Documente Academic
Documente Profesional
Documente Cultură
PROJECT REPORT
ON
Submitted in partial fulfillment for the requirement of the award of the degree of
2015
DECLARATION
ACKNOWLEDGEMENT
I would like to thank Mr. Abhishek Jain (Asst. Manager) of Wipro Technologies
for providing me an opportunity to pursue my project work in the esteemed organization.
I convey my sincere thanks to all the staff of VIF COLLEGE OF ENGG. WORK
under whose supervision the study has been successfully completed.
ABSTRACT
Computer of data communication refer to protocol involved in transmission of
digitized data between two or more online processing locations and is an integral part of the
modern information and retrieval systems in terms of their online access. The modern
information system, unlike their precursor which worked in an offline mode, operate in an
online interactive mode where in a user can interact with a host from a remote terminal using
a communication link. The article, before describing the computer communication networks,
touches upon the basic concepts, types, techniques and protocols involved in data
communication.
Communication networks are broadly classified into six categories based on the
geographical locations of its computers and terminals, namely (i) Remote Data Entry
Stations (RJES); (ii) Local Area Network (LAN); (iii) Wide Area Network (WAN); (iv)
Metropolitan Area Network (MAN); (v) Distributed Data Processing Network (DDPN); and
(vi) Gateways. Further computer communication networks are grouped into three categories
based on technology and communication media used, namely, (i) Public Switched Data
Network (PSDN); (ii) Public Switched Telephone Network (PSTN); and (iii) Integrated
Service Data Network (ISDN). The article proposes to briefly describe all these categories
with the examples as they exist in India.
The existing national and international telecommunication services based on their
scope and function have further been grouped into three categories, namely common carriers,
specialized common carriers and value added carriers. Common carriers provide large public
telephone and telegraph networks and other broad range services, specialize common carriers
offer public networks to provide limited number of services using broadband facilities such
as microwave/satellite systems. Value added carriers generally use the telephone lines and
transmission facilities of other carriers, often establishing their own private bypass networks
so as to avoid some of the facilities of local telephone companies and large-distance systems.
The article then proposes to briefly describe TYMNET, TELE-NET, ESA/IRS, ChIN and
STN as an important example of international data communication network.
4
TABLE OF CONTENTS
CONTENTS
PAGE NO
CHAPTER-1
INTRODUCTION
1-15
CHAPTER-2
LITERATURE REVIEW
16-38
CHAPTER-3
COMPANY PROFILE
39-49
CHAPTER-4
DATA ANALYSIS AND INTERPRETATION
50-63
CHAPTER-5
FINDINGS, SUGGESTIONS AND CONCLUSION
64-69
CHAPTER-6
BIBLIOGRAPHY
70
CHAPTER - I
INTRODUCTION
INTRODUCTION
COMPUTER NETWORKING
A computer network or data network is a telecommunications network that allows computers to
exchange data. In computer networks, networked computing devices pass data to each other
along data connections. Data is transferred in the form of packets. The connections (network
links) between nodes are established using either cable media or wireless media. The best-known
computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network nodes.
Nodes can include hosts such as personal computers, phones, servers as well as networking
hardware. Two such devices are said to be networked together when one device is able to
exchange information with the other device, whether or not they have a direct connection to each
other.
Computer networks support applications such as access to the World Wide Web, shared use of
application and storage servers, printers, and fax machines, and use of email and instant
messaging applications. Computer networks differ in the physical media used to transmit their
signals, the communications protocols to organize network traffic, the network's size, topology
and organizational intent.
A computer network, or simply a network, is a collection of computers and other hardware
components interconnected by communication channels that allow sharing of resources and
information. Today, computer networks are the core of modern communication. All modern
aspects of the public switched telephone network (PSTN) are computer-controlled. Telephony
increasingly runs over the Internet Protocol, although not necessarily the public Internet. The
scope of communication has increased significantly in the past decade. This boom in
communications would not have been possible without the progressively advancing computer
network. Computer networks, and the technologies that make communication between
networked computers possible, continue to drive computer hardware, software, and peripherals
industries. The expansion of related industries is mirrored by growth in the numbers and types of
people using networks, from the researcher to the home user.
7
Computer Networks
MEANING OF INTERNET
A means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers. When two computers are connected over the Internet, they can send and
receive all kinds of information such as text, graphics, voice, video, and computer programs.
No one owns Internet, although several organizations the world over collaborate in its
functioning and development. The high-speed, fiber-optic cables (called backbones) through
which the bulk of the Internet data travels are owned by telephone companies in their respective
countries.
The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then
called ARPANET) established by the US Department Of Defense in 1960s for collaboration in
military research among business and government laboratories. Later universities and other US
institutions connected to it. This resulted in ARPANET growing beyond everyone's expectations
and acquiring the name 'Internet.'
The development of hypertext based technology (called World Wide web, WWW, or just the
Web) provided means of displaying text, graphics, and animations, and easy search and
navigation tools that triggered Internet's explosive worldwide growth.
Resource sharing is the main objective of the computer network. The goal is to provide
all the program, date and hardware is available to everyone on the network without
regard to the physical location of the resource and the users.
The second objective is to provide the high Reliability. It is achieved by replicating the
files on two or more machines, so in case of unavailability (due to fail of hardware) the
other copies can be used.
Computer organization has helped organization in saving money. This is due to the fact
that the small computer has much better price to the performance ratio comparison than
the large computer like mainframe. Mainframe computer are approximately ten times
faster that the microcomputers, but they cost thousands times more. As a result of this
imbalance, organization has preferred to install interconnected microcomputer connected
to the mainframe computer.
Computer network have provided means to increase system performance as the work
load increases (load balancing). In the days of mainframe when the system was full it
was to replace with the other large mainframe computer, usually at and expensive rate not
convenience for user.
Computer network help people who live or work apart to report together. So, when one
user prepared some documentation, he can make the document online enabling other to
read and convey their opinions. Thus computer network is a powerful communication
medium.
10
Only authorized user can access resource in a computer network. Users are authenticated
by their user name and password. Hence it is not possible to access the data without
proper account. This increases security.
11
12
NETWORKING
Introduction to networking
Networking is a practice of linking of two or more computing devices such as PCs, printers,
faxes etc., with each other Connection between two devices is through physical media or logical
media to share information, data and resources. Networks are made with the hardware and
software. Cable/media
Computer Networks
Models of Networking
Model means the connectivity of two computers. We have many types of networking models.(i)
Client Server Model(ii) Peer to Peer Model (Workgroup Model)(iii)Domain Model
Client Server Model:
In a Client server model we have one server and many clients. A Client can share the
resources of server, but a server cannot share the resources on clients. On the point of view of
administrator its very easy to control the network because we combine with the server also at
security point of view. It is very useful because it uses user level security in which users have to
remember only one password toshare the resources.
13
14
ARCNET, Token Ring and other technology standards have been used in the past, but Ethernet
over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to
build LANs.
15
A MAN is optimized for a larger geographical area than a LAN, ranging from several
blocks of buildings to entire cities. MANs can also depend on communications
channels of moderate-to-high data rates. A MAN might be owned and operated by a
single organization, but it usually will be used by many individuals and
organizations. MANs might also be owned and operated as public utilities. They will
often provide means for inter networking of local networks.
16
providers, provide connections from an organization's LAN to the Internet. WANs are often built
using leased lines. At each end of the leased line, a router connects the LAN on one side with a
second router within the LAN on the other. Leased lines can be very expensive. Instead of using
leased lines, WANs can also be built using less costly circuit switching or packet switching
methods. Network protocols including TCP/IP deliver transport and addressing functions.
Protocols including Packet over SONET/SDH, MPLS, ATM and Frame Relay are often used by
service providers to deliver the links that are used in WANs. X.25 was an important early WAN
protocol, and is often considered to be the "grandfather" of Frame Relay as many of the
underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame Relay.
Academic research into wide area networks can be broken down into three areas: mathematical
models, network emulation and network simulation.
18
19
20
21
INTER NETWORKING
Internetworking is the practice of connecting a computer network with other networks through
the use of gateways that provide a common method of routing information packets between the
networks. The resulting system of interconnected networks is called an internetwork, or simply
an internet. Internetworking is a combination of the words inter ("between") and networking; not
internet-working or international-network.
The most notable example of internetworking is the Internet, a network of networks based on
many underlying hardware technologies, but unified by an internetworking protocol standard, the
Internet Protocol Suite, often also referred to as TCP/IP.
The smallest amount of effort to create an internet (an internetwork, not the Internet), is to have
two LANs of computers connected to each other via a router. Simply using either a switch or a
hub to connect two local area networks together doesn't imply internetworking; it just expands
the original LAN.
Two architectural models are commonly used to describe the protocols and methods used in
internetworking.
The Open System Interconnection (OSI) reference model was developed under the auspices of
the International Organization for Standardization (ISO) and provides a rigorous description for
layering protocol functions from the underlying hardware to the software interface concepts in
user applications. Internetworking is implemented in the Network Layer (Layer 3) of the model.
The Internet Protocol Suite, also called the TCP/IP model of the Internet was not designed to
conform to the OSI model and does not refer to it in any of the normative specifications in
Requests for Comment and Internet standards. Despite similar appearance as a layered model, it
uses a much less rigorous, loosely defined architecture that concerns itself only with the aspects
of logical networking. It does not discuss hardware-specific low-level interfaces, and assumes
22
availability of a Link Layer interface to the local network link to which the host is connected.
Internetworking is facilitated by the protocols of its Internet Layer.
CHAPTER II
REVIEW OF LITERATURE
23
24
REVIEW OF LITERATURE
25
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP
to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP),
the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and
the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged
together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to
the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP).
These protocols encapsulate the IP packets so that they can be sent over the dial-up phone
connection to an access provider's modem.
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of
TCP for special purposes. Other protocols are used by network host computers for exchanging
router information. These include the Internet Control Message Protocol (ICMP), the Interior
Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway
Protocol (BGP)
26
27
layers of the OSI Reference Model, and conclude with a summary of the layers and their
respective functions.
28
29
APPLICATION OF NETWORKS:
1. Marketing and sales: Marketing professional uses them to collect exchange and analyze data
relating to customer needs and product development cycles.
Sales application includes Teleshopping, which uses order entry computers or telephone
connected to an order processing network, and online reservation services for railways, hotels,
airlines, restaurants theatre etc.
2. Financial services: It include credit history searches, foreign exchange and investment
services and electronic fund transfer (EFT), which allow a user to transfer money without going
to bank.
3. Manufacturing: computer networks are used today in many aspects of manufacturing,
including the manufacturing processes itself. Two aspects that uses network to provide essential
services are computer Assisted design (CAD) and computer Assisted manufacturing (CAM),
both of which allow multiple user to work on a project simultaneously.
4. Electronic Messaging: E-mails transfer the messages between two and more users in a
network. With this application user can transfer the information in the form of text, picture and
voice.
5. Directory Services: It allows list of files to be stored in central location to speed up the world
wide search operation. E.g. search engines like Google, Britannia, and Yahoo etc.
6. Information Services: It includes Bulletin Boards and data bank. A www site offering the
technical specification for a new product in a information services.
7. Electronic Data Exchange (EDI): EDI allows business information (including documents
such as purchase orders and services) to be transferred without using paper.
8. Teleconferencing: It allows conference to occur without the participant being in the same
location. It includes:
Text Conferencing: Participant communicates through their keywords and computer monitors.
30
Network packet
Main article: Network packet
Most information in computer networks is carried in packets.
A network packet is a formatted unit of data (a list of bits or bytes) carried by a packet-switched
network. Computer communications links that do not support packets, such as traditional pointto-point telecommunications links, simply transmit data as a bit stream. When data is formatted
into packets, the bandwidth of the communication medium can be better shared among users
than if the network were circuit switched.
A packet consists of two kinds of data: control information and user data (also known as
payload). The control information provides data the network needs to deliver the user data, for
example: source and destination network addresses, error detection codes, and sequencing
information. Typically, control information is found in packet headers and trailers, with payload
data in between.
31
Network Topology
Main article: Network topology
The physical layout of a network is usually less important than the topology that connects
network nodes. Most diagrams that describe a physical network are therefore topological, rather
than geographic. The symbols on these diagrams usually denote network links and network
nodes.
Network Structure
Network links
The communication media used to link devices to form a computer network include electrical
cable (Home PNA, power line communication, G.hn), optical fiber (fiber-optic communication),
and radio waves (wireless networking). In the OSI model, these are defined at layers 1 and 2
the physical layer and the data link layer.
A widely adopted family of communication media used in local area network (LAN) technology
is collectively known as Ethernet. The media and protocol standards that enable communication
between networked devices over Ethernet are defined by IEEE 802.3. Ethernet transmit data over
both copper and fiber cables. Wireless LAN standards (e.g. those defined by IEEE 802.11) use
32
radio waves, or others use infrared signals as a transmission medium. Power line communication
uses a building's power cabling to transmit data.
Wired technologies
The orders of the following wired technologies are, roughly, from slowest to fastest transmission
speed.
Twisted pair wire is the most widely used medium for all telecommunication. Twistedpair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires
consist of two insulated copper wires twisted into pairs. Computer network cabling
(wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can
be utilized for both voice and data transmission. The use of two wires twisted together
helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges
from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in
two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form
comes in several category ratings, designed for use in various scenarios.
Coaxial cable is widely used for cable television systems, office buildings, and other
work-sites for local area networks. The cables consist of copper or aluminum wire
surrounded by an insulating layer (typically a flexible material with a high dielectric
constant), which itself is surrounded by a conductive layer.
33
ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power
lines) to create a high-speed (up to 1 Gigabit/s) local area network
An optical fiber is a glass fiber. It carries pulses of light that represent data. Some
advantages of optical fibers over metal wires are very low transmission loss and
immunity from electrical interference. Optical fibers can simultaneously carry multiple
wavelengths of light, which greatly increases the rate that data can be sent, and helps
enable data rates of up to trillions of bits per second. Optic fibers can be used for long
runs of cable carrying very high data rates, and are used for undersea cables to
interconnect continents.
Wireless Technologies is the transfer of information between two or more points that are not
connected by an electrical conductor.
34
Cellular and PCS systems use several radio communications technologies. The
systems divide the region covered into multiple geographic areas. Each area has a lowpower transmitter or radio relay antenna device to relay calls from one area to the next
area.
Radio and spread spectrum technologies Wireless local area networks use a highfrequency radio technology similar to digital cellular and a low-frequency radio
technology. Wireless LANs use spread spectrum technology to enable communication
between multiple devices in a limited area. IEEE 802.11 defines a common flavor of
open-standards wireless radio-wave technology known as Wifi.
35
Network nodes
Main article: Node (networking)
Apart from the physical communications media described above, networks comprise additional
basic system building blocks, such as network interface controller (NICs), repeaters, hubs,
bridges, switches, routers, modems, and firewalls.
Network interfaces
An ATM network interface in the form of an accessory card. A lot of network interfaces are builtin.
A network interface controller (NIC) is computer hardware that provides a computer with the
ability to access the transmission media, and has the ability to process low-level network
information. For example the NIC may have a connector for accepting a cable, or an aerial for
wireless transmission and reception, and the associated circuitry.
The NIC responds to traffic addressed to a network address for either the NIC or the computer as
a whole.
In Ethernet networks, each network interface controller has a unique Media Access Control
(MAC) addressusually stored in the controller's permanent memory. To avoid address conflicts
between network devices, the Institute of Electrical and Electronics Engineers (IEEE) maintains
and administers MAC address uniqueness. The size of an Ethernet MAC address is six octets.
36
Remote bridges: Can be used to create a wide area network (WAN) link between LANs.
Remote bridges, where the connecting link is slower than the end networks, largely have
been replaced with routers.
Wireless bridges: Can be used to join LANs or connect remote devices to LANs.
37
Switches
A network switch is a device that forwards and filters OSI layer 2 datagrams between ports based
on the MAC addresses in the packets. A switch is distinct from a hub in that it only forwards the
frames to the physical ports involved in the communication rather than all ports connected. It can
be thought of as a multi-port bridge. It learns to associate physical ports to MAC addresses by
examining the source addresses of received frames. If an unknown destination is targeted, the
switch broadcasts to all ports but the source. Switches normally have numerous ports, facilitating
a star topology for devices, and cascading additional switches.
Routers
A typical home or small office router showing the ADSL telephone line and Ethernet network
cable connections. A router is an internetworking device that forwards packets between networks
by processing the routing information included in the packet or datagram (Internet protocol
information from layer. The routing information is often processed in conjunction with the
routing table (or forwarding table).
38
Modems
Modems (Modulator Demodulator) are used to connect network nodes via wire not originally
designed for digital network traffic, or for wireless. To do this one or more frequencies are
modulated by the digital signal to produce an analog signal that can be tailored to give the
required properties for transmission. Modems are commonly used for telephone lines, using a
Digital Subscriber Line technology.
Firewalls
A firewall is a network device for controlling network security and access rules. Firewalls are
typically configured to reject access requests from unrecognized sources while allowing actions
from recognized ones. The vital role firewalls play in network security grows in parallel with the
constant increase in cyber attacks.
Overlay network
39
An overlay network is a virtual computer network that is built on top of another network. Nodes
in the overlay network are connected by virtual or logical links. Each link corresponds to a path,
perhaps through many physical links, in the underlying network. The topology of the overlay
network may (and often does) differ from that of the underlying one. For example, many peer-topeer networks are overlay networks. They are organized as nodes of a virtual system of links that
run on top of the Internet.[10]
40
Communications protocols
The TCP/IP model or Internet layering scheme and its relation to common protocols often
layered on top of it.
A communications protocol is a set of rules for exchanging information over network links. In a
protocol stack (also see the OSI model), each protocol leverages the services of the protocol
below it. An important example of a protocol stack is HTTP running over TCP over IP over IEEE
802.11. (TCP and IP are members of the Internet Protocol Suite. IEEE 802.11 is a member of the
Ethernet protocol suite.) This stack is used between the wireless router and the home user's
personal computer when the user is surfing the web.
Whilst the use of protocol layering is today ubiquitous across the field of computer networking,
it has been historically criticized by many researchers [12] for two principal reasons. Firstly,
abstracting the protocol stack in this way may cause a higher layer to duplicate functionality of a
lower layer, a prime example being error recovery on both a per-link basis and an end-to-end
basis.[13] Secondly, it is common that a protocol implementation at one layer may require data,
state or addressing information that is only present at another layer, thus defeating the point of
separating the layers in the first place. For example, TCP uses the ECN field in the IPv4 header
as an indication of congestion; IP is a network layer protocol whereas TCP is a transport layer
protocol.
Communication protocols have various characteristics. They may be connection-oriented or
connectionless, they may use circuit mode or packet switching, and they may use hierarchical
addressing or flat addressing.
41
There are many communication protocols, a few of which are described below.
Ethernet
Ethernet is a family of protocols used in LANs, described by a set of standards together called
IEEE 802 published by the Institute of Electrical and Electronics Engineers. It has a flat
addressing scheme. It operates mostly at levels 1 and 2 of the OSI model. For home users today,
the most well-known member of this protocol family is IEEE 802.11, otherwise known as
Wireless LAN (WLAN). The complete IEEE 802 protocol suite provides a diverse set of
networking capabilities. For example, MAC bridging (IEEE 802.1D) deals with the routing of
Ethernet packets using a Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and IEEE
802.1X defines a port-based Network Access Control protocol, which forms the basis for the
authentication mechanisms used in VLANs (but it is also found in WLANs) it is what the home
user sees when the user has to enter a "wireless access key".
Internet Protocol Suite
The Internet Protocol Suite, also called TCP/IP, is the foundation of all modern networking. It
offers connection-less as well as connection-oriented services over an inherently unreliable
network traversed by data-gram transmission at the Internet protocol (IP) level. At its core, the
protocol suite defines the addressing, identification, and routing specifications for Internet
Protocol Version 4 (IPv4) and for IPv6, the next generation of the protocol with a much enlarged
addressing capability.
Network service
Network services are applications hosted by servers on a computer network, to provide some
functionality for members or users of the network, or to help the network itself to operate.
The World Wide Web, E-mail, printing and network file sharing are examples of well-known
network services. Network services such as DNS (Domain Name System) give names for IP and
MAC addresses (people remember names like nm.lan better than numbers like
210.121.67.18), and DHCP to ensure that the equipment on the network has a valid IP address.
42
Services are usually based on a service protocol that defines the format and sequencing of
messages between clients and servers of that network service.
Network performance
Quality of service
Depending on the installation requirements, network performance is usually measured by the
quality of service of a telecommunications product. The parameters that affect this typically can
include throughput, jitter, bit error rate and latency.
The following list gives examples of network performance measures for a circuit-switched
network and one type of packet-switched network, viz. ATM:
There are many ways to measure the performance of a network, as each network is different in
nature and design. Performance can also be modelled instead of measured. For example, state
transition diagrams are often used to model queuing performance in a circuit-switched network.
The network planner uses these diagrams to analyze how the network performs in each state,
ensuring that the network is optimally designed.[27]
43
Security
Network security
Network security consists of provisions and policies adopted by the network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of the computer
network and its network-accessible resources.[29] Network security is the authorization of access
to data in a network, which is controlled by the network administrator. Users are assigned an ID
and password that allows them access to information and programs within their authority.
Network security is used on a variety of computer networks, both public and private, to secure
daily transactions and communications among businesses, government agencies and individuals.
Network surveillance
Network surveillance is the monitoring of data being transferred over computer networks such as
the Internet. The monitoring is often done surreptitiously and may be done by or at the behest of
governments, by corporations, criminal organizations, or individuals. It may or may not be legal
and may or may not require authorization from a court or other independent agency.
Computer and network surveillance programs are widespread today, and almost all Internet
traffic is or could potentially be monitored for clues to illegal activity.
Surveillance is very useful to governments and law enforcement to maintain social control,
recognize and monitor threats, and prevent/investigate criminal activity. With the advent of
programs such as the Total Information Awareness program, technologies such as high speed
surveillance computers and biometrics software, and laws such as the Communications
Assistance For Law Enforcement Act, governments now possess an unprecedented ability to
monitor the activities of citizens.[30]
However, many civil rights and privacy groupssuch as Reporters Without Borders, the
Electronic Frontier Foundation, and the American Civil Liberties Unionhave expressed
concern that increasing surveillance of citizens may lead to a mass surveillance society, with
limited political and personal freedoms.
44
Ethernet
Ethernet is the medium commonly used to build local area networks (LANs) of interconnected
machines within a limited area such as an office, company or university campus. Ethernet is
based on a bus structure to which many machines can connect to, and communication always
happens between two nodes at a time. When two or more nodes want to talk at the same time,
both will restart communication after some timeout. The technical term for this is CSMA/CD
(Carrier Sense w/ Multiple Access and Collision Detection).
Initially, Ethernet hardware consisted of a thick (yellow) cable that machines tapped into using
special connectors that poked through the cable's outer shielding. The successor of this was
called 10base5, which used BNC-type connectors for tapping in special T-connectors and
terminators on both ends of the bus. Today, ethernet is mostly used with twisted pair lines which
are used in a collapsed bus system that are contained in switches or hubs. The twisted pair lines
give this type of media its name - 10baseT for 10 Mbit/s networks, and 100baseT for 100 MBit/s
ones. In switched environments there's also the distinction if communication between the node
and the switch can happen in half- or in full duplex mode.
TCP/IP Address Format
TCP/IP uses 4-byte (32-bit) addresses in the current implementations (IPv4), also called IPnumbers (Internet-Protocol numbers), to address hosts.
TCP/IP allows any two machines to communicate directly. To permit this all hosts on a given
network must have a unique IP address. To assure this, IP addresses are administrated by one
central organisation, the InterNIC. They give certain ranges of addresses (network-addresses)
directly to sites which want to participate in the internet or to internet-providers, which give the
addresses to their customers.
If your university or company is connected to the Internet, it has (at least) one such networkaddress for its own use, usually not assigned by the InterNIC directly, but rather through an
Internet Service Provider (ISP).
45
If you just want to run your private network at home, see below on how to build your own IP
addresses. However, if you want to connect your machine to the (real :-) Internet, you should get
an IP addresses from your local network-administrator or -provider.
IP addresses are usually written in dotted quad-notation - the four bytes are written down in
decimal (most significant byte first), separated by dots. For example, 132.199.15.99 would be a
valid address. Another way to write down IP-addresses would be as one 32-bit hex-word, e.g.
0x84c70f63. This is not as convenient as the dotted-quad, but quite useful at times, too. (See
below!)
47
CHAPTER III
COMPANY PROFILE
48
COMPANY PROFILE
49
During the 1970s and 1980s, the company shifted its focus to new business opportunities in the
IT and computing industry, which was at a nascent stage in India at the time. On 7 June 1977, the
name of the company changed from Western India Vegetable Products Limited, to Wipro
Products Limited
The year 1980 marked the arrival of Wipro in the IT domain. In 1982, the name was changed
from Wipro Products Limited to Wipro Limited. Meanwhile Wipro continued to expand in the
consumer products domain with the launch of "Ralak" a tulsi-based family soap and "Wipro
Jasmine", a toilet soap.
19661992
In 1988, Wipro diversified its product line into heavy-duty industrial cylinders and mobile
hydraulic cylinders. A joint venture company with the United States' General Electric in the
name of Wipro GE Medical Systems Pvt. Ltd. was set up in 1989 for the manufacture, sales, and
service of diagnostic and imaging products. Later, in 1991, tipping systems and Eaton hydraulic
products were launched. The Wipro Fluid Power division, in 1992, developed expertise to offer
standard hydraulic cylinders for construction equipment and truck tipping systems. The market
saw the launch of the "Santoor" talcum powder and "Wipro Baby Soft" range of baby toiletries in
1990.
19942000
In 1994, Wipro set up an overseas design centre, Odyssey 21, for undertaking projects and
product developments in advanced technologies for overseas clients. Wipro Infotech and Wipro
Systems were amalgamated with Wipro in April that year. Five of Wipro's manufacturing and
development facilities secured the ISO 9001 certification during 199495. In 1999, Wipro
acquired Wipro Acer. Wipro became a more profitable, diversified corporation with new products
such as the Wipro SuperGenius personal computers (PCs). In 1999, the product was the one
Indian PC range to obtain US-based National Software Testing Laboratory (NSTL) certification
for the Year 2000 (Y2K) compliance in hardware for all models.[19]
50
51
52
Shareholding[86]
73.51%
08.82%
Indian Public
05.31%
Bodies Corporate
03.89%
Mutual Funds/UTI
01.90%
NRI
01.04%
Trusts/Others
00.84%
01.93%
Total
100.0%
53
BOARD OF DIRECTORS
Wipro Chairman Azim H. Premji, Sr. executives of Wipro and external members who are global
leaders and visionaries, form the Wipro Board of Directors which provides direction and
guidance to the organization.
Chairman
Azim H. Premji
Chairman, Wipro Limited
Executive Directors
54
Suresh C Senapaty
Executive Director
& Chief Finance Officer
Ireena Vittal
Independent Director
55
Independent Director
M. K. Sharma
Independent Director
Narayanan Vaghul
Independent Director
56
Wipro Enterprises Limited comprising two main businesses namely Wipro Consumer Care
which includes soaps, toiletries, personal care products, baby care products, wellness products,
electrical wire devices, domestic and commercial lighting and modular office furniture. We have
a strong brand presence with significant market share in identified segments. In addition, we
have a strong presence in the personal care and skin care products market in South-East Asia and
Middle-East. Wipro Consumer Care is today among the top FMCG companies and amongst the
fastest growing FMCG companies in India.
57
58
Wipro Infrastructure Engineering, a division of Wipro Enterprises Limited, has been successfully
partnering the infrastructure and engineering developments across the globe. Specialists in
designing and manufacturing custom Hydraulic Cylinders such as Double Acting, Single Acting
and Telescopic Cylinders, Actuators and Precision Engineered Components for a wide range of
applications, Wipro caters to the following segments:
Truck Hydraulics
Mining
With a global workforce of over 1,700 committed and skilled people, and 14 state-of-the-art
manufacturing facilities across India, Northern Europe, Eastern Europe, US, Brazil and China Wipro Infrastructure Engineering is the largest independent hydraulic cylinder manufacturer in
the world, delivering around 2 million cylinders to OEMs in different geographies.
Over 6 decades of experience coupled with deep engineering expertise, cross-continental
geographic presence, scalable manufacturing and consistent Quality has made Wipro
Infrastructure Engineering one of the preferred hydraulic solution providers in the world. Wipro
partners with customers at every step of their requirement by harnessing its leading-edge design,
technologies and in-house talent pool to provide optimal hydraulic solutions.
59
CHAPTER IV
DATA ANALYSIS
60
Year
2008
2009
2010
2011
2012
2013
2014
Growth Percentage
150
200
250
375
550
700
875
Growth Percentage
1000
875
900
800
700
700
550
600
500
375
400
250
300
200
150
200
100
0
Growth Percentage
Interpretation :
The Performance of networking is improving every year by year
61
Year
2008
2009
2010
2011
2012
2013
2014
Public Applications
275
325
450
600
850
1000
1200
Issued Patents
75
120
175
230
280
325
450
1400
1200
1000
800
Public Applications
600
Issued Patents
400
200
0
Interpretation:
The social networking is enhance in the public application and rising it growth compared to
Issued patents.
62
Network
WLAN Radio Off
WLAN Radio On
WLAN - Connection not transmitting
WLAN Search
Connection
10
14
18
22
Connection
25
20
15
10
5
0
10
14
18
22
Connection
Interpretation :
The WLAN connection is spread all over the networking and the information integrates from
one network to another networks.
63
Year
2008
2009
2010
2011
2012
2013
2014
Revenues
1657
2165
2354
2658
3244
3456
3854
Gross Profits
1254
1725
1850
2154
2658
2856
32145
4500
4000
3500
3000
2500
Year
2000
Revenues
Gross Profits
1500
1000
500
0
2008 2009 2010 2011 2012 2013 2014
Interpretation:
The company business and it revenues are increasing every year and there is more better
result in the gross profits.
Year
2011
2012
2013
Sales
3,00,000
4,00,000
5,50,000
2014
6,75,000
Gross
2,00,000
2,75,000
3,50,000
Net
75,000
95,000
1,25,00
4,75,000
0
1,75,00
0
6.5
5.6
4.75
5
4
4
3
2
1
3.75
Gross
3
2
Sales
Net
2
1
0
2011
2012
2013
2014
Interpretation:
The sales are increasing every year and there is more better result in the Net profits.
65
Field
Percentag
e
Educational
Labour Health and Human Services
Government Operation
Public Safety
Economic Development
20
30
25
15
10
Percentage
35
30
25
20
15
10
5
0
30
20
25
15
10
Percentage
Interpretation:
The IT Industry are contributing in every filed to enhance the social and economical status of
the nation as well.
66
7. Employee views for the addition of extra features in Employee Self Service:
When employees were asked whether there is any for additional features in Employee self- service, then
following response were obtained as mentioned in the table 5.7
Options
No of respondents
Percentage(%) of respondents
(i)
Yes
12
15
(ii)
No
68
85
Total
80
100
Interpretation: 85% of the employees responded they are satisfied with existing features of employee
self service and there is no need for the addition of extra features. Whereas 15% of the employees
responded that they need extra features to be added to this module.
67
68
69
70
71
72
73
CHAPTER V
FINDING
74
FINDINGS
1. It is observed that out of 80 employees majority (25%) of them are Assistant Managers.
2. It is observed that, all the respondents (100%) are aware of the e-connect portal.
3. It is observed that majority of the employees are satisfied with the e-connect portal as the
mean score rating is 4.05.
4. Based on employee perception, it is observed that the top most application modules and
bottom two application modules used are:
5. Majority of the employees find e-connect portal as highly user friendly, acceptable and
possess clarity.
6. As the mean score rating lies in-between 3 and 4, it is concluded that the employees of the
organization are neither satisfied nor dissatisfied with the functionalities of Travel
Management. However there is still a scope for improvement to make it to a very satisfied
level.
7. It is observed that majority (85%) of the employees express that they are very much satisfied
with the existing features of the Employee self service module.
8. It is observed that majority of the employees are neither satisfied nor dissatisfied with the
Gyan Series module as the mean score rating lies in-between 3 and 4.. There is lot of scope
for improvement in Gyan Series module to make the employees very satisfied towards this
module.
9. It is observed that majority (42.5%) of the employees utilize the Gyan Series module to the
moderate extent only. There is lot of scope for improvement in this area, to make the
employees effectively utilize the module.
75
CHAPTER VI
SUGGESTIONS
76
DVD Drive*: DVD +/- RW Dual Layer Burner or Mac Super Drive
Wireless: Any card that supports 802.11 g/n protocols and WPA2 Enterprise
Screen Size (Laptop): 14" (screen size can impact cost and weight)
Ethernet cable or adapter - This ensures the ability to connect to a wired network,
should wireless not be available or for high-bandwidth usage, such as streaming movies
or high-definition video calls.
Hard drive space - Hard drive space can be at a premium on some older computers, so
you will want to be sure you have an adequate amount of free space for installing
programs and running software. Storage space for documents, pictures, etc.can be
supplemented with a USB key, external hard drive or cloud storage options.
Processor: 2.0 GHz, 1MB L2 Cache (each processor), with at least SSE2 support
CHAPTER VI
CONCLUSION
78
79
CONCLUSION:
While the age-old concept of the network is foundational in virtually all areas of society,
Computer Networks and Protocols have forever changed the way humans will work, play, and
communicate. Forging powerfully into areas of our lives that no one had expected, digital
networking is further empowering us for the future. New protocols and standards will emerge,
new applications will be conceived, and our lives will be further changed and enhanced. While
the new will only be better, the majority of digital networking's current technologies are not
cutting-edge, but rather are protocols and standards conceived at the dawn of the digital
networking age that have stood solid for over thirty years.
The development in computer and communication technology has taken a quantum leap.
The level of expertise, competence and knowledge available in India in the field of computer
communication and networking technology has increased sufficiently to effect establishment of
communication links within and outside India. The commissioning of International Gateway
packet Switching Services (GPSS) and its PADS (Packet Assembler/Dissembler) by the VSNL
(India) in five major cities of India has facilitated cheaper and reliable communication and can
be considered as an important landmark. The availability of GPSS has in a way promoted use of
the international online search services specially the DIALOG and the EASYNET. Most of the
organization in India having online search facilities are using GPSS facilities instead of PSTN
lines in preference to the International Subscribers Trunk Dialing (STD) facility or rudimentary
International Telex Services.
The number and kinds of online databases available for remote log-in through various
international search services are increasing constantly. More than 4,000 online databases are
currently available consisting of fair number of full text databases beside factual and
bibliographic databases. More-over, innovative introductions like EASYNET (of Telebase, USA)
through VSNL, India are a welcomed change to the information scenario. EASYNET, an
information gateway, facilitate online searches over a number of databases and search services
without knowing the structure of these databases or the protocols of search service involved.
80
BIBLIOGRAPHY
Computer Networks by Tanenbaum
All about Computer Network By Manohar Lodia
Data communication By Ferozon
Websites
http://www.cisco.com
http://www.networkessential.com
http://www.google.com
http://wipro.com
81