final

42
Understanding of IT Infrastructure Services and Management Project Report Submitted by :- Varun Tyagi Training Period May 15, 2016 to July 20, 2016 Under the supervision of Mr. Sanjay Sharma (Manager Infotech Ghaziabad Plant) INFOTECH DEPARTMENT SHRIRAM PISTONS AND RINGS LTD. A4 & A5, INDUSRTIAL AREA, DELHI MEERUT ROAD

Upload: varun-tyagi

Post on 12-Feb-2017

18 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Final

Understanding of IT Infrastructure

Services and Management Project Report

Submitted by :-Varun Tyagi

Training PeriodMay 15, 2016 to July 20, 2016

Under the supervision of Mr. Sanjay Sharma

(Manager Infotech Ghaziabad Plant)

INFOTECH DEPARTMENT

SHRIRAM PISTONS AND RINGS LTD.

A4 & A5, INDUSRTIAL AREA, DELHI MEERUT ROAD

GHAZIABAD-201003

Page 2: Final

COMPANY PROFILEShriram Pistons & Rings Ltd. develops, manufacturers, and sells pistons, piston rings, pins, and engine valves for OEMs. The company offers diesel and gasoline pistons; and cast iron, steel, and moly piston rings. The company also provides replacement parts to automotive workshops, repair shops, and service stations. Shriram Pistons & Rings products are used in automobile vehicles and gensets. The company was incorporated in 1963 and is based in Delhi.

The plant has been recognized as one of the most modern and sophisticated plants in North India in the field of Automobile.The out of the Ghaziabad plant is as under (excluding Pathedi):

Piston : 15.8 million per year actual production in 2014-15

Pin : 11.0 million per year -do-

Rings : 76.5 million per year -do-

Engine valve : 32.8 million per year -do-

The company has technical collabrations with:

i. M/s. Kolbenschmidt, Germany to produce Pistons.

ii. M/s Riken corporation,Japan for Piston Rings.

iii.M/s Fuzi Oozx,Japan for the manufacture of Engine Valves.

iv. M/s Honda Foundary,Japan for technical support.

The company supplies its products to several Original Equipments Manufacturers(OEMs) like Ashok Leyland,Tata motors,Tata cummins,Maruti Suzuki,Swaraz,Hondasiel cars ,Sundram Claylon ,Honda Scooter. SPRL is also supplying its products to international OEMs like Renault,Nissan,FORD&Riken,etc.

At Shriram Pistons & Rings Ltd. Quality is an integral part of whatever we do ,which is reflected in the company’s Quality Policy.

“Total customer satisfaction through quality management and continuous improvement.”

Page 3: Final

ACKNOWLEDGEMENT

This acknowledgement transcends the reality of formality when I would like to express deep gratitude and respect to all those people behind the screen who guided, inspired and helped me in the completion of my project work.

Completing the task is never a one man- effort. It is always a contribution of a number of an individual. All the people at Shriram Pistons and Rings ltd. who made this such a happy experience for me, you all have made this small journey of knowledge and developing skills in me lot more easier.

Firstly, I want to thank God for being so gracious on me to help me in each and every step taken by me. Then I want to thank MR. V.K JAISWAL for giving this very special opportunity to me. A very heartly thanks to all employers and employees of this organization who helped me successful completion of this project.

This project would not have been completed without the proper guidance of my faculty mentor Mr. SANJAY SHARMA and Mr. SHASHWAT SOMYAKANT. A big contribution and invaluable time you have given me during this eight weeks training.

Last but not the least my parents for continuous support and love they have given to me. They are actually behind everything I have achieved till now.

Varun Tyagi

Page 4: Final

Objective of Internship

The objectives of industrial training in SPRL are:

1. To provide students the opportunity to test their interest in a particular career before permanent commitments are made.

2. To develop skills in the application of theory to practical work situations.3. To develop skills and techniques directly applicable to their careers.4. Internships will increase a student's sense of responsibility and good work habits.5. To expose students to real work environment experience gain knowledge in

writing report in technical works/projects.6. Internship students will have higher levels of academic performance.7. Internship programs will increase student earning potential upon graduation.8. To build the strength, teamwork spirit and self-confidence in students life.9. To enhance the ability to improve students creativity skills and sharing ideas.10.To build a good communication skill with group of workers and learn to learn

proper behaviour of corporate life in industrial sector.11.The student will be able instilled with good moral values such as responsibility,

commitment and trustworthy during their training.

Understanding of computer network and its components deployed within the company for efficient working as well as communication with Head Office (HO), other plant location (Pathredi), Regional Service Office’s (RSO) and godowns across the country.

Introduction to networking

A computer network or a data network is a telecommunications network that allows computers to exchange data.

In computer networks, networked computing devices pass data to each other along data connections. The connections (network links) between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.

Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones, servers as well as networking hardware.

Two such devices are said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.

Page 5: Final

SPRL NETWORK UNDRSTANDING

The Internet Service Providers (ISP) for SPRL are Reliance Communications and Tikona Digital Networks.

Various links at different locations (27 locations including Head Office (New Delhi), Pathredi Plant, Ghaziabad Plant Regional Service Office’s and godowns) across the country are managed within the Infotech department through a single monitoring system, the portals have been provided by the respected ISP’s.

Whenever a link at any of the location is down or out of service due to any reason the same is displayed over the monitoring system and necessary action is taken by the concerned authority.

Within the company through central switching pattern various independent switches have been put up in different departments (e.g. Piston plant, pin plant etc.) for efficient and fast communication.

The data centre for the entire locations across the country is in Ghaziabad Plant and all the security validations, checks are routed through this data centre to other locations.

SHRIRAM PISTON & RINGS VLAN NETWORK LAYOUT DIAGRAM

Page 6: Final

Network Diagram

Page 7: Final

CONTENTS

S.no TopicI. Company Profile

II. Acknowledgement

III. Objective of Internship

IV. SPRL Network Understanding

V. Contents

1 NETWORK MONITORING SYSTEM

Introduction to NMS Example System Set-Up Map of Networking Monitoring System Performance & Fault Management Intuitive Point-and-Click Interface Advanced Alerting

2 IT HELPDESK MANAGEMENT & TRACKING SYSTEM

Introduction to It Helpdesk Management & Tracking System

Desktop Overview IT Helpdesk IMTS Dashboard Up-to-Date Inventory IMTS Reports Track of all Your IT Purchases

Your Active Directory Users Limitations

3 END POINT SECURITY (McAfee Antivirus)

Introduction to End Point Security Introduction about McAfee Antivirus Three main locations of EPS McAfee Dashboards

Page 8: Final

Policy Catalog Queries & Reports Server tasks Server logs Working of McAfee Antivirus Steps involved in access to USB mass storage device Steps involved in DLP bypass (USB)

4 MULTIPROTOCOL LABEL SWITCHING (MPLS)

Introduction to MPLS Network Management Factors determining enterprises migrating towards MPLS

5 CONCLUSION

Page 9: Final

1. NETWORK MONITORING SYSTEM

IntroductionThe problem, which will often arise, when monitoring a computer network from a single location, is that firewalls may considerably restrict communication between computers in a local network and computers outside that network. In our project we try to resolve the problem by monitoring the network from multiple locations. We implement a central piece of software (the Server), which collects results of network activity measurements from distributed monitors (Agents).

An Agent performs network activity measurements and sends results to the Server. A regular network monitoring tool needs to communicate with computers in the entire network from a single location. An Agent, however, only monitors computers in the local network, to which it belongs, and is, therefore, much less restricted by firewalls.

Network measurements taken by Agents may include checking for strange network activities (e.g. port scan), monitoring traffic (e.g. using PCap driver), extracting SNMP information from SNMP devices found in the local network, pinging someone, trying to access a Web server and characterizing time required to load a Web page etc.The Server collects results, stores them in a database and provides statistics for the entire monitored network. The Server also remotely configures the functionality of Agents.

Example system set-up The figure depicts a network consisting of 3 local networks. The Server is located on the computer of a network administrator in one of the local networks, namely in LAN # 3. Each LAN has one Agent in it. Each Agents measures network activity in its LAN and reports results to the Server. The Server stores the results in database. Since Agents only perform measurements inside the local network,

Page 10: Final

to which they belong, the network measurements are not restricted by the firewalls on the boundaries between the LANs.

The System will have three main functions:

Monitor connectivity status of servers and services Maintain logs of all status events and changes Send e-mail notifications to Helpdesk when a service is down

System administrators (“Administrators”) will have many more options available to them as a protected service. They will be able to view a much more detailed status report on the network, with the ability to monitor the status of specific services on the server such as Telnet, POP3, IMAP and others. In addition to this, they will be able to view the status logs.

Fig.: System diagram

Map of Networking Monitoring System

Page 11: Final

2.32.32.4

Performance & Fault Management Orion NPM provides comprehensive performance, fault management, and network availability tools to ensure that your network is always running at peak performance. Via a cutting-edge web interface, Orion NPM gives you a unified view into the performance of thousands of nodes and interfaces on your network. From a single web page, you can monitor performance management metrics from any SNMP-enabled device, including routers, switches, firewalls, and servers. Commonly monitored metrics include bandwidth utilization, packet loss, latency, errors, discards, and quality of service. With Orion NPM, you get the information you need to quickly fix issues before users ever have a chance to call the help desk.

Intuitive Point-and-Click Interface When you need critical network information fast, you can’t waste time trying to reverse-engineer the thought process of whoever designed the cryptic user interface of your network management software. Orion NPM’s interface was designed by network engineers, for network engineers. The highly intuitive, fully customizable web-based interface offers point-and-click simplicity and allows you to remotely view network fault, availability, and performance information through

Page 12: Final

detailed graphs, tables, and lists. You’ll love the top 10 lists that give you at-a-glance visibility into the nodes and interfaces experiencing the highest amounts of network traffic, capacity utilization, response time, memory usage, CPU load, disk space volume, and more. Plus, real-time network maps enable you to visualize network health by location, while device troubleshooting displays present critical metrics required to quickly resolve problems with network devices.

Advanced Alerting Orion NPM enables you to quickly and easily configure powerful network alert engines to respond to hundreds of different network scenarios, including multiple condition checks. These network alerts help you recognize and correct issues before your users experience performance degradation or availability issues. With alerting support for correlated events and sustained conditions, Orion NPM ensures that you don’t get paged at 3am unless there is a critical issue. Additionally, Orion NPM can automatically escalate network alerts until a problem is resolved.

2. IT HELPDESK MANAGEMENT

& TRACKING SYSTEM Introduction to It Helpdesk Management &

Tracking SystemHelpdesk management software offers numerous benefits to sysadmins and IT pros. Company employees always appreciate a resource for their potential issues and queries. When employees submit a report, they’re assured that their problems are forwarded to the correct member of the support staff. Once a report has been submitted to the system, the employee will have the ability to log in and track the progress of their ticket.

Help desk management software acts as a web-based system, which means it can help with managing inquiries as well as other types of support processes. The software also ranks inquiries and classifies them all by priority. At the same time, the software transfers them to the appropriate department for issue resolution.

Page 13: Final

This type of software can also help reduce the amount of training that’s needed for the support staff. As a result, your support staff can become experts in just a short amount of time. Such an advantage allows for a much speedier resolution of employee networking issues, which in turn frees up your support staff to support an even higher volume of employees.

Support staff can also benefit from help desk management software as their jobs become easier. In addition, employees will receive service in a more efficient manner and wait times are dramatically reduced. Because ticket history is stored, the support staff is better able to accurately assess issues and take appropriate action.

Another benefit to leveraging help desk management software is that managers have the ability to keep track of members and their performance in the company. Since the typical help desk management solution has resolution and tracking tools, reports are easily completed. Employees will ultimately be more productive with shorter periods of downtime, which benefits the company as a whole.

Desktop OverviewThe Helpdesk Desktop is a simple yet powerful multi-user web application that allows to inventory, monitor, report on and troubleshoot your network, run a help desk, and access a community of IT pros all from one easy to use interface. The goal of the Helpdesk Desktop is to simplify the day to day management of the technology for free. It is a software that works and makes the work easy.

IT HelpdeskHelpdesk, a means of communication between IT and users. End users contact IT Team when they are having problems with their IT services. The purpose of it is to ensure that users receive appropriate help in a timely manner.

a) Previous Scenario:

Earlier helpdesk’s purpose was unachievable as there was certain limitation in it. There was no record of users request submitted to IT.

Users registered their complaints through telephone or mails, which were later on maintained by engineer in excel sheet.

Page 14: Final

Because of this we neither were able to track the calls nor had correct reports regarding the delay in response.

b) Current Scenario: Now we have launched the Online Portal in which users can submit their request to IT team.

It includes:

a) Users shall register their complaint and a unique identification number (Ticket Number) is generated by system for user’s future perusal.

b) Proactive actions are taken on each complaint; and in case users are not satisfied with the redressal, they have the provision of reopening their complaints for better services.

Page 15: Final

It's tightly integrated into your network inventory. No more typing in all of that configuration data related to a problem. When we are viewing a device in Helpdesk we simply click the New Ticket link on the toolbar and all of the data for that device is automatically attached to that help desk ticket. Meaning, now all the data you need is stored in that ticket which is just one-click away.

The Help Desk page shows you at a glance a summary of the tickets in your system - including who they're assigned to.

Dashboard

Page 16: Final

Click the Helpdesk logo in the navigation bar to see an integrated dashboard for everything you need to get your job done. You can keep this page up in your browser and quickly see everything from your Help Desk Tickets, Alerts, Inventory, and IT news, to any new hardware or software that was recently detected in your environment.The dashboard is designed to drive the work so can be customized to fit the needs. There's a default dashboard set up with your Helpdesk installation. After using Helpdesk for a while and becoming more familiar with all of its features you can use the content/widgets to update the dashboard with content you care about most

Up-to-Date InventoryHelpdesk automatically scans your network and discovers all your hardware and software assets. These are categorized in groups like 'Workstations', 'Servers' and 'Printers' so that you can quickly and easily find what you're looking for. Need more or different groups than what we give you? You can create your own custom groups. Click on any device and you can see everything about it, including: How is it configured? How much free disk space does it have? What software is installed? How is the network adapter configured? With Helpdesk inventory, almost anything you need to know about a device is right there at your fingertips.

The great thing about Helpdesk is that you're not limited to only tracking assets found on your network. You can keep track of literally any kind of company asset you're able to describe and put an ID tag on.

But it's not just about static inventory. Helpdesk can help you find problems and fix them. Network scans are updated regularly and the Timeline automatically highlights any configuration changes that have occurred since the last scan. Did any new software get installed? Are there new devices on your network? Did a new user get added you don't know about? Want to know how one machine is different than another? Just select both and compare, you'll see all the hardware and software differences automatically.

Helpdesk ReportsEnd of month. End of quarter. End of year. It's all the same. Somebody wants one of those pesky reports. "What software is installed in our network?" "I need a list of all our hardware assets." "How much disk space are we using?" And you're the one left scrambling to make it happen. Not anymore. Give key personnel the ability to run their own reports by adding them as Helpdesk users (with reporting

Page 17: Final

access only). So now, the reports you need, or they need, are just one click away.Several reports based on your everyday IT needs are built into Helpdesk out-of-the-box. Don't see the report you're looking for? No problem, we've made it easy to build your own! Just select the type of report (hardware, software or tickets), the criteria you're looking for, and what data you'd like to see in the report. Give it a name, save it, and you're done. Three simple steps is all it takes to create a custom report.And the best part? All of these reports can be exported to any format you like. Want a nice printed copy? Choose PDF format. Need to run calculations on the data? Export to Excel. Want to integrate the information into another document or application? Export in CSV format. The data you need, the way you need it, all at the click of a button.

Track of all Your IT Purchases Use the built in purchase workflow to manage your purchases from when they’re requested until they’re received. This includes built-in metrics covering pending approval, approved, purchased, and received. You can keep track of IT-related purchases either tied to tickets or independently entered. Also see how much you're spending across your inventory or by device, including the breakdown of hardware versus time and labor.

Your Active Directory UsersWith People View, you can really incorporate your Active Directory into Helpdesk to get even more information in your help tickets and network inventory. We can see all of a user's network devices, including the manually added ones that have a habit of disappearing. This will also allow for network devices to be automatically associated with tickets based on the user who submits the ticket. The Active Directory integration lets you import users' key details into Helpdesk. You can edit these details in Helpdesk and, if your AD account has WRITE

Page 18: Final

permissions, push these changes to AD. We can also unlock accounts and reset users' passwords directly from Helpdesk.

LimitationsDespite the impressive capabilities of the Helpdesk Network Monitor, there are some limitations. For example, the alert thresholds are handled on an overall basis but you can't change individual settings. This means that you may get emailed about events that aren't actually critical. I noticed a disk activity alert when one of the machines being monitored started doing backups, for example. However, you can control when Spiceworks Network Monitor sends out emails so, while such an alert may show up on the dashboard, you do not need to get emailed about it.The other notable limitation is that, currently, Helpdesk Network Monitor does not support Linux servers.

3. END POINT SECURITY (McAfee Antivirus)

Introduction to End Point SecurityIn network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the

Page 19: Final

network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.

Usually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).

Introduction about McAfee AntivirusMcAfee is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company.

The company has been a wholly owned subsidiary of Intel since February 2011 and now forms part of its Intel Security division. Intel confirmed in 2014 that it planned to drop the McAfee brand.

McAfee launched Cloud Secure program, a new service for Software-as-a-Service (SaaS) providers to add additional security to their cloud deployments. The new program includes cloud security certification services that are provided on an annual basis and will include existing security controls, processes and certifications, as well as future cloud security standards; and automatic and daily security audits, remediation of vulnerabilities and reporting of the security status of their service and network using the McAfee Cloud Secure service

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world.

End-point Security SPRLSPRL bought McAfee Endpoint Protection of Business product which include the following features:

a) VirusScan Enterpriseb) Anti-Spyware Enterprisec) VirusScan Command Lined) SiteAdvisor Enterprise Pluse) Web Filtering

Page 20: Final

f) Device Controlg) Desktop Firewallh) Security for Email Servers with Anti-Spami) ePolicy Orchestrator (ePO)-- RealTimej) GTI (Global Threat Intelligence)k) Host Intrusion Prevention (HIPSDesktop)l) Full Disk Encryptionm) Encryption for Files and Foldersn) VirusScan for MACo) VirusScan for Linuxp) Enterprise Mobility managementq) Deep Defenderr) Security for Microsoft SharePoints) VirusScan Enterprise for Storage

Three main locations of SPRLThese products are valid for all our three locations.

a) GZB - 172.28.2.XXX:8443

b) HO - 172.28.4.XX:8443

Page 21: Final

c) PTD - 192.168.192.XX:8443

Page 22: Final

McAfee DashboardsDashboards allow you to keep a constant eye on your environment. Dashboards are collections of monitors. Monitors can be anything from a chart-based query, to a small web application, like the MyAvert Security Threats, that is refreshed at a user-configured interval.Users must have the appropriate permissions to use and create dashboards.

Policy CatalogThe Policy Auditor agent plug-in debug tool allows you to run audits, benchmarks, and checks on system and save the results, including debug

Page 23: Final

information and the log file, to a ZIP file. The debug tool has an interactive console interface for all operating systems as well as a graphical interface for Windows systems. The graphical interface includes these buttons: Audits, Benchmarks, Checks, Run Selected Item, Save Debug Info, and Close. The details section shows information about a selected benchmark, audit or check.

Queries & ReportsTo monitor browser protection and security, use the ePolicy Orchestrator dashboard, monitor, and query features. SiteAdvisor Enterprise Plus provides a number of predefined queries and monitors that create reports on the sites and

Page 24: Final

download files which user’s access or attempt to access. After running queries and reports over an extended period of time, it is good practice to purge the ePO database of SiteAdvisor Enterprise Plus data to ensure proper generation of queries and reports. This occasional database maintenance is done by running an ePO purge server task.

Server tasksFollowing tasks can be performed in server task

a) we can edit tasks or create new tasksb) Select the appropriate query from the list. There is a My Groups (private)

and Shared Groups (public) tab at the top of the popup window.c) Set the actions or what to do with the list of systems pulled by the query.d) Set the frequency and time to run the server task.

Server logs

Page 25: Final

The server task log provides information about your pull and replication tasks, in addition to all server tasks. This provides the status of the task and any errors that may have occurred.

Working of McAfee Antivirus

Page 26: Final

Steps involved in enable/disable access to USB mass storage devicea) Log on to the ePO console.b) Click Menu, Data Protection, DLP Policy Manager.c) In Definitions, click Device Control, Device Definitions.d) Click Actions, New, Removable Storage Definition.e) Add Block USB drives to the name of the definition.f) Add the Bus Type property and change the value to USB. Leave the Comparison

to Equals.g) Click Save.h) Either create a new Rule Set or open an existing Rule Set.i) In the selected Rule Set, click Actions, New Rule and Removable Storage Device

Rule.j) Name the rule Block All USB Drives Removable Storage Device Rule.k) Change State to Enable.l) Select the appropriate user(s) to assign the rule to.m) In Removable Storage, select Block USB Drives in the context menu.n) Click the Reaction tab and select Block under the Prevent Action drop-down

menu.o) Configure User Notification and Report Incident as appropriate.p) Under the Computer disconnected from the corporate network section, leave the

Prevent Action set to react the same way as connected system.q) Click Save.r) If a new Rule Set was created, select Activate the Rule Set in DLP Policy in the

Policy Catalog.s) If no new Rule Set was created, navigate to the Policy Assignment tab in the

DLP Policy Manager and apply the appropriate policy.

Steps involved in DLP bypass (USB)a) Open the DLP Policy in McAfee. In the menu-bar under "tools" you will find to

create a release code.b) The release-code is generated via "challenge-response". It is only valid for the

requesting client. Please take attention that the release code will completely bypass the DLP Agent for the defined time.

c) No. the DLP admin can create a release code for himself. But it will be reported to the log, as normal.

Page 27: Final

d) You can configure in the DLP policy if you want to inform a user, when a device is blocked. In this message the user has the option to "request" the release-code.

4. MULTIPROTOCOL LABELSWITCHING (MPLS)

Introduction to MPLSMultiprotocol Label Switching (MPLS) is a protocol for speeding up and shaping network traffic flows. MPLS allows most packets to be forwarded at Layer 2 (the switching level) rather than having to be passed up to Layer 3 (the routing level). Each packet gets labeled on entry into the service provider's network by the ingress router. All the subsequent routing switches perform packet forwarding based only on those labels—they never look as far as the IP header. Finally, the egress router removes the label(s) and forwards the original IP packet toward its final destination.

The label determines which pre-determined path the packet will follow. The paths, which are called label-switched paths (LSPs), allow service providers to decide ahead of time what will be the best way for certain types of traffic to flow within a private or public network.

Service providers can use MPLS to improve quality of service (QoS) by defining LSPs that can meet specific service level agreements (SLAs) on traffic latency, jitter, packet loss and downtime. For example, a network might have three service levels -- one level for voice, one level for time-sensitive traffic and one level for “best effort”

Page 28: Final

traffic. MPLS also supports traffic separation and the creation of virtual private networks (VPNs) virtual private LAN services (VPLS) and virtual leased lines (VLLs).

MPLS got its name because it works with the Internet Protocol (IP), Asynchronous Transport Mode (ATM) and frame relay network protocols; any of these protocols can be used to create an LSP. It was created in the late 1990s to avoid having routers waste time by having to stop and look up routing tables. A common misconception is that MPLS is only used on private networks, but the protocol is used for all service provider networks -- including Internet backbones. Today, Generalized Multi-Protocol Label Switching (GMPLS) extends MPLS to manage time division multiplexing (TDM), lambda switching and other classes of switching technologies beyond packet switching.

Network ManagementEvery global organization has to handle network complexities with their increasing number of remote sites. This is where network performance factors such as connectivity, data transfer, and traffic management gain more significance. While several types of traffic flow within the network (such as multimedia, email messages, VoIP, SAP), enterprises were pushed to use private lines for voice, Frame Relay and ATM for data access. Each type of data has increased exponentially and the dependency on these datalink protocols has let companies to explore on a solution that serves as a common platform to manage all types of traffic. With requirements of bandwidth scalability, security, flexibility, and fast data transmission, MPLS (Multi-Protocol Label Switching) outdoes others as a technique that eliminates the discrepancies found in Layer-2 protocols.

Factors determining enterprises migrating towards MPLS The following key factors determine why enterprises migrate towards this technology:

a) Scalabilityb) Securityc) Costd) Speede) Qualityf) Reliability

a) Scalability

This feature defines why MPLS is most sought by companies when they plan to migrate. Common protocols such as Frame Relay and ATM work with a specified bandwidth for T3 and T1 connections (45Mbps/1.5Mbps). In case of MPLS, there are no specifications for bandwidth as this label switching technology can scale from a very low range to the highest bandwidth as the network expands. The specialty is

Page 29: Final

that it purges cell overhead of ATM, segmentation, and reassembling of conventional protocols. It allows optimum bandwidth usage and is flexible with T1, T3, satellite, and wireless connections. In addition, distribution protocols such as LDP, RSVP augment packet relay with routing protocols like OSPF, IS-IS for automatic rerouting. The protocol support of IP versions (IPv4, IPv6), ATM, Frame Relay, FDDI, and Ethernet, extends its adaptability. Huge networks can be managed with lesser number of labels for packet forwarding, such that they scale to corporate firm’s network expansion.

b) Security

As companies expand with several local and remote sites globally, MPLS gains high magnitude as security has to be ensured in both edge and core of the network. It does this by concealing core network information from customer VPNs to avoid hacking of internal information. Secure packet transmission is possible only when it facilitates protection mechanisms such as validation of packet routing, label signaling, encryption, and decryption. Using virtual private circuits, this technology removes the need of data encryption as seen in IP based networks. In each of these, this label-based technique provides tight security through generic routing encapsulation (GRE), segregating Virtual Private Network (VPN) and Internet traffic, packet filtering, defend from VPN spoofing, setting firewall, and gateway to prevent denial-of-service attacks. The infrastructure is set in such a way that the MPLS core is independent from other VPNs and hides them external network access.

c) Implementation Cost

Most of the modernized firms use T1 and T3 connections that are quite expensive for their complex network operations. For additional bandwidth requirements, extra purchase of these tiered connections incurs more investment for any corporate firm during the capacity-planning phase. This increases the cost of ownership (TCO) which eventually trims down the ROI return. A smart way to deal with this is MPLS, a ‘best managed service’ unifying all networks on a single platform with its uncomplicated deployment. It is also protocol-neutral and renders full support for applications ranging from business critical traffic (VoIP, SAP) to mail attachments. With less resources and maintenance, this assures application delivery even at traffic congestion. Rather than investing over private lines (on lease), Frame Relay, and ATM, MPLS requires only a one-time investment to merge all protocols with its core infrastructure, which simplifies the complexity. By sending VoIP and video traffic over data and control planes, it shrinks the operating cost of the management and further purchase made by the management on data services is avoided. For the reason that it is implemented worldwide, its cost is experiencing a lowdown. Hence, it is evident that enterprises planning to migrate will reap the benefits of low TCO and high ROI for their full mesh network topology as they expand.

d) Packet Transfer Rate

Using labels for packet routing, MPLS allows high-speed packet transfer with its ‘label-switching’ technique. Companies that use Internet Protocol (IP) in their network undergo a conventional packet forwarding mechanism. For each hop

Page 30: Final

between nodes, packets will be analyzed, read header information, and finally lookup in routing table takes place. This is a time-eating process as each hop is dependent on a constant lookups in route tables. MPLS is a total contrast to this where packets are assigned with labels on each node and headers are analyzed only once for forwarding packet through label switch paths (LSP). As it is ‘label based’, packet relay is quick that routes them in the configured path for fast packet transmission With this mechanism, packet that requires zero-delay transmission can make it even at traffic blockage, as a result eradicating the occurrence of packet dropping of sensitive traffic. Forward Equivalence Class (FEC) determines the type of traffic and subsequently a label is assigned according to the next label switch router (LSR). Thus, performance metrics such as processing speed, response time, and packet transfer rate are comfortably met.

e) Class of Service (CoS)

This feature is used to handle traffic in both virtual and point-to-point circuits. Both Frame Relay and ATM protocols use ‘service class’ to set type of traffic for packets in point-to-point circuits. Such circuits requires heavy engineering tasks to provision the entire network. Most of the IP implemented networks are not scalable and for this reason, a managed service like MPLS meets the requirement of companies with more of real-time VoIP and SAP traffic. A CoS value (3-bit) is encoded in the header to route traffic based on LSP, after placing them in the priority queue. Managing networks based on CoS makes it simple with easy-to-do engineering tasks for network. It also comprises methods to reserve resources for specific business applications by dropping delayed packets, thus making it available for data transmission. At this instant, the traffic carrying multimedia content (audio/video - have a huge impact over packet delivery) gains the most from MPLS as it reduces latency factors such as RTT and jitter.

f) Reliability& Redundancy

The constraints of transmission such as bandwidth allocation, resource usage, and packet relay determine the reliability of any protocol. Even at times of primary link failures, Multiprotocol Label Switching (MPLS) manages these bottlenecks with automatic rerouting of packets in alternative path of backup tunnels and utilizes bandwidth to the best possible level showing 99.999% reliability. It makes certain that backup premises are able to reconnect with remote sites during disasters. This ensures disaster recovery and any overflowing traffic in a link should be efficiently handled by the traffic engineering tasks set for a protocol. Any network operation should be done with no delay, as any failures will be handled with an alternate setup. Most of the conventional protocols do not conform to these standards, which makes MPLS the finest option to overcome all types of traffic bottlenecks.

Page 31: Final

CONCLUSIONThis internship has been an excellent and rewarding experience. I have been able to meet and network with so many people that I am sure will be able to help me with opportunities in the future.

One main thing that I have learned through this internship is time management skills as well as self-motivation. When I first started I did not think that I was going to be able to make myself sit in an office for eight hours a day, five days a week. Once I realized what I had to do I organized my day and work so that I was not overlapping or wasting my hours. I learned that I needed to b organized and have questions ready for when it was the correct time to get feedback. From this internship and time management I had to learn how to motivate myself through being in the office for so many hours. I came up with various proposals and ideas that the company is still looking into using.

I enjoy this line of work. I will continue to work hard in my position and hope to continue to learn about the industry and meet new people. This was an excellent experience and I hope that other interns got as much out of it as I did.

The purpose of Industrial Training was to expose me to real work of environment experience and at the same time, to gain the knowledge through hands on observation and job execution. From the industrial training, I have also developed skills in work ethics, communication, management and others. Moreover, this practical training program allowed me to relate theoretical knowledge with its application in the manufacturing industry.

Finally I want to say that the whole experience of working in Shriram Pistons & Rings Ltd. was great. This organization has a superb work culture, great minds. I learned a lot about computer networking.