Vous êtes sur la page 1sur 91

TRAINING REPORT

OF

SIX MONTHS INDUSTRIAL TRAINING, UNDERTAKEN

AT

NESTLE INDIA LTD.MOGA

IN

NETWORKING

ON

IPv6

OF

BACHELOR OF TECHNOLOGY

IN

Computer Science and Engineering

Under the Guidance of: Submitted By:

Name: Mr.V.S CHAUHAN Name: RITESH KUMAR

Designation: IT MANAGER College Roll No.:E101091

Department: IT University Roll No.:100180305226

CHANDIGARH-PATIALA NATIONAL HIGHWAY,

VILL. JHANSLA, TEHSIL RAJPURA, DISTT. PATIALA 140401


ACKNOWLEDGEMENT

The 16 weeks Industrial Training is a part of my course curriculum of B. TECH (COMPUTER

SCIENCE), which I am pursuing at DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

AT CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY, RAJPURA (PUNJAB).so I

am thankful to all the authorities of my institute, who design our course curriculum, as this

training helps us to update our knowledge & built a practical approach.

I would like to express my indebtedness to Mr. S. Srinivasan (Factory Manager), Dr. B.S.

Bhullar (Sr. Manager -Corporate Affairs & I.R)Ms. Rupika Singh (H.R manager) for

permitting me to undergo my training at Nestle India Ltd., Moga Factory.

I shall be failing in my duty if I do not acknowledge the help extended by Mr V.S

CHAUHAN(IT MANAGER) ER PANKAJ &Mr DALJEET SINGH , other officers and supervisors.

I would like to acknowledge the warmth, affection and co-operation by the operators and

workers of Nestle India Ltd.

Finally I would like to say that without the help of above-mentioned people, my stay at

industry would not have been such a memorable period itched in my memory as sweet

experience.
EXECUTIVE SUMMARY

This document dwells upon my project training at esteemed and worldwide organization

NESTLE INDIA LTD. from 6.1.2014 to 15.05.2014. This training is a part of my course

curriculum pursuing at DEPARTMENT OF COMPUTER SCIENCE ENGINEERING AT

CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY,RAJPURA(PUNJAB). In these

four months of my training I learnt about the commitment of the company towards quality

of the food stuff it produces, more than sufficient efforts are made by the company and its

employees at every critical point of production that assures the quality of the products that

reaches to the consumers. It gives me immense pleasure to present this project report.

My training in this esteemed organization helped me to know & learn the practical aspects

of industrial performance, theoretical part of which we studied in our course books.

Learning in nestle was not limited to doing project. I was involved in understanding the

culture of company, learning various processes, way the people co-ordinate with each

other & effects of teamwork. Some other results of my training are better communication,

enhanced confidence & more practical outlook towards life.

In the end, I would like to say that my experience in this factory would be an indispensable

one throughout my life & I would like to thank all of them once again who have made it that

way.
TO WHOM IT MAY CONCERN:

Mr. RITESH KUMAR is the student of, DEPARTMENT OF COMPUTER SCIENCE


ENGINEERING AT CHITKARA INSTITUTE OF ENGINEERIMG AND TECHNOLOGY,
RAJPURA(PUNJAB). I learnt and he has completed his Industrial Training (from 6th
January, 2014 to 15th MAY, 2014) in Nestle India Ltd, Moga Factory under my guidance. I
have checked this report & the information contained in the report is genuine to my
knowledge.

Mr . V.S CHAUHAN

(IT MANAGER)
TABLE OF CONTENTS
Introduction to company
Nestle History
Nestle logo
Operation In INDIA
MOGA Factory
Various Deptt. In Nestle MOGA Factory
1.Acknowledgement
Chapter-1
INTERNETWORKING BASICS
o What is Computer Network?
Types of networks
o 1.2(a) Local area network (LAN)
o 1.2(b) Wide Area Network (WAN)
o 1.2(e) Metropolitan area network (MAN)
o 1.2(f) Virtual private network (VPN)
CHAPTER-2
o DEVICES
2.1 DEVICES-:
2.1(a) Router
2.1(b) Switches
2.1(c)Hub
2.1(d)Bridge
CHAPTER-3
o ROUTING BASICS
3.1 ROUTING
3.2 STATIC ROUTING
3.3 Default Routing
3.4 Dynamic Routing
3.5 Autonomous system
3.6 Distance Vector Routing
3.7 Metric of Dynamic Routing
CHAPTER-4
o PROTOCOLS
4.1 Routing Protocols
4.2 Routed Protocols
4.2(a) Categories of Routing Protocols
4.3 IGRP
4.4 OSPF (Open Shortest Path First) Protocol
4.5 EIGRP
CHAPTER-5

oDHCP
5.1 DHCP
5.2(a) Dynamic Allocation
5.2(b) Automatic Allocation
5.2(c) Static Allocation
5.3 DORA PROCESS
CHAPTER-6
o ACL
6.1 ACL (Access Control List)
6.2 Applying ACLs
6.3 Types of IP ACLs
6.3(a) Standard ACLs
6.3(b) Extended ACLs
CHAPTER-7
o INTER-VLAN
7.1 Understanding How InterVLAN Routing Works
CHAPTER-8
o NAT
8.1 NAT
8.2 How Network Address Translation Works??
CHAPTER-9
o SWITCHING
9.1 Switching
9.2 Classification of switches-
9.3 Basic Switch Administration
9.4 Following function and options are not similar in router and switch.
9.5 Switch Cofiguration
CHAPTER-10
o VTP(VIRTUAL TRUNKING PORT)
10.1 VTP (VLAN Trunking Protocols)
10.2 VTP Modes of Operation
10.3 VTP Servers Configuration
CHAPTER-11
o VLANs
o 11.1 VLANs
o 11.2 INTER-VLAN
11.2(a) Understanding How Inter-VLAN Routing Works
o 11.3 Trunking
o 11.4VLAN Configuration
CHAPTER-12
CONCLUSION
LIST OF FIGURES

Figure-2.1 Router
Figure-2.2 Switches
Figure-2.3 Hub
Figure-2.4 Bridge
Figure-3.1 Configuring Static Routes by Specifying Outgoing Interfaces
Figure-3.2(a) & Figure-3.2(b) Configuring Static Routes by Specifying Next-Hop Addresses
Figure-3.3 Router
Figure-4.1 Routed protocol transport
Figure-4.2 Configuring RIP example
Figure-4.3 Configuring OSPF on Internal Routers of a Single Area
Figure-4.4 Configuring EIGRP
Figure-5.1 Snapshot Of DHCP
Figure-6.1 Applying ACLs
Figure:-7.1 Basic InterVLAN Routing Topology
Figure-8.1 NAT purposes
Figure-8.2 How Network Address Translation Works??
Figure-9.1 MAC Address table
Figure-9.2 Switch Configuration
Figure-10.1 VTPs Server Configuration
Figure-11.1 VLANs Configuration
LIST OF TABLES

Table-4.1 Comparing routing methods


Table-4.2 Characteristics of routing protocols
Introduction To Company

MR. HENRY NESTLE

FOUNDEROF NESTLE
1.1 Company Profile:

A WORD ABOUT NESTL - THE NEST

Nestl India is a multinational company with its worldwide operations in over 70


countries .The founder of Nestl was Henry Nestle who from a modest beginning
founded the company in 1866 at Switzerland for manufacturing milk powders for
babies. At that time Switzerland faced one of the highest infant mortality rates and
the milk formula saved the lives of many infants whose mothers were unable to
breast feed successfully.

At present Nestl is the worlds largest food company with its international
headquarters at Vevey, Switzerland, with almost 500 factories world wide it
employs almost 2 30,000 people.

Nestl is often quoted by most as multinational of multinationals. There is a good


reason, as less than 2% of the turnover comes from the domestic market in
Switzerland.

Nestl is much decentralized in its operations and most of the markets are given
considerable autonomy in its operation. It is more of a people and products
oriented company rather than systems oriented company there are unwritten
guidelines which are to be followed, based on common senses and a strong set of
moral principals emphasizing a lot of respect for fellow beings.

Nestl has always adapted to the local conditions and at the same time integrates
its Swiss heritage. It has always taken a long-term view in the countries in which it
operates.

Therefore, one can see a lot of investment R&D and risk taken in new product
areas. There is a great emphasis placed on training by the company. It believes in
rewarding and promoting people from within.

Today its product brand name Nestl is associated with quality products in
worldwide consumer markets.
When Henry Nestle introduced the first commercial infant formula in 1867, he also
created a symbol of the Birds nest, graphic translation of his name, which
personifies the companys business. The symbol, which is universally understood,
evokes security, motherhood and affection, nature and nourishment, family and
tradition. Today it is the central element of Nestls corporate identity and closely
parallels the companys corporate values and culture.

1.2 NESTLE STORY

Nestl was founded in 1867 on the shores of Lake Geneva in Vevey, Switzerland and its first
product was FarineLacte Nestl, an infant cereal specially formulated by Henri Nestl to
provide and improve infant nutrition. From its first historic merger with the Anglo-Swiss
Condensed Milk Company in 1905, Nestl has grown to become the worlds largest and
most diversified food Company, and is about twice the size of its nearest competitor in the
food and beverages sector.

Nestls trademark of birds in a nest, derived from Henri Nestls personal coat of arms,
evokes the values upon which he founded his Company. Namely, the values of security,
maternity and affection, nature and nourishment, family and tradition. Today, it is not only
the central element of Nestls corporate identity but serves to define the Companys
products, responsibilities, business practices, ethics and goals.

In 2004, Nestl had around 247,000 employees worldwide, operated 500 factories in
approx. 100 countries and offered over 8,000 products to millions of consumers
universally. The Companys transparent business practices, pioneering environment policy
and respect for the fundamental values of different cultures have earned it an enviable
place in the countries it operates in. Nestls activities contribute to and nurture the
sustainable economic development of people, communities and nations. Above all, Nestl is
dedicated to bringing the joy of Good Food, Good Life to people throughout their lives,
throughout the world.
1.3 NESTLE HISTORY

The Nestl Company was Henry Nestl's search for a healthy, economical alternative to
breastfeeding for mothers who could not feed their infants at the breast.
The Company formed by the 1905 merger was called the Nestl and Anglo- Swiss Milk
Company. The close of World War II marked the beginning of the most dynamic phase of
Nestl's history.
In 1947, Nestl merged with Alimentana S.A., the manufacturer of Maggi seasonings and
soups, becoming Nestl Alimentana Company. After the agreement with LOreal in 1974,
Nestl's overall position changed rapidly.
Between 1975 and 1977, the price of coffee beans quadrupled, and the price of cocoa
tripled.
Nestl approached the 1980s with a renewed flexibility and determination to evolve.
Thus, between 1980 and 1984, the Company divested a number of non-strategic or
unprofitable businesses. Nestl managed to put an end to a serious controversy over its
marketing of infant formula.
Nestl opened the 20th century by merging with the Anglo-Swiss Condensed Milk
Company to broaden its product range and widen its geographical scope. In the new
millennium, Nestl is the undisputed leader in the food industry, with more than 470
factories around the world. Nestl's existing products will grow through innovation and
renovation.
1.3.1 HISTORICAL DEVELOPMENT

Sr.No. Year Achievements

1 1866 Company's foundation

Merger between Nestl and Anglo-Swiss Condensed Milk


2 1905
Company

3 1929 Merger with Peter-Cailler-Kohler Chocolates Suisses S.A.

4 1947 Merger with Alimentana S.A. (Maggi)

5 1971 Merger with Ursina-Franck (Switzerland)

6 1985 Acquisition of Carnation (USA)

7 1988 Acquisition of Buitoni-Perugina (Italy)

8 1988 Acquisition of Rowntree (GB)

9 1992 Acquisition of Perrier (France)

Nestl acquires Victor Schmidt &Shne, Austria's oldest


10 1995 producer of confectionery, including the famous
'Mozartkugeln'.

Nestl, through the Perrier Vittel Group, expands its mineral


11 1997 water activities with the outright acquisition of San
Pellegrino.

Nestl acquires Spillers Pet foods of the UK and strengthens


12 1998 position in the pet food business which began in 1985 with
the acquisition of the Carnation Friskies brand.

Divestiture of Findus brand (except in Switzerland and Italy)


13 1999
and parts of Nestl's frozen food business in Europe.

14 Divestiture of Hills Bros, MJB and Chase & Sanborn roast and ground
1999
coffee brands (USA).

15 2000 Acquisition of Power Bar.

Nestl acquires Ralston Purina - Nestl Purina Pet Care


16 2001
Company established.
17 2002 Perrier Vittel Group re-named as Nestl Waters.

18 2006 Pantnagar plant starts manufacturing noodles.

19 2008 Cup noodle starts at Moga plant

1.4 NESTLE MISSION STATEMENT

At Nestl, we believe that research can help us make better food so that people live a better
life.

Good Food is the primary source of Good Health throughout life. We strive to bring
consumers foods that are safe, of high quality and provide optimal nutrition to meet
physiological needs. In addition to nutrition, health and wellness, Nestl products bring
consumers the vital ingredients of taste and pleasure.

As consumers continue to make choices regarding foods and beverages they consume,
Nestl helps provide selections for all individual taste and lifestyle preferences.

Research is a key part of our heritage at Nestl and an essential element our future. We
know there is still much to discover about health, wellness and the role of food in our lives,
and we continue to search for answers to bring consumers Good Food for Good Life.
1.5 NESTLE LOGO

The Nestl logo was launched by Henri Nestl in 1868 on the


basis of the meaning of his name in German, i.e. little nest, and
of his family emblem (that you can see here).

Henri obtained a 15-year French patent for his logo in 1868.


After he retired, it was registered in Vevey in 1875 by the new
owners of his company.

In 1938, the traditional nest design was combined with the


"Nestl" name to form what is called the combined mark.

In 1966 the design was simplified.

In 1988, the worm in the mother bird's beak was removed and
the fledglings became two instead of three. It is said that it was
meant to better illustrate the activities of the company, no
longer active only in utrition, and to reflect the average modern
family of two children.

The logo we know now has just been simplified.

The tree is supposed to represent an oak and the birds thrushes.


1.6 NESTL -TODAY
Some names seem to belong to legend and Nestl now synonymous with a prestigious
trademark and worlds foremost food group originally consisted of two companies Henry
Nestle of Vevey Switzerland & Anglo Swiss Condensed Milk Company in Cham. Both
companies competed vigorously from 1866- 1905. These groups merged in 1905 and become
the starting point of the recent food group.
Nestl is now the No. 1 Food Company. It is present on all five continents has an annual
turnover of nearly 89.2 Billion Swiss Francs is present on all five continents. At present there
are around 508 factories spread over 80 countries with around 260 operating companies One
basic research center and 17 technological development groups and has in excess of 2,30,000
employees.
Nestl operations worldwide are divides into 3 zones:-
ZONE EUR : Europe
ZONE AOA : Asia and Oceanic
ZONE AMS : Americas
India comes under zone AOA which includes South- East Asian trading giants of the likes of
Thailand, Indonesia, Malaysia, Singapore, China etc. besides Australia. Mr. M.W. Garret
currently heads ZONE AOA.
Currently Mr. Peter Brabeck heads the Nestle group worldwide and Mr. M.W. Garret heads
zone AOA 28%
Beverages

6%
Pharmaceuticals
27%
14%
Chocolate
Milk Products

Confectionery
Nutrition

Biscuits
Ice Cream

25%
Cooking Aids
Prepared dishes
Pet Care SALE BY PRODUCT GROUP

Fig1.1: Sale By product Group


%
1.7 NESTLE INDIA

Nestls relationship with India dates back to 1912, when it began trading as The Nestl
Anglo-Swiss Condensed Milk Company (Export) Limited, importing and selling finished
products in the Indian market.

After Indias independence in 1947, the economic policies of the Indian Government
emphasized the need for local production. Nestl responded to Indias aspirations by
forming a company in India and set up its first factory in 1961 at Moga, Punjab, where the
Government wanted Nestl to develop the milk economy. Progress in Moga required the
introduction of Nestls Agricultural Services to educate advice and help the farmer in a
variety of aspects. From increasing the milk yield of their cows through improved dairy
farming methods, to irrigation, scientific crop management practices and helping with the
procurement of bank loans. Nestl set up milk collection centers that would not only
ensure prompt collection and pay fair prices, but also instill amongst the community, a
confidence in the dairy business.

Nestl has been a partner in Indias growth for over nine decades now and has built a very
special relationship of trust and commitment with the people of India. The Companys
activities in India have facilitated direct and indirect employment and provides livelihood
to about one million people including farmers, suppliers of packaging materials, services
and other goods.

Nestl India manufactures products of truly international quality under internationally


famous brand names such as NESCAFE, MAGGI, MILKY BAR, MILO, KIT KAT, BAR-ONE,
MILKMAID and NESTEA and in recent years the Company has also introduced products of
daily consumption and use such as NESTL Milk, NESTL SLIM Milk, NESTL Fresh n
Natural Dahi and NESTL JeeraRaita.

1.7.1 OPERATIONS IN INDIA


Nestl set up its operations in India, as a trading company in 1912 and began
manufacturing at the Moga factory in 1962. The production started with the
manufacture of Milkmaid and other product was gradually brought into the fold.
Nestl India Limited was formally incorporated in 1978 prior to which the
manufacturing license was issued in the name of the Food Specialties Limited. The
corporate office is located at Gurgaon and the registered office at M -5A, Connaught
Circus, and New Delhi
At present Nestl have 7 manufacturing units countrywide which are successfully
engaged in meeting the domestic as well as the exports demand. In addition there
are several co packing units.

Fig 1.2: Factory


The Moga factory is the largest and the oldest in producing the widest range of
food products.
Presently Nestl India employs over 3000 employees. In addition, thousands of
people are associated with Nestl, having indirect employment as Milk suppliers,
Vendors, Contractors and Distributions etc.

The production group first incepted under the name Food Specialties Ltd. started
production at the Nestl Moga Factory in early 1962.At the time, with the help of
Nestle International; the company shot into prominence as the countrys foremost
producer of milk products, particularly baby foods.

The other factories are located at: -


Choladi (Tamilnadu) --Instant Tea Export 1969
Nanjangud (Karnataka) --Coffee & Milo 1989
Samalkha (Haryana) --Cereals, Milkmaid Deserts 1992
Ponda (Goa) --Chocolates & Confectionery 1995
Bicholim(Goa) --Noodles and Cold Sauces 1997
Pantnagar (Uttrakhand) --Noodles and Cold Sauces 2006
The distribution comprises of six branches located in Calcutta, Delhi, Mumbai,
Chennai, Bangalore and Chandigarh. The distribution network functions efficiently
with the transfer of goods from the factories to the mother godowns, which in turn
are transferred to the clearing and the sales agents. The C&S agents sell it to the
cash distribution, which makes the secondary sale in the market.

With time, the nature & extent of the company expanded. The product range, since
then, has now diversified so much and to such an extent that it is really a tough
task to enumerate all the products of the company on a single sheet of paper After
28 Years of working under the name of Food Specialties Ltd.

The company realized that in order to survive in the international competition and
to keep up with the changing time a better and closer relationship was required
between Nestl International and its Indian counterpart. So in 1990, a unified
production and marketing front, under the name of Nestl India was conceived

1.7.2 Nestle India-Presence across India

Beginning with its first investment in Moga in 1961, Nestls regular and substantial
investments established that it was here to stay. In 1967, Nestl set up its next factory at
Choladi (Tamil Nadu) as a pilot plant to process the tea grown in the area into soluble tea.
The Nanjangud factory (Karnataka), became operational in 1989, the Samalkha factory
(Haryana), in 1993 and in 1995 and 1997, Nestl commissioned two factories in Goa at
Ponda and Bicholim respectively. Nestl India has commissioned in 2006 its 7th factory at
Pant Nagar in Uttrakhand.
Figure: Presence across India

Fig 1.3: Locations


1.7.3 Nestle India has 8 Factories in Our Country

MOGA Factory

Moga factory started production in1962. Today, Moga


contributing almost 75% of Nestle Indias total
production volume and manufacturing 109671 tons of
food products. It employs around 1600 people. Dairy
creamers, IMF, SCM, Cereals, Vending Mixes, Noodles,
Ketchups, Bouillon are manufactured in Moga Factory.
Nanjangud Factory
Moga is located in Punjab State about 400 kilometers
North of Delhi.
Production in Nanjangud Factory started in 1989
with the manufacturing of Nescafe and Sunrise.
Milo manufacture at Nanjangud begun in 1996. It
situated 160 kilometers south of Bangalore; the
factory has around 245 employees. It
manufactures 15500 tons of Nescafe mixes, Milo.

Bicholim Factory

A satellite factory of Ponda at Bicholim for


manufacturing of Noodles and Cold Sauces, It
started their operational activity in 1997.
Ponda Factory

Ponds Factory started production of Kit Kat in


1995. It is located 40 kilometers from Panji the
capital of Goa. It manufactures Chocolates. Ponda
currently employed around 250 people.

Samalkha Factory

Samalkha Factory started production in 1993


situated 70 kilometers from Delhi. It has 260
employees and manufactures about 35000
tons of food products comprising IMFs, Infant
Cereals, Noodles, Chilled dairy.

Pant Nagar Factory

This is the one of the newly situated and the 7th


factory of the Nestle in the India. Pantnagar
Factory began production of Noodles in 2006.
Tahliwal Factory:

The 8th Factory was set up at Tahliwal, Himachal


Pradesh, in 2012. It will manufacture confectionery and
chocolates.

Choladi Factory

The factory ion Choladi started production in 1967, Situated in South Asia,
about 275 kilometers from Bangalore. The factory today has around 80
employees. It processes about 725 tons of soluble tea, which is all exported.

Beside this Nestle, India has the co-packing


arrangements also:

Chocolates Campco, Puttur

Toffees Nutrine, Surendranagar

Cold Sauce 200g Nijjer Agro Pvt. Ltd., Amritsar

Every Day Dairy Creamer Brar Co-Packer Unit, Moga

Nestl Polo Bakemans (Nagpur)

Pickles Choride foods Ltd.(Puna)

Tasters Choice Williamson Major company


(Silliguri)

Dosa&Samber mix Indian foods & fermentation Ltd. Nagpur


CHAPTER- 2

INTRODUCTION TO PRODUCT RANGE

Its activities include manufacturing and marketing of: -

Condensed milk Chocolates & Confectionery


items
Powdered milk
Tea
Ice creams
Coffee

Milk and Deities


Culinary products

Culinary Frozen products

Cereal Fruit juices

Mineral water
Instant Drink
Pet foods
Chocolates & Confectionery
Pharmaceuticals& Cosmetics
Other dairy products
Cerevita
Infant foods

2.1 BRANDS AND PRODUCTS


Beverages

NESCAFE CLASSIC is a 100% pure coffee and is made from carefully


selected coffee beans picked from the finest plantations, blended and
roasted
NESCAFE to perfection
SUNRISE to is
create the unique
an Instant rich and smooth
Coffee-Chicory NESCAFE
blend, taste.
popular for its
robust body and a flavor akin to fresh roast-and-ground coffee. The secret
lies in the right blend of flavorful coffee and roasted chicory to give you an
incomparable experience.
NESTEA Tea Bags are made from the finest blend of Assam Teas, which
give a refreshing cup of bright, coloury tea of fair strength and superior
taste. They are available both in individually enveloped and non-enveloped
formats.
A wide range of premixes for the vending machines. The basket of products
include NESCAF Classic, NESCAF Frappe, Tea Premix (Plain,
Cardamom), Hot Chocolate, Iced Tea (Lemon, Peach, Apple), and Badam
(Almond) Milk vending mixes.

We manufacture high quality Hot & Cold Water Soluble Black and Green
Tea Powders at ourstate-of-the-art factory in Choladi, located in the midst of
tea plantations which ensure availability of fresh green leaves. With their
high polyphenol content resulting in enhanced anti-oxidant properties, our
teas can be used to produce premium products, available in bulk quantities
only.

Chocolates and Confectionary

NESTL KIT KAT is delicious crisp wafer fingers covered with Choc layer. Our
special tropical zed recipe ensures that NESTL KIT KAT is preserved even in
warmer climates.

NESTL MILKY BAR is a delicious milky treat which kids love. With its Calcium
Rich recipe, NESTL MILKY BAR is a favorite with parents to treat their kids
with.

Extremely popular in India, NESTL MUNCH is wafer layer covered with


delicious Choc layer. A crispy light irresistible snack!

NESTL Milk Chocolate is a milk chocolate with a delicious taste for you to
savors.
NESTL BAR-ONE is a luscious nougat and caramel core covered with a
delicious Choc layer.

POLO is a mint roll popularly described as The Mint with the hole. Now also in
the new extra strong singles format as POLO Power mint.

Nestle Dishes & Cooking Aids

MAGGI 2-MINUTE Noodles is one of the most popular brand of instant noodles in
India. Available for export in 5 authentic Indian flavors (spicy Masala, tangy Chatpata,
Chicken, Tomato and Curry), it is a delicious anytime snack thats ready in just 2
minutes.

MAGGI
MAGGI Vegetable Atta Noodles
Chinese Noodles makesis ita unique
so simpleinnovative product
to prepare with the
delicious goodness
Indian Styleof
whole
Chinesewheat andat
Noodles real vegetables.
home in a jiffy!Available in two
Offered in the popular
exciting Masala
flavors,flavor.
Veg Chowmein

In addition to the nutrition from whole wheat, MAGGI Dal Atta Noodles offers
the goodness of Dal (lentils) in the deliciously ethnic Samber Tastemaker.

and Lemon Chicken. These packs are for export

MAGGI offers a wide range of specialty Indian Sauces which are relished for their
unique taste. Available in the following delightful variants: Tomato Ketchup,
Tomato Sauce, Tomato Chilly, Masala Chilly, Chilly Garlic, Tamarina, Tomato
Chatpata, Tomato Pudina and the all-time-favorite MAGGI Hot & Sweet Sauce.

MAGGI Taste of India Pastes are a delicate blend of traditional spices and freshly
ground pastes, offering the convenience of preparing authentic Indian recipes at
home, in no time at all! The range includes Biryani Paste, Curry Paste, Korma Paste,
Tandoori Paste and Tikka Masala Paste.
New MAGGI Healthy Soups are even more delicious, quick to prepare, convenient and
healthy. They contain real vegetables, are low fat and cholesterol free. They also do
not have added MSG, preservatives or artificial colours.

NESTL EVERYDAY Ghee is 100% pure Clarified Butter hygienically packed to


preserve its rich aroma and granular texture. As a cooking medium, NESTL
EVERYDAY Ghee helps you add that authentic ethnic aroma and flavor to
Indian preparations every time, everyday.

A Partly Skimmed Sweetened Condensed Milk, NESTL MILKMAID is a versatile


product and excellent as a dessert ingredient. With MILKMAID, you can whip
up lip-smacking desserts for your family in the shortest possible time

NESTL EVERYDAY Dairy Whitener is a creamy Dairy Whitener specially made


to add a rich, smooth taste to your tea. Every time, every day.

2.2 MOGA FACTORY

In the Malwa region of Punjab State, there is a small town, which is popularly
known among the famous grain markets of the world. However the credit of
bringing this town on the industrial map of the world goes to Nestle a Swiss
Multinational company engaged in the largest food processing operation in the
world. When in 1959 Nestl took decision to establish a milk processing factory, a
very little could the people of Moga town and the farmers in the surrounding
villages realize that the company now as Nestl India ltd. would play such an
important role in economic & social development of the area.

Fig 2.1: Moga Factory

Nestl Moga factory is the one of the oldest factory of Nestl in India. It is the first
factory of Nestl in India. It is the largest fa ctory of Nestl in India as well as in the
whole Asia Continent. This factory is the worlds Second largest factory of the
Nestl Company. The Moga factory spreads over 57acres of area.

Nestl Company set up its operations in India, as a trading company in 1912 and
began manufacturing at the Moga factory in 1961.The production starts at Moga
factory on 15th Nov, 1962. The production started with the manufacture of
Milkmaid and other products were gradually brought into the fold.

Today; Moga contributes almost 75% of Nestle Indias total production volume,
manufacturing 80,000 tons of food products. It consumes approximately 9 -10 lakhs
litres of milk. It employs 2000 people. The entire range of milks, culinary products
and cereals are manufactured in Moga. Moga is located in the state of Punjab about
400Kms.North of New Delhi.

In the Malwa region of Punjab State, there is a small town, which is popularly
known among the famous grain markets of the world. However the credit of
bringing this town on the industrial map of the world goes to Nestle a Swiss
Multinational company engaged in the largest food processing operation in the
world. When in 1959 Nestl took decision to establish a milk processing factory, a
very little could the people of Moga town and the farmers in the surrounding
villages realize that the company now as Nestl India ltd. would play such an
important role in economic & social development of the area.
The company is not only an industrial and a commercial house but has make
sustained efforts to improve economic and social environment of the people in the
area of its operation be its farmers or residents of Moga. In the initial stages
company faced many problems including procurements of milk sales of which was
considered a sin at that time. But the team that surveyed that area found the area
quite suitable for development of milk and it has been proved to be a right
decision.
The company started its operation in 1961 with a capacity of 40,000 Kg of milk per
day kept on expanding on regular intervals and at present handling capacity of
1100000 lts. 1300000 lts of milk per day. Many more products have been
introduced.

Company started milk collection in Moga area on 15 Nov 1961 and on the first day
510lts of milk was collected from four villages. From that the day onwards
company is collecting milk continuously both morning and evening without break.
The total procurement in 1962 was 2,054 million kg from 4,660 milk suppliers of
66 villages and in 1962 fresh milk reception are 102, 33 Mil lion kg from 46,308
farmers delivering milk at 650 collection centres in 574 villages and 10 milk
chilling centres. In 1998 the milk chilling centres have increased from 10 to 186.

Nestl India Ltd. Moga factory is their oldest factory in India. With a lay out spread
over nearly 57 acres & having six plants within the factory, and it is also the largest
factory of the Asia continental region.

The Company started milk collection in Moga area on 15th Nov. 1961 and on the
first day 510 litres of milk was collected as from four villages. From that day
onwards company is collecting milk in the morning and night. The capacity raised
from 40,000 litters of milk per day in 1962 to over 1,200,000 litres of milk till date.
2.2.1 Various departments in the Nestle Moga factory

Supply Chain
NQAC
IP( Industrial performance)
FMR
Cereals
PFP
Culinary
QA
Engineering
Agri Services
Milk- LP
Milk- Egrons
HR
2.3 The factory consists of four production plants:

MILK OPERATIONS
CEREALS
INSTANT DRINKS (VENDING MIXES)
CULINARY
Project Requirements

LAN Hardware:

Core Layer Switches: catalyst 3550

Distribution Layer : catalyst 2960

Access Layer : Access point and Cisco 2950

WAN Hardware:

Routers: Cisco 1841 integrated services router

1 FE Card

1 WIC 1T card

Server Hardware requirements:-

The following table lists the minimum and recommended hardware


requirements for deploying Linux and Windows Servers.

Main Difference will be in file system used by the OS. Linux will use ext3
and windows will use NTFS file system.:-
Component Minimum Recommended

Processor 2.5 gigahertz (GHz) Dual processors that


are each 3 GHz or
faster

RAM 1 gigabyte (GB) 2 GB

Disk EXT-3 File System EXT-3 File


/NTFS System/NTFS

Drive DVD drive DVD drive or the


source copied to a
local or network-
accessible drive

Display 1024 768 1024 768 or higher


resolution monitor

Network 56 kilobits per second 512Kbps or faster


(Kbps) connection connection between
between client client computers and
computers and server server
FEASIBILITY STUDY

The various issues related to feasibility study are as follows:-

1. Technology

The various technologies used for this project are:-

Cisco Packet Tracer or GNS 3


ACL
NAT
Routing
Switching
InterVLAN

2. Economic
The technological and system requirements of the project would not require
much of a cost. As we are doing the project at student level for the partial
fulfilment of Btech.degree so the technologies mentioned were taken
through the internet.

3. Schedule

The project is divided in a time span of 6 weeks so the project completion


will not be an issue.

The project deadline will be easily met and all the activities necessary to be
performed will be completed within the fixed time.
CHAPTER-1

INTRODUCTION TO
INTERNETWORKING BASICS
Chapter-1

INTRODUCTION TO INTERNETWORKING BASICS

1.1 What is Computer Network?

A computer network allows sharing of resources and information among


interconnected devices. In the 1960s, the Advanced Research Projects
Agency (ARPA) started funding the design of the Advanced Research
Projects Agency Network (ARPANET) for the United States Department of
Defense. It was the first computer network in the world. [1] Development of
the network began in 1969, based on designs developed during the 1960s.

Computer networks can be used for a variety of purposes:

Facilitating communications. Using a network, people can


communicate efficiently and easily via email, instant messaging, chat
rooms, telephone, video telephone calls, and video conferencing.

Sharing hardware. In a networked environment, each computer on a


network may access and use hardware resources on the network, such
as printing a document on a shared network printer.

Sharing files, data, and information. In a network environment,


authorized user may access data and information stored on other
computers on the network. The capability of providing access to data
and information on shared storage devices is an important feature of
many networks.
Sharing software. Users connected to a network may run application
programs on remote computers.

Information preservation.

Security.

Speed up.

1.2 Types of networks

1.2(a) Local area network (LAN)

LAN stands for Local Area Network. The scope of the LAN is within one
building, one school or within one lab. In LAN (Hub), media access method
is used CSMA/CD in which each computer sense the carrier before sending
the data over the n/w. if carrier is free then you can transmit otherwise you
have to wait or you have to listen. In multiple access each computer have
right that they can access each other. If two computers sense the carrier on
same time then the collision occur. Each computer, in the network, aware
about the collision. Now this stop transmitting and they will use back off
algorithm. In which random number is generated. This number or algorithm
is used by each computer. Who has short number or small number, he has
first priority to transmit the data over the network and other computers will
wait for their turn.
1.2(b) Wide Area Network (WAN)

WAN stands for Wide Area Network, in which two local area networks are
connected through public n/w. it may be through telecommunication
infrastructure or dedicated lines. For e.g.: - ISDN lines, Leased lines etc. In
which we can use WAN devices and WAN technology. You can also
connect with your remote area through existing Internetwork called Internet.

1.2(c)Metropolitan area network (MAN)

A Metropolitan area network is a large computer network that usually spans


a city or a large campus.

1.2(d)Virtual private network (VPN)

A virtual private network (VPN) is a computer network in which some of the


links between nodes are carried by open connections or virtual circuits in
some larger network (e.g., the Internet) instead of by physical wires. The
data link layer protocols of the virtual network are said to be tunneled
through the larger network when this is the case. One common application is
secure communications through the public Internet, but a VPN need not
have explicit security features, such as authentication or content encryption.
VPNs, for example, can be used to separate the traffic of different user
communities over an underlying network with strong security features.
CHAPTER-2

DEVICES

2.1 DEVICES-:

2.1(a)Router
Router is hardware device, which is used to communicate two different
networks. Router performs routing and path determination. It does not
perform broadcast information. There are two types of routers: -
(i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and remote
access. This feature is offered by Microsoft. This feature is by default
installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient.
But in case of software routers, it has less features, slow performance. They
are not very much efficient.

Figure-2.1
2.1(b) Switches
Switch is also used to connect multiple workstations. Switch is more
intelligent than hub. It has special kind of memory called mac
address/filter/lookup table. Switch reads mac addresses. Switch stores mac
addresses in its filter address table. Switch when receives frame, it reads the
destination mac address and consult with its filter table. If he has entry in its
filter table then he forwards the frame to that particular mac address, if not
found then it performs broadcasting to all its connected nodes.
Every port has its own buffer memory. A port has two queues one is input
queue and second is output queue. When switch receives the frame, the
frame is received in input queue and forward from output queue. So in case
of switch there is no chance or place for collisions. In case of switch, the
media access method is used CSMA/CA (Carrier Sense Multiple Access/
Collision Avoidance). Switches provide more efficiency, more speed and
security.
There are two types of switches: -
(i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.

Figure-2.2
2.1(c)Hub
Hub is centralized device, which is used to connect multiple workstations.
There are two types of Hub: -
(i) Active Hub

(ii) Passive Hub

It has no special kind of memory. It simply receives the frame (data) and
forwards it to all its nodes except the receiving node. It always performs
broadcasting. In case of hub, there is one collision domain and one broadcast
domain. In case of hub, the media access method is used CSMA/CD (Carrier
Sense Multiple Access/Collision Detection).
(i) Active Hub

In Active hub, it receives the frame regenerate and then forward to all its
nodes.

(ii) Passive Hub

In Passive hub, it simply receives the frame and forward to all its
connected nodes.

You cannot perform LAN segmentation using hub.

Figure-2.3

2.1(d)Bridge
Bridge is a hardware device, which is used to provide LAN segmentation
means it is used for break the collision domain. It has same functionality as
performed by switch. We can use bridge between two different topologies. It
has fewer ports. Each port has a own buffer memory. It works on Data Link
Layer of OSI model. It also read mac address and stores it in its filter table.
In case of bridge there is one broadcast domain.

Figure-2.4
CHAPTER-3

ROUTING

3.1 ROUTING

Routing is the process that a router uses to forward packets toward the
destination network. A router makes decisions based upon the destination IP
address of a packet. All devices along the way use the destination IP address
to point the packet in the correct direction so that the packet eventually
arrives at its destination. In order to make the correct decisions, routers must
learn the direction to remote networks.

3.2 STATIC ROUTING

In this routing, we have to use IP route commands through which we can


specify routes for different networks. The administrator will analyze whole
internetwork topology and then specify the route for each n/w that is not
directly connected to the router.

3.2(a) Steps to perform static routing-


(1) Create a list of all n/w present in internetwork.

(2) Remove the n/w address from list, which is directly connected to n/w.

(3) Specify each route for each routing n/w by using IP route command.

Router(config)#ip route <destination n/w><mask><next hop ip>


Next hop IP it is the IP address of neighbor router that is directly connected
our router.

Configuring Static Routes by Specifying Outgoing Interfaces

Figure-3.1

Configuring Static Routes by Specifying Next-Hop Addresses

Figure-3.2(a)

Figure-3.2(b)
3.2(b) Advantages of static routing
(1) Fast and efficient.

(2) More control over selected path.

(3) Less overhead for router.

(4) Bandwidth of interfaces is not consumed in routing updates.

3.2(c) Disadvantages of static routing


(1) More overheads on administrator.

(2) Load balancing is not easily possible.

(3) In case of topology change routing table has to be change manually.

3.3 Default Routing


Default routing means a route for any n/w. these routes are specify with the
help of following syntax: -

Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>

Or

<exit interface>

This type of routing is used in following scenario.

Scenario 1: -
Stub network

A n/w which has only one exit interface is called stub network.

If there is one next hop then we can use default routing.


Scenario 2
Internet connectivity

On Internet, million of n/ws are present. So we have to specify default


routing on our router.

Default route is also called gateway of last resort. This route will be used
when no other routing protocol is available.

Router(config)#ip route 10.0.0.0 255.0.0.0 172.16.0.5

Router(config)#ip route 0.0.0.0 0.0.0.0 200.100.100.11

To display routing table

Router#ship route

To display static routes only

Router#ship route static


S 192.168.10.0/28 [1/0] via 172.16.0.5

To display connected n/ws only

Router#ship route connected

To check all the interface of a router

Router#sh interface brief

3.4 Dynamic Routing


In dynamic routing, we will enable a routing protocol on router. This
protocol will send its routing information to the neighbor router. The
neighbors will analyze the information and write new routes to the routing
table.
The routers will pass routing information receive from one router to other
router also. If there are more than one path available then routes are
compared and best path is selected. Some examples of dynamic protocol are:
RIP, IGRP, EIGRP, OSPF

3.4(a) Types of Dynamic Routing Protocols

According to the working there are two types of Dynamic Routing


Protocols.

(1) Distance Vector

(2) Link State

3.4(b) According to the type of area in which protocol is used there are again
two types of protocol: -

(1) Interior Routing Protocol

(2) Exterior Routing Protocol

3.5 Autonomous system


Autonomous system is the group of contiguous routers and n/w, which will
share their routing information directly with each other. If all routers are in
single domain and they share their information directly with each other then
the size of routing updates will depend on the no. of n/w present in the
Internetwork. Update for each n/w may take 150 200 bytes information.

For example: - if there are 1000 n/ws then size of update will be

200*1000 = 200000 bytes


The routing information is send periodically so it may consume a large
amount of bandwidth in our n/w.

3.6 Distance Vector Routing

The Routing, which is based on two parameters, that is distance and


direction is called Distance Vector Routing. The example of Distance Vector
Routing is RIP & IGRP.

Operation: -
(1) Each Router will send its directly connected information to the neighbor
router. This information is send periodically to the neighbors.

(2) The neighbor will receive routing updates and process the route
according to following conditions: -

(i) If update of a new n/w is received then this information is stored in


routing table.

(ii) If update of a route is received which is already present in routing table


then route will be refresh that is route times are reset to zero.

(iii) If update is received for a route with lower metric then the route, which
is already present in our routing table. The router will discard old route and
write the new route in the routing table.

(iv) If update is received with higher metric then the route that is already
present in routing table, in this case the new update will be discard.

(3) A timer is associated with each route. The router will forward routing
information on all interfaces and entire routing table is send to the neighbor.
There are three types of timers associated with a route.
(i) Route update timer

It is the time after which the router will send periodic update to the neighbor.

(ii) Route invalid timer

It is the time after which the route is declared invalid, if there are no updates
for the route. Invalid route are not forwarded to neighbor routers but it is still
used to forward the traffic.

(iii) Route flush timer

It is the time after which route is removed from the routing table, if there are
no updates about the router.

3.7 Metric of Dynamic Routing


Metric are the measuring unit to calculate the distance of destination n/w. A
protocol may use a one or more than one at a time to calculate the distance.
Different types of metric are: -

(1) Hop Count

(2) Band Width

(3) Load

(4) Reliability

(5) Delay

(6) MTU
1.Hop Count
It is the no. of Hops (Routers) a packet has to travel for a destination n/w.

2.Bandwidth
Bandwidth is the speed of link. The path with higher bandwidth is preferred
to send the data.

3.Load
Load is the amount of traffic present in the interface. Paths with lower load
and high throughput are used to send data.

4.Reliability
Reliability is up time of interface over a period of time.

5. Delay
Delay is the time period b/w a packet is sent and received by the destination.

6. MTU(Maximum Transmission Unit)

It is the maximum size of packet that can be sent in a frame mostly MTU is
set to 1500.
3.8 Routers Configuration

Figure-3.3
CHAPTER-4

PROTOCOLS

4.1 Routing Protocols

Routing protocols includes the following processes for sharing route


information allows routers to communicate with other routers to update and
maintain the routing tables

Examples of routing protocols that support the IP routed protocol are:

RIP, IGRP,

OSPF, BGP,

And EIGRP.

4.2 Routed Protocols

Protocols used at the network layer that transfer data from one host to
another across a router are called routed or routable protocols. The Internet
Protocol (IP) and Novell's Internetwork Packet Exchange (IPX) are
examples of routed protocols. Routers use routing protocols to exchange
routing tables and share routing information. In other words, routing
protocols enable routers to route routed protocols e.x. IPX(Internet Packet
Exchanger) and IP(Internet Protocol ).
IGP and EGP

Figure-4.1

4.2(a)Categories of Routing Protocols

Most routing algorithms can be classified into one of two categories:

distance vector

link-state

The distance vector routing approach determines the direction (vector) and
distance to any link in the internetwork.

The link-state approach, also called shortest path first, recreates the exact
topology of the entire internetwork.
Comparing Routing Methods

TYPES OF ROUTING PROTOCOLS

RIPv1

Table-4.1
CHARACTERISTICS

Table-4.2
Configuring RIP Example

Figure-4.2
4.3 IGRP

Interior Gateway Routing Protocol (IGRP) is a proprietary protocol


developed by Cisco.

Some of the IGRP key design characteristics emphasize the following:

It is a distance vector routing protocol.

Routing updates are broadcast every 90 seconds.

Bandwidth, load, delay and reliability are used to

create a composite metric.

4.3(a) IGRP Stability Features

IGRP has a number of features that are designed to enhance its stability,
such as:

Holddowns

Split horizons

Poison reverse updates

Holddowns
Holddowns are used to prevent regular update messages from
inappropriately reinstating a route that may not be up.
Split horizons
Split horizons are derived from the premise that it is usually not useful to
send information about a route back in the direction from which it came.

Poison reverse updates


Split horizons prevent routing loops between adjacent routers, but poison
reverse updates are necessary to defeat larger routing loops.

Today, IGRP is showing its age, it lacks support for variable length subnet
masks (VLSM). Rather than develop an IGRP version 2 to correct this
problem, Cisco has built upon IGRP's legacy of success with Enhanced

4.4 OSPF (Open Shortest Path First) Protocol

OSPF is a Link-State Routing Protocols

Link-state (LS) routers recognize much more information about the


network than their distance-vector counterparts,Consequently LS routers
tend to make more accurate decisions.

Link-state routers keep track of the following:

Their neighbours

All routers within the same area

Best paths toward a destination

Neighbor table:

Also known as the adjacency database


(list of recognized neighbors)
Topology table:

Typically referred to as LSDB


(routers and links in the area or network)

All routers within an area have an identical LSDB

Routing table:

Commonly named a forwarding database


(list of best paths to destinations)

4.4(a) Configuring Basic OSPF: Single Area

Router(config)#

routerospfprocess-id

Router(config-router)#

networkaddress inverse-maskarea [area-id]

Router OSPF subordinate command that defines the interfaces


(by network number) that OSPF will run on. Each network
number must be defined to a specific area.

Configuring OSPF on Internal Routers of a Single Area


Figure-4.3

4.5 EIGRP

Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-proprietary


routing protocol based on Interior Gateway Routing Protocol (IGRP).

Unlike IGRP, which is a classful routing protocol, EIGRP supports CIDR


and VLSM.

Compared to IGRP, EIGRP boasts faster convergence times, improved


scalability, and superior handling of routing loops.
Furthermore, EIGRP can replace Novell Routing Information Protocol (RIP)
and AppleTalk Routing Table Maintenance Protocol (RTMP), serving both
IPX and AppleTalk networks with powerful efficiency.

EIGRP is often described as a hybrid routing protocol, offering the best of


distance vector and link-state algorithms.

4.5(a) Configuring EIGRP

Figure-4.4
CHAPTER-5

DHCP

5.1 DHCP

Dynamic Host Configuration Protocol automates network-parameter


assignment to network devices from one or more DHCP servers. Even in
small networks, DHCP is useful because it makes it easy to add new
machines to the network.

When a DHCP-configured client (a computer or any other network-aware


device) connects to a network, the DHCP client sends a [[Broadcasting
(computing)|broadcast]] query requesting necessary information from a
DHCP server. The DHCP server manages a pool of IP addresses and
information about client configuration parameters such as [[default
gateway]], [[domain name]], the [[name server]]s, other servers such as
[[time server]]s, and so forth. On receiving a valid request, the server assigns
the computer an IP address, a lease (length of time the allocation is valid),
and other IP configuration parameters, such as the [[subnet mask]] and the
[[default gateway]]. The query is typically initiated immediately after
[[booting]], and must complete before the client can initiate [[Internet
Protocol|IP]]-based communication with other hosts.
5.2 Depending on implementation, the DHCP server may have
three methods of allocating IP-addresses:

5.(a) ''Dynamic Allocation'': A [[network administrator]] assigns a


range of IP addresses to DHCP, and each client computer on the LAN is
configured to request an IP address from the DHCP [[Server
(computing)|server]] during network initialization. The request-and-grant
process uses a lease concept with a controllable time period, allowing the
DHCP server to reclaim (and then reallocate) IP addresses that are not
renewed.

5.2(b) ''Automatic Allocation'': The DHCP server permanently


assigns a free IP address to a requesting client from the range defined by the
administrator. This is like dynamic allocation, but the DHCP server keeps a
table of past IP address assignments, so that it can preferentially assign to a
client the same IP address that the client previously had.

5.2(c) ''Static Allocation'': The DHCP server allocates an IP address


based on a table with [[MAC address]]/[[IP address]] pairs, which are
manually filled in (perhaps by a [[network administrator]]). Only requesting
clients with a MAC address listed in this table will be allocated an IP
address. This feature (which is not supported by all DHCP servers) is
variously called ''Static DHCP Assignment'' (by [[DD-WRT]]), ''fixed-
address'' (by the dhcpd documentation), ''Address Reservation'' (by Netgear),
''DHCP reservation'' or ''Static DHCP'' (by Cisco/[[Linksys]]), and ''IP
reservation'' or ''MAC/IP binding'' (by various other router manufacturers).
5.3 DORA PROCESS

DHCP operations fall into four basic phases: IP discovery, IP lease offer,
IP request, and IP lease acknowledgement.

DHCP clients and servers on the same subnet communicate via UDP
broadcasts. If the client and server are on different subnets, IP discovery and
IP request messages are sent via UDP broadcasts, but IP lease offer and IP
lease acknowledgement messages are [[unicast]].

5.3(a) DHCP discovery

The client broadcasts messages on the physical subnet to discover available


DHCP servers. Network administrators can configure a local router to
forward DHCP packets to a DHCP server from a different subnet. This
client-implementation creates a [[User Datagram Protocol]] (UDP) packet
with the broadcast destination of 255.255.255.255 or the specific subnet
broadcast address.

A DHCP client can also request its last-known IP address (in the example
below, 192.168.1.100). If the client remains connected to a network for
which this IP is valid, the server might grant the request. Otherwise, it
depends whether the server is set up as authoritative or not. An authoritative
server will deny the request, making the client ask for a new IP address
immediately. A non-authoritative server simply ignores the request, leading
to an implementation-dependent timeout for the client to give up on the
request and ask for a new IP address.
5.3(b) DHCP offer

When a DHCP server receives an IP lease request from a client, it reserves


an IP address for the client and extends an IP lease offer by sending a
DHCPOFFER message to the client. This message contains the client's
MAC address, the IP address that the server is offering, the subnet mask, the
lease duration, and the IP address of the DHCP server making the offer.

The server determines the configuration based on the client's hardware


address as specified in the CHADDR (Client Hardware Address) field. Here
the server, 192.168.1.1, specifies the IP address in the YIADDR (Your IP
Address) field.

5.3(c) DHCP request

A client can receive DHCP offers from multiple servers, but it will accept
only one DHCP offer and broadcast a DHCP request message. Based on the
Transaction ID field in the request, servers are informed whose offer the
client has accepted. When other DHCP servers receive this message, they
withdraw any offers that they might have made to the client and return the
offered address to the pool of available addresses. The DHCP request
message is broadcast, instead of being unicast to a particular DHCP server,
because the DHCP client has still not received an IP address. Also, this way
one message can let all other DHCP servers know that another server will be
supplying the IP address without missing any of the servers with a series of
unicast messages.
5.3(d) DHCP acknowledgement

When the DHCP server receives the DHCPREQUEST message from the
client, the configuration process enters its final phase. The acknowledgement
phase involves sending a DHCPACK packet to the client. This packet
includes the lease duration and any other configuration information that the
client might have requested. At this point, the IP configuration process is
completed.

Snapshot of DHCP

Figure-5.1
CHAPTER-6

ACL (Acceess Control List)

6.1 ACL (Acceess Control List)

Access Control List is a list of conditions that are used to control the
network traffic or packet filtering.We can use ACL for filtering the unwanted
packets when implementing security policy.

6.2 Applying ACLs

You can define ACLs without applying them. But, the ACLs have no effect
until they are applied to the interface of the router. It is a good practice to
apply the ACL on the interface closest to the source of the traffic. As shown
in this example, when you try to block traffic from source to destination, you
can apply an inbound ACL to E0 on router A instead of an outbound list to
E1 on router C. An access-list has a deny ip any any implicitly at the end of
any access-list. If traffic is related to a DHCP request and if it is not
explicity permitted, the traffic is dropped because when you look at DHCP
request in IP, the source address is s=0.0.0.0 (Ethernet1/0),
d=255.255.255.255, len 604, rcvd 2 UDP src=68, dst=67. Note that the
source IP address is 0.0.0.0 and destination address is 255.255.255.255.
Source port is 68 and destination 67. Hence, you should permit this kind of
traffic in your access-list else the traffic is dropped due to implicit deny at
the end of the statement.

Note: For UDP traffic to pass through, UDP traffic must also be permited
explicitly by the ACL.
Figure-6.1

Define In, Out, Inbound, Outbound, Source, and Destination

The router uses the terms in, out, source, and destination as references.
Traffic on the router can be compared to traffic on the highway. If you were
a law enforcement officer in Pennsylvania and wanted to stop a truck going
from Maryland to New York, the source of the truck is Maryland and the
destination of the truck is New York. The roadblock could be applied at the
PennsylvaniaNew York border (out) or the MarylandPennsylvania border
(in).

6.3 Types of IP ACLs

This section of the document describes ACL types.

6.3(a) Standard ACLs

Standard ACLs are the oldest type of ACL. They date back to as early as
Cisco IOS Software Release 8.3. Standard ACLs control traffic by the
comparison of the source address of the IP packets to the addresses
configured in the ACL.

This is the command syntax format of a standard ACL.


access-listaccess-list-number {permit|deny}
{host|sourcesource-wildcard|any}

In all software releases, the access-list-number can be anything from 1 to 99.


In Cisco IOS Software Release 12.0.1, standard ACLs begin to use
additional numbers (1300 to 1999). These additional numbers are referred to
as expanded IP ACLs. Cisco IOS Software Release 11.2 added the ability to
use list name in standard ACLs.

A source/source-wildcard setting of 0.0.0.0/255.255.255.255 can be


specified as any. The wildcard can be omitted if it is all zeros. Therefore,
host 10.1.1.2 0.0.0.0 is the same as host 10.1.1.2.

After the ACL is defined, it must be applied to the interface (inbound or


outbound). In early software releases, out was the default when a keyword
out or in was not specified. The direction must be specified in later software
releases.

interface<interface>
ip access-group number {in|out}

This is an example of the use of a standard ACL in order to block all traffic
except that from source 10.1.1.x.

interface Ethernet0/0
ip address 10.1.1.1 255.255.255.0
ip access-group 1 in
access-list 1 permit 10.1.1.0 0.0.0.255
6.3(b) Extended ACLs

Extended ACLs were introduced in Cisco IOS Software Release 8.3.


Extended ACLs control traffic by the comparison of the source and
destination addresses of the IP packets to the addresses configured in the
ACL.

This is the command syntax format of extended ACLs. Lines are wrapped
here for spacing considerations.

IP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} protocol source source-wildcard
destination destination-wildcard [precedence precedence]
[tostos] [log|log-input] [time-range time-range-name]

ICMP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} icmpsource source-wildcard
destination destination-wildcard
[icmp-type [icmp-code] |icmp-message]
[precedence precedence] [tostos] [log|log-input]
[time-range time-range-name]

TCP
access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} tcpsource source-wildcard [operator [port]]
destination destination-wildcard [operator [port]]
[established] [precedence precedence] [tostos]
[log|log-input] [time-range time-range-name]

UDP

access-list access-list-number
[dynamic dynamic-name [timeout minutes]]
{deny|permit} udpsource source-wildcard [operator [port]]
destination destination-wildcard [operator [port]]
[precedence precedence] [tostos] [log|log-input]
[time-range time-range-name]
CHAPTER-7

INTER-VLAN

7.1 Understanding How InterVLAN Routing Works


Network devices in different VLANs cannot communicate with one another
without a router to route traffic between the VLANs. In most network
environments, VLANs are associated with individual networks or
subnetworks.

For example, in an IP network, each subnetwork is mapped to an individual


VLAN. In a Novell IPX network, each VLAN is mapped to an IPX network
number. In an AppleTalk network, each VLAN is associated with a cable
range and AppleTalk zone name.

Configuring VLANs helps control the size of the broadcast domain and
keeps local traffic local. However, when an end station in one VLAN needs
to communicate with an end station in another VLAN, interVLAN
communication is required. This communication is supported by interVLAN
routing. You configure one or more routers to route traffic to the appropriate
destination VLAN.

Shows a basic interVLAN routing topology. Switch A is in VLAN 10 and


Switch B is in VLAN 20. The router has an interface in each VLAN.

Figure:-7.1 Basic InterVLAN Routing Topology


When Host A in VLAN 10 needs to communicate with Host B in VLAN 10,
it sends a packet addressed to that host. Switch A forwards the packet
directly to Host B, without sending it to the router.

When Host A sends a packet to Host C in VLAN 20, Switch A forwards the
packet to the router, which receives the traffic on the VLAN 10 interface.
The router checks the routing table, determines the correct outgoing
interface, and forwards the packet out the VLAN 20 interface to Switch B.
Switch B receives the packet and forwards it to Host C.

shows another common scenario, interVLAN routing over a single trunk


connection to the router. The switch has ports in multiple VLANs.
InterVLAN routing is performed by a Cisco 7505 router connected to the
switch through a full-duplex Fast Ethernet trunk link.
CHAPTER-8

NAT

8.1 NAT-:Short for Network Address Translation, an Internet standard that


enables a local-area network (LAN) to use one set of IP addresses for
internal traffic and a second set of addresses for external traffic. A NAT box
located where the LAN meets the Internet makes all necessary IP address
translations.

NAT serves three main purposes:

Provides a type of firewall by hiding internal IP addresses


Enables a company to use more internal IP addresses. Since they're
used internally only, there's no possibility of conflict with IP
addresses used by other companies and organizations.

Allows a company to combine multiple ISDN connections into a


single Internet connection.
Figure-8.1

8.2 How Network Address Translation Works??

Figure-8.2

Network Address Translation helps improve security by reusing IP


addresses. The NAT router translates traffic coming into and leaving
the private network. See more pictures of computer networking.

If you are reading this article, you are most likely connected to the
Internet and viewing it at the HowStuffWorks Web site. There's a very
good chance that you are using Network Address Translation
(NAT) right now.

The Internet has grown larger than anyone ever imagined it could be.
Although the exact size is unknown, the current estimate is that there
are about 100 million hosts and more than 350 million users actively
on the Internet. That is more than the entire population of the United
States! In fact, the rate of growth has been such that the Internet is
effectively doubling in size each year.

So what does the size of the Internet have to do with NAT?


Everything! For a computer to communicate with other computers and
Web servers on the Internet, it must have an IP address. An IP
address (IP stands for Internet Protocol) is a unique 32-bit number that
identifies the location of your computer on a network. Basically, it
works like your street address -- as a way to find out exactly where
you are and deliver information to you.

When IP addressing first came out, everyone thought that there were
plenty of addresses to cover any need. Theoretically, you could have
4,294,967,296 unique addresses (232). The actual number of available
addresses is smaller (somewhere between 3.2 and 3.3 billion) because
of the way that the addresses are separated into classes, and because
some addresses are set aside for multicasting, testing or other special
uses.
CHAPTER-9

SWITCHING CONCEPTS

9.1 Switching

Switches occupy the same place in the network as hubs. Unlike hubs,
switches examine each packet and process it accordingly rather than simply
repeating the signal to all ports. Switches map the Ethernet addresses of the
nodes residing on each network segment and then allow only the necessary
traffic to pass through the switch. When a packet is received by the switch,
the switch examines the destination and source hardware addresses and
compares them to a table of network segments and addresses. If the
segments are the same, the packet is dropped ("filtered"); if the segments are
different, then the packet is "forwarded" to the proper segment. Additionally,
switches prevent bad or misaligned packets from spreading by not
forwarding them.

MAC Address Table


Figure-9.1

9.2 Classification of switches-


Switches are classified according to the following criteria: -

9.2(a) Types of switches based on working-


(1) Store & Forward

This switch receives entire frame then perform error checking and start
forwarding data to the destination.

(2) Cut through

This switch starts forwarding frame as soon as first six bytes of the frame
are received.

(3) Fragment-free

This switch receives 64 bytes of the frame, perform error checking and
then start forwarding data.

(4) Adaptive cut-through

It changes its mode according the condition. If it see there are errors in
many frames then it changes to Store & Forward mode from Cut through or
Fragment-free.

9.2(b) Types of switches based on management-


(1) Manageable switches

(2) Non-Manageable switches


(3) Semi-Manageable switches

Types of switches based on OSI layer -


(1) Layer 2 switches (only switching)

(2) Layer 3 switches (switching & routing)

9.2(c) Types of switches based on command mode (only in


Cisco)-
(1) IOS based

(2) CLI based

9.2(d) Type of switches based on hierarchical model-


(1) Core layer switches

(2) Distribution layer switches

(3) Access layer switches

9.2(e) Qualities of switch-


- No. of ports

- Speed of ports

- Type of media

- Switching or wire speed or throughput


9.3 Basic Switch Administration-
IOS based switches are similar to the routers. We can perform following
function on switches in a similar manner as performed on router.

(1) Access switch using console

(2) Commands to enter & exit from different mode

(3) Commands to configure passwords

(4) Manage configuration

(5) Backup IOS and configuration

(6) Configuring and resolving hostnames

(7) Managing telnet

(8) Configuring CDP

(9) Configuring time clock

(10) Configuring Banners

(11) Command line shortcuts and editing shortcuts

(12) Managing history

(13) Configure logging

(14) Boot system commands


9.4 Following function and options are not similar in router
and switch.-

(1) Default hostname is Switch

(2) Auxiliary port is not present

(3) VTY ports are mostly 0 to 15

(4) By default interfaces are enabled

(5) IP address cannot be assign to interfaces

(6) Routing configuration mode is not present

(7) Interface no. starts from 1

(8) Web access is by default enabled

(9) Configuration registry is not present in similar manner

(10) Flash memory may contain multiple files and startup-configuration is


also saved in flash
9.5 Switch Cofiguration

Figure-9.2
CHAPTER-10

VTP (VLAN Trunking Protocols)

10.1 VTP(VLAN Trunking Protocols)

Cisco created this one too. The basic goals of VLAN Trunking Protocol
(VTP) are to manage all configured VLANs across a switched internetwork
and to maintain consistency throughout that network. VTP allows you to
add, delete, and rename VLANsinformation that is then
propagated to all other switches in the VTP domain.

Heres a list of some of the cool features VTP has to offer:

Consistent VLAN configuration across all switches in the network


VLAN trunking over mixed networks, such as Ethernet to ATM
LANE or even FDDI
Accurate tracking and monitoring of VLANs
Dynamic reporting of added VLANs to all switches in the VTP
domain
Adding VLANs using Plug and Play

With the help of VTP,we can simplify the process of creating the Vlans.In
multiple switches,we can configure one switch as VTP Server and all the
switches will be configured as VTP clients. We will create the vlans on VTP
Server switch. The Server will send periodic updates to the VTP client
switches. The client will create the vlan from the updates received from the
server
10.2 VTP Modes of Operation

10.2(a) Server
This is the default mode for all Catalyst switches. You need at least one
server in your VTP domain to propagate VLAN information throughout that
domain. Also important: The switch must be in server mode to be able to
create, add, and delete VLANs in a VTP domain.
VLAN information has to be changed in server mode, and any change made
to VLANs on a switch in server mode will be advertised to the
entire VTP domain. In VTP server mode, VLAN configurations are saved in
NVRAM on the switch.

10.2(b) Client
In client mode, switches receive information from VTP servers, but they also
receive and forward updates, so in this way, they behave
like VTP servers. The difference is that they cant create, change, or delete
VLANs. Plus, none of the ports on a client switch can be added to
a new VLAN before the VTP server notifies the client switch of the new
VLAN and the VLAN exists in the clients VLAN database. Also good
to know is that VLAN information sent from a VTP server isnt stored in
NVRAM, which is important because it means that if the switch is reset
or reloaded, the VLAN information will be deleted. Heres a hint: If you
want a switch to become a server, first make it a client so it receives all
the correct VLAN information, then change it to a serverso much easier!
So basically, a switch in VTP client mode will forward VTP summary
advertisements and process them. This switch will learn about but wont
save the VTP configuration in the running configuration, and it wont save it
in NVRAM. Switches that are in VTP client mode will only learn
about and pass along VTP informationthats it!

10.2(c) Transparent
Switches in transparent mode dont participate in the VTP domain or share
its VLAN database, but theyll still forward VTP
advertisements through any configured trunk links. They can create, modify,
and delete VLANs because they keep their own databaseone
they keep secret from the other switches. Despite being kept in NVRAM, the
VLAN database in transparent mode is actually only locally
significant. The whole purpose of transparent mode is to allow remote
switches to receive the VLAN database from a VTP server-configured
switch through a switch that is not participating in the same VLAN
assignments.
VTP only learns about normal-range VLANs, with VLAN IDs 1 to 1005;
VLANs with IDs greater than 1005 are called extended-range VLANs
and theyre not stored in the VLAN database. The switch must be in VTP
transparent mode when you create VLAN IDs from 1006 to 4094, so
it would be pretty rare that youd ever use these VLANs. One other thing:
VLAN IDs 1 and 1002 to 1005 are automatically created on all
switches and cant be removed.
10.3 VTP Servers Configuration

Figure-10.1
CHAPTER-11

VLANs

11.1VLANs-A VLAN is singe broadcast domain. All devices connected to


the vlan receive broadcasts sent by any other VLAN members. However,
devices connected to a different VLAN will not receive those same
broadcasts. A VLAN consists of hosts defined as members communicating
as a logical network segment. A VLAN can have connected members
located anywhere in the campus network, as long as VLAN connectivity is
provided among all the members.

11.2 INTER-VLAN

11.2(a) Understanding How Inter-VLAN Routing Works

Network devices in different VLANs cannot communicate with one another


without a router to route traffic between the VLANs. In most network
environments, VLANs are associated with individual networks or sub-
networks.

For example, in an IP network, each sub-network is mapped to an individual


VLAN. In a Novell IPX network, each VLAN is mapped to an IPX network
number. In an AppleTalk network, each VLAN is associated with a cable
range and AppleTalk zone name.

Configuring VLANs helps control the size of the broadcast domain and
keeps local traffic local. However, when an end station in one VLAN needs
to communicate with an end station in another VLAN, inter-VLAN
communication is required. This communication is supported by inter-VLAN
routing. You configure one or more routers to route traffic to the
appropriate destination VLAN.

When Host A in VLAN 10 needs to communicate with Host B in VLAN 10, it


sends a packet addressed to that host. Switch A forwards the packet
directly to Host B, without sending it to the router.

When Host A sends a packet to Host C in VLAN 20, Switch A forwards the
packet to the router, which receives the traffic on the VLAN 10 interface.
The router checks the routing table, determines the correct outgoing
interface, and forwards the packet out the VLAN 20 interface to Switch B.
Switch B receives the packet and forwards it to Host C.

It shows another common scenario, inter-VLAN routing over a single trunk


connection to the router. The switch has ports in multiple VLANs. Inter-
VLAN routing is performed by a Cisco 7505 router connected to the switch
through a full-duplex Fast Ethernet trunk link.

11.3 Trunking

A trunk is a point-to-point link that transmits and receives traffic between


switches or between switches and routers. Trunks carry the traffic of
multiple VLANs and can extend VLANs across an entire network.
11.4VLAN Configuration

Figure-11.1
CHAPTER-12

Conclusion

The Enterprise network is the lifeblood of any Small to Medium Enterprise


(SME) with more than one site or supply chain partner. It enables access to
business information and allows for profitable and effective communication
flows between employees in different enterprise sites. Network enterprise
network equipment are mature and ubiquitous, but the quality of services
provided by similar networks varies from city to city and from country to
country. In particular, the quality variation gap between most of the cities
in some developing nations and their counterparts in advanced nations is
very wide. This is due to the lack in developing nations of an adequate IT
infrastructure, which is taken for granted in developed nations. Planning an
enterprise network in a developing nation is almost like planning it in the
middle of a desert. This project briefly discusses the architecture of an
enterprise network. It examines the barriers to planning, designing and
implementing an enterprise network. This project also covers the methods
to implement enterprise level networks.

In this project weve started from working on Basics of routers and


switches then covering the Routing technologies required to route data
between branches. In large LAN it is required to perform segmentation. So
we have to implement technologies like VLAN, TRUNKING, STP, PORT
SECURITY & INTER-VLAN etc.

Vous aimerez peut-être aussi