Download as pdf or txt
Download as pdf or txt
You are on page 1of 46

KANGARO GROUP OF COMPANIES

B-XXX-6754,Focal Point,Ludhiana-141010

BTech

In

Information Technology

Submitted by: UNDER THE GUIDANCE OF:

ANSH PAWAN SHARMA MR. JASPAL SIR


MRS. RAMINDER MAM
ACKNOWLEDGEMENT
I am highly grateful to KGOC Ludhiana, one of the leading
companies of the nation, for providing me an opportunity to
undertake four weeks training at their manufacturing premises
at Ludhiana, Punjab. It was a great learning experience as I was
introduced to various aspects of the working of the
organization, the latest state of the art technologies & machines
used in the manufacturing processes. It was wonderful to see
the company striving hard for the goods. I would like to express
my sincerest gratitude towards IT Team for their regular
support, guidance and constructive criticism that helped me
complete my four weeks of training successfully. At the end I
would like to thank all the staff members of KGOC, Ludhiana
who made this training a rich learning experience.
PREFACE
With the ongoing revolution in technology where
innovations are taking at the blink of eye, it is
impossible to keep the pace with the emerging
trends. Excellence is an attitude that whole of
human race is born with. It is the environment that
makes sure that whether the result of this attitude is
visible or otherwise. A well planned, properly
executed and evaluated industrial training helps a
lot in including a professional attitude. It provides
a linkage b/w the student and industry to develop
an awareness of industrial approach to problem
solving, based on broad understanding of process
and mode of operation of organization.

During this period, the student gets the real


experience for working in the actual industry
environment. Most of the theoretical knowledge
that has been gained during their studies is put to
test here. Apart from this the student gets an
opportunity to learn the latest technology, which is
immensely helps in them in building their carrier.

I had the opportunity to have a real experience on


many ventures, which increased my sphere of
knowledge to great extent. I got a chance to learn
many new technologies and was also interfaced to
many new technologies. And all this credit goes to
organization KGOC.
CONTENTS
1. Introduction
2. About the Company
3. Projects
3.1 Network and Security
3.2 Systems Applications and Products in Data Processing
(SAP)
4.Observations and Discussions
5.Bibliography
CHAPTER 1
INTRODUCTION
Looking back a few years ago to the technology we
had then compared to what we have now is
incredible to see first-hand. With the ongoing
revolution in the field of technology where
innovations are taking place at the blink of the eye,
it is impossible to keep the pace with the emerging
trends. But KGOC has set clearly set its vision to
be a worldclass enterprise in professional stationary
goods and has made its way to the top. Today it is
one of the leading stationary organizations of the
nation. KGOC Ludhiana has provided students
from various institutions a well-planned, properly
executed and evaluated industrial training which
helps develop a linkage between students and the
industry to unfold an awareness of industrial
approach to problem solving based on broad
understanding of process and mode of operation of
organization.

During this period, the student gets the real


experience for working in the actual industry
environment. Most of the theoretical knowledge
that has been gained during their studies is put to
test here. Apart from this the student gets an
opportunity to learn the latest technology, which is
immensely helps in them in building their carrier. I
had the opportunity to have a real experience on
many ventures, which increased my sphere of
knowledge to great extent.
CHAPTER 2
ABOUT THE COMPANY
The Kangaro Group was established by Lala Shri Janki Dass
Jain in 1959. A humble start at Ludhiana (India) has now turned
into a leading stationery manufacturing organisation
The company is engaged in manufacturing a wide variety of
products including Staplers, Paper Perforators, Staples, Staple
Removers, Paper Cutters, Binder Punch, Tape Dispenser, File
Clips, Lever Arc Mechanism etc. A broad range of Tackers and
Heavy Duty Staples is also manufactured in house.
Competitive advantage comes from the dedicated R&D centre
at New Delhi. Products are developed under strict supervision
of over 100 technocrats and highly skilled people, engaged in
developing new designs and concepts, particularly taking care
of ergonomics. It is equipped with latest technology and
infrastructure.
Unique selling proposition comes from manufacturing quality
products while keeping the costs to minimum. The domestic
market is catered by Sales & Marketing network spread all over
India. In addition to Home & Office’s, consumers include
Corporates, Government Sectors and Educational Institutes.
The products are kept in outlets with “Face on Display” helping
consumers to identify the best at a single glance.
Exports constitute a considerable share of the total volume. The
products are marketed worldwide, through international
exhibitions in Brazil, China, Germany, Japan, Russia, USA etc.,
and are being exported around the globe.
Performance oriented approach has brought several laurels to
the Group. Our company has been honoured with “Export
Excellence Award” every year since 1996. The company has
been certified ISO 9001 by TUV Siddentschland, Germany and
has won several awards including "World Quality Commitment
International Star Award” in Platinum Category at Paris.
KANGARO houses a comprehensive sheet metal components
manufacturing shop, a machine shop having a range of special
purpose machines, fully automatic electroplating plant, fully
automatic powder coating plant, plastic injection molding shop
besides the heat treatment shop and all other required facilities
right inside. In the staple manufacturing section, KANGARO
has a fully automatic wire drawing line to manufacture desired
quality of wire that is used to manufacture staples on completely
automatic multiple wire staple manufacturing lines.
KANGARO also has the traditional single wire machines for
special applications. The company have a network and security
system through which they manage all there data and security.
The company’s data is cloud based and proper firewalls, routers
have been configured for the proper channelisation. The
company manages all the transactions through SAP. SAP
(Systems, Applications, and Products in Data Processing) is a
globally recognized software company that specializes in
providing enterprise resource planning (ERP) solutions to
businesses. Established in Germany, SAP has become a
dominant force in the realm of business software, serving
organizations of all sizes and industries worldwide. SAP's ERP
software allows companies to streamline their operations by
integrating various business processes, such as finance, human
resources, procurement, and supply chain management, into a
unified and efficient system. This integration enhances data
visibility, enables better decision-making, and promotes overall
operational efficiency. With its commitment to innovation and
customer-centric solutions, SAP continues to play a pivotal role
in the digital transformation of businesses across the globe.
CHAPTER 3
PROJECTS
CHAPTER3.1 Network and Security
OSI MODEL-The OSI (Open Systems
Interconnection) model is a conceptual framework
used to standardize and understand the functions of
a network or telecommunications system. It defines
a series of seven layers, each responsible for
specific tasks related to data communication.

1. Physical Layer (Layer 1): This layer deals with


the physical medium and transmission of raw binary
data bits over a physical medium, such as copper,
fiber-optic cables, or wireless. It defines
characteristics like voltage levels, cable
specifications, and data rates.

2. Data Link Layer (Layer 2): The data link layer


is responsible for framing, addressing, and error
detection in data transmission. It is divided into two
sublayers: Logical Link Control (LLC) and Media
Access Control (MAC). Ethernet is an example of a
data link layer protocol.
3. Network Layer (Layer 3): The network layer
manages the routing and forwarding of data packets
between different networks. It uses logical
addressing (IP addresses) and routing algorithms to
determine the best path for data to travel. Common
network layer protocols include IP (Internet
Protocol) and ICMP (Internet Control Message
Protocol).

4. Transport Layer (Layer 4): The transport layer


is responsible for end-to-end communication and
data segmentation. It ensures data integrity,
reliability, and flow control. Key transport layer
protocols include TCP (Transmission Control
Protocol) and UDP (User Datagram Protocol).

5. Session Layer (Layer 5): The session layer


manages and establishes sessions between
applications on different devices. It handles session
initiation, maintenance, and termination. It also
controls data synchronization and dialog control in
a communication session.

6. Presentation Layer (Layer 6): The presentation


layer focuses on data translation, encryption, and
compression. It ensures that data is presented in a
format that is understandable to both the sender and
receiver. It deals with issues like character
encoding, data compression, and encryption.

7. Application Layer (Layer 7): The application


layer is the topmost layer and provides a platform
for application software and end-user interaction. It
includes application protocols for services like
email (SMTP), web browsing (HTTP), file transfer
(FTP), and more. This layer is where applications
interface with the lower layers of the OSI model.
NETWORK-A network is a collection of interconnected
devices, such as computers, servers, routers, and
switches, that are linked together to enable the sharing of
data, resources, and services. These devices
communicate with each other through a variety of
communication protocols, both wired and wireless, to
facilitate the exchange of information.

SECURITY-Security in IT, is a comprehensive set of


practices, technologies, and measures designed to protect
digital data, systems, networks, and devices from
unauthorized access, damage, disruption, or theft.
PORT-a port refers to a logical or virtual endpoint for
communication between devices or software
applications. Ports are used to identify specific services
or processes on a device within a network, allowing data
to be directed to the appropriate destination.
Ports are of three types: -
1. Root
2. Designated
3. Non- designated
VLAN-VLAN, which stands for Virtual Local Area
Network, is a technology used in computer networking
to logically divide a physical network into multiple
isolated, virtual networks. VLAN 1 is the native
VLAN.1002-1005 are reserved VLAN’s.

TOPOLOGY- Topology refers to the physical or logical


layout and structure of interconnected devices, nodes, or
components within a computer network. It defines how
these devices are arranged and how they communicate
with one another.
Subnetting-Subnetting is a fundamental networking
technique used to divide an IP address space into smaller,
more manageable segments, known as subnets.
VTP (VLAN Trunk Protocol): VTP operates on network
switches, specifically Cisco switches. It is used to
manage VLAN information and synchronize VLAN
configurations across switches in a network. VTP helps
ensure consistency and reduces the manual configuration
effort when dealing with multiple switches in a network.
DTP (Dynamic Trunk Protocol): DTP is also a
Ciscospecific protocol that works on network switches.
It facilitates the automatic negotiation of trunk links
between switches. DTP helps determine whether a link
should be an access link or a trunk link based on the
connected device's capabilities and configurations.
DTP have three modes:-
1. Auto
2. Desirable
3. Trunk

STP: The Spanning Tree Protocol (STP) is a network


protocol used to prevent and eliminate network loops in
Ethernet networks. Network loops can cause broadcast
storms, excessive network traffic, and overall network
instability. STP, specifically IEEE 802.1D, is designed to
create a loop-free logical topology by selectively
blocking certain Ethernet links while keeping others
active. Here are key aspects of the Spanning Tree
Protocol:

1. Loop Prevention: STP's primary objective is to


prevent network loops. A loop occurs when multiple
paths exist between network segments, and without
proper management, this can lead to packet collisions,
broadcast storms, and network congestion.

2. Root Bridge: In a network using STP, one switch is


elected as the "Root Bridge." This switch serves as the
reference point for calculating the shortest path to all
other switches in the network. It ensures that a loop-free
tree-like structure is formed.

3. Bridge Protocol Data Units (BPDU): BPDUs are


control messages exchanged between switches running
STP. They contain information about the switch's
identity, its position in the network, and its understanding
of the network topology.

5. Bridge ID and Path Cost: Each switch is assigned a


unique Bridge ID, which is a combination of a priority
value and the switch's MAC address. The path cost is
used to calculate the shortest path to the Root Bridge.
Ports with the lowest path cost are preferred for
forwarding data.

7. Multiple Spanning Tree Protocol (MSTP): MSTP is


an enhancement to STP that allows for multiple instances
of the spanning tree to be created in a single network,
optimizing network resource usage in more complex
environments.

8. Rapid Spanning Tree Protocol (RSTP): RSTP (IEEE


802.1w) is an evolution of STP that provides faster
convergence in the event of network changes, reducing
network downtime. RSTP is backward compatible with
traditional STP.

states->>>
Discarding->> Discard, blocking, listening learning
forwarding

Speed and cost :-


10mb-100
100mb-19
1G-4
10G-2
20G-1

To prevent loop from coming when port fast is enabled,


we use:-
1. BPDU filter
2. BPDU guard

It will be active on default. Conversion will be fast in this.


Port fast is enabled on each port.
Priority-24576+ VLAN Number

Mechanism to prevent looping and changing of port


1. Root guard
2. Loop guard

CHAPTER 3.2
Systems, Applications, and Products in Data
Processing

Use of SAP- Traditional business models often decentralize


data management, with each business function storing its own
operational data in a separate database. This makes it difficult
for employees from different business functions to access each
other’s information. Furthermore, duplication of data across
multiple departments increases IT storage costs and the risk of
data errors.
By centralizing data management, SAP software provides
multiple business functions with a single view of the truth. This
helps companies better manage complex business processes by
giving employees of different departments easy access to
realtime insights across the enterprise. As a result, businesses
can accelerate workflows, improve operational efficiency, raise
productivity, and ultimately increase profits. SAP helps
companies and organizations of all sizes and industries run their
businesses profitably, adapt continuously, and grow sustainably.
ERP-ERP stands for “enterprise resource planning.” ERP
software includes programs for all core business areas, such as
procurement, production, materials management, sales,
marketing, finance, and human resources (HR).
SAP was one of the first companies to develop standard
software for business solutions and continues to offer
industryleading ERP solutions.

SAP have designated Transaction Codes(T-codes) which are


used to perform operations.
There are z-codes too which are used to perform customize
operations and z-codes vary from company to company
whereas t-codes are unique and can be found in any company.

Works done:-
SAP login page

Creating a material
MATERIALS LIST(MM60)
PURCHASE REQUISITION

List display(ME5A)

Creating a PR(ME51N)
Making changes in PR(ME52N)

Viewing a PR(ME53N)
Releasing a PR(ME54N)

Creating a Purchase Order(ME21N)


Making Changes in PO(ME22N)

Viewing a PO(ME23N)
Releasing a PO(ME29N)

Gate Entry of Materials(z-code)


Displaying material document(MIGO)

Creating reservations(MB21)
Making changes in reservation(MB22)

Displaying reservation(MB23)

Material documents list(MB51)


Searching for material stocks b/w some given time
interval(MBLB)
Display of warehouse stocks(MB52)
Stock Overview(MMBE)
Creating PO header(CO01)
Confirmation for PO:Goods Movements(CO11N)
Order Info System(COOIS)
Creating Inquiry(VA11)

Creating a Sister Concern Order(VA01)


Displaying a Sister Concern Order(VA03)

Creating outbound delivery with order reference(VL01N)

Creating Billing Document(VF01)


Cancelling a Billing Document(VF11)
CHAPTER 4
OBSERVATIONS & DISCUSSIONS

The industrial training at KGOC has given me an exposure


of the activities of an industry. This being a large
organization deals with wide spectrum of technologies.
During my training in KGOC Ludhiana, I learned about
different kinds of projects ranging from software
technologies to hardware assemblies.
The observations on the applications of the projects
worked on in the training period at KGOC are briefly
stated below.

Application of Projects:-

1. Network & Security- Network and security are intertwined


components of today's digital landscape. A network serves
as the foundation for communication and data exchange,
connecting devices across various scales, from local area
networks to the global internet. However, the open nature
of networks makes them susceptible to security threats.
Network security involves implementing measures and
technologies to safeguard data, systems, and resources
against unauthorized access and cyber threats, ensuring
the confidentiality, integrity, and availability of
information. This includes practices like firewalls,
encryption, access control, and intrusion detection, along
with security policies and training. A robust network,
combined with strong security measures, is crucial for
facilitating modern communication while protecting
against an evolving array of digital risks and challenges.
2. SAP-SAP applications provide a comprehensive suite of
software solutions for enterprise resource planning (ERP),
customer relationship management (CRM), supply chain
management, and more, enabling organizations to
streamline business processes, enhance productivity, and
make data-driven decisions. These applications cover a
wide range of industries and functions, offering tools for
financial management, human resources, sales and
distribution, procurement, and analytics, among others.
With a user-friendly interface and extensive customization
options, SAP applications help businesses efficiently
manage their operations and adapt to changing market
demands.
CHAPTER 5
BIBLIOGRAPHY

Sources:-
https://kgocglobal.com

https://kangarokgoc.com/
https://www.sap.com/india/index.html

https://www.cisco.com/c/en_in/products/security/what-is-network-security.html

You might also like