Lakshmi Narayan College of Technology: Project Report On
Lakshmi Narayan College of Technology: Project Report On
lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm
LAKSHMI NARAYAN COLLEGE OF TECHNOLOGY
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
PROJECT REPORT ON
NETWORKING(INFRASTRUCTURE)
pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk
lzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxc
Submitted to: Submitted by:
Mohd. Anis
vbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopas Shibi Choudhary
IT Manager-TCS
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
TTSL BHOPAL
rtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyu
INDEX
1. Acknowledgement.
2. Certificate of Approval.
4. Introduction.
5. Basics of networking.
6. RJ-45.
7. Switch configuration
8. V-Lan
KNOWLEDGEMENT
No creation in this world is a solo effort and neither is this project. I would be very
remiss if I did not thank many people who have helped me directly or indirectly to
survive the project.
My sincere thanks to Mohd. Anis (IT Manager-TCS) for the constant enormous
support through the thick and thin and polishing it until it shines.
While talking about football for any tedious work we say ‘bend it like Beckham’
so was the case here working with TTSL, whenever I had any problem Mr. Rajesh
pandey (Network Manager) was always here to give a helping hand and pixilate
the problem. So for me it became “bend it like Rajesh Sir”.
I always believe in transforming things in their easiest possible state and I thank
Mr. Mohd Anis for allowing me work my way.
‘God help those who help themselves’ but in technical field we say god help those
who are helped by “Help Desk”. These very important people fulfilled there duties
in all aspect. So my special votes of thanks to Mr. Ganesh More, Mrs. Babita
Diwakaran and Mr. Wasim Khan.
Family comes first but here I am mentioning them in the end because their support
has always been and will always be the laying stone of any work I do. So I thank
my family with all my heart for encouraging and supporting me always.
CERTIFICATE OF APPROVAL
Bhopal (M.P.).
Tata Teleservices Limited spearheads the Tata Group’s presence in the telecom
sector. The Tata Group had revenues of around US $75 billion in financial year
2008-09, and includes over 90 companies, over 350,000 employees worldwide and
more than 3.5 million shareholders.
R.M. Lala, author of various critically acclaimed books on the Tata Group has, in
an article in The Hindu, clearly defined business ethics from the Tata Group
perspective. He says that in the public mind, ethics in business is mainly identified
with financial integrity, but the real meaning of ethics goes beyond that. The
dictionary defines ethics as the science of morals in human conduct, a moral
principle or code. Business ethics lays down how a person in business deals with
his or her colleagues, staff and workers, shareholders, customers, the community,
the government, the environment and even the nation at large.
As Tata Teleservices Limited we are part of the larger whole that is Tata Group;
and as TTSLites we have to ensure that we uphold the highest standards of
business practices and human ethics that have been set by the Tata’s over the years.
In any fast moving industry, especially one as dynamic as telecom, there are times
when you might be tempted to take shortcuts for the sake of growth. However,
many a times these shortcuts maybe unethical and against the norms of business
ethics which exist within the Group and the world outside. The Tata Code of
Conduct clearly defines the ideal behavior and ethics that every Tata employee
should follow in his/her day to day work.
If, in your daily course of life here at TTSL, you see someone taking those
shortcuts and violating what we as a part of the Tata Group and as decent human
beings stand for — take a stand and blow the whistle; it is the right thing to do!
Speak out for what is right and report any violation of our ethical standards.
Click the Ethics Violation link below to report a violation you have observed.
Ethics Violation
Trust us to do the right thing for we expect you to do the same.
Ethics: (defn.)
1. The discipline dealing with what is good and bad and with moral duty and
obligation
4. A guiding philosophy
(Source: Merriam-Webster’s Online Dictionary
Philosophy
“Sharpening the saw” is the essence of life. It is imperative to create time to renew
knowledge, skills and allow one self the opportunity to form new mental frames."
The role of Learning and Development team will be to formally create this
opportunity of renewal and continuous learning for team members, leading to
improved organizational and individual effectiveness.
Key Highlights
• Training strategy finalized and ready for roll out.
• Gyan Tarang released and rolled our for all TTSL employees. This application
aims at consolidating the Talent in TTSL.
• Six skill development training programs organized for GM and above employees.
Some of the key programs were – “Finance for Strategic Decision making”,
“Breakthrough Leadership”, “Strategic Planning and Leadership skills”.
• Induction Dates Standardized and Pre read material uploaded on intranet.
• Training calendar published on intranet so that it is easily accessible to all TTSL
employees.
SOFTWARE REQUIREMENTS IN TATA:-
2. MS-Office 2007.
4. Print Manager.
5. E-attendance.
6. Acrobat Reader
7. WinZip 14.1.
BASICS OF NETWORKING
# NETWORK TOPOLOGY:-
1. Bus topology.
2. Star topology
3. Mesh topology.
4. Hybrid topology.
5. Ring topology.
# OSI-MODEL:-
OSI stands for open system interconnection reference model. The Open System
Interconnection (OSI) reference model describes how information from a software
application in one computer moves through a network medium to a software
application in another computer. The OSI reference model is a conceptual model
composed of seven layers, each specifying particular network functions. The
model was developed by the International Organization for Standardization (ISO)
in 1984, and it is now considered the primary architectural model for inter-
computer communications. The OSI model divides the tasks involved with moving
information between networked computers into seven smaller, more manageable
task groups. A task or group of tasks is then assigned to each of the seven OSI
layers. Each layer is reasonably self-contained so that the tasks assigned to each
layer can be implemented independently. This enables the solutions offered by
one layer to be updated without adversely affecting the other layers.
The seven layers of the Open System Interconnection (OSI) reference model:
Application layer.
Presentation layer.
Session layer.
Transport layer.
Network layer.
Data link layer.
Physical layer.
The seven layers of the OSI reference model can be divided into two
categories: upper layers and lower layers.
The upper layers of the OSI model deal with application issues and
generally are implemented only in software. The highest layer, the
application layer, is closest to the end user. Both users and application layer
processes interact with software applications that contain a communications
component. The term upper layer is sometimes used to refer to any layer
above another layer in the OSI model.
The lower layers of the OSI model handle data transport issues. The
physical layer and the data link layer are implemented in hardware and
software. The lowest layer, the physical layer, is closest to the physical
network medium (the network cabling, for example) and is responsible for
actually placing information on the medium.
# NETWORKING DEVICES:-
1. Switches:-
In electronics, a switch is an electrical component that can break an
electrical circuit, interrupting the current or diverting it from one conductor
to another.[1][2] The most familiar form of switch is a manually operated
electromechanical device with one or more sets of electrical contacts. Each
set of contacts can be in one of two states: either 'closed' meaning the
contacts are touching and electricity can flow between them, or 'open',
meaning the contacts are separated and nonconducting.
2. Routers:-
A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN). Technically, network
switches operate at layer two (Data Link Layer) of the OSI model.
RJ-45 Cables
There are 3 main types of RJ-45 cables that you will run across in networking, both
LAN and WAN.
Straight-through
Crossover
Rolled
To identify the RJ-45 cable type, hold the two ends of the cable next to each other
so you can see the colored wires inside the ends.
Examine the sequence of colored wires to determine the type of RJ-45 cable, as
follows:
Straight-through — the colored wires are in the same sequence at both ends
of the cable.
Crossover — the first (far left) colored wire at one end of the cable is the
third colored wire at the other end of the cable.
Rolled — the colored wires at one end of the cable are in the reverse
sequence of the colored wires at the other end of the cable.
1. White of orange.
2. Orange.
3. White of green.
4. Blue.
5. White of blue
6. Green.
7. White of brown.
8. Brown.
1. Cut the cable using the clipping tool and align them in order, cut them in
same level, now with tool put all the wires in RJ-45 connector.
2. Color should be in order otherwise the cable made will be of no use.
# CROSS CABLE: -
SWITCH CONFIGURATION
#. HOW TO CONFIGURE IP ADDRESS OF A SWITCH:-
To start the HYPER TERMINAL –
1. Go to Start ProgramsAccessoriesCommunicationHyper
Terminal.
2. Give any username say “XYZ”.
3. Click on Default settings and click OK.
4. Hit “enter” to start the processing.
Username:
Password:
Password:
Config()#hostname ttsl
ttsl(config-if)#description ***SHIBI***
ttsl(config-if)#exit
Password XYZ
Then go to startruntype cmdtype telnet.
Then it will ask for the password, enter the password you have assigned
earlier. Only after entering the password we can gain access to the switch.
2. Through CONSOLE:- Insert the console cable in the console port of the
switch and one end connected to the system. Now we can gain access to the
switch.
V-LAN
A Local Area Network (LAN) was originally defined as a network of computers
located within the same area. Today, Local Area Networks are defined as a single
broadcast domain. This means that if a user broadcasts information on his/her
LAN, the broadcast will be received by every other user on the LAN. Broadcasts
are prevented from leaving a LAN by using a router. The disadvantage of this
method is routers usually take more time to process incoming data compared to a
bridge or a switch. More importantly, the formation of broadcast domains
depends on the physical connection of the devices in the network. Virtual Local
Area Networks (VLAN's) were developed as an alternative solution to using
routers to contain broadcast traffic.
The workstations, hubs, and repeaters together form a LAN segment. A LAN
segment is also known as a collision domain since collisions remain within the
segment. The area within which broadcasts and multicasts are confined is called a
broadcast domain or LAN. Thus a LAN can consist of one or more LAN segments.
Defining broadcast and collision domains in a LAN depends on how the
workstations, hubs, switches, and routers are physically connected together. This
means that everyone on a LAN must be located in the same area .
VLAN's allow a network manager to logically segment a LAN into different
broadcast domains (see Figure2). Since this is a logical segmentation and not a
physical one, workstations do not have to be physically located together. Users on
different floors of the same building, or even in different buildings can now
belong to the same LAN.
Logical View
Physical View
1) Performance.
3) Simplified Administration.
4) Reduced Cost.
5) Security.
#. V-LAN CONFIGURATION:-
Username:
Password:
switch>en
Password:
switch#config t
Username:
Password:
switch>en
Password:
switch#config t
switch(config)#hostname switch
switch(config)#hostname switch
switch(config)#vlan 10
switch(config-vlan)#name cs
switch(config-vlan)#exit
switch(config)#vlan 20
switch(config-vlan)#name it
switch(config-vlan)#exit
switch(config)#vlan 30
switch(config-vlan)#name ec
switch(config-vlan)#exit
switch#
switch#config t
switch(config-if)#description ***cs***
switch(config-if)#exit
switch(config-if)#description ***cs1***
switch(config-if)#exit
switch(config-if)#description ***cs2***
switch(config-if)#description ***cs3***
switch(config-if)#exit
switch(config-if)#description ***cs4***
switch(config-if)#exit
switch(config-if)#description ***cs5***
switch(config-if)#exit
switch(config-if)#description ***cs6***
switch(config-if)#exit
switch(config)#interface fastethernet 0/8
switch(config-if)#description ***it***
switch(config-if)#exit
switch(config-if)#description ***it1***
switch(config-if)#exit
switch(config-if)#description ***it2***
switch(config-if)#exit
switch(config-if)#description ***it1***
switch(config-if)#exit
switch(config-if)#exit
switch(config-if)#description ***it3***
switch(config-if)#exit
switch(config-if)#description ***it4***
switch(config-if)#exit
switch(config-if)#description ***it5***
switch(config-if)#exit
switch(config-if)#description ***it6***
switch(config-if)#switchport mode access
switch(config-if)#exit
switch(config-if)#description ***it7***
switch(config-if)#exit
switch(config-if)#description ***ec***
switch(config-if)#exit
switch(config-if)#description ***ec1***
switch(config-if)#exit
switch(config-if)#description ***ec2***
switch(config-if)#exit
switch(config-if)#description ***ec3***
switch(config-if)#exit
switch(config-if)#description ***ec4***
switch(config-if)#exit
switch(config-if)#description ***ec5***
switch(config-if)#exit
switch(config-if)#description ***ec6***
switch(config-if)#description ***ec7***
switch(config-if)#exit
switch(config-if)#description ***ec8***
switch(config-if)#exit
switch(config)#exit
switch#config t
switch(config-if)#172.18.100.263 255.255.255.2
switch(config-if)#exit
switch(config)#exit
switch#
eshow vlan
VLAN Name Status Ports
---- -------------------------------- --------- ------------------------------
1 default active
3 HSRP_Zone active
6 VLAN0006 active
7 Franchisee active
8 OMC_Zone active
9 Internet_Zone active
Fa0/24
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1
Trans2
switch#[Bswitch(config)#interface gigabitethernet 0/
THANK YOU…….
BIBLIOGRAPHY
http://social.msdn.microsoft.com
http://www.tek-tips.com/
http://slacksite.com/
http://www.devasp.net/net/articles/
http://www.tatainteractive.com
http://telespace:8080/default.aspx
c# by o’reilly
http://www.webwizguide.com/kb/asp_tutorials/add_to_database.asp
http://www.microsoft.com/
http://www.dealing-with-data.net/index.html
http://www.asptutorial.info/learn/OpenReadCreate-files.html
http://172.17.14.119/crtool/cr_process.asp
http://www.wikipiedia.com