Sunteți pe pagina 1din 45

MANAGEMENT TRAINEE R EPORT

Prepared By:

Talha Razzaq

Employee Code # 2389

Department of Information Technology

Submitted to:
SHEHZAD AFZAL CHEEMA Sb
(GGM HR)

1|Page
People are not perfect in all the context of this life. They have a limited mind
and thinking approaches. It is the guidance from the almighty Allah on the behalf
of his prophet Hazrat Muhammad (SAW) that shows the man light in the darkness
and the person finds his way by this light, person is nothing but a helpless
creative. Thanks to Allah Almighty for giving us such a beautiful opportunity and
enabling us to complete my project.

The work presented in this manuscript was accomplished under the guidance and
enlightened supervision of Venerated Mr. SHEHZAD AFZAL CHEEMA Sb (GGM HR).

And i would like to express sincere and heartiest thanks to my seniors, especially

For Mr. Adnan sb (Senior Manager Networking) & Mr. Liaqat sb (Assistant
Manager Networking) who made me able to work in this field.

I am also thankful to my brother Kamran Razzaq for their moral support and
encouragement day to day.

Finally, I wish to offer my sincere and heartily feelings of thanks to my loving


parents, who supported me with lovely attitude and long patients for completing
my education and whom innocent sincere prayers led me to my success
throughout my life.

2|Page
Half a century ago, a textile trading family, known as the Sadaqat family started their
textile business, in a small suburb; Chiniot, near Pakistan's famous Textile city Faisalabad. The
newly established business was based on the core values of honesty and quality in business.

Sadaqat Limited has a long history of successful business operations based on highly
professional and ethical practices, focused to achieve total customer satisfaction. Recognized as
one of the major industrial business concern in Pakistan, Sadaqat is astutely diversified and
includes manufacturing operations in home textiles. The management of the company is
committed to the maintenance of international standards, along with a continuous effort in
actually raising acceptable norms of quality and services in order to be dynamic and at the same
time successfully meet the new challenges of ever changing business environment by adopting
pro-active behavior.

Sadaqat Limited aims to represent the quintessential heritage of Pakistan and assimilate it with the
latest trends prevalent in the home textile industry. With more than half a century of enriched
experience and enchanting spectrum of home textile has earned Sadaqat numerous patrons all
across the world.

GLOBAL VISION

New technologies and open trade laws have allowed the global market to be better
connected, cohesive and significantly smaller for premier international businesses. At
Sadaqat Ltd, we take these open markets as opportunities towards acquiring a more
diverse clientele, and have positioned ourselves as a truly international company
through various measures. To be responsive to the demands of a global economy, we
have invested heavily in our infrastructure by growing our global presence and
3|Page
improving our logistical operations.
We aim in continuing to strengthen exports from Pakistan by strictly adhering to
quality standards for weaving, dyeing,finishing and all other processes. Furthermore,
we strive to raise the benchmark of the quality of product representing Pakistan in the
global textile market by taking stringent measures for quality assurance.

CEO'S MESSAGE

We at Sadaqat Ltd believe in only providing the best.We also believe in challenging
ourselves to strive for excellence! We are continuously innovating to improve our
systems, services, processes and quality of our products. It is due to this consistent
dedication towards innovation that we have gained our success, name and credibility
in the home textiles industry.
Sadaqat Ltd, founded in 1951; is, today, a diversified company with sales of over 150
Million US dollars. Our management team consists of the best to offer the
organization, and our competent and dedicated workforce ensures that all our
customer needs are met to their complete satisfaction.
The home textiles industry is an ever-changing one; the processes, standards, products
and competition are constantly shifting; and to succeed, we adapt ourselves to always
remain ahead of the curve. Amongst all this change, what remains constant is our
commitment to provide exceptional quality products, services and experiences to all
stakeholders involved

Tel: +92 41 111 010 111

SADAQAT LIMITED 2KM, SAHIANWALA ROAD, KHURRIANWALA, FAISALABAD 37630


PAKISTAN

4|Page
INFORMATION TECHNOLOGY
(IT) DEPARTMENT

5|Page
Computer network

A computer network is a digital telecommunications network which allows


nodes to share resources. In computer networks, computing devices
exchange data with each other using connections between nodes. These
data links are established over cable media such as wires or optic cables,
or wireless media such as Wi-Fi.

The increasing scope of communication has led to much advancement in


the networking field and in its relative industries like hardware, software
manufacturing and integration. As a result, most households have access
to one or more networks. There are three broad network types:

 Local Area Network (LAN):

Used to serve a small number of people located in a small geographical


space. Peer-to-peer or client server networking methods can be
employed.
6|Page
 Wide Area Network (WAN):

Formed to connect a computer with its peripheral resources across a


large geographical area.

 Wireless Local Area Network (WLAN)/Wireless Wide Area Network


(WWAN):

7|Page
Formed without the use
of wires or physical
media to connect hosts with the server. The data is transferred over
radio transceivers.

Network packet

Computer communication links that do not support packets, such as


traditional point-to-point telecommunication links, simply transmit data as a bit
stream. However, the overwhelming majority of computer networks carry their
data in packets. A network packet is a formatted unit of data (a list of bits or
bytes, usually a few tens of bytes to a few kilobytes long) carried by a packet-
switched network. Packets are sent through the network to their destination.
Once the packets arrive they are reassembled into their original message.

8|Page
Network topology

Network topology is the arrangement of the elements of a communication


network. Network topology can be used to define or describe the arrangement of
various types of telecommunication networks, including command and control
radio networks, industrial fieldbusses, and computer networks. Network
topologies are:

 BUS Topology
 RING Topology
 STAR Topology
 MESH Topology
 TREE Topology
 HYBRID Topology

BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called Linear
Bus topology.

9|Page
RING Topology
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbours for
each device.

STAR Topology
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.

10 | P a g e
MESH Topology

A mesh network is a local network topology in which the infrastructure nodes connect
directly, dynamically and non-hierarchically to as many other nodes as possible and
cooperate with one another to efficiently route data from/to clients

TREE
Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy.

11 | P a g e
HYBRID Topology

It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring
topology and star topology).

12 | P a g e
Sadaqat Limited Network Summary

13 | P a g e
The Network Summary of Sadaqat Limited is monitored by accessing:
http://192.168.2.103:8090

 192.168.2.103 is URL address


 8090 is port number

Virtual server machine


A virtual machine server (VM server) hosts or runs virtual machines that run various
operating systems and act as full computing platforms on their own through emulation
and virtualization.
 DB: 192.168.0.3

 HR-ATT: 192.168.2.19

 MAIL SG: 192.168.2.2

 MAIL SGL: 210.56.22.51

 PDC: 192.168.2.3

 MAILSWI: 210.56.22.53

 ADC: 192.168.2.4

 SL-FS: 192.168.2.23

 SophosFW: 192.168.2.5

 RPRO: 192.168.2.30

 Alerts: 192.168.2.7

 VEEAM-LEG: 192.168.2.61

 MailKhas: 192.168.2.8

 SAP-VEEAM: 192.168.2.62

 Packages: 192.168.2.10

 VCenter: 192.168.2.60
14 | P a g e
Network Switch

A network switch (also called switching hub, bridging hub, officially MAC bridge[1]) is a computer
networking device that connects devices on a computer network by using packet switching to
receive, process, and forward data to the destination device.

Type of Network Switch:

Unmanageable Switch:
Unmanaged network switches are frequently used in home networks, small companies and
businesses. It permits devices on the network to connect with each other, such as computer to
computer or printer to computer in one location. An unmanaged switch does not necessarily
need to be configured or watched. It is simple and easy to set up.

Manageable Switch:
Compared to unmanaged switches, the advantage of managed switches is that they can be
customized to enhance the functionality of a certain network. They offer some features like QoS
(Quality of Service), Simple Network Management Protocol (SNMP) and so on. These types of
switches in networking can support a range of advanced features designed to be controlled by a
professional administrator.

15 | P a g e
PoE Switch:
PoE Gigabit Ethernet switch is a network switch that utilizes Power over Ethernet technology.
When connected with multiple other network devices, PoE switches can support power and data
transmission over one network cable at the same time. This greatly simplifies the cabling
process. These types of switches in networking provide greater flexibility and you will never have
to worry about power outlet when deploying network devices.

HOW Network Switch Works?

Our network switches are connected by uplink, All computers and switches are
connected by twisted pair cable.

Our Network work on STAR topology, all the computers are connected to a single
hub through a cable. This hub is the central node and all others nodes are connected to
the central node.

If uplink of one switch is down, it causes to down the entire systems.

The manageable switch needs electric power supply to function.

The manageable switch are configured according to VLAN as we needed.

16 | P a g e
What is VLAN?
A virtual LAN is any broadcast domain that is partitioned and isolated in a computer
network at the data link layer. LAN is the abbreviation for local area network and in this
context virtual refers to a physical object recreated and altered by additional logic.

What is IP?
An Internet Protocol address is a numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for communication. An IP address
serves two principal functions: host or network interface identification and location
addressing.

IP address classes
Class 1st Octet Decimal Range Default Subnet Mask

A 1 – 126* 255.0.0.0
B 128 – 191 255.255.0.0
17 | P a g e
C 192 – 223 255.255.255.0
D 224 – 239 Reserved for Multicasting

Class ‘C’ of IP address:

As IP address consist of 4 bytes, Each bytes has 8 bits.


In Class C, First three bytes of IP address is reserved for Network ID and last byte
reserved for Host.

Network Host

192.168.6.11
18 | P a g e
Ethernet
Ethernet is the technology that is most commonly
used in wired local area networks (LANs). A LAN
is a network of computers and other electronic
devices

that covers a small area such as a room, office, or


building.

How Straight Connection & Crossover Connection Works?

19 | P a g e
Equipment That We Use
RJ-45 Connector:
RJ45 is a type of connector commonly used for Ethernet networking.
It looks similar to a telephone jack, but is slightly wider. Since
Ethernet cables have an RJ45 connector on each end, Ethernet cables
are sometimes also called RJ45 cables.

Category 6 Cable (Cat-6):

Category 6 cable, commonly referred to as Cat 6, is a standardized


twisted pair cable for Ethernet and other network physical layers
that is backward compatible with the Category 5/5e and Category
3 cable standards

Rj-45 Crimping Tool:

A crimping tool is a device used to conjoin two pieces of metal by


deforming one or both of them in a way that causes them to hold
each other. The result of thetool's work is called a crimp. A good
example ofcrimping is the process of affixing a connector to the end of a cable.

Cable Tester:

A cable tester is an electronic device used to verify the electrical


connections in a signal cable or other wired assembly. Basic cable
testers are continuity testers that verify the existence of a
conductive path between ends of the cable, and verify the correct
wiring of connectors on the cable.

20 | P a g e
IT Server Room
Computer Server:
A server is a computer program or device that provides a service to another computer
program and its user, also known as the client. In a data center, the physical computer that a
server program runs on is also frequently referred to as a server. That machine may be
a dedicated server or it may be used for other purposes as well.

Types of Computer Server in IT Room:

 SAP Server

The SAP Server store and maintain record of SAP (System Application and products) – ERP.

 Legacy Server

The Legacy Server store and maintains record of ORACLE Database system.

21 | P a g e
Mail SG:

The Mai SG server control and manage send & receive of Emails.
M-Daemon is used for Email server. It is accessed by URL:
http://192.168.2.2:3000/

M Daemon:

M Daemon Email Server is an email server application with groupware functions


for Microsoft Windows,
M daemon supports multiple client-side protocols,
including IMAP, POP3, SMTP/MSA, webmail, CalDAV, CardDAV, and

22 | P a g e
optionally ActiveSync for mobile clients and Outlook, and its Connector for
Outlook add-on.

Mail Server KHAS:

To view KHAS MAIL M DAEMON panel http://192.168.2.8:3000/

23 | P a g e
Domain Server:

A domain controller (DC) is a server that responds to security authentication


requests within a Windows Server domain. ... A domain controller is the
centerpiece of the Windows Active Directory service. It authenticates users,
stores user account information and enforces security policy for a
Windows domain.

24 | P a g e
Sadaqat Limited Conference Room

A conference room, or meeting room is a room provided for singular events such
as business conferences and meetings.

Accessories Use in Conference Room

 Life-Size Device
 Display Projector

25 | P a g e
Life-Size Cloud Device

A professional line of audio and video conferencing equipment is engineered to


give you an amazing meeting experience. Setup is plug and play, controls are
intuitive and the user experience is unmatched.

26 | P a g e
Attendance Machine System

A biometric device is a security identification and authentication device. Such


devices use automated methods of verifying or recognizing the identity of a living
person based on a physiological or behavioral characteristic. These characteristics
include fingerprints, facial images, iris and voice recognition.

MP 4800 is a fingerprint authentication device,


specially designed to provide personal identification,
preventing Identity theft, fraud, and unauthorized
access. This is also a great tools for Time - Attendance
management system with sophisticated features that
suit your requirements.

27 | P a g e
How it works?
Biometric finger print scanner system works very efficiently and quickly as
you can read in below described steps. For identification process a biometric
physiological finger Scanner works on two basic principles.
 First, it takes an image of a finger.
 Then finger scanner save specific characteristics of every unique finger
and saved in the form of biometric encrypt key.
 Actually finger print scanner never saves images of a finger only series
of binary code for verification purpose.

 No one can change the algorithm into an image so it is totally


impossible to duplicate your finger prints so no need to worry about it.
 Secondly the biometric attendance system determines whether the
pattern of ridges and valleys in this image matches the pattern of ridges
and valleys in pre-scanned images.
 So now fingerprint scanner is operational and you can easily manage
employee’s attendance and every aspect related to time.

28 | P a g e
IP 192.168.6.25

LAN wire

CPU

IP
192.168.6.30

Network Switch

Server Room

Advantages of Using Biometric Attendance System Works

There are so many advantages of using biometric attendance system works.


Read below how biometric system can be beneficial for your organization
and advantages of using it are
 Installation system of biometric attendance system is easy.
 Biometric time attendance system works very quickly and its user interface
is very friendly.
 Biometric attendance system stops buddy punching like cards or PIN
passwords.
 Accuracy rate of the biometrics attendance system is very high.
 Finger print scanner equipment is inexpensive.
 No one can fake or create replica your finger prints.
 Employees can miss or forget his/her attendance cards, but not the finger.
 Employees don’t need to remember long PIN, passwords and patterns.
 Attendance by biometric finger scanner is fast process it hardly take 1 to 5
seconds only.
 Attendance by biometric scanner gives you always accurate data record.
 Biometric attendance system can easily reject an unauthorized person within
no time.

29 | P a g e
SOFTWARE DEVELOPMENT

30 | P a g e
Oracle Database

Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is


a proprietary multi-model database[4] management system produced and
marketed by Oracle Corporation.
It is a database commonly used for running online transaction processing
(OLTP), data warehousing (DW) and mixed (OLTP & DW) database workloads. The
latest generation, Oracle Database 18c, is available on-prem, on-Cloud, or in a
hybrid-Cloud environment. 18c may also be deployed on Oracle Engineered
Systems (e.g. Exadata) on-prem, on Oracle (public) Cloud or (private) Cloud at
Customer. At Openworld 2017 in San Francisco, Executive Chairman of the Board
and CTO, Larry Ellison announced the next database generation, Oracle
Autonomous Database.

Oracle database (Oracle DB) is a relational database management


system (RDBMS) from the Oracle Corporation. Oracle DB is one of the
most trusted and widely-used relational database engines.
The system is built around a relational database framework in which data
objects may be directly accessed by users (or an application front end)
through structured query language (SQL). Oracle is a fully scalable
relational database architecture and is often used by global enterprises,
which manage and process data across wide and local area networks. The
Oracle database has its own network component to allow communications
across networks.
Oracle DB is also known as Oracle RDBMS and, sometimes, just Oracle.

31 | P a g e
Oracle Form Developer

Oracle Forms, a component of Oracle Fusion Middleware, is Oracle's long-


established technology to design and build enterprise applications quickly and
efficiently. Are you using an old version of Oracle Forms? Upgrade today and
take advantage of the many new features and performance improvements found
in the latest version.

Oracle Form Builder is using for making data entry form or screens. By using
Oracle Form Builder we can make any type of data entry screen that will use for
any purpose.

32 | P a g e
Oracle Report Developer
Oracle Reports, a component of Oracle Fusion Middleware is Oracle's award-
winning, high-fidelity enterprise reporting tool. It enables businesses to provide
instant access to information to all levels within and outside of the organization in
a scalable and secure environment. Oracle Reports consists of Oracle Reports
Developer - a powerful, declarative WYSIWYG reports design tool and a JEE 5
based Oracle Reports Server with multi-tier architecture to access any data
sources, generate reports in any popular format for web and paper, and to burst
and distribute reports to any destination. Oracle remains committed to the
development of this technology, and to the ongoing release as a component of
the Oracle Fusion Middleware platform.

Oracle Reports is a tool for developing reports against data stored in an Oracle
database. Oracle Reports consists of Oracle Reports Developer (a component of
the Oracle Developer Suite) and Oracle Application Server Reports Services (a
component of the Oracle Application Server).

33 | P a g e
SAP – ERP DEPARTMENT

34 | P a g e
SAP ERP

SAP ERP is an enterprise resource planning software developed by the German


company SAP SE. SAP ERP incorporates the key business functions of an
organization. The latest version (SAP ERP 6.0) was made available in 2006. The
most recent Enhancement Package (EHP8) for SAP ERP 6.0 was released in 2016.
Business Processes included in SAP ERP are Operations
(Sales & Distribution, Materials Management, Production Planning, Logistics
Execution, and Quality Management), Financials (Financial
Accounting, Management Accounting, Financial Supply Chain
Management), Human Capital Management (Training, Payroll, e-Recruiting)
and Corporate Services (Travel Management, Environment, Health and Safety,
and Real-Estate Management).

35 | P a g e
SAP stands for Systems Applications and Products in Data Processing. SAP system
consists of a number of fully integrated modules, which covers virtually every
aspect of the business management.

SAP is #1 in the ERP market. As of 2010, SAP has more than 140,000 installations
worldwide, over 25 industry-specific business solutions and more than 75,000
customers in 120 countries

Other Competitive products of SAP Software in the market are Oracle, Microsoft
Dynamics etc.

How Does SAP Work?

SAP software products provide powerful instruments for helping companies to


manage their financials, logistics, human resources, and other business areas. The
backbone of SAP software offering is SAP ERP system which is the most advanced
Enterprise Resource Planning (ERP) system from currently available ones. SAP has
evolved to offer application software for supporting complex business
functionality and in this post we are going to explain (on high level) how does SAP
work.

SAP System Architecture

SAP ERP system is commonly structured in a three-tier client/server architecture.


The three-tier architecture is the recommended one because it enables high
scalability and flexibility but SAP can also be deployed on two- and one-tier
architectures. Beow figure provides a graphical illustration of the differences
between these architectures.

36 | P a g e
In the three-tier SAP architecture, the presentation tier provides the interface to
the user, the application tier processes the business logic, and the database tier
stores the business data.

The Presentation Tier

The presentation tier is typically located on PCs of business users and provides the
SAP Graphical Interface (SAP GUI). SAP GUI is a lightweight application that can be
installed on any computer running MS Windows or Mac OS and it provides the
interface for communication between the user and the SAP ERP system.

The Application Tier

The application tier is basically the heart of the SAP ERP system. It executes the
business logic, responsible for processing client transactions, print jobs, running
reports, coordinating access to the database, and interfacing with other

37 | P a g e
applications. It is possible to distribute the application logic between several server
machines in situations when the load exceeds processing power of a single server.

The Database Tier

The database is used for storing two types of objects: the business-generated data
and the SAP application programs. The business-generated data represents data
objects created by users as part of various business processes. For instance, sales
orders or customer master records are classified as the business-generated data.
SAP application programs are routines written in ABAP (special programming
language used in SAP) that are loaded into the SAP application servers from the
database at runtime.

38 | P a g e
Above these tiers, SAP architecture can be further segmented into several
application modules. Each module contains the SAP application programs and
business data related to a specific business area such as financial accounting
(FI) or materials management (MM). Figure 2 illustrates the application modules
which are included into the SAP ERP system.
Although SAP application modules cover completely different business process and
business areas, technically they work in a similar manner. The difference is only in
ABAP programs and data tables that are used in each of these modules of SAP. For
this reason, our article is not going to focus on any particular SAP module but will
instead explain how does SAP work with the three-tier architecture in general.

How Does SAP Work?

Now that we know what are the components and tiers of the SAP ERP system, let
us see how does SAP work. As it was explained above, the heart (or kernel) of the
SAP system is in the application tier (application server). The application server gets
input from and displays output to the presentation tier (SAP GUI). Furthermore, it
stores data in the database tier.

1. A request arrives from the presentation tier (it can be an online request from a
user or a request related to a batch job or anything else).
2. This request is analyzed by the dispatcher of the SAP central instance.
3. The dispatcher passes the request to the message process (M).
4. The message process (M) decided whether this request should be processed on
this instance or needs to be forwarded to a different instance (for example, an
instance with a lower computing load).
5. If the request remains at the same instance, it is put in one of the work processes
of the appropriate type (for instance, if it an online request from a user, it should
be placed in the dialog work process).
6. The request gets processed by the work process, and if necessary, the SAP
system will commit an update to the database through the enqueuer server (E).
7. The feedback about outcome of the request is delivered back to the originator
of the request in a reversed order.

39 | P a g e
SMART MRT

40 | P a g e
Smart- MRT is a unit production hanger system that acts as an all-efficient
workflow manager by
Dramatically expanding your existing production capacity while cutting down
throughput time, thus reducing your overhead costs and increasing your
profits. With Smart- MRT’s highly advanced
computerized system that tracks and records every stage of production in real-
time, your workflow is made simple, neat and effortless. The result: cheaper,
better and faster production that is guaranteed to be an everlasting delight to
you, your workers and your clients.

41 | P a g e
1. Worker loads the pieces in a hanger from the loading station
2. The hanger routes to the next station
3. Product is put together at every stage at each subsequent
sewing station
4. Product gets checked at the quality & control station (in line)
5. Product continues to be pieced together at the next subsequent
stations
6. Final product gets checked and approved
7. Approved product lands at the unloading station
8. Empty hanger returns to the loading station

Workers can log-off and shift workers log-in easily since production is calculated automatically
Easily handles multiple designs, small and huge orders

Smart Functions
High-resistant, solid metal structure that is adaptable to varying factory conditions

42 | P a g e
Flexible hangers made of industry-strength ABS plastic that can withstand harsh working
conditions
Microchip attached to each hanger that stores data swiftly into the main CPU
Low maintenance required
Easy-to-use control panels
Collection of real-time data via strong anti-interference RFID technology
Aautomatically records each worker’s working hours
Customizable to fit manufacturer’s operations, onsite layout and conditions
Detects defective product and automatically returns it to the originating
work station

Sensitive safety features that can detect technical faults

43 | P a g e
Smart MRT is suitable for all sorts of fabrics including clothes, swimwear, knitwear, apparel
accessories, lingerie, bags, bed sheets, pillow cases, textiles, blankets, curtains, upholstery etc.
The hangers are made of flexible industry-strength ABS plastic that is firm yet gentle on the
fabrics.

44 | P a g e
Thank You

45 | P a g e

S-ar putea să vă placă și