+ All Categories
Home > Documents > Basics of Ccna

Basics of Ccna

Date post: 04-Apr-2018
Category:
Upload: gagan2010
View: 222 times
Download: 0 times
Share this document with a friend

of 35

Transcript
  • 7/30/2019 Basics of Ccna

    1/35

    Guru Nanak Dev Engineering College, Ludhiana

    MID TERM REPORT

    COMPUTER NETWORKING AND WDRAMAT

    RELIENCE COMMUNICATION

    UNDER GUIDANCE OF

    PARAMJEET BHULLAR, CIRCLE LEAD IT DEPT

    CHANDIGARH

    KULWINDER MAHAL, AOI IT DEPT LUDHIANA

    SUBMITTED BY

    JASMINE KAUR

    Electronics and communication engg. (2009-2013)

    Roll No. 93040

    Uni Roll No. 90370412844

  • 7/30/2019 Basics of Ccna

    2/35

    TABLE OF CONTENT

    1. Company profilea. IT. infrastructure

    2. Introduction to Networkinga. Definition

    b. Requirement of Networking

    3. Types of Network

    a. LAN (Local Area Network)

    b. WAN (Wide Area Network)

    4. Network Models

    a. OSI Model

    5. Cables

    a. Twisted Cable

    b. Coaxial Cablec. Fibre Optic

    6. Networking Devices

    a. Router

    b. Switch

    c. Repeater d. Hub

    e. Gateway

    f. Bridge

    7. IP Addressing

    a. Introductionb. Private IP

    c. Masking

    d. Subnetting

    8. Network topologies

    9. WDRAM

    a. Windows server update server

    b. Domain

    c. Remedy

    d. Antivirus

    e. Marimba

  • 7/30/2019 Basics of Ccna

    3/35

    COMPANY PROFILE

    DHIRUBHAIS DREAM

    Late Dhirubhai Ambani built Reliance from scratch to be in the reckoning

    for a place in the Global Fortune 500 list. This achievement is even more

    significant due to the fact, that the entire growth was achieved in an organic

    manner and in a span of just 25 years.

    Dhirubhai was not just firmly rooted in traditional Indian values, but was

    also a quintessentially modern man - the man of the new millennium. This

    was clearly reflected in his passion for mega-sized projects, the most

    advanced technology and the highest level of productivity

    Dhirubhai Ambani, Founder Chairman of the Reliance Group, had an acute

    sense that education alone empowers people. He was a great communicator.

    He communicated to inspire, to guide, to educate and to motivate.

    Dhirubhai Ambani was of the conviction that Communications would

    energize enterprises, galvanizes governance, make livelihood an enjoyment,

    learning an experience, and living an excitement.

    Reliance Communications is a fascinating outcome of this powerful

    conviction. It is a major initiative to translate his inspiring dream intoreality

    VISION

    Reliance Communication ltd. envisions a digital revolution that will sweep

    the country and bring about a New Way of Life. A digital way of life for a

    New India. With mobile devices, net ways and broadband systems linked topowerful digital networks, Reliance Communication will usher fundamental

    changes in the social and economic landscape of India.

    Reliance Communication will help men and women connect and

    communicate with each other It will enable citizens to reach out to their

    work place, home and interests, while on the move. It will enable people to

  • 7/30/2019 Basics of Ccna

    4/35

    work, shop, educate and entertain themselves round the clock, both in the

    virtual world and in the physical world.

    IT INFRASTRUCTURE

    Reliance Communication offices are spread across the country. There are

    multiple offices in a city. IT being the important aspect of running the

    business, a team has been dedicated for IT Infrastrucre. IT Infrastructure

    team is responsible for setting up and further supporting IT Infrastructure at

    various Infocomm Offices.

    INTRODUCTION TO NETWORKING

    Definition :-

    A network is a system that transmits any combination of voice, video and/or

    data between users. A network can be defined by its geographical

    dimensions and by which the users PC access it.

    A network consists of a:

    The network operating system (Windows NT/2000TM/Xp) on the

    users PC (client) and server. The cables connecting all network devices (users PC, server,

    peripherals, etc.).

    All supporting network components (hubs, routers and switches, etc.).

    Computer Network means an interconnected collection of autonomous

    computers.

    Requirement of Networking

    Resource sharing- To make all programs, equipment, and especially dataavailable to anyone on the network without regard to the physical location of

    the resource and the user.

    High reliability- As all files could be replicated on two or three machines, so

    if one of them is unavailable (due to hardware failure), the other copies

    could be used.

    http://4.it/http://4.it/
  • 7/30/2019 Basics of Ccna

    5/35

    Scalability- It is the ability to increase system performance gradually as the

    workload grows just by adding more processors.

    A computer network can provide a powerful communication medium along

    widely separated employees.

    The use of networks to enhance human-to-human communication will

    probably prove more important than technical goals such as improved

    reliability.

    These are the requirement with respect to companies but computer

    networking is required even in the normal day to day life as we have to

    access the internet to get information about what all new happening in the

    world, to have communication with people staying far away using the e mail

    service.

    TYPES OF NETWORKS

    LAN (LOCAL AREA NETWORK)

    These are privately owned networks within a single building or campus of

    up to a few a kilometers in size.

    LANs are distinguished from other networks by three characteristics:

    1) Their size.

    2) Their transmission technology.

    3) Their topology.

    LANs are restricted in size, which means that the worst-case transmission

    time is bounded and known in advance.

    LANs often use a transmission technology consisting of a single cable to

    which all the machines are attached.

    LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few

    errors.

  • 7/30/2019 Basics of Ccna

    6/35

    LAN SETUP

    IEEE has produced several standards for LANs. These standards

    collectively known as IEEE 802 .

    IEEE802.3 (Ethernet), IEEE802.4 (Token Bus), IEEE802.5 (Token Ring)

    WAN (WIDE AREA NETWORK)

    It is a Computer network that spans a relatively large geographical area,

    often a country or continent. Typically a WAN consists of two or more

    Local Area Network.

    Computers connected to WAN are often connected through public networks

    such as telephone systems. They can also be connected through leased lines

    or satellites. The largest WAN in existence is Internet.

    WANs run at speed of maximum 2 to 10 Mbps.

    WAN SETUP

    For most WANs, the long distance bandwidth is relatively slow: on the order

    of kilobits per second (kbps) as opposed to megabits per second (Mbps) for

    local-area networks (LANs). For example, an Ethernet LAN has a 10 Mbps

    bandwidth; a WAN using part or all of a T1 carrier has a bandwidth of 1.544

    Mbps .

    Three types of approaches are used to connect WANs:

    1) Circuit switching, which provides a fixed connection (at least for the

    duration of a call or session), so that each packet takes the same path.

    Examples of this approach include ISDN, Switched 56, and Switched T1.

  • 7/30/2019 Basics of Ccna

    7/35

    2) Packet switching, which establishes connections during the transmission

    process so that different packets from the same transmission may take

    different routes and may arrive out of sequence at the destination. Examples

    of this approach are X.25, frame relay, and ATM.

    3) Leased lines, which can provide a dedicated connection for private use

    NETWORK MODELS

    Layering Concepts and Benefits

    Many benefits can be gained from the process of breaking up the functions

    or tasks of networking into smaller chunks, called layers, and defining

    standard interfaces between these layers. The layers break a large, complex

    set of concepts and protocols into smaller pieces, making it easier to talk

    about, to implement with hardware and software, and to troubleshoot.

    The following list summarizes the benefits of layered protocol

    Specifications:

    Humans can more easily discuss and learn about the many details of a

    protocol specification.

    Standardized interfaces among layers facilitate modular engineering.

    A better environment for interoperability is created. One vendor can write

    software that implements higher layersfor example, a Web browserand

    another can write software that implements the lower layersfor example,

    Microsofts built-in TCP/IP software in its operating systems.

    Reduced complexity allows easier program changes and faster product

    evolution.

    One layer uses the services of the layer immediately below it. Therefore,

    remembering what each layer does is easier. (For example, the network layer

  • 7/30/2019 Basics of Ccna

    8/35

    needs to deliver data from end to end. To do this, it uses data links to

    forward data to the next successive device along that end-to-end path.)

    OSI NETWORK MODEL

    The OSI model describes how information makes its way from application

    programs through a network medium to another application program in other

    computer. It divides one big problem in to seven smaller problems . Each

    problem is addressed by one of the seven layers of the OSI model.

    Functions of Network Layers in Brief:

    APPLICATION LAYER

    Used for applications specifically written to run over the network

    Allows access to network services that support applications;

    Directly represents the services that directly support user applications

    Handles network access, flow control and error recovery

    Example apps are file transfer, e-mail, Net BIOS-based applications

    PRESENTATION LAYER

    Translates from application to network format and vice-versa

    All different formats from all sources are made into a common

    uniform format that the rest of the OSI model can understand

    Responsible for protocol conversion, character conversion, data

    encryption / decryption, expanding graphics commands, data

    compression

    Sets standards for different systems to provide seamlesscommunication from multiple protocol stacks

    Not always implemented in a network protocol

    SESSION LAYER

    Establishes, maintains and ends sessions across the network

  • 7/30/2019 Basics of Ccna

    9/35

    Responsible for name recognition (identification) so only the

    designated parties can participate in the session

    Provides synchronization services by planning check points in the

    data stream => if session fails, only data after the most recent

    checkpoint need be transmitted

    Manages who can transmit data at a certain time and for how long

    Examples are interactive login and file transfer connections, the

    session would connect and re-connect if there was an interruption;

    recognize names in sessions and register names in history

    TRANSPORT LAYER

    Additional connection below the session layer Manages the flow control of data between parties across the network

    Divides streams of data into chunks or packets; the transport layer of

    the receiving computer reassembles the message from packets

    "Train" is a good analogy => the data is divided into identical units

    Provides error-checking to guarantee error-free data delivery, with on

    losses or duplications

    Provides acknowledgment of successful transmissions; requests

    retransmission if some packets dont arrive error-free

    Provides flow control and error-handling

    NETWORK LAYER

    Translates logical network address and names to their physical

    address (e.g. computer name ==> MAC address)

    Responsible for addressing and determining routes for sending

    Managing network problems such as packet switching, data

    congestion and routing

    If router cant send data frame as large as the source computer sends,the network layer compensates by breaking the data into smaller units.

    At the receiving end, the network layer reassembles the data

    Think of this layer stamping the addresses on each train car

    IP; ARP; RARP, ICMP; RIP; OSFP;

  • 7/30/2019 Basics of Ccna

    10/35

    DATA LINK LAYER

    Turns packets into raw bits 100101 and at the receiving end turns bits

    into packets.

    Handles data frames between the Network and Physical layers

    The receiving end packages raw data from the Physical layer into data

    frames for delivery to the Network layer

    Responsible for error-free transfer of frames to other computer via the

    Physical Layer

    This layer defines the methods used to transmit and receive data on

    the network. It consists of the wiring, the devices use to connect theNIC to the wiring, the signaling involved to transmit / receive data

    and the ability to detect signaling errors on the network media

    Logical Link Control

    Error correction and flow control

    Manages link control and defines SAPs

    PHYSICAL LAYER

    Transmits raw bit stream over physical cable

    Defines cables, cards, and physical aspects

    Defines NIC attachments to hardware, how cable is attached to NIC

    Defines techniques to transfer bit stream to cable

    IP ADDRESSING

    Every machine on the internet has a unique identifying number, called an IP

    Address. A typical; IP address looks like this:

  • 7/30/2019 Basics of Ccna

    11/35

    216.27.61.45

    IP ADDRESS is a 32-bit number, usually written in dotted decimal

    form, that uniquely identifies an interface of some computer. This 32-

    bit number is divided into 4 octets each separated by a decimal. Outso many values certain values are restricted for use as typical IP

    address. For example, the IP address 0.0.0.0 is reserved for the

    default network and the address 255.255.255.255is used for

    broadcast.

    Each IP address is split into 2 sections:

    1. Network address

    2. Host address

    Individual IP address in same network all have a different value in the

    host part of address, but they have identical value in network part,

    just as in town there are different street address but same ZIP code.

    There are five IP classes:

    Class A This class is for very large networks, such as a major

    international company. IP addresses with a first octet from 1 to 126

    are part of this class. The other three octets are each used to identify

    each host.Net Host or Node

    54. 24.54.43

    Loopback- The IP address 127.0.0.1 is used as the loopback address.

    This means that it is used by the host computer to send a message

    back to itself. It is commonly used for troubleshooting and network

    testing.

    Class B- Class B is used for medium-sized networks. A good

    example is a large college campus. IP addresses with a first octet

    from 128 to191 are part of this class. Class B addresses also include

  • 7/30/2019 Basics of Ccna

    12/35

    the second octet as part of the Net identifier. The other two octets are

    used to identify each host.

    Net Host or Node

    24.53.198

    Class C- Class C addresses are commonly used for small to mid-size

    business. IP addresses with a first octet from192 to 223 are part of

    this class. Class C addresses also include the second and third octets

    as part of Net identifier. The last octet is used to identify each host.

    Net Host or Node

    34.86

    Class D- It is used for multicast. It has first bit value of 1, second bit

    value of 1, third bit value of 1 and fourth bit value of 0. The other 28

    bits are used to identify the group of computers the multicast

    messages is intended for.

    Net Host or Node

    224 24.54.145

    Class E- It is used for experimental purpose only.

    Net Host or Node

    240. 23.45.105

    Private IP

    It is not necessary that every time we make a network we are

    connected to some ISP (Internet Service Provider). So in that case werequire some private IP also which can be used in indigenous

    networks .In each class a range of IP addresses have been defined for

    this purpose

    CLASS A 10.0.0.1 to 10.255.255.244

    CLASS B 172.16.0.1 to 172.34.255.254

  • 7/30/2019 Basics of Ccna

    13/35

    CLASS C 192.168.0.0/16

    MASKING

    Computers use a mask to define size of network and host part of an

    address. Mask is a 32-bit number written in dotted decimal form. Itprovides us the network address when we perform a Boolean AND of

    mask with the IP address. It also define number of host bits in an

    address.

    SUBNETTING

    Basically it is a process of subdividing networks into smaller subnets.

    In case we have 2-3 small networks but we cant buy IP address for each and

    every network. So here we use the basic concept of SUBNETTING i.e usingone public IP address we will give them IP address and make them

    independent networks. For this we take some bits of host address and use

    them for network address so we have different independent networks

    Example

    If subnet mask is 255.255.240.0

    And an IP address for a computer is given as 142.16.52.4

    142.16.0.0 is network address

    0.0.48.0 is the subnet address

    0.0.4.4 is the host address of the computer

    10001110.00010000.00110100.00000100 is ANDed with

    11111111.11111111.11110000.00000000

    and output is 10001110.00010000.00110000.00000000

  • 7/30/2019 Basics of Ccna

    14/35

    here first two octets represents Network address and third octet represents

    subnet address.

    It can be compared with a postal address as there is only one ZIP code

    (Network address), different streets (Subnet address), and different house

    number (Host address).

    Some terminologies those are used with Networking models:

    Collision Domain- It is the group of PCs in which collision will occur

    when two PC will transmit data simultaneously.

    Broadcast Domain- It is the group of PCs those will receive same

    broadcast message.

    CSMA/CD (Carrier Sense Multiple Access/ Collision Detection)- In this

    protocol when a PC wants to transmit any packet it sense the carrier i.e the

    path ,if no other PC is using the carrier then only it sends. If two PCs starts

    sending data simultaneously collision will occur. Both PCs will wait for

    some random time and then initiate the same process.

    MAC (Media Access Control) . The IEEE 802.3 (Ethernet) and 802.5

    (Token Ring) are the MAC sub layers of these two LAN data-link protocols.

    Burned-in address: The 6-byte address assigned by the vendor making

    the card. It is usually burned in to a ROM or EEPROM on the LAN card and

    begins with a 3-byte organizationally unique identifier (OUI) assigned by

    the IEEE.

    Locally administered address: Through configuration, an address that is

    used instead of the burned-in address.

    Unicast address: Fancy term for a MAC that represents a single LAN

    interface.

  • 7/30/2019 Basics of Ccna

    15/35

    PASSIVE COMPONENTS

    Passive components are those devices which are used to provide

    connectivity between different networking devices.

    It includes

    Cables

    Patch Panel

    Patch Cord

    I/O box

    Racks

    RJ-45 Connectors

    CABLES

    There are different Cabling options depending on the access method :

    Twisted pair

    This made it easy to access the back of the patch panel and other

    networking components.The wires are twisted around each other

    tominimize interference from other twisted pairs in the cable.

  • 7/30/2019 Basics of Ccna

    16/35

    Twisted pair cables are available unshielded (UTP)

    or shielded (STP). UTP is the most common type

    and uses a RJ-45 Connector.

    Typical lengths are up to 100m.

    Twisted pair network uses a star topology.

    Coaxial

    Coaxial cable uses BNC connectors.

    The maximum cable lengths are around 500m.

    Coaxial networks use a single bus topology

  • 7/30/2019 Basics of Ccna

    17/35

    Fiber Optic

    UTP and Co-axial cables are not capable for driving the data signalsfor long distance i.e. UTP is capable of transmitting up to a distance

    100 meters only By using the Fiber cables it is possible to send the

    data about 10 kilometers. Fiber optic cable uses SC, ST, LC

    connectors (most common in use is SC connector)

    In fiber cables the data is converted to light signals and the signal is

    made to propagate through the fiber cable. There are two types of

    Fibre optic cable available.

    1. Single mode: In this mode typical length is up to 12km and data

    rate is 1000Mbps. The core diameter is about 9.25 nm cable is knownas 1000 base LX cable.

    2. Multi mode: This mode is further categorised in two:

    1. SX: Typical length is up to 500m and data rate is 1000Mbps.

    2. FX: Typical length is up to 220m and data rate is 100Mbps.

  • 7/30/2019 Basics of Ccna

    18/35

    PATCH PANEL

    A patch panel provides a convenient place to terminate (connect) allof the cable coming from different locations into the wiring closet.

    We connect the cables coming from various locations willing to

    connect to switch through the patch panel.

    NEED OF PATCH PANEL

    We can label the patch panel so we know that which wire belongs to

    which location. Without a patch panel, it is chaotic. If we want to

    disconnect a station from the switch, it's a lot easier if there's a label.

    Most cabling is wired "straight-through" from end to end. But

    sometimes we need to cross-wire some of the pairs between switch

  • 7/30/2019 Basics of Ccna

    19/35

    and station, like with a cable modem, or cross-wire to connect two

    switches. With a patch panel, all of this cross-wiring is done in the

    patch cable. If you have to make any changes, like moving a station

    or switch, you just move the patch cable with it, instead of having to

    reterminate the cable run.

    RACK

    We have to mount the patch panel somehow. The best way is to buy a

    rack. Basically, a rack is a pair of vertical rails with holes drilled in

    them so that we can mount patch panels, hubs, and other network

    equipment. This made it easy to access the back of the patch panel

    and other networking components.

    Computer networking devices

    Router

    A router is a device that forwards data packets between computer networks,

    creating an overlay internetwork. A router is connected to two or more datalines from different networks. When a data packet comes in one of the lines,

    the router reads the address information in the packet to determine its

    ultimate destination. Then, using information in its routing table orrouting

    policy, it directs the packet to the next network on its journey. Routers

    perform the "traffic directing" functions on the Internet. A data packet is

    typically forwarded from one router to another through the networks that

    constitute the internetwork until it gets to its destination nodeUnlike a

    gateway, it cannot interface different protocols. Works on OSI layer 3.

    Routers may provide connectivity within enterprises, between enterprisesand the Internet, and between internet service providers (ISPs) networks.

    The largest routers (such as the CiscoCRS-1 orJuniperT1600) interconnect

    the various ISPs, or may be used in large enterprise networks. Smaller

    routers usually provide connectivity for typical home and office networks.

    Other networking solutions may be provided by a backbone Wireless

    http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Cisco_Systemshttp://en.wikipedia.org/wiki/Cisco_CRS-1http://en.wikipedia.org/wiki/Juniper_Networkshttp://en.wikipedia.org/wiki/Juniper_T-Series#T1600http://en.wikipedia.org/wiki/Wireless_Distribution_Systemhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Cisco_Systemshttp://en.wikipedia.org/wiki/Cisco_CRS-1http://en.wikipedia.org/wiki/Juniper_Networkshttp://en.wikipedia.org/wiki/Juniper_T-Series#T1600http://en.wikipedia.org/wiki/Wireless_Distribution_System
  • 7/30/2019 Basics of Ccna

    20/35

    Distribution System (WDS), which avoids the costs of introducing

    networking cables into buildings.

    Switch

    A switch is a telecommunication device which receives a message from

    any device connected to it and then transmits the message only to the

    device for which the message was meant. This makes the switch a moreintelligent device than a hub (which receives a message and then

    transmits it to all the other devices on its network). The network switch

    plays an integral part in most modern Ethernetlocal area networks

    (LANs). Mid-to-large sized LANs contain a number of linked managed

    switches. Small office/home office (SOHO) applications typically use a

    single switch, or an all-purpose converged device such as a residential

    gateway to access small office/homebroadband services such as DSL or

    cable Internet. In most of these cases, the end-user device contains a

    routerand components that interface to the particular physical broadband

    technology. User devices may also include a telephone interface forVoIP. Works on OSI layer 2.

    Bridge

    It is a device that connects multiple network segments along the data link

    layer. Network bridging describes the action taken by network equipment

    to allow two or more communication networks, or two or more network

    http://en.wikipedia.org/wiki/Wireless_Distribution_Systemhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_Internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_equipmenthttp://en.wikipedia.org/wiki/Communication_networkhttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/File:24-port_3Com_switch.JPGhttp://en.wikipedia.org/wiki/Wireless_Distribution_Systemhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_Internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_equipmenthttp://en.wikipedia.org/wiki/Communication_networkhttp://en.wikipedia.org/wiki/Network_segment
  • 7/30/2019 Basics of Ccna

    21/35

    segments,[1] to create an aggregate network. Bridging is distinct from

    routing which allows the networks to communicate independently as

    separate networks.[2] A network bridge is a network device that connects

    more than one network segment.Works on OSI layer 2.

    Hub

    A network hub is an unsophisticated device in comparison with, for

    example, a switch. A hub does not examine or manage any of the traffic

    that comes through it: any packet entering any port is rebroadcast on all

    other ports. Effectively, it is barely aware of frames or packets and

    mostly operates on raw bits orsymbols. Consequently, due to the larger

    collision domains, packet collisions are more frequent in networks

    connected using hubs than in networks connected using more

    sophisticated devices. Works on OSI layer 1.

    Repeater

    It is a device to amplify or regenerate digital signals received while

    sending them from one part of a network into another. Works on OSI

    layer 1.

    Gateway

    A gateway is a network point that acts as an entrance to anothernetwork.

    On the Internet, a node or stopping point node or a host (end-point) node.

    Both the computers of Internet users and the computers that servepages

    to users are host nodes, while the nodes that connect the networks in

    between are gateways. For example, the computers that control traffic

    between company networks or the computers used by internet service

    providers (ISPs) to connect users to the internet are gateway nodes.

    In the network for an enterprise, acomputer serveracting as a gateway node

    is often also acting as aproxy serverand a firewall server. A gateway is

    often associated with both a router, which knows where to direct a given

    packet of data that arrives at the gateway, and a switch, which furnishes the

    actual path in and out of the gateway for a given packet.

    http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridge#cite_note-1http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_bridge#cite_note-2http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernet_switchhttp://en.wikipedia.org/wiki/Symbol_ratehttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Repeaterhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridge#cite_note-1http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_bridge#cite_note-2http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernet_switchhttp://en.wikipedia.org/wiki/Symbol_ratehttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Repeaterhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Firewall_(computing)
  • 7/30/2019 Basics of Ccna

    22/35

    Some hybrid network devices:

    Multilayer switch: a switch which, in addition to switching on OSI

    layer 2, provides functionality at higher protocol layers. Protocol converter: a hardware device that converts between two

    different types oftransmissions, such as asynchronous and

    synchronous transmissions.

    Bridge router(brouter): a device that combines router and bridge

    functionality and therefore works on OSI layers 2 and 3.

    Hardware or software components that typically sit on the connection point

    of different networks, e.g. between an internal network and an external

    network:

    Proxy server: computernetwork service which allows clients to make

    indirect network connections to other network services

    Firewall: a piece of hardware or software put on the network to

    prevent some communications forbidden by the network policy

    Network address translator(NAT): network service provide as

    hardware or software that converts internal to external network

    addresses and vice versa

    Other hardware for establishing networks or dial-up connections:

    Multiplexer: device that combines several electrical signals into a

    single signal

    Network interface controllera piece of computer hardware to allow

    the attached computer to communicate by network

    Wireless network interface controllera piece of computer hardware to

    allow the attached computer to communicate by LAN

    Modem: device that modulates an analog "carrier" signal (such as

    sound), to encode digital information, and that also demodulates such

    a carrier signal to decode the transmitted information, as a computercommunicating with another computer over the telephone network

    ISDN terminal adapter(TA): a specialized gateway for ISDN

    Line driver: a device to increase transmission distance by amplifying

    the signal. Base-band networks only.

    http://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Protocol_converterhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)http://en.wikipedia.org/wiki/Bridge_routerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Network_servicehttp://en.wikipedia.org/wiki/Firewall_(networking)http://en.wikipedia.org/wiki/Network_address_translatorhttp://en.wikipedia.org/wiki/Multiplexerhttp://en.wikipedia.org/wiki/Network_interface_controllerhttp://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Modemhttp://en.wikipedia.org/wiki/ISDN_terminal_adapterhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Line_driverhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Protocol_converterhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)http://en.wikipedia.org/wiki/Bridge_routerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Network_servicehttp://en.wikipedia.org/wiki/Firewall_(networking)http://en.wikipedia.org/wiki/Network_address_translatorhttp://en.wikipedia.org/wiki/Multiplexerhttp://en.wikipedia.org/wiki/Network_interface_controllerhttp://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Modemhttp://en.wikipedia.org/wiki/ISDN_terminal_adapterhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Line_driver
  • 7/30/2019 Basics of Ccna

    23/35

    Network topologies

    Think of a topology as a network's virtual shape or structure. This shape

    does not necessarily correspond to the actual physical layout of the devices

    on the network. For example, the computers on a home LAN may bearranged in a circle in a family room, but it would be highly unlikely to find

    a ring topology there.

    Network topologies are categorized into the following basic types:

    bus

    ring

    star

    tree

    mesh hybrid

    Bus Topology

    Bus networks (not to be confused with the system bus of a computer) use a

    common backbone to connect all devices. A single cable, the backbone

    functions as a shared communication medium that devices attach or tap into

    with an interface connector. A device wanting to communicate with anotherdevice on the network sends a broadcast message onto the wire that all other

    devices see, but only the intended recipient actually accepts and processes

    the message.

    Ethernet bus topologies are relatively easy to install and don't require much

    cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5

    ("ThickNet") both were popular Ethernet cabling options many years ago for

    bus topologies. However, bus networks work best with a limited number of

    devices. If more than a few dozen computers are added to a network bus,performance problems will likely result. In addition, if the backbone cable

    fails, the entire network effectively becomes unusable. ]

    http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm
  • 7/30/2019 Basics of Ccna

    24/35

    Ring Topology

    In a ring network, every device has exactly two neighbors for

    communication purposes. All messages travel through a ring in the same

    direction (either "clockwise" or "counterclockwise"). A failure in any cable

    or device breaks the loop and can take down the entire network.

    To implement a ring network, one typically uses FDDI,SONET, orToken

    Ring technology. Ring topologies are found in some office buildings or

    school campuses.

    Star Topology

    Many home networks use the star topology. A star network features a central

    connection point called a "hub node" that may be a network hub, switch orrouter. Devices typically connect to the hub with Unshielded Twisted Pair

    (UTP) Ethernet.

    Compared to the bus topology, a star network generally requires more cable,

    but a failure in any star network cable will only take down one computer's

    network access and not the entire LAN. (If the hub fails, however, the entire

    network also fails.)

    Tree Topology

    Tree topologies integrate multiple star topologies together onto a bus. In its

    simplest form, only hub devices connect directly to the tree bus, and each

    hub functions as the root of a tree of devices. This bus/star hybrid approach

    supports future expandability of the network much better than a bus (limited

    in the number of devices due to the broadcast traffic it generates) or a star

    (limited by the number of hub connection points) alone.

    Mesh Topology

    Mesh topologies involve the concept of routes. Unlike each of the previous

    topologies, messages sent on a mesh network can take any of several

    possible paths from source to destination. (Recall that even in a ring,

    although two cable paths exist, messages can only travel in one direction.)

    Some WANs, most notably the Internet, employ mesh routing.

    http://compnetworking.about.com/cs/sonet/g/bldef_sonet.htmhttp://compnetworking.about.com/cs/sonet/g/bldef_sonet.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/cs/internetworking/g/bldef_hub.htmhttp://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htmhttp://compnetworking.about.com/cs/routers/g/bldef_router.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_wan.htmhttp://compnetworking.about.com/cs/sonet/g/bldef_sonet.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/cs/internetworking/g/bldef_hub.htmhttp://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htmhttp://compnetworking.about.com/cs/routers/g/bldef_router.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_wan.htm
  • 7/30/2019 Basics of Ccna

    25/35

    A mesh network in which every device connects to every other is called a

    full mesh. As shown in the illustration below, partial mesh networks also

    exist in which some devices connect only indirectly to others.

    Hybrid

    Hybrid networks use a combination of any two or more topologies in such a

    way that the resulting network does not exhibit one of the standard

    topologies (e.g., bus, star, ring, etc.). For example, a tree network connected

    to a tree network is still a tree network topology. A hybrid topology is

    always produced when two different basic network topologies are

    connected. Two common examples for Hybrid network are:star ring

    networkandstar bus network

    A Star ring network consists of two or more star topologies connectedusing a multistation access unit (MAU) as a centralized hub.

    A Star Bus network consists of two or more star topologies connected

    using a bus trunk (the bus trunk serves as the network's backbone).

    While grid and torus networks have found popularity in high-performance

    computing applications, some systems have used genetic algorithms to

    http://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/Genetic_algorithmhttp://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/Genetic_algorithm
  • 7/30/2019 Basics of Ccna

    26/35

    design custom networks that have the fewest possible hops in between

    different nodes. Some of the resulting layouts are nearly incomprehensible,

    although they function quite well.[citation needed]

    A Snowflake topology is really a "Star of Stars" network, so it exhibits

    characteristics of a hybrid network topology but is not composed of two

    different basic network topologies being connected. Definition : Hybrid

    topology is a combination of Bus,Star and ring topology.

    IP ADDRESS

    IP Address is a logical address of the computer. It use for identify of

    computer this is unique same as telephone number. IP is a 32 bit address.Computer networking is depending on IP address.

    IP Address is two types: --------

    STATIC IP: - Provide by User this IP cannot change automatically.

    DYNAMIC IP: - Provide by DHCP Server this is can be change

    automatically

    Difference between Static IP and Dynamic IP

    STATIC IP DYNAMIC IP

    Required more time to fill IP address Required less time to fill

    IP List maintain by user IP List maintain by DHCP

    Server

    Human Error No chance

    PC shuffle Problem No Problem

    12.2 What is DHCP?

    Automatically assigns IP addresses method centralized.

    http://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_needed
  • 7/30/2019 Basics of Ccna

    27/35

    DHCP is a protocol that allocates IP addresses to computer on a network.

    NETWORK CONNECTIVITY OF RCOM CIRCLE OFFICECHANDIGARH

    In Chandigarh circle office, we have a LAN IP pool of10.132.16.1/24 and

    WAN IP pool of 97.246.86.101.

    We have 1 DHCP SERVER having an IP address of 10.132.16.20 and DNS

    server having an IP address of 10.132.16.19.

    We have 4 TOSHIBA printers on each floor of the office having IP

    addresses

    10.132.16.4, 10.132.16.7, 10.132.16.5 AND 10.132.16.8.

    SWITCH STACK connects the whole network.

    http://10.132.16.1/24http://10.132.16.1/24
  • 7/30/2019 Basics of Ccna

    28/35

    WDRAM

    RELIANCE I.T PROJECT

    INFRASTRUCTURE MANAGED SERVICE GROUP(IMSG)

    This project is started, so that there can be a proper utilization and

    management of all the computers within the RELIANCE NETWORK.

    There are 5 major components of the project

    1. WINDOWS SERVER UPDATE SERVER

    2. DOMAIN

    3. REMEDY

    4. ANTIVIRUS

    5. MARIMBA

    In this project there are 5 main servers, through which constant updates,

    patches etc are being sent.

    These servers are different from the normal servers, as they have to

    communicate with multiple users at the same time.

    THESE MAIN SERVERS ARE KEPT IN DAKC (DHIRU AMBANI

    KNOWLEDGE CENTER) BOMBAY.

    FOR THE CHANDIGARH CLUSTER, THE SUBSERVERS ARE KEPT

    IN WAREHOUSE MOHALI.

    Main servers first communicate with the sub servers, then those sub servers

    sends all the updates to all those computers which are kept come in the

    pendency list.

  • 7/30/2019 Basics of Ccna

    29/35

    The PENDENCY list is being send by the IMSG team in Bombay, known as

    the

    'WDRAM REPORT'.

    This report consists of all the pendencys, issues and problems related to the

    WDRAM.

    Report is being sent on the weekly basis.

    Report is forwarded by the AREA OPERATION INCHARGE, of the

    respective cluster, to all the Engineers.

    Currently there are over 200 PC's in CMP OFFICE and these pcs have to be

    constantly monitored so that they can all work properly.

    The main purpose here is to maintain the proper working of the 5 major

    components as mentioned above.

    In this report there are issues like:

    1 Is PC in DOMAIN?

    2 Is antivirus installed?

    3 Is antivirus infected?

    4. Is marimba installed?

    5 Has computer fetched 7 days report?(there is a weekly report which is

    constantly sent from DAKC)

    6. Are patches up-to-date?

    7. Is there any Remedy mismatch?

    There are many other issues under WDRAM which IT TEAM have to deal

    with.

  • 7/30/2019 Basics of Ccna

    30/35

    19.2 Five major components of the project

    W(WINDOWS SERVER UPDATE SERVER):

    For this server RELIANCE had a special tie up with MICROSOFT. This

    server updates the client machine with security patches for software

    application. Patches are used for software applications, so that they can work

    properly.

    WSUS Servers configuration is different from normal servers

    configuration.

    For updating wsus server we have to make a user login.

    1 of the most important component used in the WSUS is MBSA(Microsoft

    base line security Analyzer )

    MBSA helps to scan a computer, by the help of MBSA a user can scan anyindividual PC or even multiple Pcs in any given range.

    Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that

    helps small and medium businesses determine their security state in

    accordance with Microsoft security recommendations and offers specific

    remediation guidance. Improve your security management process by using

    MBSA to detect common security misconfigurations and missing security

    updates on your computer systems. Built on the Windows Update Agent and

    Microsoft Update infrastructure, MBSA ensures consistency with otherMicrosoft management products including Microsoft Update (MU),

    Windows Server Update Services (WSUS), Systems Management Server

    (SMS), System Centre Configuration Manager (SCCM) 2007, and Small

    Business Server (SBS). Used by many leading third party security vendors

    and security auditors, MBSA on average scans over 3 million computers

  • 7/30/2019 Basics of Ccna

    31/35

    each week. Join the thousands of users that depend on MBSA for analyzing

    their security state.In RELIANCE COMMUNICATIONS version 2.1 is

    used.

    D (DOMAIN SERVER)

    By Default every computer domain is work group. So every computer has

    to be kept in the RELIANCE domain that is ricpj.ric.com.

    When the new PC comes to the office, it cannot pick up the updates

    automatically from the domain server .so for that the PC should be kept in

    the Domain.

    R (REMDY SERVER)

    This server is responsible for the working of the REMEDY SOFTWARE.

    Which consist of all the information about the user.

    ADVANTAGES

    o Calls are put through this software. Any User having IT related

    problem would lock a call on toll free number or they can mail

    to [email protected] .

    o It is also used in call logging or call tracing for any I.T related

    problem .each and every asset is mapped through this.

    This software was made by BMC, exclusively for RELIANCE

    COMMUNICATIONS. This software is used to map each and every asset of

    the computer which has been deployed to the user.

    http://ricpj.ric.com/mailto:[email protected]://ricpj.ric.com/mailto:[email protected]
  • 7/30/2019 Basics of Ccna

    32/35

    Whenever a user faces any problem in his\her computer OR even if there is

    any issue related to WDRAM, he\she would send a mail to

    [email protected], then a call would be locked and

    would be assigned to a particular engineer. Each and every Engineer has his

    account in the REMMEDY Software which he is able to keep a track of allthe calls which are being assigned to him.

    Even if any of the external customers (customers to RELIANCE

    COMMUNICATIONS e.g. SBI, PUNJAB NATIONAL BANK etc)

    Once an Engineer logs into the REMEDY software, then he clicks onto the

    Incident Management Console. The main work of the engineer is in the

    Incident Management Console.

    An engineer has to check his calls which are locked .all the calls are

    categorized according there priority levels.

    HIGHEST PRIORITY CALL:

    Issues related to NETWORK, router call (external call), HSD Call (external

    call).

    MEDIUM PRIORITY CALL:

    Most of the calls are categorised under medium priority call. Calls of

    WDRAM are categorised under medium priority.

    LOW PRIORITY CALL:

    Calls related to hardware is categorised under low priority.

    mailto:[email protected]:[email protected]
  • 7/30/2019 Basics of Ccna

    33/35

    After putting the call in progress , engineer then tries to resolve the issue

    .time available to the engineer is 180 minutes. if by any chance engineer is

    not able to resolve his call within the given time period, then his call would

    be escalated.

    A (ANTIVIRUS SERVER):

    Symmetric(ANTIVIRUS used in RELIANCE NETWORK) sends all the

    updates to the ANTIVIRUS server, and those updates are send all over the

    network.

    Earlier trend micro was used but it was not that much effective.

    In antivirus we can face many issues like;

    Is antivirus infected?

    Is antivirus updated?

    Is antivirus engine on?

    Removal of Infection from a system

    If a system, gets infected, we have to download a file called NSS file which

    is updated daily. The complete procedure to download and install the NSS

    file is below:-

    Goto 10.8.51.60 which is a FTP server for all downloads.

    Then click Download and then Symantec which shows the list of antivirus

    tools.

    Goto Symantec tool and then NSS file is visible. Download this file and

    place it on C: drive.

    Restart the sytem in Safe Mode and run this NSS file.

  • 7/30/2019 Basics of Ccna

    34/35

    M (MARIMBA TOOL):

    The Marimba Remedy Service Console (Windows) can be used as the

    primary interface which is used for tracking, scanning and monitoring

    hardware and software changes of a system. It is present in all the systemsand is a necessary tools for diagnosis

    Marimba is a software developed by BMC Software Group. Marimba is

    mandatory and is installed on the all servers, workstations and laptops

    located all over India which are connected by ADAG Group Intranet

    Network. Any computer or laptop must have Marimba installed before it can

    be connected to the domain. Failure to do so results in a pendency which is

    easily spotted at the Mumbai Circle office with the help of WDRAM

    software. It is the IT engineers job to make sure all the PCs and laptopshave Marimba installed.

    Marimba provides a continuous compliance over software, patches,

    configuration settings, power settings, and security content through a

    powerful policy-based management system that:

    Discovers, manages, and documents configurations for client devices

    like POS systems, handhelds, kiosks, and ATMs

    Configures, updates, and patches client endpoints to ensure total

    compliance and prevent security vulnerabilities

    Installs, updates, and repairs application software and content to

    ensure successful application releases

    Tracks, harvests, and reuses software licenses to control costs and

    ensure compliance with corporate license agreements

    Manages advanced PC power settings to help establish and enforce

    Green IT initiatives Supports popular client platforms, such as: Microsoft Windows

    (including Windows 7), Windows Mobile, Red Hat and SUSE Linux

  • 7/30/2019 Basics of Ccna

    35/35

    Marimba is now called BMC BladeLogic Client Automation which is a

    newer version. But ADAG Group uses the older version which is still called

    Marimba.

    The Advantages of using Marimba are:-

    Attain first-time success rates of up to 95% or more for configuration

    changes even in highly distributed environments

    Eliminate 90% of the manual steps required by other patch

    management systems

    Deploy software to hundreds of thousands of diverse endpoints with

    minimal hardware infrastructure and bandwidth usage

    Enforce policy-driven compliance, while also saving on license costsand minimizing security vulnerabilities

    Reduce client power consumption by up to 70%

    Reduce annual software spend and gain clear insight to overall

    software usage


Recommended