Вы находитесь на странице: 1из 35

Guru Nanak Dev Engineering College, Ludhiana MID TERM REPORT

COMPUTER NETWORKING AND WDRAM


AT

RELIENCE COMMUNICATION UNDER GUIDANCE OF PARAMJEET BHULLAR, CIRCLE LEAD IT DEPT CHANDIGARH KULWINDER MAHAL, AOI IT DEPT LUDHIANA

SUBMITTED BY JASMINE KAUR Electronics and communication engg. (2009-2013) Roll No. 93040 Uni Roll No. 90370412844

TABLE OF CONTENT
1. Company profile
a. IT. infrastructure

2. a. b. 3. a. b. 4. a. 5. a. b. c. 6. a. b. c. d. e. f. 7. a. b. c. d. 8. 9. a. b. c. d. e.

Introduction to Networking Definition Requirement of Networking Types of Network LAN (Local Area Network) WAN (Wide Area Network) Network Models OSI Model Cables Twisted Cable Coaxial Cable Fibre Optic Networking Devices Router Switch Repeater Hub Gateway Bridge IP Addressing Introduction Private IP Masking Subnetting Network topologies WDRAM Windows server update server Domain Remedy Antivirus Marimba

COMPANY PROFILE

DHIRUBHAIS DREAM Late Dhirubhai Ambani built Reliance from scratch to be in the reckoning for a place in the Global Fortune 500 list. This achievement is even more significant due to the fact, that the entire growth was achieved in an organic manner and in a span of just 25 years. Dhirubhai was not just firmly rooted in traditional Indian values, but was also a quintessentially modern man - the man of the new millennium. This was clearly reflected in his passion for mega-sized projects, the most advanced technology and the highest level of productivity Dhirubhai Ambani, Founder Chairman of the Reliance Group, had an acute sense that education alone empowers people. He was a great communicator. He communicated to inspire, to guide, to educate and to motivate. Dhirubhai Ambani was of the conviction that Communications would energize enterprises, galvanizes governance, make livelihood an enjoyment, learning an experience, and living an excitement. Reliance Communications is a fascinating outcome of this powerful conviction. It is a major initiative to translate his inspiring dream into reality

VISION Reliance Communication ltd. envisions a digital revolution that will sweep the country and bring about a New Way of Life. A digital way of life for a New India. With mobile devices, net ways and broadband systems linked to powerful digital networks, Reliance Communication will usher fundamental changes in the social and economic landscape of India. Reliance Communication will help men and women connect and communicate with each other It will enable citizens to reach out to their work place, home and interests, while on the move. It will enable people to

work, shop, educate and entertain themselves round the clock, both in the virtual world and in the physical world. IT INFRASTRUCTURE Reliance Communication offices are spread across the country. There are multiple offices in a city. IT being the important aspect of running the business, a team has been dedicated for IT Infrastrucre. IT Infrastructure team is responsible for setting up and further supporting IT Infrastructure at various Infocomm Offices.

INTRODUCTION TO NETWORKING Definition :A network is a system that transmits any combination of voice, video and/or data between users. A network can be defined by its geographical dimensions and by which the users PC access it. A network consists of a:

The network operating system (Windows NT/2000TM/Xp) on the users PC (client) and server. The cables connecting all network devices (users PC, server, peripherals, etc.). All supporting network components (hubs, routers and switches, etc.).

Computer Network means an interconnected collection of autonomous computers. Requirement of Networking Resource sharing- To make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource and the user. High reliability- As all files could be replicated on two or three machines, so if one of them is unavailable (due to hardware failure), the other copies could be used.

Scalability- It is the ability to increase system performance gradually as the workload grows just by adding more processors. A computer network can provide a powerful communication medium along widely separated employees. The use of networks to enhance human-to-human communication will probably prove more important than technical goals such as improved reliability. These are the requirement with respect to companies but computer networking is required even in the normal day to day life as we have to access the internet to get information about what all new happening in the world, to have communication with people staying far away using the e mail service. TYPES OF NETWORKS

LAN (LOCAL AREA NETWORK) These are privately owned networks within a single building or campus of up to a few a kilometers in size. LANs are distinguished from other networks by three characteristics: 1) Their size. 2) Their transmission technology. 3) Their topology. LANs are restricted in size, which means that the worst-case transmission time is bounded and known in advance. LANs often use a transmission technology consisting of a single cable to which all the machines are attached. LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few errors.

LAN SETUP

IEEE has produced several standards for LANs. These standards collectively known as IEEE 802 . IEEE802.3 (Ethernet), IEEE802.4 (Token Bus), IEEE802.5 (Token Ring)

WAN (WIDE AREA NETWORK) It is a Computer network that spans a relatively large geographical area, often a country or continent. Typically a WAN consists of two or more Local Area Network. Computers connected to WAN are often connected through public networks such as telephone systems. They can also be connected through leased lines or satellites. The largest WAN in existence is Internet. WANs run at speed of maximum 2 to 10 Mbps. WAN SETUP For most WANs, the long distance bandwidth is relatively slow: on the order of kilobits per second (kbps) as opposed to megabits per second (Mbps) for local-area networks (LANs). For example, an Ethernet LAN has a 10 Mbps bandwidth; a WAN using part or all of a T1 carrier has a bandwidth of 1.544 Mbps . Three types of approaches are used to connect WANs: 1) Circuit switching, which provides a fixed connection (at least for the duration of a call or session), so that each packet takes the same path. Examples of this approach include ISDN, Switched 56, and Switched T1.

2) Packet switching, which establishes connections during the transmission process so that different packets from the same transmission may take different routes and may arrive out of sequence at the destination. Examples of this approach are X.25, frame relay, and ATM. 3) Leased lines, which can provide a dedicated connection for private use

NETWORK MODELS

Layering Concepts and Benefits Many benefits can be gained from the process of breaking up the functions or tasks of networking into smaller chunks, called layers, and defining standard interfaces between these layers. The layers break a large, complex set of concepts and protocols into smaller pieces, making it easier to talk about, to implement with hardware and software, and to troubleshoot. The following list summarizes the benefits of layered protocol Specifications: Humans can more easily discuss and learn about the many details of a protocol specification. Standardized interfaces among layers facilitate modular engineering. A better environment for interoperability is created. One vendor can write software that implements higher layersfor example, a Web browserand another can write software that implements the lower layersfor example, Microsofts built-in TCP/IP software in its operating systems. Reduced complexity allows easier program changes and faster product evolution. One layer uses the services of the layer immediately below it. Therefore, remembering what each layer does is easier. (For example, the network layer

needs to deliver data from end to end. To do this, it uses data links to forward data to the next successive device along that end-to-end path.)

OSI NETWORK MODEL

The OSI model describes how information makes its way from application programs through a network medium to another application program in other computer. It divides one big problem in to seven smaller problems . Each problem is addressed by one of the seven layers of the OSI model. Functions of Network Layers in Brief: APPLICATION LAYER

Used for applications specifically written to run over the network Allows access to network services that support applications; Directly represents the services that directly support user applications Handles network access, flow control and error recovery Example apps are file transfer, e-mail, Net BIOS-based applications

PRESENTATION LAYER

Translates from application to network format and vice-versa All different formats from all sources are made into a common uniform format that the rest of the OSI model can understand Responsible for protocol conversion, character conversion, data encryption / decryption, expanding graphics commands, data compression Sets standards for different systems to provide seamless communication from multiple protocol stacks Not always implemented in a network protocol

SESSION LAYER

Establishes, maintains and ends sessions across the network

Responsible for name recognition (identification) so only the designated parties can participate in the session Provides synchronization services by planning check points in the data stream => if session fails, only data after the most recent checkpoint need be transmitted Manages who can transmit data at a certain time and for how long Examples are interactive login and file transfer connections, the session would connect and re-connect if there was an interruption; recognize names in sessions and register names in history

TRANSPORT LAYER

Additional connection below the session layer Manages the flow control of data between parties across the network Divides streams of data into chunks or packets; the transport layer of the receiving computer reassembles the message from packets "Train" is a good analogy => the data is divided into identical units Provides error-checking to guarantee error-free data delivery, with on losses or duplications Provides acknowledgment of successful transmissions; requests retransmission if some packets dont arrive error-free Provides flow control and error-handling

NETWORK LAYER

Translates logical network address and names to their physical address (e.g. computer name ==> MAC address) Responsible for addressing and determining routes for sending Managing network problems such as packet switching, data congestion and routing If router cant send data frame as large as the source computer sends, the network layer compensates by breaking the data into smaller units. At the receiving end, the network layer reassembles the data Think of this layer stamping the addresses on each train car

IP; ARP; RARP, ICMP; RIP; OSFP;

DATA LINK LAYER


Turns packets into raw bits 100101 and at the receiving end turns bits into packets. Handles data frames between the Network and Physical layers The receiving end packages raw data from the Physical layer into data frames for delivery to the Network layer Responsible for error-free transfer of frames to other computer via the Physical Layer This layer defines the methods used to transmit and receive data on the network. It consists of the wiring, the devices use to connect the NIC to the wiring, the signaling involved to transmit / receive data and the ability to detect signaling errors on the network media

Logical Link Control


Error correction and flow control Manages link control and defines SAPs

PHYSICAL LAYER

Transmits raw bit stream over physical cable Defines cables, cards, and physical aspects Defines NIC attachments to hardware, how cable is attached to NIC Defines techniques to transfer bit stream to cable

IP ADDRESSING Every machine on the internet has a unique identifying number, called an IP Address. A typical; IP address looks like this:

216.27.61.45 IP ADDRESS is a 32-bit number, usually written in dotted decimal form, that uniquely identifies an interface of some computer. This 32bit number is divided into 4 octets each separated by a decimal. Out so many values certain values are restricted for use as typical IP address. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255is used for broadcast. Each IP address is split into 2 sections: 1. Network address 2. Host address Individual IP address in same network all have a different value in the host part of address, but they have identical value in network part, just as in town there are different street address but same ZIP code. There are five IP classes: Class A This class is for very large networks, such as a major international company. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are each used to identify each host. Net Host or Node 54. 24.54.43 Loopback- The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing. Class B- Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to191 are part of this class. Class B addresses also include

the second octet as part of the Net identifier. The other two octets are used to identify each host. Net Host or Node 24.53.198 Class C- Class C addresses are commonly used for small to mid-size business. IP addresses with a first octet from192 to 223 are part of this class. Class C addresses also include the second and third octets as part of Net identifier. The last octet is used to identify each host. Net Host or Node 34.86

Class D- It is used for multicast. It has first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast messages is intended for. Net Host or Node 224 24.54.145 Class E- It is used for experimental purpose only. Net Host or Node 240. 23.45.105 Private IP It is not necessary that every time we make a network we are connected to some ISP (Internet Service Provider). So in that case we require some private IP also which can be used in indigenous networks .In each class a range of IP addresses have been defined for this purpose CLASS A 10.0.0.1 to 10.255.255.244 CLASS B 172.16.0.1 to 172.34.255.254

CLASS C 192.168.0.0/16 MASKING Computers use a mask to define size of network and host part of an address. Mask is a 32-bit number written in dotted decimal form. It provides us the network address when we perform a Boolean AND of mask with the IP address. It also define number of host bits in an address. SUBNETTING Basically it is a process of subdividing networks into smaller subnets. In case we have 2-3 small networks but we cant buy IP address for each and every network. So here we use the basic concept of SUBNETTING i.e using one public IP address we will give them IP address and make them independent networks. For this we take some bits of host address and use them for network address so we have different independent networks

Example If subnet mask is 255.255.240.0 And an IP address for a computer is given as 142.16.52.4 142.16.0.0 is network address 0.0.48.0 is the subnet address 0.0.4.4 is the host address of the computer

10001110.00010000.00110100.00000100 is ANDed with 11111111.11111111.11110000.00000000 and output is 10001110.00010000.00110000.00000000

here first two octets represents Network address and third octet represents subnet address. It can be compared with a postal address as there is only one ZIP code (Network address), different streets (Subnet address), and different house number (Host address).

Some terminologies those are used with Networking models: Collision Domain- It is the group of PCs in which collision will occur when two PC will transmit data simultaneously.

Broadcast Domain- It is the group of PCs those will receive same broadcast message. CSMA/CD (Carrier Sense Multiple Access/ Collision Detection)- In this protocol when a PC wants to transmit any packet it sense the carrier i.e the path ,if no other PC is using the carrier then only it sends. If two PCs starts sending data simultaneously collision will occur. Both PCs will wait for some random time and then initiate the same process. MAC (Media Access Control) . The IEEE 802.3 (Ethernet) and 802.5 (Token Ring) are the MAC sub layers of these two LAN data-link protocols. Burned-in address: The 6-byte address assigned by the vendor making the card. It is usually burned in to a ROM or EEPROM on the LAN card and begins with a 3-byte organizationally unique identifier (OUI) assigned by the IEEE. Locally administered address: Through configuration, an address that is used instead of the burned-in address. Unicast address: Fancy term for a MAC that represents a single LAN interface.

PASSIVE COMPONENTS

Passive components are those devices which are used to provide connectivity between different networking devices. It includes

Cables Patch Panel Patch Cord I/O box Racks RJ-45 Connectors

CABLES

There are different Cabling options depending on the access method : Twisted pair This made it easy to access the back of the patch panel and other networking components.The wires are twisted around each other tominimize interference from other twisted pairs in the cable.

Twisted pair cables are available unshielded (UTP) or shielded (STP). UTP is the most common type and uses a RJ-45 Connector. Typical lengths are up to 100m. Twisted pair network uses a star topology. Coaxial Coaxial cable uses BNC connectors. The maximum cable lengths are around 500m. Coaxial networks use a single bus topology

Fiber Optic UTP and Co-axial cables are not capable for driving the data signals for long distance i.e. UTP is capable of transmitting up to a distance 100 meters only By using the Fiber cables it is possible to send the data about 10 kilometers. Fiber optic cable uses SC, ST, LC connectors (most common in use is SC connector) In fiber cables the data is converted to light signals and the signal is made to propagate through the fiber cable. There are two types of Fibre optic cable available. 1. Single mode: In this mode typical length is up to 12km and data rate is 1000Mbps. The core diameter is about 9.25 nm cable is known as 1000 base LX cable. 2. Multi mode: This mode is further categorised in two: 1. SX: Typical length is up to 500m and data rate is 1000Mbps. 2. FX: Typical length is up to 220m and data rate is 100Mbps.

PATCH PANEL A patch panel provides a convenient place to terminate (connect) all of the cable coming from different locations into the wiring closet. We connect the cables coming from various locations willing to connect to switch through the patch panel.

NEED OF PATCH PANEL We can label the patch panel so we know that which wire belongs to which location. Without a patch panel, it is chaotic. If we want to disconnect a station from the switch, it's a lot easier if there's a label. Most cabling is wired "straight-through" from end to end. But sometimes we need to cross-wire some of the pairs between switch

and station, like with a cable modem, or cross-wire to connect two switches. With a patch panel, all of this cross-wiring is done in the patch cable. If you have to make any changes, like moving a station or switch, you just move the patch cable with it, instead of having to reterminate the cable run.

RACK We have to mount the patch panel somehow. The best way is to buy a rack. Basically, a rack is a pair of vertical rails with holes drilled in them so that we can mount patch panels, hubs, and other network equipment. This made it easy to access the back of the patch panel and other networking components.

Computer networking devices


Router
A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it gets to its destination nodeUnlike a gateway, it cannot interface different protocols. Works on OSI layer 3. Routers may provide connectivity within enterprises, between enterprises and the Internet, and between internet service providers (ISPs) networks. The largest routers (such as the Cisco CRS-1 or Juniper T1600) interconnect the various ISPs, or may be used in large enterprise networks. Smaller routers usually provide connectivity for typical home and office networks. Other networking solutions may be provided by a backbone Wireless

Distribution System (WDS), which avoids the costs of introducing networking cables into buildings.

Switch
A switch is a telecommunication device which receives a message from any device connected to it and then transmits the message only to the device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network). The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable Internet. In most of these cases, the end-user device contains a router and components that interface to the particular physical broadband technology. User devices may also include a telephone interface for VoIP. Works on OSI layer 2.

Bridge
It is a device that connects multiple network segments along the data link layer. Network bridging describes the action taken by network equipment to allow two or more communication networks, or two or more network

segments,[1] to create an aggregate network. Bridging is distinct from routing which allows the networks to communicate independently as separate networks.[2] A network bridge is a network device that connects more than one network segment.Works on OSI layer 2.

Hub
A network hub is an unsophisticated device in comparison with, for example, a switch. A hub does not examine or manage any of the traffic that comes through it: any packet entering any port is rebroadcast on all other ports. Effectively, it is barely aware of frames or packets and mostly operates on raw bits or symbols. Consequently, due to the larger collision domains, packet collisions are more frequent in networks connected using hubs than in networks connected using more sophisticated devices. Works on OSI layer 1.

Repeater
It is a device to amplify or regenerate digital signals received while sending them from one part of a network into another. Works on OSI layer 1.

Gateway
A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes, while the nodes that connect the networks in between are gateways. For example, the computers that control traffic between company networks or the computers used by internet service providers (ISPs) to connect users to the internet are gateway nodes. In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.

Some hybrid network devices:


Multilayer switch: a switch which, in addition to switching on OSI layer 2, provides functionality at higher protocol layers. Protocol converter: a hardware device that converts between two different types of transmissions, such as asynchronous and synchronous transmissions. Bridge router (brouter): a device that combines router and bridge functionality and therefore works on OSI layers 2 and 3.

Hardware or software components that typically sit on the connection point of different networks, e.g. between an internal network and an external network:

Proxy server: computer network service which allows clients to make indirect network connections to other network services Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the network policy Network address translator (NAT): network service provide as hardware or software that converts internal to external network addresses and vice versa

Other hardware for establishing networks or dial-up connections:


Multiplexer: device that combines several electrical signals into a single signal Network interface controller a piece of computer hardware to allow the attached computer to communicate by network Wireless network interface controller a piece of computer hardware to allow the attached computer to communicate by LAN Modem: device that modulates an analog "carrier" signal (such as sound), to encode digital information, and that also demodulates such a carrier signal to decode the transmitted information, as a computer communicating with another computer over the telephone network ISDN terminal adapter (TA): a specialized gateway for ISDN Line driver: a device to increase transmission distance by amplifying the signal. Base-band networks only.

Network topologies
Think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there. Network topologies are categorized into the following basic types:

bus ring star tree mesh hybrid

Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable. ]

Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.

Star Topology
Many home networks use the star topology. A star network features a central connection point called a "hub node" that may be a network hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)

Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the root of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.

Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.

A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.

Hybrid
Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network connected to a tree network is still a tree network topology. A hybrid topology is always produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network

A Star ring network consists of two or more star topologies connected using a multistation access unit (MAU) as a centralized hub. A Star Bus network consists of two or more star topologies connected using a bus trunk (the bus trunk serves as the network's backbone).

While grid and torus networks have found popularity in high-performance computing applications, some systems have used genetic algorithms to

design custom networks that have the fewest possible hops in between different nodes. Some of the resulting layouts are nearly incomprehensible, although they function quite well.[citation needed] A Snowflake topology is really a "Star of Stars" network, so it exhibits characteristics of a hybrid network topology but is not composed of two different basic network topologies being connected. Definition : Hybrid topology is a combination of Bus,Star and ring topology.

IP ADDRESS
IP Address is a logical address of the computer. It use for identify of computer this is unique same as telephone number. IP is a 32 bit address. Computer networking is depending on IP address. IP Address is two types: -------STATIC IP: - Provide by User this IP cannot change automatically. DYNAMIC IP: - Provide by DHCP Server this is can be change automatically Difference between Static IP and Dynamic IP STATIC IP Required more time to fill IP address IP List maintain by user Server Human Error PC shuffle Problem 12.2 What is DHCP? Automatically assigns IP addresses method centralized. DYNAMIC IP Required less time to fill IP List maintain by DHCP No chance No Problem

DHCP is a protocol that allocates IP addresses to computer on a network.

NETWORK CONNECTIVITY OF RCOM CIRCLE OFFICE CHANDIGARH


In Chandigarh circle office, we have a LAN IP pool of 10.132.16.1/24 and WAN IP pool of 97.246.86.101. We have 1 DHCP SERVER having an IP address of 10.132.16.20 and DNS server having an IP address of 10.132.16.19. We have 4 TOSHIBA printers on each floor of the office having IP addresses 10.132.16.4, 10.132.16.7, 10.132.16.5 AND 10.132.16.8. SWITCH STACK connects the whole network.

WDRAM RELIANCE I.T PROJECT INFRASTRUCTURE MANAGED SERVICE GROUP(IMSG)

This project is started, so that there can be a proper utilization and management of all the computers within the RELIANCE NETWORK. There are 5 major components of the project 1. WINDOWS SERVER UPDATE SERVER 2. DOMAIN 3. REMEDY 4. ANTIVIRUS 5. MARIMBA In this project there are 5 main servers, through which constant updates, patches etc are being sent. These servers are different from the normal servers, as they have to communicate with multiple users at the same time. THESE MAIN SERVERS ARE KEPT IN DAKC (DHIRU AMBANI KNOWLEDGE CENTER) BOMBAY. FOR THE CHANDIGARH CLUSTER, THE SUBSERVERS ARE KEPT IN WAREHOUSE MOHALI. Main servers first communicate with the sub servers, then those sub servers sends all the updates to all those computers which are kept come in the pendency list.

The PENDENCY list is being send by the IMSG team in Bombay, known as the 'WDRAM REPORT'. This report consists of all the pendencys, issues and problems related to the WDRAM. Report is being sent on the weekly basis. Report is forwarded by the AREA OPERATION INCHARGE, of the respective cluster, to all the Engineers. Currently there are over 200 PC's in CMP OFFICE and these pcs have to be constantly monitored so that they can all work properly. The main purpose here is to maintain the proper working of the 5 major components as mentioned above. In this report there are issues like: 1 Is PC in DOMAIN? 2 Is antivirus installed? 3 Is antivirus infected? 4. Is marimba installed? 5 Has computer fetched 7 days report?(there is a weekly report which is constantly sent from DAKC) 6. Are patches up-to-date? 7. Is there any Remedy mismatch? There are many other issues under WDRAM which IT TEAM have to deal with.

19.2 Five major components of the project

W(WINDOWS SERVER UPDATE SERVER):

For this server RELIANCE had a special tie up with MICROSOFT. This server updates the client machine with security patches for software application. Patches are used for software applications, so that they can work properly. WSUS Servers configuration. configuration is different from normal servers

For updating wsus server we have to make a user login. 1 of the most important component used in the WSUS is MBSA(Microsoft base line security Analyzer ) MBSA helps to scan a computer, by the help of MBSA a user can scan any individual PC or even multiple Pcs in any given range. Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS), System Centre Configuration Manager (SCCM) 2007, and Small Business Server (SBS). Used by many leading third party security vendors and security auditors, MBSA on average scans over 3 million computers

each week. Join the thousands of users that depend on MBSA for analyzing their security state.In RELIANCE COMMUNICATIONS version 2.1 is used.

D (DOMAIN SERVER) By Default every computer domain is work group. So every computer has to be kept in the RELIANCE domain that is ricpj.ric.com. When the new PC comes to the office, it cannot pick up the updates automatically from the domain server .so for that the PC should be kept in the Domain.

R (REMDY SERVER)

This server is responsible for the working of the REMEDY SOFTWARE. Which consist of all the information about the user.

ADVANTAGES
o

Calls are put through this software. Any User having IT related problem would lock a call on toll free number or they can mail to imsgcircle.support@relianceada.com . It is also used in call logging or call tracing for any I.T related problem .each and every asset is mapped through this.

This software was made by BMC, exclusively for RELIANCE COMMUNICATIONS. This software is used to map each and every asset of the computer which has been deployed to the user.

Whenever a user faces any problem in his\her computer OR even if there is any issue related to WDRAM, he\she would send a mail to imsgcircle.support@relianceada.com, then a call would be locked and would be assigned to a particular engineer. Each and every Engineer has his account in the REMMEDY Software which he is able to keep a track of all the calls which are being assigned to him. Even if any of the external customers (customers to RELIANCE COMMUNICATIONS e.g. SBI, PUNJAB NATIONAL BANK etc) Once an Engineer logs into the REMEDY software, then he clicks onto the Incident Management Console. The main work of the engineer is in the Incident Management Console. An engineer has to check his calls which are locked .all the calls are categorized according there priority levels.

HIGHEST PRIORITY CALL: Issues related to NETWORK, router call (external call), HSD Call (external call).

MEDIUM PRIORITY CALL: Most of the calls are categorised under medium priority call. Calls of WDRAM are categorised under medium priority.

LOW PRIORITY CALL: Calls related to hardware is categorised under low priority.

After putting the call in progress , engineer then tries to resolve the issue .time available to the engineer is 180 minutes. if by any chance engineer is not able to resolve his call within the given time period, then his call would be escalated.

A (ANTIVIRUS SERVER): Symmetric(ANTIVIRUS used in RELIANCE NETWORK) sends all the updates to the ANTIVIRUS server, and those updates are send all over the network. Earlier trend micro was used but it was not that much effective. In antivirus we can face many issues like; Is antivirus infected? Is antivirus updated? Is antivirus engine on? Removal of Infection from a system If a system, gets infected, we have to download a file called NSS file which is updated daily. The complete procedure to download and install the NSS file is below:Goto 10.8.51.60 which is a FTP server for all downloads. Then click Download and then Symantec which shows the list of antivirus tools. Goto Symantec tool and then NSS file is visible. Download this file and place it on C: drive. Restart the sytem in Safe Mode and run this NSS file.

M (MARIMBA TOOL): The Marimba Remedy Service Console (Windows) can be used as the primary interface which is used for tracking, scanning and monitoring hardware and software changes of a system. It is present in all the systems and is a necessary tools for diagnosis Marimba is a software developed by BMC Software Group. Marimba is mandatory and is installed on the all servers, workstations and laptops located all over India which are connected by ADAG Group Intranet Network. Any computer or laptop must have Marimba installed before it can be connected to the domain. Failure to do so results in a pendency which is easily spotted at the Mumbai Circle office with the help of WDRAM software. It is the IT engineers job to make sure all the PCs and laptops have Marimba installed. Marimba provides a continuous compliance over software, patches, configuration settings, power settings, and security content through a powerful policy-based management system that:

Discovers, manages, and documents configurations for client devices like POS systems, handhelds, kiosks, and ATMs Configures, updates, and patches client endpoints to ensure total compliance and prevent security vulnerabilities Installs, updates, and repairs application software and content to ensure successful application releases Tracks, harvests, and reuses software licenses to control costs and ensure compliance with corporate license agreements Manages advanced PC power settings to help establish and enforce Green IT initiatives Supports popular client platforms, such as: Microsoft Windows (including Windows 7), Windows Mobile, Red Hat and SUSE Linux

Marimba is now called BMC BladeLogic Client Automation which is a newer version. But ADAG Group uses the older version which is still called Marimba. The Advantages of using Marimba are:

Attain first-time success rates of up to 95% or more for configuration changes even in highly distributed environments Eliminate 90% of the manual steps required by other patch management systems Deploy software to hundreds of thousands of diverse endpoints with minimal hardware infrastructure and bandwidth usage Enforce policy-driven compliance, while also saving on license costs and minimizing security vulnerabilities Reduce client power consumption by up to 70% Reduce annual software spend and gain clear insight to overall software usage

Вам также может понравиться