,452 employees servicing over 900 large enterprise & Fortune 1000
corporations with a presence in 61 countries. On 31 March 2014, its market capitalisation was
approximately 1.27 trillion ($20.8 billion), making it one of India's largest publicly traded
company and seventh largest IT services firm globally.
Wipro Infotech is a leading manufacturer of computer hardware and provider of IT services in
India and the Middle East region. Part of Wipro Ltd, the $6.98 billion conglomerate and global
leader in technology enabled solutions, the company leverages on the parent's philosophy of
'Applying Thought' to enable business results by being a transformation catalyst.
Backed by our strong quality processes and rich experience managing global clients across
various business verticals, we align IT strategies to your business goals. From simple changes in
process to innovative solutions, we help our customers harness the power of IT to achieve
profitable growth, market leadership, customer delight and sustainability. Along with our best of
breed technology partners, Wipro Infotech also helps you with your hardware and IT
infrastructure needs.
Our vast IT services portfolio includes consulting, systems integration, application development
and maintenance, technology infrastructure services, package implementation and R&D services
among others.
The company was incorporated on 29 December 1945, in Mumbai by Mohamed Premji as
'Western India Vegetable Products Limited', later abbreviated to 'Wipro'. It was initially set up as
a manufacturer of vegetable and refined oils in Amalner, district Jalgaon, Maharashtra, under the
trade names of Kisan, Sunflower and Camel. The company logo still contains a sunflower to
reflect products of the original business.

49

During the 1970s and 1980s, the company shifted its focus to new business opportunities in the
IT and computing industry, which was at a nascent stage in India at the time. On 7 June 1977, the
name of the company changed from Western India Vegetable Products Limited, to Wipro
Products Limited
The year 1980 marked the arrival of Wipro in the IT domain. In 1982, the name was changed
from Wipro Products Limited to Wipro Limited. Meanwhile Wipro continued to expand in the
consumer products domain with the launch of "Ralak" a tulsi-based family soap and "Wipro
Jasmine", a toilet soap.
19661992
In 1988, Wipro diversified its product line into heavy-duty industrial cylinders and mobile
hydraulic cylinders. A joint venture company with the United States' General Electric in the
name of Wipro GE Medical Systems Pvt. Ltd. was set up in 1989 for the manufacture, sales, and
service of diagnostic and imaging products. Later, in 1991, tipping systems and Eaton hydraulic
products were launched. The Wipro Fluid Power division, in 1992, developed expertise to offer
standard hydraulic cylinders for construction equipment and truck tipping systems. The market
saw the launch of the "Santoor" talcum powder and "Wipro Baby Soft" range of baby toiletries in
1990.
19942000
In 1994, Wipro set up an overseas design centre, Odyssey 21, for undertaking projects and
product developments in advanced technologies for overseas clients. Wipro Infotech and Wipro
Systems were amalgamated with Wipro in April that year. Five of Wipro's manufacturing and
development facilities secured the ISO 9001 certification during 199495. In 1999, Wipro
acquired Wipro Acer. Wipro became a more profitable, diversified corporation with new products
such as the Wipro SuperGenius personal computers (PCs). In 1999, the product was the one
Indian PC range to obtain US-based National Software Testing Laboratory (NSTL) certification
for the Year 2000 (Y2K) compliance in hardware for all models.[19]

50

Wipro Group of Companies


Wipro Ltd.
Wipro Limited is a global company provider of comprehensive IT solutions and services,
including Systems Integration, Consulting, Information Systems outsourcing, IT-enabled
services, and R&D services.
It is also a value added reseller of desktops, servers, notebooks, storage products, networking
solutions and packaged software for international brands.
Wipro entered into the technology business in 1981 and has over 140,000 employees and clients
across 54 countries today. IT revenues stood at $6.2 billion for the year ended 31 March 2013,
with a repeat business ratio of over 95%.
The business model at Wipro Technologies Ltd is an industry aligned customer facing model
which gives greater understanding of customers businesses to build industry specific solutions.
Wipro.
Wipro Consumer Care & Lighting
Wipro Consumer Care and Lighting (WCCLG), a business unit of Wipro Limited operates in the
FMCG segment offering a wide range of consumable commodities. Established in 1945, the first
product to be introduced by WCCLG was vegetable oil, later popularised under the brand name
"Sunflower Vanaspati". It offers personal care products, such as Wipro Baby Soft and Wipro
Safewash, toilet soaps like Santoor and Chandrika as well as international brands like Yardley.
Its portfolio of lighting solutions includes products like Smartlite CFL, [62] LED, emergency lights
and more.
Through its customer-centric products and acquisitions, Wipro Consumer Care and Lighting has
become a fast-growing company in the FMCG segment.

51

Wipro Infrastructure Engineering


Wipro Infrastructure Engineering is the hydraulics business division of Wipro Limited and has
been in the business of manufacturing hydraulic cylinders, truck cylinders, and their components
and solutions since 1976. This division delivers hydraulic cylinders to international OEMs and
represents the Kawasaki, Sun Hydraulics and Teijin Seiki range of hydraulic products in India. It
has entered into partnerships with companies like Kawasaki and aerospace giant EADS. The
commitment to quality has made Wipro Infrastructure Engineering the second largest
independent manufacturer of cylinders in the world. The company has recently ventured into
water treatment systems and solutions to cater to the needs of various industries.
Wipro GE Medical Systems Limited
Wipro GE Medical Systems Limited is Wipros joint venture with GE Healthcare South Asia. It
is engaged in the research and development of advanced solutions to cater to patient and
customer needs in healthcare. This partnership, which began in 1990, today includes offerings
like gadgets and equipment for diagnostics, healthcare IT solutions and services to help
healthcare professionals combat cancer, heart disease, and other ailments. There is complete
adherence to Six Sigma quality standards in all products.
Sustainability at Wipro
Wipros approach to sustainability is structured on enabling itself, as an organisation, and its
customers to be more ecologically sustainable. It is driven by issues considered important to
employees, India current and future generations, customers, investors, suppliers, and the
community as a whole. Wipro has been ranked 1st in the 2010 Asian Sustainability Rating
(ASRTM) of Indian companies and is a member of the NASDAQ Global Sustainability Index as
well as the Dow Jones Sustainability Index. In November 2012 Guide to Greener Electronics,
Greenpeace ranked Wipro first with a score of 7.1/10.

52

Listing and shareholding


Listing: Wipro's equity shares are listed on Bombay Stock Exchange where it is a constituent of
the BSE SENSEX index, and the National Stock Exchange of India where it is a constituent of
the S&P CNX Nifty. The American Depositary Shares of the company are listed at the NYSE
since October 2000.
Shareholding: On 30 September 2013, 73.51% of the equity shares of the company were owned
by the promoters: Azim Premji, his family members, partnership firms in which he is a partner
and Trusts formed by him/his family. The remaining 26.49% shares are owned by others
.
Shareholders (as on 30-September-2013)

Shareholding[86]

Promoter group led by Azim Premji

73.51%

Foreign Institutional Investors (FII)

08.82%

Indian Public

05.31%

Bodies Corporate

03.89%

Mutual Funds/UTI

01.90%

NRI

01.04%

Trusts/Others

00.84%

American Depositary Shares

01.93%

Total

100.0%

53

BOARD OF DIRECTORS

Wipro Chairman Azim H. Premji, Sr. executives of Wipro and external members who are global
leaders and visionaries, form the Wipro Board of Directors which provides direction and
guidance to the organization.

Chairman

Azim H. Premji
Chairman, Wipro Limited
Executive Directors

T K Kurien CEO &


Member of the Board, Wipro Ltd.

54

Suresh C Senapaty
Executive Director
& Chief Finance Officer

Dr. Ashok S. Ganguly


Independent Director

Ireena Vittal
Independent Director

Dr. Jagdish N. Sheth

55

Independent Director

M. K. Sharma
Independent Director

Narayanan Vaghul
Independent Director

Awards 2012-13: Azim Premji gets a Lifetime Achievement


The award seeks to salute those who have conquered the peaks of corporate achievements and
set examples for the current generation of India Inc leaders
To view Azim H Premji, the winner of The Economic Times Lifetime Achievement Award 2013,
only through the prism of Wipro would be an injustice to his immense contribution in other
fields. Still, the creation of the country's third-largest software exporter, with revenues of over Rs
43,000 crore, is what Premji is best known for.

56

Wipro Enterprises Limited comprising two main businesses namely Wipro Consumer Care
which includes soaps, toiletries, personal care products, baby care products, wellness products,
electrical wire devices, domestic and commercial lighting and modular office furniture. We have
a strong brand presence with significant market share in identified segments. In addition, we
have a strong presence in the personal care and skin care products market in South-East Asia and
Middle-East. Wipro Consumer Care is today among the top FMCG companies and amongst the
fastest growing FMCG companies in India.

57

Wipro Infrastructure Engineering group specializes in designing and manufacturing custom


Hydraulic Cylinders (Double Acting, Single Acting and Telescopic Cylinders), Actuators and
Precision Engineered Components for infrastructure and related industries such as Construction
& Earthmoving, Material/Cargo Handling and Forestry, Truck Hydraulic, Farm & Agriculture,
Mining, and Aerospace & Defense. With a global workforce of over 1,700 committed and skilled
people, and 14 state-of-the-art manufacturing facilities across India, Northern Europe, Eastern
Europe, US, Brazil and China Wipro Infrastructure Engineering is the largest independent
hydraulic cylinder manufacturer in the world, delivering around 2 million cylinders to OEMs in
different geographies.
Wipro Infrastructure Engineering also has a platform in the Water business, offering end-to-end
solutions in Water and Wastewater treatment for industrial applications. Equipped with modern
production facilities, Wipro Water is a key player in this segment with capabilities to design &
manufacture, install & maintain Water and Waste Water Treatment Plants for diverse industries
like Oil & Gas, Steel, Power, Pharma & Chemical to name a few.
Apart from the above, Wipro Enterprises Limited have two associates namely:
1. Wipro GE Healthcare Private Limited.
2. Wipro Kawasaki Precision Machinery Private Limited.

58

Wipro Infrastructure Engineering, a division of Wipro Enterprises Limited, has been successfully
partnering the infrastructure and engineering developments across the globe. Specialists in
designing and manufacturing custom Hydraulic Cylinders such as Double Acting, Single Acting
and Telescopic Cylinders, Actuators and Precision Engineered Components for a wide range of
applications, Wipro caters to the following segments:

Material & Cargo Handling

Construction & Earthmoving

Truck Hydraulics

Farm & Agriculture

Mining

Aerospace & Defence

With a global workforce of over 1,700 committed and skilled people, and 14 state-of-the-art
manufacturing facilities across India, Northern Europe, Eastern Europe, US, Brazil and China Wipro Infrastructure Engineering is the largest independent hydraulic cylinder manufacturer in
the world, delivering around 2 million cylinders to OEMs in different geographies.
Over 6 decades of experience coupled with deep engineering expertise, cross-continental
geographic presence, scalable manufacturing and consistent Quality has made Wipro
Infrastructure Engineering one of the preferred hydraulic solution providers in the world. Wipro
partners with customers at every step of their requirement by harnessing its leading-edge design,
technologies and in-house talent pool to provide optimal hydraulic solutions.
59

CHAPTER IV
DATA ANALYSIS

60

1. Growth Computer Networking

Year
2008
2009
2010
2011
2012
2013
2014

Growth Percentage
150
200
250
375
550
700
875

Growth Percentage
1000
875
900
800
700
700
550
600
500
375
400
250
300
200
150
200
100
0

Growth Percentage

Interpretation :
The Performance of networking is improving every year by year

61

2. Growth of Social Networking

Year
2008
2009
2010
2011
2012
2013
2014

Public Applications
275
325
450
600
850
1000
1200

Issued Patents
75
120
175
230
280
325
450

1400
1200
1000
800
Public Applications

600

Issued Patents

400
200
0

Interpretation:
The social networking is enhance in the public application and rising it growth compared to
Issued patents.

62

3. WLAN Network Connectivity out of 25 respondent

Network
WLAN Radio Off
WLAN Radio On
WLAN - Connection not transmitting
WLAN Search

Connection
10
14
18
22

Connection
25
20
15
10
5
0

10

14

18

22

Connection

Interpretation :
The WLAN connection is spread all over the networking and the information integrates from
one network to another networks.

63

4. Revenues and Gross Profit in Crores

Year
2008
2009
2010
2011
2012
2013
2014

Revenues
1657
2165
2354
2658
3244
3456
3854

Gross Profits
1254
1725
1850
2154
2658
2856
32145

4500
4000
3500
3000
2500

Year

2000

Revenues
Gross Profits

1500
1000
500
0
2008 2009 2010 2011 2012 2013 2014

Interpretation:
The company business and it revenues are increasing every year and there is more better
result in the gross profits.

5. Past Performance in Dollar


6.
64

Year
2011
2012
2013

Sales
3,00,000
4,00,000
5,50,000

2014

6,75,000

Gross
2,00,000
2,75,000
3,50,000

Net
75,000
95,000
1,25,00

4,75,000

0
1,75,00
0

6.5

5.6
4.75

5
4

4
3
2
1

3.75

Gross

3
2

Sales
Net

2
1

0
2011

2012

2013

2014

Interpretation:
The sales are increasing every year and there is more better result in the Net profits.

65

6. IT Investment by Strategic IT Cluster

Field

Percentag
e

Educational
Labour Health and Human Services
Government Operation
Public Safety
Economic Development

20
30
25
15
10

Percentage
35
30
25
20
15
10
5
0

30
20

25
15

10
Percentage

Interpretation:
The IT Industry are contributing in every filed to enhance the social and economical status of
the nation as well.

66

7. Employee views for the addition of extra features in Employee Self Service:
When employees were asked whether there is any for additional features in Employee self- service, then
following response were obtained as mentioned in the table 5.7

Employee views on addition of extra features in Employee Self Service


S.No

Options

No of respondents

Percentage(%) of respondents

(i)

Yes

12

15

(ii)

No

68

85

Total

80

100

Employee views on addition of extra features in Employee Self Service

Interpretation: 85% of the employees responded they are satisfied with existing features of employee
self service and there is no need for the addition of extra features. Whereas 15% of the employees
responded that they need extra features to be added to this module.

67

68

69

70

71

72

73

CHAPTER V
FINDING

74

FINDINGS
1. It is observed that out of 80 employees majority (25%) of them are Assistant Managers.
2. It is observed that, all the respondents (100%) are aware of the e-connect portal.
3. It is observed that majority of the employees are satisfied with the e-connect portal as the
mean score rating is 4.05.
4. Based on employee perception, it is observed that the top most application modules and
bottom two application modules used are:
5. Majority of the employees find e-connect portal as highly user friendly, acceptable and
possess clarity.
6. As the mean score rating lies in-between 3 and 4, it is concluded that the employees of the
organization are neither satisfied nor dissatisfied with the functionalities of Travel
Management. However there is still a scope for improvement to make it to a very satisfied
level.
7. It is observed that majority (85%) of the employees express that they are very much satisfied
with the existing features of the Employee self service module.
8. It is observed that majority of the employees are neither satisfied nor dissatisfied with the
Gyan Series module as the mean score rating lies in-between 3 and 4.. There is lot of scope
for improvement in Gyan Series module to make the employees very satisfied towards this
module.
9. It is observed that majority (42.5%) of the employees utilize the Gyan Series module to the
moderate extent only. There is lot of scope for improvement in this area, to make the
employees effectively utilize the module.

75

CHAPTER VI
SUGGESTIONS

76

RECOMMENDATIONS & SUGGESTIONS


Suggestions Computers for proper networking

Operating System: Windows 8 or Mac OS 10.8 Mountain Lion

Memory: minimum of 4 GB RAM, recommend 8 GB RAM

Processor Speed: minimum of Intel Core i5 or equivalent

Hard Drive: 320 GB or larger

DVD Drive*: DVD +/- RW Dual Layer Burner or Mac Super Drive

Wireless: Any card that supports 802.11 g/n protocols and WPA2 Enterprise

Ethernet**: 10/100/1000 (gigabit)

Monitor (Desktop): 19" Monitor or larger

Screen Size (Laptop): 14" (screen size can impact cost and weight)

Ethernet cable or adapter - This ensures the ability to connect to a wired network,
should wireless not be available or for high-bandwidth usage, such as streaming movies
or high-definition video calls.

Hard drive space - Hard drive space can be at a premium on some older computers, so
you will want to be sure you have an adequate amount of free space for installing
programs and running software. Storage space for documents, pictures, etc.can be
supplemented with a USB key, external hard drive or cloud storage options.

Recommended Minimum Configuration for Computers

Operating System: Windows 7 or Mac OS 10.7 (Lion)


77

Processor: 2.0 GHz, 1MB L2 Cache (each processor), with at least SSE2 support

Memory: minimum 2 GB RAM

Hard drive: at least 40 GB free disk space

Network: Wireless or Ethernet card capable of supporting high-speed Internet access

Audio: Sound card/speakers for listening to embedded audio or lectures

Video: Monitor/screen resolution of 1024x768 or greater

CHAPTER VI
CONCLUSION

78

79

CONCLUSION:
While the age-old concept of the network is foundational in virtually all areas of society,
Computer Networks and Protocols have forever changed the way humans will work, play, and
communicate. Forging powerfully into areas of our lives that no one had expected, digital
networking is further empowering us for the future. New protocols and standards will emerge,
new applications will be conceived, and our lives will be further changed and enhanced. While
the new will only be better, the majority of digital networking's current technologies are not
cutting-edge, but rather are protocols and standards conceived at the dawn of the digital
networking age that have stood solid for over thirty years.
The development in computer and communication technology has taken a quantum leap.
The level of expertise, competence and knowledge available in India in the field of computer
communication and networking technology has increased sufficiently to effect establishment of
communication links within and outside India. The commissioning of International Gateway
packet Switching Services (GPSS) and its PADS (Packet Assembler/Dissembler) by the VSNL
(India) in five major cities of India has facilitated cheaper and reliable communication and can
be considered as an important landmark. The availability of GPSS has in a way promoted use of
the international online search services specially the DIALOG and the EASYNET. Most of the
organization in India having online search facilities are using GPSS facilities instead of PSTN
lines in preference to the International Subscribers Trunk Dialing (STD) facility or rudimentary
International Telex Services.
The number and kinds of online databases available for remote log-in through various
international search services are increasing constantly. More than 4,000 online databases are
currently available consisting of fair number of full text databases beside factual and
bibliographic databases. More-over, innovative introductions like EASYNET (of Telebase, USA)
through VSNL, India are a welcomed change to the information scenario. EASYNET, an
information gateway, facilitate online searches over a number of databases and search services
without knowing the structure of these databases or the protocols of search service involved.

80

BIBLIOGRAPHY
Computer Networks by Tanenbaum
All about Computer Network By Manohar Lodia
Data communication By Ferozon
Websites
http://www.cisco.com
http://www.networkessential.com
http://www.google.com
http://wipro.com

Wikipedia contributors, "OSI model," Wikipedia, The Free Encyclopedia


Wikipedia contributors, "Ethernet," Wikipedia, The Free Encyclopedia
Wikipedia contributors, "Internet protocol suite," Wikipedia, The Free Encyclopedia
An Overview of TCP/IP Protocols and the Internet Gary C. Kessler 1994, 2004
The New Oxford American Dictionary 2nd Edition 2005
Wikipedia contributors, "BNC connector," Wikipedia, The Free Encyclopedia

81

S-ar putea să vă placă și