Computer Networking Process

download Computer Networking Process

of 81

description

CNP Project for MBA

Transcript of Computer Networking Process

A PROJECT REPORT ONCOMPUTER NETWORKING PROCESSAt

Submitted in partial fulfillment for the requirement of the award of the degree of

MASTER OF BUSINESS ADMINISTRATIONByMr. AHMED MUNEEBUDDINRoll No: 11D51E0055

VIF COLLEGE OF ENGG & TECH (Affiliated to JNTU, Hyderbad)2015

DECLARATION

I hereby declare that this project report titled "Computer Networking process" submitted by me to the DEPARTMENT OF BUSINESS MANAGEMENT, VIF COLLEGE OF ENGG & TECH is a bonafide work undertaken by me and it is not submitted to any other university or institution for the award of any degree/certificate or published any time before.

Mr. AHMED MUNEEBUDDINRoll No: 11D51E0055

Acknowledgement

The Project Report Titled "Computer Networking process" is done by me at Wipro Technologies in partial fulfillment for the award of degree of Master of Business Administration.

I would like to thank Mr. Abhishek Jain (Asst. Manager) of Wipro Technologies for providing me an opportunity to pursue my project work in the esteemed organization.

I convey my sincere thanks to all the staff of VIF COLLEGE OF ENGG. WORK under whose supervision the study has been successfully completed.

Mr. AHMED MUNEEBUDDINRoll No: 11D51E0055

ABSTRACTComputer of data communication refer to protocol involved in transmission of digitized data between two or more online processing locations and is an integral part of the modern information and retrieval systems in terms of their online access. The modern information system, unlike their precursor which worked in an offline mode, operate in an online interactive mode where in a user can interact with a host from a remote terminal using a communication link. The article, before describing the computer communication networks, touches upon the basic concepts, types, techniques and protocols involved in data communication. Communication networks are broadly classified into six categories based on the geographical locations of its computers and terminals, namely (i) Remote Data Entry Stations (RJES); (ii) Local Area Network (LAN); (iii) Wide Area Network (WAN); (iv) Metropolitan Area Network (MAN); (v) Distributed Data Processing Network (DDPN); and (vi) Gateways. Further computer communication networks are grouped into three categories based on technology and communication media used, namely, (i) Public Switched Data Network (PSDN); (ii) Public Switched Telephone Network (PSTN); and (iii) Integrated Service Data Network (ISDN). The article proposes to briefly describe all these categories with the examples as they exist in India. The existing national and international telecommunication services based on their scope and function have further been grouped into three categories, namely common carriers, specialized common carriers and value added carriers. Common carriers provide large public telephone and telegraph networks and other broad range services, specialize common carriers offer public networks to provide limited number of services using broadband facilities such as microwave/satellite systems. Value added carriers generally use the telephone lines and transmission facilities of other carriers, often establishing their own private bypass networks so as to avoid some of the facilities of local telephone companies and large-distance systems. The article then proposes to briefly describe TYMNET, TELE-NET, ESA/IRS, ChIN and STN as an important example of international data communication network. TABLE OF CONTENTS

CONTENTS PAGE NOCHAPTER-1 INTRODUCTION 1-15CHAPTER-2 LITERATURE REVIEW16-38CHAPTER-3COMPANY PROFILE39-49CHAPTER-4 DATA ANALYSIS AND INTERPRETATION50-63CHAPTER-5 FINDINGS, SUGGESTIONS AND CONCLUSION64-69 CHAPTER-6 BIBLIOGRAPHY70

CHAPTER - IINTRODUCTION

INTRODUCTIONCOMPUTER NETWORKING A computer network or data network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections. Data is transferred in the form of packets. The connections (network links) between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones, servers as well as networking hardware. Two such devices are said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. Computer networks differ in the physical media used to transmit their signals, the communications protocols to organize network traffic, the network's size, topology and organizational intent.A computer network, or simply a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information. Today, computer networks are the core of modern communication. All modern aspects of the public switched telephone network (PSTN) are computer-controlled. Telephony increasingly runs over the Internet Protocol, although not necessarily the public Internet. The scope of communication has increased significantly in the past decade. This boom in communications would not have been possible without the progressively advancing computer network. Computer networks, and the technologies that make communication between networked computers possible, continue to drive computer hardware, software, and peripherals industries. The expansion of related industries is mirrored by growth in the numbers and types of people using networks, from the researcher to the home user.Computer networking may be considered a branch of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of the related disciplines.A computer network facilitates interpersonal communications allowing people to communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Providing access to information on shared storage devices is an important feature of many networks. A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. A network allows sharing of network and computing resources. Users may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks.

Computer Networks

BASIC COMMUNICATION MODEL Communication model is used to exchange the data between two parties for Ex: The communication between a computer, server and telephone through modem.

MEANING OF INTERNETA means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs.No one owns Internet, although several organizations the world over collaborate in its functioning and development. The high-speed, fiber-optic cables (called backbones) through which the bulk of the Internet data travels are owned by telephone companies in their respective countries.The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then called ARPANET) established by the US Department Of Defense in 1960s for collaboration in military research among business and government laboratories. Later universities and other US institutions connected to it. This resulted in ARPANET growing beyond everyone's expectations and acquiring the name 'Internet.'The development of hypertext based technology (called World Wide web, WWW, or just the Web) provided means of displaying text, graphics, and animations, and easy search and navigation tools that triggered Internet's explosive worldwide growth.

OBJECTIVES OF THE STUDY These provided the necessary computer assistance in the activities pertaining to the respective department. It was not possible to share information among the departments. As a result, the information was replicated wherever needed. This increased redundancy caused increased in storage space, less data consistency etc. Resource sharing is the main objective of the computer network. The goal is to provide all the program, date and hardware is available to everyone on the network without regard to the physical location of the resource and the users. The second objective is to provide the high Reliability. It is achieved by replicating the files on two or more machines, so in case of unavailability (due to fail of hardware) the other copies can be used. Computer organization has helped organization in saving money. This is due to the fact that the small computer has much better price to the performance ratio comparison than the large computer like mainframe. Mainframe computer are approximately ten times faster that the microcomputers, but they cost thousands times more. As a result of this imbalance, organization has preferred to install interconnected microcomputer connected to the mainframe computer. Computer network have provided means to increase system performance as the work load increases (load balancing). In the days of mainframe when the system was full it was to replace with the other large mainframe computer, usually at and expensive rate not convenience for user. Computer network help people who live or work apart to report together. So, when one user prepared some documentation, he can make the document online enabling other to read and convey their opinions. Thus computer network is a powerful communication medium. Only authorized user can access resource in a computer network. Users are authenticated by their user name and password. Hence it is not possible to access the data without proper account. This increases security.

LIMITATION OF THE STUDY Network Hardware, Software and Setup Costs: Computers don't just magically network themselves, of course. Setting up a network requires an investment in hardware and software, as well as funds for planning, designing and implementing the network. Hardware and Software Management and Administration Costs: In all but the smallest of implementations, ongoing maintenance and management of the network requires the care and attention of an IT professional. Undesirable Sharing: With the good comes the bad; while networking allows the easy sharing of useful information, it also allows the sharing of undesirable data. One significant sharing problem in this regard has to do with viruses, which are easily spread over networks and the Internet. Illegal or Undesirable Behavior: Similar to the point above, networking facilitates useful connectivity and communication, but also brings difficulties with it.. Data Security Concerns: If a network is implemented properly, it is possible to greatly improve the security of important data.

NETWORKINGIntroduction to networkingNetworking is a practice of linking of two or more computing devices such as PCs, printers, faxes etc., with each other Connection between two devices is through physical media or logical media to share information, data and resources. Networks are made with the hardware and software. Cable/media

Computer Networks

Models of NetworkingModel means the connectivity of two computers. We have many types of networking models.(i) Client Server Model(ii) Peer to Peer Model (Workgroup Model)(iii)Domain ModelClient Server Model: In a Client server model we have one server and many clients. A Client can share the resources of server, but a server cannot share the resources on clients. On the point of view of administrator its very easy to control the network because we combine with the server also at security point of view. It is very useful because it uses user level security in which users have to remember only one password toshare the resources.

Peer to Peer Model (Workgroup Model)In Peer to Peer networking model all computers are in equal status, that is wecannot manage centralization, administration secutity. In Peer to Perr networking clientuse operating system like Window 98, Window XP, Window 2000, Window Vista.Domain ModelIt is a mixture of client server and peer-to-peer model. In this clients can sharetheir resources as peer-to-peer but with the permission of the server as in client server model therefore it is commonly used model because in this security is more as we can putrestriction on both server and clients.

TYPES OF COMMUNICATION NETWORSNetworks can be categorized as per geographical area to be covered by the network. Computer network are divided into four categories includes: Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN), Wireless (Wi-fi) and Inter network.

LOCAL AREA NETWORK (LANA local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.[1] The defining characteristics of LANs, in contrast to wide area networks (WANs), include their smaller geographic area, and non-inclusion of leased telecommunication lines.[citation needed]ARCNET, Token Ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to build LANs.

METROPOLITAN AREA NETWORK (MAN)A metropolitan area network (MAN) is computer network larger than a local area network, covering an area of a few city blocks to the area of an entire city, possibly also including the surrounding areas.A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications channels of moderate-to-high data rates. A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. MANs might also be owned and operated as public utilities. They will often provide means for inter networking of local networks.

A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan area or campus. Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, and connect them to wider area networks like the Internet.

WIDE AREA NETWORK (WAN)A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.Related terms for other types of networks are personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively.WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations. Many WANs are built for one particular organization and are private. Others, built by Internet service providers, provide connections from an organization's LAN to the Internet. WANs are often built using leased lines. At each end of the leased line, a router connects the LAN on one side with a second router within the LAN on the other. Leased lines can be very expensive. Instead of using leased lines, WANs can also be built using less costly circuit switching or packet switching methods. Network protocols including TCP/IP deliver transport and addressing functions. Protocols including Packet over SONET/SDH, MPLS, ATM and Frame Relay are often used by service providers to deliver the links that are used in WANs. X.25 was an important early WAN protocol, and is often considered to be the "grandfather" of Frame Relay as many of the underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame Relay.Academic research into wide area networks can be broken down into three areas: mathematical models, network emulation and network simulation.

WIRELESS COMMUNICATION NETWORK Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers, wireless computer mice, keyboards and headsets, headphones, radio receivers, satellite television, broadcast television and cordless telephones.Somewhat less common methods of achieving wireless communications include the use of other electromagnetic wireless technologies, such as light, magnetic, or electric fields or the use of soundWireless operations permit services, such as long-range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used in the telecommunications industry to refer to telecommunications systems (e.g. radio transmitters and receivers, remote controls etc.) which use some form of energy (e.g. radio waves, acoustic energy, etc.) to transfer information without the use of wires. Information is transferred in this manner over both short and long distances

Wireless Communication Network

INTER NETWORKINGInternetworking is the practice of connecting a computer network with other networks through the use of gateways that provide a common method of routing information packets between the networks. The resulting system of interconnected networks is called an internetwork, or simply an internet. Internetworking is a combination of the words inter ("between") and networking; not internet-working or international-network.The most notable example of internetworking is the Internet, a network of networks based on many underlying hardware technologies, but unified by an internetworking protocol standard, the Internet Protocol Suite, often also referred to as TCP/IP.The smallest amount of effort to create an internet (an internetwork, not the Internet), is to have two LANs of computers connected to each other via a router. Simply using either a switch or a hub to connect two local area networks together doesn't imply internetworking; it just expands the original LAN.Two architectural models are commonly used to describe the protocols and methods used in internetworking.The Open System Interconnection (OSI) reference model was developed under the auspices of the International Organization for Standardization (ISO) and provides a rigorous description for layering protocol functions from the underlying hardware to the software interface concepts in user applications. Internetworking is implemented in the Network Layer (Layer 3) of the model.The Internet Protocol Suite, also called the TCP/IP model of the Internet was not designed to conform to the OSI model and does not refer to it in any of the normative specifications in Requests for Comment and Internet standards. Despite similar appearance as a layered model, it uses a much less rigorous, loosely defined architecture that concerns itself only with the aspects of logical networking. It does not discuss hardware-specific low-level interfaces, and assumes availability of a Link Layer interface to the local network link to which the host is connected. Internetworking is facilitated by the protocols of its Internet Layer.

CHAPTER IIREVIEW OF LITERATURE

REVIEW OF LITERATURE

TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) IS THE BASIC COMMUNICATION LANGUAGE OR PROTOCOL OF THE INTERNETTCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)

Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP)

TCP/IP, OSI REFRENCE MODEL OPEN SYSTEM INTERCONNECTION (OSI)Models are useful because they help us understand difficult concepts and complicated systems. When it comes to networking, there are several models that are used to explain the roles played by various technologies, and how they interact. Of these, the most popular and commonly used is the Open Systems Interconnection (OSI) Reference Model.The idea behind the OSI Reference Model is to provide a framework for both designing networking systems and for explaining how they work. As you read about networking, you will frequently find references to the various levels, or layers, of the OSI Reference Model. The existence of the model makes it easier for networks to be analyzed, designed, built and rearranged, by allowing them to be considered as modular pieces that interact in predictable ways, rather than enormous, complex monoliths.In fact, it's pretty much impossible to read a lot about networking without encountering discussions that presume at least some knowledge of how the OSI Reference Model works. This is why I strongly advise that if you are new to the OSI Reference Model, you read this chapter carefully. While it is all arguably background material, reading it will help form an important foundation in your understanding of networks, and will make the rest of the Guide make more sense at the same time.If you are quite familiar with the OSI Reference Model, you may wish to skip this chapter of the Guide, or just skim through it. You can always return later to brush up on particular issues, as needed. There are also many links that come back to the descriptions of the individual layers from various parts of the Guide.In the pages that follow, I describe the OSI Reference Model in detail. I begin with a history of the model, and a discussion of some general concepts related to the OSI model and networking models overall. I provide a useful analogy to help you understand how the reference model works to explain the interaction of networks on multiple levels. I then describe each of the seven layers of the OSI Reference Model, and conclude with a summary of the layers and their respective functions.

OPEN SYSTEM INTERCONNECTION (OSI)

COMPARISON BETWEEN OSI MODEL AND TCP /IP MODEL

APPLICATION OF NETWORKS: 1. Marketing and sales: Marketing professional uses them to collect exchange and analyze data relating to customer needs and product development cycles.Sales application includes Teleshopping, which uses order entry computers or telephone connected to an order processing network, and online reservation services for railways, hotels, airlines, restaurants theatre etc.2. Financial services: It include credit history searches, foreign exchange and investment services and electronic fund transfer (EFT), which allow a user to transfer money without going to bank.3. Manufacturing: computer networks are used today in many aspects of manufacturing, including the manufacturing processes itself. Two aspects that uses network to provide essential services are computer Assisted design (CAD) and computer Assisted manufacturing (CAM), both of which allow multiple user to work on a project simultaneously.4. Electronic Messaging: E-mails transfer the messages between two and more users in a network. With this application user can transfer the information in the form of text, picture and voice.5. Directory Services: It allows list of files to be stored in central location to speed up the world wide search operation. E.g. search engines like Google, Britannia, and Yahoo etc.6. Information Services: It includes Bulletin Boards and data bank. A www site offering the technical specification for a new product in a information services.7. Electronic Data Exchange (EDI): EDI allows business information (including documents such as purchase orders and services) to be transferred without using paper.8. Teleconferencing: It allows conference to occur without the participant being in the same location. It includes:Text Conferencing: Participant communicates through their keywords and computer monitors.Voice Conferencing: Participant at a number of locations communicates simultaneously through phone (talk).Video Conferencing: Participant can see as well as talk to another.9. Cellular Telephone: Wireless phone communication even while travelling through long distance.10. Cable TV: This is widest usable thing today throughout the world.

Network packetMain article: Network packetMost information in computer networks is carried in packets.A network packet is a formatted unit of data (a list of bits or bytes) carried by a packet-switched network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a bit stream. When data is formatted into packets, the bandwidth of the communication medium can be better shared among users than if the network were circuit switched.A packet consists of two kinds of data: control information and user data (also known as payload). The control information provides data the network needs to deliver the user data, for example: source and destination network addresses, error detection codes, and sequencing information. Typically, control information is found in packet headers and trailers, with payload data in between.

Network TopologyMain article: Network topologyThe physical layout of a network is usually less important than the topology that connects network nodes. Most diagrams that describe a physical network are therefore topological, rather than geographic. The symbols on these diagrams usually denote network links and network nodes.Network Structure

Network linksThe communication media used to link devices to form a computer network include electrical cable (Home PNA, power line communication, G.hn), optical fiber (fiber-optic communication), and radio waves (wireless networking). In the OSI model, these are defined at layers 1 and 2 the physical layer and the data link layer.A widely adopted family of communication media used in local area network (LAN) technology is collectively known as Ethernet. The media and protocol standards that enable communication between networked devices over Ethernet are defined by IEEE 802.3. Ethernet transmit data over both copper and fiber cables. Wireless LAN standards (e.g. those defined by IEEE 802.11) use radio waves, or others use infrared signals as a transmission medium. Power line communication uses a building's power cabling to transmit data.Wired technologies

The orders of the following wired technologies are, roughly, from slowest to fastest transmission speed. Twisted pair wire is the most widely used medium for all telecommunication. Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. Computer network cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form comes in several category ratings, designed for use in various scenarios. Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire surrounded by an insulating layer (typically a flexible material with a high dielectric constant), which itself is surrounded by a conductive layer. ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network An optical fiber is a glass fiber. It carries pulses of light that represent data. Some advantages of optical fibers over metal wires are very low transmission loss and immunity from electrical interference. Optical fibers can simultaneously carry multiple wavelengths of light, which greatly increases the rate that data can be sent, and helps enable data rates of up to trillions of bits per second. Optic fibers can be used for long runs of cable carrying very high data rates, and are used for undersea cables to interconnect continents. Price is a main factor distinguishing wired- and wireless-technology options in a business. Wireless options command a price premium that can make purchasing wired computers, printers and other devices a financial benefit. Before making the decision to purchase hard-wired technology products, a review of the restrictions and limitations of the selections is necessary. Business and employee needs may override any cost considerations.[5]Wireless Technologies is the transfer of information between two or more points that are not connected by an electrical conductor.

Main article: Wireless network Terrestrial microwave Terrestrial microwave communication uses Earth-based transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the low-gigahertz range, which limits all communications to line-of-sight. Relay stations are spaced approximately 48km (30mi) apart. Communications satellites Satellites communicate via microwave radio waves, which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically in geosynchronous orbit 35,400km (22,000mi) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals. Cellular and PCS systems use several radio communications technologies. The systems divide the region covered into multiple geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area. Radio and spread spectrum technologies Wireless local area networks use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. IEEE 802.11 defines a common flavor of open-standards wireless radio-wave technology known as Wifi. Free-space optical communication uses visible or invisible light for communications. In most cases, line-of-sight propagation is used, which limits the physical positioning of communicating devices.

Network nodesMain article: Node (networking)Apart from the physical communications media described above, networks comprise additional basic system building blocks, such as network interface controller (NICs), repeaters, hubs, bridges, switches, routers, modems, and firewalls.Network interfaces

An ATM network interface in the form of an accessory card. A lot of network interfaces are built-in.A network interface controller (NIC) is computer hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information. For example the NIC may have a connector for accepting a cable, or an aerial for wireless transmission and reception, and the associated circuitry.The NIC responds to traffic addressed to a network address for either the NIC or the computer as a whole.In Ethernet networks, each network interface controller has a unique Media Access Control (MAC) addressusually stored in the controller's permanent memory. To avoid address conflicts between network devices, the Institute of Electrical and Electronics Engineers (IEEE) maintains and administers MAC address uniqueness. The size of an Ethernet MAC address is six octets. Repeaters and hubsA repeater is an electronic device that receives a network signal, cleans it of unnecessary noise, and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. With fiber optics, repeaters can be tens or even hundreds of kilometers apart.A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay that affects network performance. As a result, many network architectures limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance links, notably undersea cabling.BridgesA network bridge connects and filters traffic between two network segments at the data link layer (layer 2) of the OSI model to form a single network. This breaks the network's collision domain but maintains a unified broadcast domain. Network segmentation breaks down a large, congested network into an aggregation of smaller, more efficient networks.Bridges come in three basic types: Local bridges: Directly connect LANs Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers. Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

SwitchesA network switch is a device that forwards and filters OSI layer 2 datagrams between ports based on the MAC addresses in the packets. A switch is distinct from a hub in that it only forwards the frames to the physical ports involved in the communication rather than all ports connected. It can be thought of as a multi-port bridge. It learns to associate physical ports to MAC addresses by examining the source addresses of received frames. If an unknown destination is targeted, the switch broadcasts to all ports but the source. Switches normally have numerous ports, facilitating a star topology for devices, and cascading additional switches.

RoutersA typical home or small office router showing the ADSL telephone line and Ethernet network cable connections. A router is an internetworking device that forwards packets between networks by processing the routing information included in the packet or datagram (Internet protocol information from layer. The routing information is often processed in conjunction with the routing table (or forwarding table).

ModemsModems (Modulator Demodulator) are used to connect network nodes via wire not originally designed for digital network traffic, or for wireless. To do this one or more frequencies are modulated by the digital signal to produce an analog signal that can be tailored to give the required properties for transmission. Modems are commonly used for telephone lines, using a Digital Subscriber Line technology.FirewallsA firewall is a network device for controlling network security and access rules. Firewalls are typically configured to reject access requests from unrecognized sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in cyber attacks.Overlay network

A sample overlay networkAn overlay network is a virtual computer network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links. Each link corresponds to a path, perhaps through many physical links, in the underlying network. The topology of the overlay network may (and often does) differ from that of the underlying one. For example, many peer-to-peer networks are overlay networks. They are organized as nodes of a virtual system of links that run on top of the Internet.[10]

Communications protocols

The TCP/IP model or Internet layering scheme and its relation to common protocols often layered on top of it.A communications protocol is a set of rules for exchanging information over network links. In a protocol stack (also see the OSI model), each protocol leverages the services of the protocol below it. An important example of a protocol stack is HTTP running over TCP over IP over IEEE 802.11. (TCP and IP are members of the Internet Protocol Suite. IEEE 802.11 is a member of the Ethernet protocol suite.) This stack is used between the wireless router and the home user's personal computer when the user is surfing the web.Whilst the use of protocol layering is today ubiquitous across the field of computer networking, it has been historically criticized by many researchers[12] for two principal reasons. Firstly, abstracting the protocol stack in this way may cause a higher layer to duplicate functionality of a lower layer, a prime example being error recovery on both a per-link basis and an end-to-end basis.[13] Secondly, it is common that a protocol implementation at one layer may require data, state or addressing information that is only present at another layer, thus defeating the point of separating the layers in the first place. For example, TCP uses the ECN field in the IPv4 header as an indication of congestion; IP is a network layer protocol whereas TCP is a transport layer protocol.Communication protocols have various characteristics. They may be connection-oriented or connectionless, they may use circuit mode or packet switching, and they may use hierarchical addressing or flat addressing.There are many communication protocols, a few of which are described below.EthernetEthernet is a family of protocols used in LANs, described by a set of standards together called IEEE 802 published by the Institute of Electrical and Electronics Engineers. It has a flat addressing scheme. It operates mostly at levels 1 and 2 of the OSI model. For home users today, the most well-known member of this protocol family is IEEE 802.11, otherwise known as Wireless LAN (WLAN). The complete IEEE 802 protocol suite provides a diverse set of networking capabilities. For example, MAC bridging (IEEE 802.1D) deals with the routing of Ethernet packets using a Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and IEEE 802.1X defines a port-based Network Access Control protocol, which forms the basis for the authentication mechanisms used in VLANs (but it is also found in WLANs) it is what the home user sees when the user has to enter a "wireless access key".Internet Protocol SuiteThe Internet Protocol Suite, also called TCP/IP, is the foundation of all modern networking. It offers connection-less as well as connection-oriented services over an inherently unreliable network traversed by data-gram transmission at the Internet protocol (IP) level. At its core, the protocol suite defines the addressing, identification, and routing specifications for Internet Protocol Version 4 (IPv4) and for IPv6, the next generation of the protocol with a much enlarged addressing capability.Network serviceNetwork services are applications hosted by servers on a computer network, to provide some functionality for members or users of the network, or to help the network itself to operate.The World Wide Web, E-mail, printing and network file sharing are examples of well-known network services. Network services such as DNS (Domain Name System) give names for IP and MAC addresses (people remember names like nm.lan better than numbers like 210.121.67.18), and DHCP to ensure that the equipment on the network has a valid IP address.Services are usually based on a service protocol that defines the format and sequencing of messages between clients and servers of that network service.Network performanceQuality of serviceDepending on the installation requirements, network performance is usually measured by the quality of service of a telecommunications product. The parameters that affect this typically can include throughput, jitter, bit error rate and latency.The following list gives examples of network performance measures for a circuit-switched network and one type of packet-switched network, viz. ATM: Circuit-switched networks: In circuit switched networks, network performance is synonymous with the grade of service. The number of rejected calls is a measure of how well the network is performing under heavy traffic loads.[25] Other types of performance measures can include the level of noise and echo. ATM: In an Asynchronous Transfer Mode (ATM) network, performance can be measured by line rate, quality of service (QoS), data throughput, connect time, stability, technology, modulation technique and modem enhancements.[26]There are many ways to measure the performance of a network, as each network is different in nature and design. Performance can also be modelled instead of measured. For example, state transition diagrams are often used to model queuing performance in a circuit-switched network. The network planner uses these diagrams to analyze how the network performs in each state, ensuring that the network is optimally designed.[27]

SecurityNetwork securityNetwork security consists of provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and its network-accessible resources.[29] Network security is the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority. Network security is used on a variety of computer networks, both public and private, to secure daily transactions and communications among businesses, government agencies and individuals.Network surveillanceNetwork surveillance is the monitoring of data being transferred over computer networks such as the Internet. The monitoring is often done surreptitiously and may be done by or at the behest of governments, by corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent agency.Computer and network surveillance programs are widespread today, and almost all Internet traffic is or could potentially be monitored for clues to illegal activity.Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. With the advent of programs such as the Total Information Awareness program, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of citizens.[30]However, many civil rights and privacy groupssuch as Reporters Without Borders, the Electronic Frontier Foundation, and the American Civil Liberties Unionhave expressed concern that increasing surveillance of citizens may lead to a mass surveillance society, with limited political and personal freedoms. Ethernet Ethernet is the medium commonly used to build local area networks (LANs) of interconnected machines within a limited area such as an office, company or university campus. Ethernet is based on a bus structure to which many machines can connect to, and communication always happens between two nodes at a time. When two or more nodes want to talk at the same time, both will restart communication after some timeout. The technical term for this is CSMA/CD (Carrier Sense w/ Multiple Access and Collision Detection).Initially, Ethernet hardware consisted of a thick (yellow) cable that machines tapped into using special connectors that poked through the cable's outer shielding. The successor of this was called 10base5, which used BNC-type connectors for tapping in special T-connectors and terminators on both ends of the bus. Today, ethernet is mostly used with twisted pair lines which are used in a collapsed bus system that are contained in switches or hubs. The twisted pair lines give this type of media its name - 10baseT for 10 Mbit/s networks, and 100baseT for 100 MBit/s ones. In switched environments there's also the distinction if communication between the node and the switch can happen in half- or in full duplex mode.TCP/IP Address FormatTCP/IP uses 4-byte (32-bit) addresses in the current implementations (IPv4), also called IP-numbers (Internet-Protocol numbers), to address hosts.TCP/IP allows any two machines to communicate directly. To permit this all hosts on a given network must have a unique IP address. To assure this, IP addresses are administrated by one central organisation, the InterNIC. They give certain ranges of addresses (network-addresses) directly to sites which want to participate in the internet or to internet-providers, which give the addresses to their customers.If your university or company is connected to the Internet, it has (at least) one such network-address for its own use, usually not assigned by the InterNIC directly, but rather through an Internet Service Provider (ISP).If you just want to run your private network at home, see below on how to build your own IP addresses. However, if you want to connect your machine to the (real :-) Internet, you should get an IP addresses from your local network-administrator or -provider.IP addresses are usually written in dotted quad-notation - the four bytes are written down in decimal (most significant byte first), separated by dots. For example, 132.199.15.99 would be a valid address. Another way to write down IP-addresses would be as one 32-bit hex-word, e.g. 0x84c70f63. This is not as convenient as the dotted-quad, but quite useful at times, too. (See below!)

Domain Name Service (DNS)/etc/hosts bears an inherent problem, especially in big networks: when one host is added or one host's address changes, all the /etc/hosts files on all machines have to be changed! This is not only time-consuming, it's also very likely that there will be some errors and inconsistencies, leading to problems.Another approach is to hold only one hostnames-table (-database) for a network, and make all the clients query that nameserver. Updates will be made only on the nameserver.This is the basic idea behind the Domain Name Service (DNS).Usually, there's one nameserver for each domain (hence DNS), and every host (client) in that domain knows which domain it is in and which nameserver to query for its domain.When the DNS gets a query about a host which is not in its domain, it will forward the query to a DNS which is either the DNS of the domain in question or knows which DNS to ask for the specified domain. If the DNS forwarded the query doesn't know how to handle it, it will forward that query again to a DNS one step higher. This is not ad infinitum, there are several root-servers, which know about any domain.Network Information Service (NIS/YP)Yellow Pages (YP) was invented by Sun Microsystems. The name has been changed into Network Information Service (NIS) because YP was already a trademark of the British telecom. So, when I'm talking about NIS you'll know what I mean. ;-)There are quite some configuration files on a Unix-system, and often it's desired to maintain only one set of those files for a couple of hosts. Those hosts are grouped together in a NIS-domain (which has nothing to do with the domains built by using DNS!) and are usually contained in one workstation cluster.Examples for the config-files shared among those hosts are /etc/passwd, /etc/group and - last but not least - /etc/hosts.So, you can abuse NIS for getting a unique name-to-address-translation on all hosts throughout one (NIS- ) domain.There's only one drawback, which prevents NIS from actually being used for that translation: In contrast to the DNS, NIS provides no way to resolve hostnames which are not in the hosts-table. There's no hosts one level up which the NIS-server can query, and so the translation will fail! Suns NIS+ takes measures against that problem, but as NIS+ is only available on Solaris-systems, this is of little use for us now.Don't get me wrong: NIS is a fine thing for managing e.g. user-information (/etc/password,) in workstation-clusters, it's simply not too useful for resolving hostnames.

CHAPTER IIICOMPANY PROFILE

COMPANY PROFILE

Wipro Limited (Western India Products Limited) is an Indian multinational IT Consulting and System Integration services company headquartered in Bangalore, Karnataka. As of March 2014, the company has 147,452 employees servicing over 900 large enterprise & Fortune 1000 corporations with a presence in 61 countries. On 31 March 2014, its market capitalisation was approximately 1.27 trillion ($20.8 billion), making it one of India's largest publicly traded company and seventh largest IT services firm globally. Wipro Infotech is a leading manufacturer of computer hardware and provider of IT services in India and the Middle East region. Part of Wipro Ltd, the $6.98 billion conglomerate and global leader in technology enabled solutions, the company leverages on the parent's philosophy of 'Applying Thought' to enable business results by being a transformation catalyst.Backed by our strong quality processes and rich experience managing global clients across various business verticals, we align IT strategies to your business goals. From simple changes in process to innovative solutions, we help our customers harness the power of IT to achieve profitable growth, market leadership, customer delight and sustainability. Along with our best of breed technology partners, Wipro Infotech also helps you with your hardware and IT infrastructure needs.Our vast IT services portfolio includes consulting, systems integration, application development and maintenance, technology infrastructure services, package implementation and R&D services among others. The company was incorporated on 29 December 1945, in Mumbai by Mohamed Premji as 'Western India Vegetable Products Limited', later abbreviated to 'Wipro'. It was initially set up as a manufacturer of vegetable and refined oils in Amalner, district Jalgaon, Maharashtra, under the trade names of Kisan, Sunflower and Camel. The company logo still contains a sunflower to reflect products of the original business.During the 1970s and 1980s, the company shifted its focus to new business opportunities in the IT and computing industry, which was at a nascent stage in India at the time. On 7 June 1977, the name of the company changed from Western India Vegetable Products Limited, to Wipro Products LimitedThe year 1980 marked the arrival of Wipro in the IT domain. In 1982, the name was changed from Wipro Products Limited to Wipro Limited. Meanwhile Wipro continued to expand in the consumer products domain with the launch of "Ralak" a tulsi-based family soap and "Wipro Jasmine", a toilet soap. 19661992In 1988, Wipro diversified its product line into heavy-duty industrial cylinders and mobile hydraulic cylinders. A joint venture company with the United States' General Electric in the name of Wipro GE Medical Systems Pvt. Ltd. was set up in 1989 for the manufacture, sales, and service of diagnostic and imaging products. Later, in 1991, tipping systems and Eaton hydraulic products were launched. The Wipro Fluid Power division, in 1992, developed expertise to offer standard hydraulic cylinders for construction equipment and truck tipping systems. The market saw the launch of the "Santoor" talcum powder and "Wipro Baby Soft" range of baby toiletries in 1990.19942000In 1994, Wipro set up an overseas design centre, Odyssey 21, for undertaking projects and product developments in advanced technologies for overseas clients. Wipro Infotech and Wipro Systems were amalgamated with Wipro in April that year. Five of Wipro's manufacturing and development facilities secured the ISO 9001 certification during 199495. In 1999, Wipro acquired Wipro Acer. Wipro became a more profitable, diversified corporation with new products such as the Wipro SuperGenius personal computers (PCs). In 1999, the product was the one Indian PC range to obtain US-based National Software Testing Laboratory (NSTL) certification for the Year 2000 (Y2K) compliance in hardware for all models.[19]

Wipro Group of Companies Wipro Ltd.Wipro Limited is a global company provider of comprehensive IT solutions and services, including Systems Integration, Consulting, Information Systems outsourcing, IT-enabled services, and R&D services.It is also a value added reseller of desktops, servers, notebooks, storage products, networking solutions and packaged software for international brands. Wipro entered into the technology business in 1981 and has over 140,000 employees and clients across 54 countries today. IT revenues stood at $6.2 billion for the year ended 31 March 2013, with a repeat business ratio of over 95%.The business model at Wipro Technologies Ltd is an industry aligned customer facing model which gives greater understanding of customers businesses to build industry specific solutions.Wipro.Wipro Consumer Care & LightingWipro Consumer Care and Lighting (WCCLG), a business unit of Wipro Limited operates in the FMCG segment offering a wide range of consumable commodities. Established in 1945, the first product to be introduced by WCCLG was vegetable oil, later popularised under the brand name "Sunflower Vanaspati". It offers personal care products, such as Wipro Baby Soft and Wipro Safewash, toilet soaps like Santoor and Chandrika as well as international brands like Yardley. Its portfolio of lighting solutions includes products like Smartlite CFL,[62] LED, emergency lights and more. Through its customer-centric products and acquisitions, Wipro Consumer Care and Lighting has become a fast-growing company in the FMCG segment.

Wipro Infrastructure EngineeringWipro Infrastructure Engineering is the hydraulics business division of Wipro Limited and has been in the business of manufacturing hydraulic cylinders, truck cylinders, and their components and solutions since 1976. This division delivers hydraulic cylinders to international OEMs and represents the Kawasaki, Sun Hydraulics and Teijin Seiki range of hydraulic products in India. It has entered into partnerships with companies like Kawasaki and aerospace giant EADS. The commitment to quality has made Wipro Infrastructure Engineering the second largest independent manufacturer of cylinders in the world. The company has recently ventured into water treatment systems and solutions to cater to the needs of various industries. Wipro GE Medical Systems LimitedWipro GE Medical Systems Limited is Wipros joint venture with GE Healthcare South Asia. It is engaged in the research and development of advanced solutions to cater to patient and customer needs in healthcare. This partnership, which began in 1990, today includes offerings like gadgets and equipment for diagnostics, healthcare IT solutions and services to help healthcare professionals combat cancer, heart disease, and other ailments. There is complete adherence to Six Sigma quality standards in all products. Sustainability at WiproWipros approach to sustainability is structured on enabling itself, as an organisation, and its customers to be more ecologically sustainable. It is driven by issues considered important to employees, India current and future generations, customers, investors, suppliers, and the community as a whole. Wipro has been ranked 1st in the 2010 Asian Sustainability Rating (ASRTM) of Indian companies and is a member of the NASDAQ Global Sustainability Index as well as the Dow Jones Sustainability Index. In November 2012 Guide to Greener Electronics, Greenpeace ranked Wipro first with a score of 7.1/10.

Listing and shareholdingListing: Wipro's equity shares are listed on Bombay Stock Exchange where it is a constituent of the BSE SENSEX index, and the National Stock Exchange of India where it is a constituent of the S&P CNX Nifty. The American Depositary Shares of the company are listed at the NYSE since October 2000. Shareholding: On 30 September 2013, 73.51% of the equity shares of the company were owned by the promoters: Azim Premji, his family members, partnership firms in which he is a partner and Trusts formed by him/his family. The remaining 26.49% shares are owned by others . Shareholders (as on 30-September-2013)Shareholding[86]

Promoter group led by Azim Premji73.51%

Foreign Institutional Investors (FII)08.82%

Indian Public05.31%

Bodies Corporate03.89%

Mutual Funds/UTI01.90%

NRI01.04%

Trusts/Others00.84%

American Depositary Shares01.93%

Total100.0%

BOARD OF DIRECTORS

Wipro Chairman Azim H. Premji, Sr. executives of Wipro and external members who are global leaders and visionaries, form the Wipro Board of Directors which provides direction and guidance to the organization.

Chairman

Azim H. PremjiChairman, Wipro LimitedExecutive Directors

T K Kurien CEO & Member of the Board, Wipro Ltd.

Suresh C SenapatyExecutive Director& Chief Finance Officer

Dr. Ashok S. GangulyIndependent Director

Ireena VittalIndependent Director

Dr. Jagdish N. ShethIndependent Director

M. K. SharmaIndependent Director

Narayanan VaghulIndependent Director

Awards 2012-13: Azim Premji gets a Lifetime Achievement

The award seeks to salute those who have conquered the peaks of corporate achievements and set examples for the current generation of India Inc leadersTo view Azim H Premji, the winner of The Economic Times Lifetime Achievement Award 2013, only through the prism of Wipro would be an injustice to his immense contribution in other fields. Still, the creation of the country's third-largest software exporter, with revenues of over Rs 43,000 crore, is what Premji is best known for.

Wipro Enterprises Limited comprising two main businesses namely Wipro Consumer Care which includes soaps, toiletries, personal care products, baby care products, wellness products, electrical wire devices, domestic and commercial lighting and modular office furniture. We have a strong brand presence with significant market share in identified segments. In addition, we have a strong presence in the personal care and skin care products market in South-East Asia and Middle-East. Wipro Consumer Care is today among the top FMCG companies and amongst the fastest growing FMCG companies in India. Wipro Infrastructure Engineering group specializes in designing and manufacturing custom Hydraulic Cylinders (Double Acting, Single Acting and Telescopic Cylinders), Actuators and Precision Engineered Components for infrastructure and related industries such as Construction & Earthmoving, Material/Cargo Handling and Forestry, Truck Hydraulic, Farm & Agriculture, Mining, and Aerospace & Defense. With a global workforce of over 1,700 committed and skilled people, and 14 state-of-the-art manufacturing facilities across India, Northern Europe, Eastern Europe, US, Brazil and China Wipro Infrastructure Engineering is the largest independent hydraulic cylinder manufacturer in the world, delivering around 2 million cylinders to OEMs in different geographies.Wipro Infrastructure Engineering also has a platform in the Water business, offering end-to-end solutions in Water and Wastewater treatment for industrial applications. Equipped with modern production facilities, Wipro Water is a key player in this segment with capabilities to design & manufacture, install & maintain Water and Waste Water Treatment Plants for diverse industries like Oil & Gas, Steel, Power, Pharma & Chemical to name a few. Apart from the above, Wipro Enterprises Limited have two associates namely:1. Wipro GE Healthcare Private Limited.2. Wipro Kawasaki Precision Machinery Private Limited.

Wipro Infrastructure Engineering, a division of Wipro Enterprises Limited, has been successfully partnering the infrastructure and engineering developments across the globe. Specialists in designing and manufacturing custom Hydraulic Cylinders such as Double Acting, Single Acting and Telescopic Cylinders, Actuators and Precision Engineered Components for a wide range of applications, Wipro caters to the following segments: Material & Cargo Handling Truck Hydraulics Mining Construction & Earthmoving Farm & Agriculture Aerospace & Defence

With a global workforce of over 1,700 committed and skilled people, and 14 state-of-the-art manufacturing facilities across India, Northern Europe, Eastern Europe, US, Brazil and China - Wipro Infrastructure Engineering is the largest independent hydraulic cylinder manufacturer in the world, delivering around 2 million cylinders to OEMs in different geographies.Over 6 decades of experience coupled with deep engineering expertise, cross-continental geographic presence, scalable manufacturing and consistent Quality has made Wipro Infrastructure Engineering one of the preferred hydraulic solution providers in the world. Wipro partners with customers at every step of their requirement by harnessing its leading-edge design, technologies and in-house talent pool to provide optimal hydraulic solutions.

CHAPTER IVDATA ANALYSIS

1. Growth Computer Networking

YearGrowth Percentage

2008150

2009200

2010250

2011375

2012550

2013700

2014875

Interpretation : The Performance of networking is improving every year by year

2. Growth of Social Networking

YearPublic Applications Issued Patents

200827575

2009325120

2010450175

2011600230

2012850280

20131000325

20141200450

Interpretation: The social networking is enhance in the public application and rising it growth compared to Issued patents.

3. WLAN Network Connectivity out of 25 respondent

Network Connection

WLAN Radio Off10

WLAN Radio On 14

WLAN - Connection not transmitting18

WLAN Search 22

Interpretation : The WLAN connection is spread all over the networking and the information integrates from one network to another networks.

4. Revenues and Gross Profit in Crores

YearRevenues Gross Profits

200816571254

200921651725

201023541850

201126582154

201232442658

201334562856

2014385432145

Interpretation: The company business and it revenues are increasing every year and there is more better result in the gross profits.

5. Past Performance in Dollar 6. YearSalesGrossNet

20113,00,0002,00,00075,000

20124,00,0002,75,00095,000

20135,50,0003,50,0001,25,000

20146,75,0004,75,0001,75,000

Interpretation: The sales are increasing every year and there is more better result in the Net profits.

6. IT Investment by Strategic IT Cluster

FieldPercentage

Educational 20

Labour Health and Human Services 30

Government Operation 25

Public Safety 15

Economic Development 10

Interpretation: The IT Industry are contributing in every filed to enhance the social and economical status of the nation as well.

7. Employee views for the addition of extra features in Employee Self Service:When employees were asked whether there is any for additional features in Employee self- service, then following response were obtained as mentioned in the table 5.7

Employee views on addition of extra features in Employee Self ServiceS.NoOptionsNo of respondentsPercentage(%) of respondents

(i)Yes1215

(ii)No6885

Total80100

Employee views on addition of extra features in Employee Self Service

Interpretation: 85% of the employees responded they are satisfied with existing features of employee self service and there is no need for the addition of extra features. Whereas 15% of the employees responded that they need extra features to be added to this module.

CHAPTER VFINDING

FINDINGS1. It is observed that out of 80 employees majority (25%) of them are Assistant Managers.2. It is observed that, all the respondents (100%) are aware of the e-connect portal.3. It is observed that majority of the employees are satisfied with the e-connect portal as the mean score rating is 4.05.4. Based on employee perception, it is observed that the top most application modules and bottom two application modules used are:5. Majority of the employees find e-connect portal as highly user friendly, acceptable and possess clarity.6. As the mean score rating lies in-between 3 and 4, it is concluded that the employees of the organization are neither satisfied nor dissatisfied with the functionalities of Travel Management. However there is still a scope for improvement to make it to a very satisfied level.7. It is observed that majority (85%) of the employees express that they are very much satisfied with the existing features of the Employee self service module.8. It is observed that majority of the employees are neither satisfied nor dissatisfied with the Gyan Series module as the mean score rating lies in-between 3 and 4.. There is lot of scope for improvement in Gyan Series module to make the employees very satisfied towards this module.9. It is observed that majority (42.5%) of the employees utilize the Gyan Series module to the moderate extent only. There is lot of scope for improvement in this area, to make the employees effectively utilize the module.

CHAPTER VISuggestions

Recommendations & SuggestionsSuggestions Computers for proper networking Operating System: Windows 8 or Mac OS 10.8 Mountain Lion Memory: minimum of 4 GB RAM, recommend 8 GB RAM Processor Speed: minimum of Intel Core i5 or equivalent Hard Drive: 320 GB or larger DVD Drive*: DVD +/- RW Dual Layer Burner or Mac Super Drive Wireless: Any card that supports 802.11 g/n protocols and WPA2 Enterprise Ethernet**: 10/100/1000 (gigabit) Monitor(Desktop): 19" Monitor or larger Screen Size (Laptop): 14" (screen size can impact cost and weight) Ethernet cable or adapter- This ensures the ability to connect to a wired network, should wireless not be available or for high-bandwidth usage, such as streaming movies or high-definition video calls. Hard drive space- Hard drive space can be at a premium on some older computers, so you will want to be sure you have an adequate amount of free space for installing programs and running software. Storage space for documents, pictures, etc.can be supplemented with aUSB key,external hard drive or cloud storage options.Recommended Minimum Configuration for Computers Operating System: Windows 7 or Mac OS 10.7 (Lion) Processor:2.0 GHz, 1MB L2 Cache (each processor), with at least SSE2 support Memory: minimum 2 GB RAM Hard drive: at least40 GB free disk space Network: Wireless or Ethernet cardcapable of supporting high-speed Internet access Audio:Soundcard/speakers for listening to embedded audio or lectures Video:Monitor/screen resolution of 1024x768 or greater

CHAPTER VICONCLUSION

CONCLUSION:While the age-old concept of the network is foundational in virtually all areas of society, Computer Networks and Protocols have forever changed the way humans will work, play, and communicate. Forging powerfully into areas of our lives that no one had expected, digital networking is further empowering us for the future. New protocols and standards will emerge, new applications will be conceived, and our lives will be further changed and enhanced. While the new will only be better, the majority of digital networking's current technologies are not cutting-edge, but rather are protocols and standards conceived at the dawn of the digital networking age that have stood solid for over thirty years. The development in computer and communication technology has taken a quantum leap. The level of expertise, competence and knowledge available in India in the field of computer communication and networking technology has increased sufficiently to effect establishment of communication links within and outside India. The commissioning of International Gateway packet Switching Services (GPSS) and its PADS (Packet Assembler/Dissembler) by the VSNL (India) in five major cities of India has facilitated cheaper and reliable communication and can be considered as an important landmark. The availability of GPSS has in a way promoted use of the international online search services specially the DIALOG and the EASYNET. Most of the organization in India having online search facilities are using GPSS facilities instead of PSTN lines in preference to the International Subscribers Trunk Dialing (STD) facility or rudimentary International Telex Services. The number and kinds of online databases available for remote log-in through various international search services are increasing constantly. More than 4,000 online databases are currently available consisting of fair number of full text databases beside factual and bibliographic databases. More-over, innovative introductions like EASYNET (of Telebase, USA) through VSNL, India are a welcomed change to the information scenario. EASYNET, an information gateway, facilitate online searches over a number of databases and search services without knowing the structure of these databases or the protocols of search service involved.

BIBLIOGRAPHY Computer Networks by Tanenbaum All about Computer Network By Manohar Lodia Data communication By Ferozon

Websites http://www.cisco.comhttp://www.networkessential.comhttp://www.google.comhttp://wipro.com

Wikipedia contributors, "OSI model," Wikipedia, The Free Encyclopedia

Wikipedia contributors, "Ethernet," Wikipedia, The Free Encyclopedia

Wikipedia contributors, "Internet protocol suite," Wikipedia, The Free Encyclopedia

An Overview of TCP/IP Protocols and the Internet Gary C. Kessler 1994, 2004

The New Oxford American Dictionary 2nd Edition 2005

Wikipedia contributors, "BNC connector," Wikipedia, The Free Encyclopedia

1