You are on page 1of 23

VIT

UN I V E R S I T Y
(Estd. u/s 3 of UGC Act 1956)

Vellore - 632 014, Tamil Nadu, India

INDUSTRIAL INPLANT TRAINING IN HCL INFOSYSTEM CHENNAI 03-12-12 to 30-12-12


AN INDUSTRIAL INPLANT REPORT submitted by

P.V.S DINESH KUMAR 10BCE0205


in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY
in

COMPUTER SCIENCE AND ENGINEERING

October 2013
1

DECLARATION BY THE CANDIDATE

I hereby declare that the in-plant training report entitled Industrial Inplant Training In HCL INFOSYSTEM LTD CHENNAI, 03-12-2012 to 30-12-2012 submitted by me to Vellore Institute of Technology, Vellore in partial fulfillment of the requirement for the award of the degree of B.Tech in COMPUTER SCIENCE AND ENGINEERING is a record of bonafide industrial training undertaken by me under the supervision of G. Aishwarya (Software Engineer). I further declare that the work reported in this report has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

Place : Vellore

Signature of the Candidate

Date: 17-OCT-2013

VIT
UNIVERSITY
(Estd. u/s 3 of UGC Act 1956)

Vellore - 632 014, Tamil Nadu, India

School of Computer Science and Engineering BONAFIDE CERTIFICATE


This is to certify that the in-plant training report entitled Industrial Inplant Training In HCL INFOSYSTEM LTD CHENNAI, 03-12-2012 to 30-12-2012 submitted by P.V.S Dinesh Kumar (10BCE0205) to Vellore Institute of Technology, Vellore in partial fulfillment of the requirement for the award of the degree of B.Tech in Computer Science and Engineering is a record of bonafide in-plant training undertaken by him under my supervision. The training fulfills the requirements as per the regulations of this Institute and in my opinion meets the necessary standards for submission. The contents of this report have not been submitted and will not be submitted either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.
Prof. Anand.M. Program Manager (B.Tech, CSE) Ms. G. Aishwarya Course director , HCL - Chennai

Date:

Date :

Examiner (s) Signature:

ACKNOWLEDGEMENT

This training has been an knowledgeable experience for me and this acknowledgment is not a mere formality but a genuine opportunity to thank everyone, as without their active support and encouragement this training wouldnt have been successful. I would like to express my thanks to Ms. G. Aishwarya for her guidance and cooperation for allowing me to undergo training under her guidance.

Place : Vellore

P.V.S DINESH KUMAR

Date: 17-OCT-2013

10BCE0205

TABLE OF CONTENTS

CHAPTER NO. 1. 2. 3. 4. 5. 7. 8. 9.

TOPIC Introduction to HCL Hardware and Networking System Administration(LINUX) Software Platforms(JAVA) Software Platforms(.NET) Android Blue Eye Technology Conclusion

PAGE NO. 6 7-10 11-13 14-15 16-18 19-20 21-22 23

HINDUSTAN COMPUTERS LIMITED (HCL): Introduction:Today HCL is a leading global technology and IT enterprise with annual revenue of US$ 6.3 billion. The HCL enterprise comprises two companies listed in India, HCL Technologies and HCL Infosystems. The 35 years old enterprise, founded in 1976, is one of India's original IT garage start ups. Its range of offerings span R&D and Technology Services, Enterprise and Applications Consulting, Remote Infrastructure Management, BPO services, IT Hardware, Systems Integration and Distribution of Technology and Telecom products in India. The HCL team comprises 93,000 professionals of diverse nationalities, operating across 31 countries including 505 points of presence in India. HCL has global partnerships with several leading Fortune 1000 firms, including several IT and Technology majors. HCL over the years has integrated and innovated products for its customer's giving key emphasis on product life cycle management, commencing from sourcing, manufacturing to installation and recovery at the end-of-life of the product to ensure protection of the environment, health and safety of all stakeholders. HCL Infosystems Ltd has established itself as Indias premier hardware, services and ICT systems integration company offering a wide spectrum of products which include - Computing, Storage, Networking, Security, Telecom, Imaging and Retail. Over the years, we have developed specialized expertise across verticals including Telecom, BFSI, eGovernance and Power.

Services:
HCL Services span the following industries: Banking and Capital Markets, Insurance, Healthcare and Pharmaceuticals, Telecom, Media, Publishing and Entertainment, Utilities, Hi-Tech and Manufacturing, Retail and Consumer Packaged Goods, Travel, Transportation and Logistic, Finance and Accounting, Supply Chain Management, Human Resources Outsourcing,

KPO/Analytics, Customer Relationship Management 6

Hardware and Networking


IP Address: An Internet Protocol Address is a numerical label assigned to each device participating in a computer network that uses the IP for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there The designers of the Internet Protocol defined an IP address as a 32-bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address, was developed.

DNS: Domain Name System (DNS) translates Internet domain and host names to IP address. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

Domain Name Space:

To have a hierarchical name space a domain name space was designed. Names are defined in an inverted tree structure with a root at the top.

DHCP: The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol that is used by network devices to configure the IP settings of another devices such as a computer, laptop or tablet. Network administrators or users who connect to a wireless network do not need to configure the IP settings manually, since these settings are received from a server running DHCP. DHCP servers maintain a database of available IP addresses and configuration information, which is used to assign IP addresses to client devices. DHCP uses the same two ports assigned by IANA for BOOTP: destination UDP port 67 for sending data to the server, and UDP port 68 for data to the client. DHCP communications are connectionless in nature. APIPA: Automatic Private IP Addressing, a feature of later windows operating systems.
With

APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address and subnet mask. If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0. A client uses the self-configured IP address until a DHCP server becomes available. The APIPA service also checks regularly for the presence of a DHCP server (every five minutes, according to Microsoft). If it detects a DHCP server on the network, APIPA stops, and the DHCP server replaces the APIPA networking addresses with dynamically assigned addresses.

Routers
The addressing in the internet is referred to as Internet Protocol (IP) addressing. An IP address defines two parts: one part is similar lo postal code and other part is to the house address and in internet terminology, they are known as netid and hosted to identify a network and a host address respectively. Thus host is the end point of communication in the Internet where a communication starts. Like any other service delivery system, we also need a delivery model for the internet. The internet conceptual framework know as TCP/IP relies on a delivery model in which TCP is in charge of reliable delivery of information, while IP is in charge of routing, using the IP address mechanism. Briefly we can see that eventually packets are to be routed from source to destination. Such packets

may need to traverse many cross points, similar to traffic intersection in road transportation network. Cross points in the internet are called routers. A router function is to read the destination marked in an incoming IP packet, to consult its internal information to identify an outgoing link to which the packet is to be forwarded and then to forward the packet. Similar to the number of lanes and the speed limit on the road, a network link that connects two routers is limited by how much data it can transfer per unit of time, commonly referred to as bandwidth or capacity of link. A network then carries traffic on its links and through its routers to the eventual destination, traffic in a network, refers to packets generated by different applications, such as web or mail. Router Architecture:

They demonstrated about Ethernet gateway routers for LAN extender. Ethernet router: This Router Bridge is a very cost-effective and flexible way to connect your LAN to the Internet or Branch Offices. It integrates the functions of Bridge/Router with the WAN device. It can be ordered as 1 WAN or a 2 WAN device. The 2 WAN devices which is useful for adding the bandwidths of both WANs into a higher bandwidth. In addition, a serial asynchronous interface is provided that can be used to connect to any external modem (PSTN/ISDN/GPRS/CDMA) for Dialup or Dial Backup support.

Switches
A network switch or switching hub is a computer networking device that links network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3) and above are often called layer-3 switches or multilayer switches. Switches exist for various types of networks including Fibre Channel, Asynchronous Transfer Mode, Ethernet and others. They demonstrated about Unmanaged GT switch. Unmanaged GT switch: An unmanaged switch simply allows Ethernet devices to communicate with one another, such as a PC or network printer, and those are typically what we call plug and play. They are shipped with a fixed configuration and do not allow any changes to this configuration. 16 port 10/100/1000Mbps 24 port 10/100/1000Mbps 8 port 10/100/1000Mbps

10

LINUX
UNIX is frequently criticized for a lack of consistency between versions, vendors and even applications. UNIX is not the product of any single corporation or group, and this does have a significant impact on its personality. Linux is probably the ultimate expression of UNIX's collective identity. After Linus Torvalds created the Linux kernel and announced it to the Internet, people from all over the world began to contribute to what has become called the Linux Operating System. While there is a core group of a few developers who were key in its development, they do not all work for the same company or even live in the same country. Obviously, Linux reflects a few different views on how computers should work.

Linux in Embedded Devices Due to its low cost and ease of customization, Linux is often used in embedded systems. In the mobile sub-sector of the Telecommunications equipment sector there are three major platforms based on a more or less modified version of the Linux kernel: mer, Tizen and Android. Android has become the dominant mobile operating system for smartphones, during the second quarter of 2013, 79.3% of smartphones sold worldwide used Android.[94] Cell phones and PDAs running Linux on open-source platforms became more common from 2007; examples include the Nokia N810, Openmoko's Neo1973, and the Motorola ROKR E8. Continuing the trend, Palm (later acquired by HP) produced a new Linux-derived operating system, webOS, which is built into its new line of Palm Pre smartphones. A system call is a request by a running task to the kernel to provide some sort of service on its behalf. In general, the kernel services invoked by system calls comprise an abstraction layer between hardware and user-space programs, allowing a programmer to implement an operating environment without having to tailor his program(s) too specifically to one single brand or precise specific combination of system hardware components. System calls also serve this generalization function across programming languages; e.g., the read system call will read data from a file descriptor. To the programmer, this looks like another C function, but in actuality, the code for read is contained within the kernel. 1. Kernel Mode: the machine operates with critical data structure, direct hardware (IN/OUT or memory mapped), direct memory, IRQ, DMA, and so on. 2. User Mode: users can run applications.

11

Linux Commands: Command Example cat .bashrc cat Description Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.

cd cd /home Less Logout less textfile

Change the current working directory to /home. The '/' indicates relative to root, and no matter what directory you are in when you execute this command, the directory will be changed to "/home" Similar to the more command, but the user can page up and down through the file. The example displays the contents of textfile Logs the current user off the system.

Ls

Is -al

Whereis

whereis ls

List all files in the current working directory in long listing format showing permissions, ownership, size, and time and date stamp Locates binaries and manual pages for the ls command.

Mv

Move the file from "myfile" to "yourfile". This effectively mv -i myfile changes the name of "myfile" to "yourfile". yourfile

12

more

more /etc/profile

Lists the contents of the "/etc/profile" file to the screen one page at a time.

shutdown shutdown -h now

Shuts the system down to halt immediately.

Advantages and Benefits of Linux 1) Linux is a free open source operating system. So it can be said, there is no license fee for buying or using Linux. 2) Easy to use. In the past, they said that Linux is a difficult operating system, and only devoted to the hackers. But now, this opinion is wrong. Linux is easy to use and can be said thats almost as easy as using Windows. 3) Almost all applications included in Windows, there have been alternative in Linux. We can access the Open Source website as Alternative to obtain useful fairly complete information about alternative of Windows applications on Linux. 4) Security is more superior than Windows. It could be argued that almost all Windows users would ever be exposed to viruses, spyware, trojans, adware, etc. This almost did not happen on Linux. Where Linux since the beginning of a multi-user design, which is when the virus infects a particular user, will be very difficult to infect and spread to other users. On Windows, this is not happening. In terms of hardware and data maintenance would be more efficient. 5) Linux is relatively stable. Computers that run on UNIX operating system is known to run stable indefinitely. Linux is a variant of UNIX, also inherits this stability. Rarely encountered the computer suddenly hangs and have to press Ctrl-Alt-Del or Restart to end the incident. It is not surprising that Linux has the large world server market.

13

JAVA
Introduction to Java
To fully understand java, one must understand the reasons behind its creation, the forces that shaped it, and legacy that it inherits. Like the successful computer language that came before, java is blend of the best elements of its rich heritage combined with the innovative concepts required by its unique mission. Much of the character of the java is inherited from C and C++.From C, java derives its syntax. Many of javas OOPs features were influenced by C++. Creation of java was deeply rooted in the process of refinement and adaptation that has been occurring in computer programming language for the past several decades.

Features of Java Simple


There are no pointers in java. It has automatic garbage collection. It also has rich predefined class libraries.

Portable
The application runs on all platforms. The size of all primitive data types are always the same irrespective of the compiler. The libraries define portable interfaces.

Object Oriented
It mainly focuses on the objects and the methods manipulating the data. All functions are associated with objects. Almost all data types are objects like files, strings etc. Potentially better code organization and reuse.

Secure
Usage in networked environment require more security. Access restrictions are forced (private, public). Memory allocation model is a major defense.

Dynamic
Java is designed to adapt to evolving environment. Libraries can freely add new methods and instance variables without any effect on their clients. It can check the class type in runtime. Interfaces promote flexibility and reusability in code by specifying a set of methods an object can perform, but leaves open how these methods should be implemented.

14

Java Applets
An applet is a special kind of java program that is designed to be transmitted over the Internet and automatically executed by a java-compatible web browser. Furthermore, an applet is downloaded on the demand, without further interaction with user. If the user click a link that contain the applet, the applet will automatically downloaded and run in the browser. The creation of the applet changed Internet programming because it expanded the universe of objects that can move about freely in the cyberspace.

Javas Magic: The Bytecode


The output of the java compiler is not the executable code Rather, it is bytecode. Bytecode is a highly optimized set of instructions designed to be executed by the java run time system, which is called the Java Virtual Machine (JVM).Translating a java program into the bytecode makes it much easier to run a program in a wide variety of environments because only the JVM needs to be implemented for each platform. Although the details of the JVM will differ from platform to platform, all understand the same bytecode.

Servlets: java on the server side


A servlet is a small program that executes on the server. A servlet is a small program that executes on the server. Just as applets dynamically extend the functionality of a web browsers, servlets dynamically extend the functionality of a web server. Thus, with the advent of the servlet, Java spanned both sides of the client/server connection. Servlet are used to create dynamically generated content that is then served to the client. The servlet offers several advantages, including increased performance. Because servlets (like all Java programs) are compiled into bytecode and executed by the JVM, they are highly portable.

15

.NET
Introduction to .NET :
Microsoft .NET is Microsofts XML web services platform. .NET contains all that needed to build and run software based on xml, the lingua franca of internet data exchange. The .NET platform also includes a set of programming tools and infrastructure to enable the creation, deployment, management , and aggregation of XML web services and tools for the end users to interact with .NET. .Net is a new framework for developing web-based and windows-based applications within the Microsoft environment. The framework offers a fundamental shift in Microsoft strategy: it moves application development from client-centric to server-centric.

The .NET Platform :

SERVER INFRASTRUCTURE : Application center 2000 Biztalk server 2000 Host integration server 2000 Mobile information 2001 server and SQL server 2000

BUILDING BLOCK SERVICES : They include passport(for user identification) and services for message delivery, file storage, userpreference management, calendar management and other functions. SMART DEVICES: Enable PCs, laptops, workstations, smartphones, handheld computers, Tablet PCs, game consoles, and other smart devices to operate in the .NET universe. Common Language Runtime (CLR): CLR works like a virtual machine in executing all languages. All .NET languages must obey the rules and standards imposed by CLR. Examples: Object declaration, creation and use Data types, language libraries Error and exception handling Interactive Development Environment (IDE).

16

Design Features

Interoperability:

Because computer systems commonly require interaction between newer and older applications, the .NET Framework provides means to access functionality implemented in newer and older programs that execute outside the .NET environment. Access to COM components is provided in the System. Runtime. Interop Services and System. Enterprise Services namespaces of the framework; access to other functionality is achieved using the feature. Common Language Runtime engine:

The Common Language Runtime (CLR) serves as the execution engine of the .NET Framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling.

Language independence:

The .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible datatypes and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, the .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language.

Base Class Library:

The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes that encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction, XML document manipulation, and so on. It consists of classes, interfaces of reusable types that integrates with CLR(Common Language Runtime).

17

Simplified deployment:

The .NET Framework includes design features and tools which help manage the installation of computer software to ensure it does not interfere with previously installed software, and it conforms to security requirements.

Security:

The design addresses some of the vulnerabilities, such as buffer overflows, which have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.

Portability:

While Microsoft has never implemented the full framework on any system except Microsoft Windows, it has engineered the framework to be platform-agnostic, and cross-platform implementations are available for other operating systems (see Silverlight and the Alternative implementations section below). Microsoft submitted the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language), the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as official standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.

18

ANDROID
Introduction
Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to write managed code in a Java-like language that utilizes Googledeveloped Java libraries, but does not support programs developed in native code.

Features of Android
Application framework enabling reuse and replacement of components Integrated browser based on the open source WebKit engine Optimized graphics powered by a custom 2D graphics library; 3D graphics based on the OpenGL ES 1.0 specification (hardware acceleration optional) SQLite for structured data storage Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF) Bluetooth, EDGE, 3G, and WiFi (hardware dependent) Camera, GPS, compass, and accelerometer (hardware dependent) Rich development environment including a device emulator, tools for debugging, memory and performance profiling, and a plugin for the Eclipse IDE

Android Architecture
There are four layers in android architecture. They are 1) Applications 2) Framework services 3) Libraries and android runtime 4) Linux kernel

19

1) Applications In Application layer there are applications like browser, home contacts, games, other apps .

2) Framework services In this layer codes written mostly in java. This framework contains activity manager, window manager view system, package manager, location manager and notification manager. 3) Native libraries ,services and daemons In this layer the code are written in C or C++. This layer contains SSl, SGL, media frame work , sqlite, Open GL, surface Manger. 4) The Linux kernel This is the last layer in android, this layer contains camera drivers, flash memory drivers, display driver, power management drivers for hardware, and inter-process communication, networking, file system.

20

BLUE EYE TECHNOLOGY


Blue Eye
Blue eye is the technology to make computers sense and understand human behavior and feelings and react in the proper ways. The U.S. computer giant, IBM has been conducting research on the Blue Eyes technology at its Almaden Research Center (ARC) in San Jose, Calif., since 1997. The ARC is IBM's main laboratory for basic research. The primary objective of the research is to give a computer the ability of the human being to assess a situation by using the senses of sight, hearing and touch. The idea of giving computers personality or, more accurately, emotional intelligence may seem creepy, but technologists says, such machines would offer important advantages. De-spite their lightning speed and awesome powers of computation, today's PCs are essentially deaf, dumb, and blind. They can't see you, they can't hear you, and they certainly don't care a whit how you feel. Every computer user knows the frustration of nonsensical error messages, buggy software, and abrupt system crashes. Our emotional changes are mostly reflected in our heart pulse rate, breathing rate, facial expressions, eye movements, voice etc. Hence these are the parameters on which blue technology is being developed. The process of making emotional computers with sensing abilities is known as affective computing. The steps used in this are:

1) Giving sensing abilities 2) Detecting human emotions 3) Respond properly Various methods of accomplishing affective computing are: 1) Affect Detection 2) MAGIC Pointing(Manual Acquisition with Gaze Tracking Technology) 3) Suitor(Simple User Interface Tracker) 4) Emotion Mouse

21

Affect Detection This is the method of detecting our emotional states from the expressions on our face. Algorithms to real time implementation that extract information from facial expressions and head gestures are being explored. Most of the information is extracted from the position of the eye rows and the corners of the mouth. MAGIC Pointing MAGIC stands for Manual Acquisition with Gaze Tracking Technology. a computer with this technology could move the cursor by following the direction of the user's eyes. This type of technology will enable the computer to automatically transmit information related to the screen that the user is gazing at. Also, it will enable the computer to determine, from the user's expression, if he or she understood the information on the screen, before automatically deciding to proceed to the next program. The user pointing is still done by the hand, but the cursor always appears at the right position as if by MAGIC. By marrying input technology and eye tracking, we get MAGIC pointing. Suitor SUITOR stands for Simple User Interface Tracker. It implements the method for putting computational devices in touch with their users changing moods. It is mostly used in we used applications. By watching what we page the user is currently browsing, SUITOR can find additional information on that topic. The key is that the user simply interacts with the computer as usual and the computer infers user interest based on what it sees the user do. Emotional Mouse This is the mouse embedded with sensors that can sense the physiological attributes such as temperature, body pressure, pulse rate, and touching style, etc. The computer can determine the users emotional states by a single touch. IBM is still performing research on this mouse and will be available in the market within the next two or three years. The expected accuracy is 75%.

Blue Eye Enabled Devices


1) POD 2) PONG 3) SECURE PAD

22

Conclusion
In the last I can say that taking training in such a company proved to be very beneficial for me. I learnt about the various technologies in current IT field. This training has proved to be an excellent benefit. It provides an opportunity to know about the working of routers, switches and other modern technologies like Android, Java, Linux used in HCL Infosystem. The training proved to be a great opportunity to make the students learn about different technologies.

23