Professional Documents
Culture Documents
UN I V E R S I T Y
(Estd. u/s 3 of UGC Act 1956)
BACHELOR OF TECHNOLOGY
in
October 2013
1
I hereby declare that the in-plant training report entitled Industrial Inplant Training In HCL INFOSYSTEM LTD CHENNAI, 03-12-2012 to 30-12-2012 submitted by me to Vellore Institute of Technology, Vellore in partial fulfillment of the requirement for the award of the degree of B.Tech in COMPUTER SCIENCE AND ENGINEERING is a record of bonafide industrial training undertaken by me under the supervision of G. Aishwarya (Software Engineer). I further declare that the work reported in this report has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.
Place : Vellore
Date: 17-OCT-2013
VIT
UNIVERSITY
(Estd. u/s 3 of UGC Act 1956)
Date:
Date :
ACKNOWLEDGEMENT
This training has been an knowledgeable experience for me and this acknowledgment is not a mere formality but a genuine opportunity to thank everyone, as without their active support and encouragement this training wouldnt have been successful. I would like to express my thanks to Ms. G. Aishwarya for her guidance and cooperation for allowing me to undergo training under her guidance.
Place : Vellore
Date: 17-OCT-2013
10BCE0205
TABLE OF CONTENTS
CHAPTER NO. 1. 2. 3. 4. 5. 7. 8. 9.
TOPIC Introduction to HCL Hardware and Networking System Administration(LINUX) Software Platforms(JAVA) Software Platforms(.NET) Android Blue Eye Technology Conclusion
HINDUSTAN COMPUTERS LIMITED (HCL): Introduction:Today HCL is a leading global technology and IT enterprise with annual revenue of US$ 6.3 billion. The HCL enterprise comprises two companies listed in India, HCL Technologies and HCL Infosystems. The 35 years old enterprise, founded in 1976, is one of India's original IT garage start ups. Its range of offerings span R&D and Technology Services, Enterprise and Applications Consulting, Remote Infrastructure Management, BPO services, IT Hardware, Systems Integration and Distribution of Technology and Telecom products in India. The HCL team comprises 93,000 professionals of diverse nationalities, operating across 31 countries including 505 points of presence in India. HCL has global partnerships with several leading Fortune 1000 firms, including several IT and Technology majors. HCL over the years has integrated and innovated products for its customer's giving key emphasis on product life cycle management, commencing from sourcing, manufacturing to installation and recovery at the end-of-life of the product to ensure protection of the environment, health and safety of all stakeholders. HCL Infosystems Ltd has established itself as Indias premier hardware, services and ICT systems integration company offering a wide spectrum of products which include - Computing, Storage, Networking, Security, Telecom, Imaging and Retail. Over the years, we have developed specialized expertise across verticals including Telecom, BFSI, eGovernance and Power.
Services:
HCL Services span the following industries: Banking and Capital Markets, Insurance, Healthcare and Pharmaceuticals, Telecom, Media, Publishing and Entertainment, Utilities, Hi-Tech and Manufacturing, Retail and Consumer Packaged Goods, Travel, Transportation and Logistic, Finance and Accounting, Supply Chain Management, Human Resources Outsourcing,
DNS: Domain Name System (DNS) translates Internet domain and host names to IP address. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.
To have a hierarchical name space a domain name space was designed. Names are defined in an inverted tree structure with a root at the top.
DHCP: The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol that is used by network devices to configure the IP settings of another devices such as a computer, laptop or tablet. Network administrators or users who connect to a wireless network do not need to configure the IP settings manually, since these settings are received from a server running DHCP. DHCP servers maintain a database of available IP addresses and configuration information, which is used to assign IP addresses to client devices. DHCP uses the same two ports assigned by IANA for BOOTP: destination UDP port 67 for sending data to the server, and UDP port 68 for data to the client. DHCP communications are connectionless in nature. APIPA: Automatic Private IP Addressing, a feature of later windows operating systems.
With
APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address and subnet mask. If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0. A client uses the self-configured IP address until a DHCP server becomes available. The APIPA service also checks regularly for the presence of a DHCP server (every five minutes, according to Microsoft). If it detects a DHCP server on the network, APIPA stops, and the DHCP server replaces the APIPA networking addresses with dynamically assigned addresses.
Routers
The addressing in the internet is referred to as Internet Protocol (IP) addressing. An IP address defines two parts: one part is similar lo postal code and other part is to the house address and in internet terminology, they are known as netid and hosted to identify a network and a host address respectively. Thus host is the end point of communication in the Internet where a communication starts. Like any other service delivery system, we also need a delivery model for the internet. The internet conceptual framework know as TCP/IP relies on a delivery model in which TCP is in charge of reliable delivery of information, while IP is in charge of routing, using the IP address mechanism. Briefly we can see that eventually packets are to be routed from source to destination. Such packets
may need to traverse many cross points, similar to traffic intersection in road transportation network. Cross points in the internet are called routers. A router function is to read the destination marked in an incoming IP packet, to consult its internal information to identify an outgoing link to which the packet is to be forwarded and then to forward the packet. Similar to the number of lanes and the speed limit on the road, a network link that connects two routers is limited by how much data it can transfer per unit of time, commonly referred to as bandwidth or capacity of link. A network then carries traffic on its links and through its routers to the eventual destination, traffic in a network, refers to packets generated by different applications, such as web or mail. Router Architecture:
They demonstrated about Ethernet gateway routers for LAN extender. Ethernet router: This Router Bridge is a very cost-effective and flexible way to connect your LAN to the Internet or Branch Offices. It integrates the functions of Bridge/Router with the WAN device. It can be ordered as 1 WAN or a 2 WAN device. The 2 WAN devices which is useful for adding the bandwidths of both WANs into a higher bandwidth. In addition, a serial asynchronous interface is provided that can be used to connect to any external modem (PSTN/ISDN/GPRS/CDMA) for Dialup or Dial Backup support.
Switches
A network switch or switching hub is a computer networking device that links network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3) and above are often called layer-3 switches or multilayer switches. Switches exist for various types of networks including Fibre Channel, Asynchronous Transfer Mode, Ethernet and others. They demonstrated about Unmanaged GT switch. Unmanaged GT switch: An unmanaged switch simply allows Ethernet devices to communicate with one another, such as a PC or network printer, and those are typically what we call plug and play. They are shipped with a fixed configuration and do not allow any changes to this configuration. 16 port 10/100/1000Mbps 24 port 10/100/1000Mbps 8 port 10/100/1000Mbps
10
LINUX
UNIX is frequently criticized for a lack of consistency between versions, vendors and even applications. UNIX is not the product of any single corporation or group, and this does have a significant impact on its personality. Linux is probably the ultimate expression of UNIX's collective identity. After Linus Torvalds created the Linux kernel and announced it to the Internet, people from all over the world began to contribute to what has become called the Linux Operating System. While there is a core group of a few developers who were key in its development, they do not all work for the same company or even live in the same country. Obviously, Linux reflects a few different views on how computers should work.
Linux in Embedded Devices Due to its low cost and ease of customization, Linux is often used in embedded systems. In the mobile sub-sector of the Telecommunications equipment sector there are three major platforms based on a more or less modified version of the Linux kernel: mer, Tizen and Android. Android has become the dominant mobile operating system for smartphones, during the second quarter of 2013, 79.3% of smartphones sold worldwide used Android.[94] Cell phones and PDAs running Linux on open-source platforms became more common from 2007; examples include the Nokia N810, Openmoko's Neo1973, and the Motorola ROKR E8. Continuing the trend, Palm (later acquired by HP) produced a new Linux-derived operating system, webOS, which is built into its new line of Palm Pre smartphones. A system call is a request by a running task to the kernel to provide some sort of service on its behalf. In general, the kernel services invoked by system calls comprise an abstraction layer between hardware and user-space programs, allowing a programmer to implement an operating environment without having to tailor his program(s) too specifically to one single brand or precise specific combination of system hardware components. System calls also serve this generalization function across programming languages; e.g., the read system call will read data from a file descriptor. To the programmer, this looks like another C function, but in actuality, the code for read is contained within the kernel. 1. Kernel Mode: the machine operates with critical data structure, direct hardware (IN/OUT or memory mapped), direct memory, IRQ, DMA, and so on. 2. User Mode: users can run applications.
11
Linux Commands: Command Example cat .bashrc cat Description Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.
Change the current working directory to /home. The '/' indicates relative to root, and no matter what directory you are in when you execute this command, the directory will be changed to "/home" Similar to the more command, but the user can page up and down through the file. The example displays the contents of textfile Logs the current user off the system.
Ls
Is -al
Whereis
whereis ls
List all files in the current working directory in long listing format showing permissions, ownership, size, and time and date stamp Locates binaries and manual pages for the ls command.
Mv
Move the file from "myfile" to "yourfile". This effectively mv -i myfile changes the name of "myfile" to "yourfile". yourfile
12
more
more /etc/profile
Lists the contents of the "/etc/profile" file to the screen one page at a time.
Advantages and Benefits of Linux 1) Linux is a free open source operating system. So it can be said, there is no license fee for buying or using Linux. 2) Easy to use. In the past, they said that Linux is a difficult operating system, and only devoted to the hackers. But now, this opinion is wrong. Linux is easy to use and can be said thats almost as easy as using Windows. 3) Almost all applications included in Windows, there have been alternative in Linux. We can access the Open Source website as Alternative to obtain useful fairly complete information about alternative of Windows applications on Linux. 4) Security is more superior than Windows. It could be argued that almost all Windows users would ever be exposed to viruses, spyware, trojans, adware, etc. This almost did not happen on Linux. Where Linux since the beginning of a multi-user design, which is when the virus infects a particular user, will be very difficult to infect and spread to other users. On Windows, this is not happening. In terms of hardware and data maintenance would be more efficient. 5) Linux is relatively stable. Computers that run on UNIX operating system is known to run stable indefinitely. Linux is a variant of UNIX, also inherits this stability. Rarely encountered the computer suddenly hangs and have to press Ctrl-Alt-Del or Restart to end the incident. It is not surprising that Linux has the large world server market.
13
JAVA
Introduction to Java
To fully understand java, one must understand the reasons behind its creation, the forces that shaped it, and legacy that it inherits. Like the successful computer language that came before, java is blend of the best elements of its rich heritage combined with the innovative concepts required by its unique mission. Much of the character of the java is inherited from C and C++.From C, java derives its syntax. Many of javas OOPs features were influenced by C++. Creation of java was deeply rooted in the process of refinement and adaptation that has been occurring in computer programming language for the past several decades.
Portable
The application runs on all platforms. The size of all primitive data types are always the same irrespective of the compiler. The libraries define portable interfaces.
Object Oriented
It mainly focuses on the objects and the methods manipulating the data. All functions are associated with objects. Almost all data types are objects like files, strings etc. Potentially better code organization and reuse.
Secure
Usage in networked environment require more security. Access restrictions are forced (private, public). Memory allocation model is a major defense.
Dynamic
Java is designed to adapt to evolving environment. Libraries can freely add new methods and instance variables without any effect on their clients. It can check the class type in runtime. Interfaces promote flexibility and reusability in code by specifying a set of methods an object can perform, but leaves open how these methods should be implemented.
14
Java Applets
An applet is a special kind of java program that is designed to be transmitted over the Internet and automatically executed by a java-compatible web browser. Furthermore, an applet is downloaded on the demand, without further interaction with user. If the user click a link that contain the applet, the applet will automatically downloaded and run in the browser. The creation of the applet changed Internet programming because it expanded the universe of objects that can move about freely in the cyberspace.
15
.NET
Introduction to .NET :
Microsoft .NET is Microsofts XML web services platform. .NET contains all that needed to build and run software based on xml, the lingua franca of internet data exchange. The .NET platform also includes a set of programming tools and infrastructure to enable the creation, deployment, management , and aggregation of XML web services and tools for the end users to interact with .NET. .Net is a new framework for developing web-based and windows-based applications within the Microsoft environment. The framework offers a fundamental shift in Microsoft strategy: it moves application development from client-centric to server-centric.
SERVER INFRASTRUCTURE : Application center 2000 Biztalk server 2000 Host integration server 2000 Mobile information 2001 server and SQL server 2000
BUILDING BLOCK SERVICES : They include passport(for user identification) and services for message delivery, file storage, userpreference management, calendar management and other functions. SMART DEVICES: Enable PCs, laptops, workstations, smartphones, handheld computers, Tablet PCs, game consoles, and other smart devices to operate in the .NET universe. Common Language Runtime (CLR): CLR works like a virtual machine in executing all languages. All .NET languages must obey the rules and standards imposed by CLR. Examples: Object declaration, creation and use Data types, language libraries Error and exception handling Interactive Development Environment (IDE).
16
Design Features
Interoperability:
Because computer systems commonly require interaction between newer and older applications, the .NET Framework provides means to access functionality implemented in newer and older programs that execute outside the .NET environment. Access to COM components is provided in the System. Runtime. Interop Services and System. Enterprise Services namespaces of the framework; access to other functionality is achieved using the feature. Common Language Runtime engine:
The Common Language Runtime (CLR) serves as the execution engine of the .NET Framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling.
Language independence:
The .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible datatypes and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, the .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language.
The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes that encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction, XML document manipulation, and so on. It consists of classes, interfaces of reusable types that integrates with CLR(Common Language Runtime).
17
Simplified deployment:
The .NET Framework includes design features and tools which help manage the installation of computer software to ensure it does not interfere with previously installed software, and it conforms to security requirements.
Security:
The design addresses some of the vulnerabilities, such as buffer overflows, which have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.
Portability:
While Microsoft has never implemented the full framework on any system except Microsoft Windows, it has engineered the framework to be platform-agnostic, and cross-platform implementations are available for other operating systems (see Silverlight and the Alternative implementations section below). Microsoft submitted the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language), the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as official standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.
18
ANDROID
Introduction
Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to write managed code in a Java-like language that utilizes Googledeveloped Java libraries, but does not support programs developed in native code.
Features of Android
Application framework enabling reuse and replacement of components Integrated browser based on the open source WebKit engine Optimized graphics powered by a custom 2D graphics library; 3D graphics based on the OpenGL ES 1.0 specification (hardware acceleration optional) SQLite for structured data storage Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF) Bluetooth, EDGE, 3G, and WiFi (hardware dependent) Camera, GPS, compass, and accelerometer (hardware dependent) Rich development environment including a device emulator, tools for debugging, memory and performance profiling, and a plugin for the Eclipse IDE
Android Architecture
There are four layers in android architecture. They are 1) Applications 2) Framework services 3) Libraries and android runtime 4) Linux kernel
19
1) Applications In Application layer there are applications like browser, home contacts, games, other apps .
2) Framework services In this layer codes written mostly in java. This framework contains activity manager, window manager view system, package manager, location manager and notification manager. 3) Native libraries ,services and daemons In this layer the code are written in C or C++. This layer contains SSl, SGL, media frame work , sqlite, Open GL, surface Manger. 4) The Linux kernel This is the last layer in android, this layer contains camera drivers, flash memory drivers, display driver, power management drivers for hardware, and inter-process communication, networking, file system.
20
1) Giving sensing abilities 2) Detecting human emotions 3) Respond properly Various methods of accomplishing affective computing are: 1) Affect Detection 2) MAGIC Pointing(Manual Acquisition with Gaze Tracking Technology) 3) Suitor(Simple User Interface Tracker) 4) Emotion Mouse
21
Affect Detection This is the method of detecting our emotional states from the expressions on our face. Algorithms to real time implementation that extract information from facial expressions and head gestures are being explored. Most of the information is extracted from the position of the eye rows and the corners of the mouth. MAGIC Pointing MAGIC stands for Manual Acquisition with Gaze Tracking Technology. a computer with this technology could move the cursor by following the direction of the user's eyes. This type of technology will enable the computer to automatically transmit information related to the screen that the user is gazing at. Also, it will enable the computer to determine, from the user's expression, if he or she understood the information on the screen, before automatically deciding to proceed to the next program. The user pointing is still done by the hand, but the cursor always appears at the right position as if by MAGIC. By marrying input technology and eye tracking, we get MAGIC pointing. Suitor SUITOR stands for Simple User Interface Tracker. It implements the method for putting computational devices in touch with their users changing moods. It is mostly used in we used applications. By watching what we page the user is currently browsing, SUITOR can find additional information on that topic. The key is that the user simply interacts with the computer as usual and the computer infers user interest based on what it sees the user do. Emotional Mouse This is the mouse embedded with sensors that can sense the physiological attributes such as temperature, body pressure, pulse rate, and touching style, etc. The computer can determine the users emotional states by a single touch. IBM is still performing research on this mouse and will be available in the market within the next two or three years. The expected accuracy is 75%.
22
Conclusion
In the last I can say that taking training in such a company proved to be very beneficial for me. I learnt about the various technologies in current IT field. This training has proved to be an excellent benefit. It provides an opportunity to know about the working of routers, switches and other modern technologies like Android, Java, Linux used in HCL Infosystem. The training proved to be a great opportunity to make the students learn about different technologies.
23