AB

May 31, 2016 | Author: Versha Rajput | Category: N/A
Share Embed Donate


Short Description

Download AB...

Description

Concept of Reliance communication ?An Overview of current Market Scenario ?Brief Study of the Organization ?Organizational Set-up (1) CONCEPT OF RELIANCE COMMUNICATION Thursday, August 09, 2007 Anil Ambani: Telecom person of the year 2007 His marketing strategy has made millions of Indians happy, they got the best mob ile tariffs in the world-local call costs at 15 paise/minute, and STD call at 40 paise/minute NEW DELHI, INDIA: When the VOICE&DATA jury, comprising eminent professionals fro m the telecom field, met in Delhi in June to choose the Telecom Person of the Ye ar 2007, the five-hour selection process was steamy. The reason was obvious: The telecom sector is growing faster than any other segm ent and naturally their CEOs have a lot to crow about. The jury had to select on e from three CEOs, who had made it to the final list through nominations from th e industry and the initial scrutiny. Among the three, one of the main contenders was a young CEO. The jury decided that he should come back next year to try and win the coveted award. The list now had two names-both CEOs of two well-known c ompanies. The pivotal difference between the two: one is an entrepreneur and the other is not so popular, as his credit is shared among a number of his big dadd ies. Following a five-hour closely held, hotly debated discussion, the name was annou nced: Anil Dhirubhai Ambani, chairman of Reliance Communications. Anil Ambani jo ined Reliance Industries (currently promoted by his brother Mukesh Ambani, follo wing their split) in 1983 as co-chief executive officer. Forbes ranked him numbe r 104 among the World's Richest People in 2006. The Ambani family faced criticis m when it announced its ambitious plans to build a countrywide telecom network, as its prior expertise lay in commodities-textiles and petrochemicals- business only. Apart from that telecom needs a service-oriented mindset, critics felt. Wh at they did not remember was how the family had served its millions of sharehold ers. Policies in India are made in line with Ambani's vision, says an industry expert . His business acumen and closeness to politicians assisted him in making it to the Rajya Sabha in June 2004, as an independent member. Ambani chose to resign v oluntarily on March 25, 2006. The same association with politicos gave him negative returns too when the Mayaw ati Government in Uttar Pradesh put a spanner on his ambitious plans to build a 1,200- acre SEZ. Media sees his aggression when he announces financial results for the Reliance A DA group of companies, and when he attends the annual general meetings and faces questions from shareholders. When he meets the press, he has answers to all the ir questions. He also remembers to call select journalists by name. To merchant bankers he, who has already contributed immensely to the financial r eforms of the country, is one of the financial wizards of the world. May be beca use of his expertise, he gave up in the race to grab Hutchison Essar stake, afte r indirectly jacking up the valuation. His negotiations with the Qualcomm chief are also a folk theory now. How did Ambani become the VOICE&DATA Telecom Person of the Year 2007? What are h is personal and organizational achievements in the recent past? His path-breaking marketing strategy that was put in by the strongest team of te lecom professionals the country has ever seen has made millions of Indians happy as they got the best mobile tariffs in the world. The aggression resulted to ad ding to his already swollen kitty. Every hour India will be adding around 20,000 new mobile customers and Reliance Communications over 4,000. When mobile teleph ony first began in India, a local call cost Rs 16 per minute; an STD Rs 50; and a call to the US Rs 100 per minute. With Reliance Communication s pioneering price initiative, a local call now costs a mere 15 paise per minute, STD 40 paise, an

d a call to the US costs less than Rs 2 per minute. The presence of Reliance Com munications is making the competition in India panicky. Global telecom forces wi ll also shortly start feeling the heat. Ambani has also recently announced his R s 1,200 crore buyout of Yipes Holdings. Achiever's Pride Undertook financial restructuring of Reliance communications To spend Rs 16,000 crore to expand and strengthen network coverage After expansion, Reliance Communications will have the single largest wireless network in the world Launched the lowest-cost classic brand handset at Rs 777 Subscriber base grew to over 28 mn during last fiscal, registering 60% growth Total Revenue shot up to Rs 14,468 crore, an increase of 34% Net Profit rises to Rs 3,163 crore, an increase of over 600% Revenues of the wireless business increased by 46% to Rs 10,728 crore Broadband achieved revenue growth of 123% to Rs 1,144 crore Market capitalization crossed Rs 100,000 crore Will add 23,000 more towers Telecom services will be available in over 23,000 towns and 600,000 villages Next generation DTH network will be launched before end of the year Reliance Communications' wireless subscriber base grew to over 28 mn last fiscal , registering a 60% growth. This makes it one of the top two wireless operators in India. "Economic growth in the future will be indexed to connectivity of millions of en terprise and individual customers. Over the next few years, we will have over 10 0 million customers, making us one of the top 5 telecom players in the world. In four years, we put up a total of 14,000 towers across the country. This year al one we will add 23,000 more towers. Our wireless network is currently available in 10,000 towns. By the end of this year, it will be available in over 23,000 to wns and 600,000 villages," Anil Ambani said at the first annual general meeting of Reliance Communications since the re-organization of the Reliance Group in Ju ne 2005. "In four years of operations, we invested around Rs 32,000 crore. This year alon e we will invest over Rs 20,000 crore. At the end of this year, we will have cov ered over 90% of our population. If Version 1.0 of the Indian telecom story was all about affordability, Version 2.0 will be about reach. Our Network expansion will give us the power to drive the market and stay ahead of the curve," Ambani adds. According to Ambani, the financial restructuring of Reliance Communications is t he biggest turnaround story in the history of corporate India. The inherited own ership structure of Reliance Communications was complex. The reorganization has yielded a simple, fair, and transparent ownership structure, and given Reliance Communications 100% ownership of all operational and associate companies. Reliance Communications is now among the three most valuable private sector comp anies in India, and the five most valuable telecom companies in Asia. In the cur rent Fiscal, Reliance Communications will spend Rs 16,000 crore to further expan d and strengthen its network coverage across India and the rest of the world. In addition to organic growth, Reliance Communications will leverage the advanta ges derived from this impressive financial platform to explore and pursue any si gnificant Opportunities available in the telecommunications sector. "We are curr ently evaluating a number of inorganic opportunities in select international mar kets to further expand our footprint," Ambani said. Reliance Communication s One India, One Tariff plan allowed millions to connect ac ross India at just one rupee a minute. The company was the first one to break th e Rs 1,000 entry-barrier with the launch of the lowest-cost classic brand handse t at Rs 777. As per its expansion plan, Reliance Communications will have the single largest wireless etwork in the world, covering over 900 mn Indians or more than 15% of t he global population. It will over 23,000 towns or every single Indian habitatio n with a population of over 1,000. Reliance Communications will cover almost 100

% of all rail routes, providing seamless voice, video, radio, and Internet conne ctivity to 14 mn commuters every day. It will also cover almost 100% of all nati onal highways, and 84% of all state highways, giving millions of users the power to talk, text, surf, play, chat or simply stay in touch across nearly the entir e length of India's 2,00,000-km-long road network. Having achieved tremendous growth, the main challenge for Reliance Communication s is to improve quality of service and ARPU. Its enterprise business is also not in a position to compete with the global majors. Stock market valuations may bo ost the fortunes of an entrepreneur, but Ambani needs to address the issues face d by the growing mobile customer base, especially in India, where bureaucracy ta kes pride in checking the businessman. (2) AN OVERVIEW OF CURRENT MARKET SCENARIO Reliance Communications (formerly Reliance Communications Ventures) is one of In dia's largest providers of integrated communications services. The company has m ore than 20 million customers and serves individual consumers, enterprises, and carriers, providing wireless, wireline, long distance, voice, data, and internet communications services through a number of operating subsidiaries. The company sells communications and digital entertainment products and services through it s chain of Reliance Web World retail outlets. The company's Reliance Infocomm su bsidiary provides wireless communications services throughout India. Reliance Co mmunications is part of the Reliance - Anil Dhirubhai Ambani Group. The current network expansion undertaken by Reliance is the largest wireless net work expansion undertaken by any operator across the world. It was with this bel ief in mind that Reliance Communications (formerly Reliance Infocomm) started la ying 60,000 route kilometres of a pan-India fibre optic backbone. This backbone was commissioned on 28 December 2002, the auspicious occasion of D hirubhai s 70th birthday, though sadly after his unexpected demise on 6 July 2002. Reliance Communications has a reliable, high-capacity, integrated (both wireless and wire line) and convergent (voice, data and video) digital network. It is ca pable of delivering a range of services spanning the entire infocomm (informatio n and communication) value chain, including infrastructure and services for ente rprises as well as individuals, applications, and consulting. Today, Reliance Communications is revolutionizing the way India communicates and networks, truly bringing about a new way of life. We will leverage our strengths to execute complex global-scale projects to facil itate leading-edge information and communication services affordable to all indi vidual consumers and businesses in India. We will offer unparalleled value to create customer delight and enhance business productivity. We will also generate value for our capabilities beyond Indian borders and enabl e millions of India's knowledge workers to deliver their services globally. (3) BRIEF STUDY OF THE ORGANIZATION Chairman s profile Reliance Communications Limited founded by the late Shri. Dhirubhai H Ambani (19 32-2002) is the flagship company of the Reliance Anil Dhirubhai Ambani Group. It is India's foremost truly integrated telecommunications service provider. With a customer base of over 36 million including close to one million individual ove rseas retail customers, Reliance Communications ranks among the top ten Asian Te lecom companies. Its corporate clientele includes 600 Indian, 250 multinational corporations and over 200 global carriers and owns and operates the world's larg est next generation, IP enabled connectivity infrastructure, comprising over 150 ,000 kilometers of fiber optic cable systems in India, USA, Europe, Middle East and the Asia Pacific region Regarded as one of the foremost corporate leaders of

contemporary India, Shri Anil D Ambani, 48, is the chairman of all listed compa nies of the Reliance ADA Group, namely, Reliance Communications, Reliance Capita l, Reliance Energy and Reliance Natural Resources. He is also the president of the Dhirubhai Ambani Institute of Information and Co mmunications Technology, Gandhinagar . An MBA from the Wharton School of the University of Pennsylvania, Shri Ambani is credited with pioneering several financial innovations in the Indian capital ma rkets. He spearheaded the country s first forays into overseas capital markets wit h international public offerings of global depositary receipts, convertibles and bonds. Under his chairmanship, the constituent companies of the Reliance ADA group have raised nearly US$ 3 billion from global financial markets in a period of less t han 15 months. Shri Ambani has been associated with a number of prestigious academic institutio ns in India and abroad. He is currently a member of: Wharton Board of Overseers, The Wharton School, USA Board of Governors, Indian Institute of Management (IIM), Ahmedabad Board of Governors, Indian Institute of Technology (IIT), Kanpur Executive Board, Indian School of Business (ISB), Hyderabad In June 2004, Shri Ambani was elected as an Independent member of the Rajya Sabh a Upper House, Parliament of India, a position he chose to resign voluntarily on March 25, 2006. Selected Awards and Achievements Voted the Businessman of the Year in a poll conducted by The Times of India TNS, D ecember 2006 Voted the Best role model among business leaders in the biannual Mood of the Natio n poll conducted by India Today magazine, August 2006 Conferred the CEO of the Year 2004 in the Platts Global Energy Awards Conferred 'The Entrepreneur of the Decade Award' by the Bombay Management Associ ation, October 2002 Awarded the First Wharton Indian Alumni Award by the Wharton India Economic Foru m (WIEF) in recognition of his contribution to the establishment of Reliance as a global leader in many of its business areas, December 2001 Selected by Asiaweek magazine for its list of 'Leaders of the Millennium in Busi ness and Finance' and was introduced as the only 'new hero' in Business and Fina nce from India, June 1999.

(4) ORGANIZATIONAL SET UP

PRESIDENT IDENT (PERSONAL BUSINESS ) ESS) SENIOUR VP VP GM DGM AGM SENIOUR MANAGER MANAGER DEPUTY MANAGER ASSISTANT MANAGER MANAGEMENT TRAINING

PRESIDENT (ENTERPRISES BUSINESS)

PRES (HOME BUSIN

Figure 1.1 Organisational setup INTRODUCTION IMSG (INFRASTRUCTURE MANAGEMENT SERVICE GROUP) Figure2.1 Imsg framework IMSG is a dedicated group of IT engineers of IGATE Global solutions ltd outsourc ed to reliance to handle the infrastructure of reliance centre in Delhi.

BASIC TERMINOLOGIES USED IN THE PROJECT: Network: A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electr onic communications. The computers on a network may be linked through cables, te lephone lines, radio waves, satellites, or infrared light beams. The two basic types of networks include: Local Area Network (LAN) Wide Area Network (WAN) Local Area Network A Local Area Network (LAN) is a network that is confined to a relatively small a rea. It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. I t stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerf ul than the file server, and they may have additional software on their hard dri ves. On most LANs, cables are used to connect the network interface cards in eac h computer. See the Topology, Cabling, and Hardware sections of this tutorial fo r more information on the configuration of a LAN. Wide Area Network Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matt er of minutes, without paying enormous phone bills. A WAN is complicated. It use s multiplexers to connect local and metropolitan networks to global communicatio ns networks like the Internet. To users, however, a WAN will not appear to be mu ch different than a LAN or a MAN. Benefits of Installing a Network Speed. Networks provide a very rapid method for sharing and transferring files. Without a network, files are shared by copying them to floppy disks, then carryi ng or sending the disks from one computer to another. This method of transferrin g files (referred to as sneaker-net) is very time-consuming. Cost. Networkable versions of many popular software programs are available at co nsiderable savings when compared to buying individually licensed copies. Besides monetary savings, sharing a program on a network allows for easier upgrading of the program. The changes have to be done only once, on the file server, instead of on all the individual workstations. Security. Files and programs on a network can be designated as "copy inhibit," s o that you do not have to worry about illegal copying of programs. Also, passwor ds can be established for specific directories to restrict access to authorized users. Centralized Software Management. One of the greatest benefits of installing a ne

twork at a school is the fact that all of the software can be loaded on one comp uter (the file server). This eliminates that need to spend time and energy insta lling updates and tracking files on independent computers throughout the buildin g. Resource Sharing. Sharing resources is another area in which a network exceeds s tand-alone computers. Most schools cannot afford enough laser printers, fax mach ines, modems, scanners, and CD-ROM players for each computer. However, if these or similar peripherals are added to a network, they can be shared by many users. Electronic Mail. The presence of a network provides the hardware necessary to in stall an e-mail system. IP Addressing Fundamentals In order for a network to be useful hosts must have a way to contact each other. The TCP/IP protocol utilizes multiple layers of addressing to make this possibl e. It can be broken into four different layers. The physical or hardware layer l ies at the base of this protocol "stack". This layer depends upon the actual phy sical implementation of the network (such as Ethernet or token-ring) and is ulti mately responsible for the delivery of network information packets. The IP (Inte rnet Protocol) layer sits above the physical layer in the stack and is independe nt of the network hardware. Therefore it may encompass many different physical t ypes of networks. The TCP (Transmission Control Protocol) comes next and is inde pendent of both the physical network and the IP layers (although it is most comm only used with IP). The application layer, where a user typically interacts, top s off the stack. The underlying protocols below the application are mostly trans parent to the end user. Some applications include FTP (File Transfer Protocol) a nd Telnet. Each layer in the protocol stack has its own addressing scheme. The hardware add ress is used to identify hosts connected to the network. Different physical netw orks have different forms of addresses that are not compatible with one another. The IP address is also used to identify hosts connected to the network, however it does not rely upon the underlying hardware so it can identify hosts on diffe rent physical networks. The TCP port number identifies a particular application on a machine. A packet of information leaves the application layer and enters th e TCP layer where a TCP header is added containing the destination and source po rt number. Then it enters the IP layer which adds an IP header containing a dest ination and source IP address. Finally the hardware layer adds its header and th e appropriate address information. When the packet reaches its destination each layer removes and decodes its header information and then sends the remainder of the packet on until it reaches the destination application. IP Addressing An IP (Internet Protocol) address uniquely identifies a node or host connection to an IP network. System administrators or network designers assign IP addresses to nodes. IP addresses are configured by software; they are not hardware specif ic. An IP address is a 32 bit binary number usually represented as 4 fields each representing 8 bit numbers in the range 0 to 255 (sometimes called octets) sepa rated by decimal points. For example: 150.215.17.9 It is sometimes useful to view the values in their binary form. 150.215.17.9 10010110.11010111.00010001.00001001 An IP address consists of two parts, one identifying the network and one identif ying the node. The Class of the address determines which part belongs to the net work address which part belongs to the node address. Address classes There are 5 different address classes. The first byte of the first octet determi nes the class of the address. 1 and 126 it is a Class A address. 128 and 191 it is a Class B address 192 and 223 it is a Class C address 224 and 239 it is a Class D address 240 and 255 it is a Class E address.

127 is reserved for loop back and is used for internal testing on the local mach ine. Now we can see how the class of address determines which part belongs to the net work (N) and which part belongs to the node (n). Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn 150.215.17.9 is a Class B address so its Network is defined by the first two oct ets and it's node is defined by the last 2 octets. Class D addresses are reserve d for multicasting and Class E addresses are reserved for future use so they sho uld not be used. In order to specify a network with an IP address the node section is set to all 0's for example 150.215.0.0 specifies the network for the above address. When th e node section is set to all ones it specifies a broadcast that is sent to all h osts on a network. 150.215.255.255 specifies a broadcast address IP Subnet Addressing There are several reasons why you might want to subnet a network. You may want t o incorporate different types of physical networks into your IP network. Impleme nting subnets helps to control network traffic. On an Ethernet network every mac hine on the same physical network sees all the packets of data sent out on the n etwork. In heavy traffic situations this can result in collisions making the net work performance painfully slow. In both these situations routers or gateways ar e used to separate networks. The router breaks the network into multiple subnets . Subnet masking Applying a subnet mask to an address allows you to identify the network and node sections of an IP address. Doing a bitwise AND on the IP address and the subnet mask results in the network address. For example: 10010110.11010111.00010001.00001001 150.215.017.009 11111111.11111111.00000000.00000000 255.255.000.000 -------------------------------------------------------10010110.11010111.00000000.00000000 150.215.000.000 This result may seem familiar to you because Class A, B and C addresses have a s elf encoded or default subnet mask built in. Class A - 255.0.0.0 Class B - 255.255.0.0 Class C - 255.255.255.0 Or in binary form Class A - 11111111.00000000.00000000.00000000 Class B - 11111111.11111111.00000000.00000000 Class C - 11111111.11111111.11111111.00000000 MAC: MAC addresses are physical addresses, unlike IP addresses which are logica l addresses. Logical addresses require you to load special drivers and protocols in order to be able to configure your network card/computer with an IP Address, whereas a MAC address doesn't require any drivers whatsoever. The reason for th is is that the MAC address is actually "burnt-in" into your network card's memor y chipset. Figure2.2 layers The IP address of a machine exists on the 3rd Layer of the OSI model and, when a packet reaches the computer, it will travel from Layer 1 upwards, so we need to be able to identify the computer before Layer 3. This is where the MAC address - Layer 2 comes into the picture. All machines on a network will listen for packets that have their MAC address in the destination field of that packet. The Physical Layer understands the electrical signals on the network and creates the frame which gets passed to the Datalink layer. If the packet is destined fo r the computer then the MAC address in the destination field of the packet will match, so it will accept it and pass it onto the Layer above (3) which, in turn,

will check the network address of the packet (IP Address), to make sure it matc hes with the network address to which the computer has been configured. DATA CENTER: A data center is a facility used to house computer systems and ass ociated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications conn ections, environmental controls (e.g., air conditioning, fire suppression) and s ecurity devices. Communications in data centers today are most often based on networks running th e IP protocol suite. Data centers contain a set of routers and switches that tra nsport traffic between the servers and to the outside world. Redundancy of the I nternet connection is often provided by using two or more upstream service provi ders. Some of the servers at the data center are used for running the basic Internet a nd intranet services needed by internal users in the organization, e.g., e-mail servers, proxy servers, and DNS servers. Figure2.3 dns server Network security elements are also usually deployed: firewalls, VPN gateways, in trusion detection systems, etc. Also common are monitoring systems for the netwo rk and some of the applications. Additional off site monitoring systems are also typical, in case of a failure of communications inside the data center. SERVER: Server is often dedicated, meaning that they perform no other tasks besi des their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer. Figure2.4 switches A server comprise the one of the most important components of a typical data c enter. SWITCH: A network switch is a small hardware device that joins multiple computer s together within one local area network (LAN). Technically, network switches op erate at layer two (Data Link Layer) and some at layer3 (Networking layer) of th e OSI model. Network switches appear nearly identical to network hubs, but a switch generally contains more intelligence than a hub. Switches (Layer-2 Switching) are a lot s marter than hubs and operate on the second layer of the OSI model. What this mea ns is that a switch won't simply receive data and transmit it throughout every p ort, but it will read the data and find out the packet's destination by checking the MAC address. The destination MAC address is located always at the beginning of the packet so once the switch reads it, it is forwarded to the appropriate p ort so no other node or computer connected to the switch will see the packet.. Figure2.5 A Switch in a Network Layer-2 switches are a lot faster than routers cause they dont look at the Netwo rk Layer header or one can say, information. Instead all they look at is the fra me's hardware address (MAC address) to determine where the frame needs to be for warded or if it needs to be dropped. If we had to point a few features of switch es we would say: They provide hardware based bridging (MAC addresses). They work at wire speed, therefore have low latency. They come in 3 different types: Store & Forward, Cut-Through and Fragment Free. Traditional network switches operate at Layer 2 of the OSI model while network r outers operate at Layer 3. This often leads to confusion over the definition of "Layer 3 switch." A Layer 3 switch is a high-performance device for network routing. Layer 3 switc hes actually differ very little from routers. A Layer 3 switch can support t he same routing protocols as network routers do. Both inspect incoming packets a nd make dynamic routing decisions based on the source and destination addresses

inside. Both types of boxes share a similar appearance. Layer 3 switches were conceived as a technology to improve on the performance of routers used in large local area networks (LANs) like corporate intranets. The key difference between Layer 3 switches and routers lies in the hardware technol ogy used to build the unit. The hardware inside a Layer 3 switch merges that of traditional switches and routers, replacing some of a router's software logic wi th hardware to offer better performance in some situations. Layer 3 switches often cost less than traditional routers. Designed for use with in local networks, a Layer 3 switch will typically not possess the WAN ports and wide area network features a traditional router will always have. All switches regardless of the brand and various enhancements they carry, have s omething in common, it's the three stages (sometimes 2 stages) they go through w hen powered up and during operation. These are as follows: Address Learning: When a switch is powered on, the MAC filtering table is empty. When a device transmits and an interface receives a frame, the switch places th e source address in the MAC filtering table remembering the interface the device on which it is located. The switch has no choice but to flood the network with this frame because it has no idea where the destination device is located. If a device answers and sends a frame back, then the switch will take the source addr ess from that frame and place the MAC address in the database, associating this address with the interface that received the frame. Since the switch has two MAC addresses in the filtering table, the devices can make a point-to-point connect ion and the frames will only be forwarded between the two devices. This makes la yer-2 switches better than hubs. Forward/Filter decisions: When a frame arrives at the switch, the first step is to check the destination hardware address, which is compared to the forward/filt er MAC database. If the destination hardware address is known, then it will tran smit it out the correct port, but if the destination hardware address is not kno wn, then it will broadcast the frame out of all ports, except the one which it r eceived it from. If a device (computer) answers to the broadcast, then the MAC a ddress of that device is added to the MAC database of the switch. Loop Avoidance (Optional) : It s often necessary to set up of redundant links bet ween the switches in order to avoid failures i.e. switch A takes over if switch B fails and vice-versa. This necessitates for the switch to support Spanning Tre e Protocol as this protocol finds the redundant links and switches them down unt il the time they are to be used. This avoids the possibility of a loop to occur within the system. FIREWALL: A firewall is simply a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent un authorized Internet users from accessing private networks connected to the Inter net. All data entering or leaving the Intranet pass through the firewall, which examines each packet and blocks those that do not meet the specified security cr iteria. FIREWALL SETTINGS AT THE HCL INFOSYSTEMS LTD. BLOCKING THE UNAUTHORIZED ACCESS Firewalls are also essential since they can provide a single block point where s ecurity and audit can be imposed. Firewalls provide an important logging and aud iting function; often they provide summaries to the admin about what type/volume of traffic that has been processed through it. Theoretically, there are two types of firewalls: 1. Network layer Firewall: This type generally makes their decisions based on th e source address, destination address and ports in individual IP packets. A simp le router is the traditional network layer firewall, since it is not able to mak e particularly complicated decisions about what a packet is actually talking to or where it actually came from. The point to be noted about many network layer firewalls is that they route tra ffic directly though them, so to use one we either need to have a validly assign ed IP address block or to use a private internet address block. The network laye r firewalls tend to be very fast and tend to be mostly transparent to its users.

2. Application layer Firewall: These generally are hosts running proxy servers, which permit no traffic directly between networks, and which perform elaborate l ogging and examination of traffic passing through them. Application layer firewalls can be used as network address translators, since tr affic goes in one side and out the other, after having passed through an applica tion that effectively masks the origin of the initiating connection. Application layer firewalls tend to provide more detailed audit reports and tend to enforce more conservative security models than network layer firewalls. GATEWAYS: A network gateway is an internetworking system capable of joining toge ther two networks that use different base protocols. A network gateway can be im plemented completely in software, completely in hardware, or as a combination of both. Depending on the types of protocols they support, network gateways can op erate at any level of the OSI model. Because a network gateway, by definition, appears at the edge of a network, rela ted capabilities like firewalls tend to be integrated with it. On home networks, a broadband router typically serves as the network gateway although ordinary co mputers can also be configured to perform equivalent functions. VIRTUAL PRIVATE NETWORK: A virtual private network (VPN) encapsulates data trans fers between two or more networked devices not on the same private network so as to keep the transferred data private from other devices on one or more interven ing local or wide area networks. There are many different classifications, imple mentations, and uses for VPNs. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. Figure2.6 Working of A VPN A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunnel ing Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a "tunnel" th at cannot be "entered" by data that is not properly encrypted.

ARCHITECHTURE OF THE NETWORK Figure2.7 network architecture The Reliance network comprises of many Media Convergence Nodes (MCN). All media (voice and data) first get terminated at these MCN s and then routed to their resp ective destinations. Thus each MCN holds an important entity in Reliance Network . Every MCN is connected to Network Operation Center (NOC) Mumbai through its co re MCN also sometimes referred as core locations. WDRAM WDRAM Report Management is an integral task performed by infrastructure managem ent team (IMSG) at reliance communications ltd. It is an acronym that stands for W:WSUS SERVER MANAGEMENT D: DOMAIN ADMINISTRATION R: REMEDY SERVICE MANAGEMENT A:ANTIVIRUS MANAGEMENT M: MARIMBA SERVER MANAGEMENT

The softwares used for the management of the WDRAM report is BMC Service Management Software suite.

BMC SERVICE MANAGEMENT SOFTWARE SUITE BMC combines best-practice ITILĀ® processes and automated application support for t hose processes including Incident Management, Problem Management, Change Managem ent and a CMDB operated and managed through a Service Desk running on the BMC Re medy suite of tools. By applying IT management best practices in an incremental and flexible approach , BMC and its Remedy suite solve immediate pain points to align people, process and technology to deliver higher levels of IT maturity and value. Reliance experience with Service Management and its knowledge of BMC Software s Rem edy suite of solutions for proactive Incident, Problem and Change Management ena bles the business to anticipate, identify and resolve infrastructure incidents o ften before they interrupt business functions. JDL, Service Management and Remed y help further reduce the number, duration, and severity of business disruptions through Change Management while improving Service Desk efficiency. Through a broader range of integrations with more Problem Management automation, BMC enables the Service Desk to more efficiently prioritize, resolve and preven t incidents based on business priorities or potential impact. WSUS WSUS stands for Windows Server Update Services. Windows Server Update Services (WSUS) provides a software update service for Mic rosoft Windows operating systems and other Microsoft software. Figure3.1 work of wsus WSUS is a locally managed system that works with the public Microsoft Update web site to give system administrators more control. By using Windows Server Update Services, administrators can manage the distribut ion of Microsoft hotfixes and updates released through Automatic Updates to comp uters in a corporate environment. Figure3.2 Microsoft windows update services As it is clearly shown in the figure that the task of WSUS updates is being exec uted and the figure illustrates a snapshot of the ongoing process. The software clearly shows the status of the updates along with the names of the computers on which the updates are being done.

Figure3.3 connected wsus servers Either a workgroup or a single computer can be selected to receive the updates. Using the remote desktop management procedure these updates can be run on the cl ient s machine. Microsoft Windows Server Update Services (WSUS) is thus a Windows service that h elps in distribution Microsoft s updates to clients in network. It downloads updates from Microsoft Update and installs the updates to client c

omputers in network so that each computer doesn t need access to the Internet and download updates from Microsoft website itself. Hence, if you have a lot of computers that running Windows that require updates in your network, you can save a lot of bandwidth of the Internet connection. Figure3.4 wsus with firewall Also, WSUS enables centralized management. It has an administrative console that summarizes current updates available on the server and updated status of each c lient computer that connect to the WSUS server.

DOMAIN

The above picture shows highlights the importance of domains in a network. Figure3.5 domain in network The various domains and other aspects of the network which are of utmost importa nce to an IMSG Engineer are as follows: Administrative Domain, the organization that actually controls and provisions th e resources, such as network resources and computing resources. Network Domain, a logical collection of connected network devices. An administra tive domain can administer multiple networks. Device, a physical network device. Switch Matrix, the logical component inside a device or network that is capable of dynamically switching packets or network connections. Interface, a logical interface, representing a network interface at a single lay er. (a physical interface can consist of multiple logical interfaces). The user may be added to the following built-in groups on the local computer: 1.Administrators 2.Backup operators 3.Debugger users 4.Guests 5.HelpServicesGroup 6.Network configuration operators 7.Power users 8.Remote desktop users If the computer is a member of a domain, the computer also maintains a local dom ain that has security accounts. These security accounts only pertain to that computer. To change domains at the

logon screen, press CTRL+ALT+DELETE. If the Domain box does not appear, click the Options button to display the Domai n box, and then select the required domain from the menu. The DHCP servers come into picture when a new laptop or pc is to be put on the d omain.

DHCP The primary components of DHCP discussed in this section include the DHCP server , DHCP client, and DHCP leases. Figure3.6 dhcp screen DHCP Servers The DHCP server dispenses and manages network IP addresses. It assigns IP addres ses to clients that are connecting to the network for the first time. When a cli ent connects to the network, the server automatically assigns it an IP address f rom an appropriate pool of addresses. You can have multiple DHCP servers on your network as long as their subnet pools do not overlap. However, it is recommended that you have only one DHCP server f or your entire network. The server is responsible for a pool of IP addresses. It can give out an IP address to a client requesting a new configuration from the pool of IP addresses for which it is responsible. When a client asks for confirm ation of its existing configuration, the server confirms the configuration. Figure3.7 connections between dhcp server and dhcp client DHCP Clients DHCP server supplies DHCP clients with sufficient information to establish an en dpoint for network communications. It also supplies other parameters needed by s ystem- and application-level software. DHCP clients are currently supported on 10 BaseT and 100 BaseT ethernets. It is not supported on FDDI and Token Ring networks. DHCP Leases The DHCP server has control of the IP address block. It grants DHCP clients perm ission to use IP addresses on a lease basis. The IP address is "leased" to the c lient for a fixed amount of time. The administrator sets the lease time, which c an last from 120 seconds to infinity. During the lease, DHCP guarantees that the IP address assigned to the client will not be re-assigned to another client. Be fore the lease time expires, the DHCP client automatically requests an extension on its lease. As long as the client can contact the DHCP server, the server wil l renew the lease. This section covers the basic interaction between a client and DHCP server to as sign an IP address to a client on the network. 1. A DHCP transaction begins when a client sends out a DHCP DISCOVER packet . This is usually a broadcast packet. At minimum, the packet will contain only t he client's hardware address. 2. The server receives the DHCP DISCOVER packet. If an IP address on the cl ient subnet is available and the server is willing to grant a lease, it makes an offer by sending a DHCP OFFER packet to the client. The offer packet contains t he: Proposed IP address for client Server's name

Server's IP address Other configuration information 3. The client receives the DHCP OFFER packet. The client might receive more than one offer if you have more than one DHCP server on the network. HP strongl y recommends that you have only one DHCP server on the network. If the client li kes the offer, it sends a DHCPREQUEST packet to the server. This indicates a for mal request to lease the IP address offered by the server.

4. The DHCP server receives the DHCPREQUEST packet and grants the client it s request to lease the IP address. The server sends a DHCPACK to the client. Thi s is the official notification that the address has been granted. 5. Before the lease time expires, the DHCP client requests to extend the le ase by sending a DHCPREQUEST packet to the server. The server then updates and e xtends the lease time. It sends a DHCPACK to the client to notify it that the le ase has been extended. These updates and lease extensions continue as long as th e client is powered on. If the lease expires and the client is not powered on, a nd not able to request an extension on the lease, the IP address is recycled. 6. The DHCP server sends DHCPACK to extend the lease on the IP address. REMEDY SERVICE MANAGEMENT Remedy is a BMC software that is used as a repository of the database of the calls made by the users and thus an from his account and can track as to what is the status their priority level, what is the issue and what further

information to maintain administrator can login of the calls, what are action has to be taken.

Figure3.8 bmc remedy login screen Remedy is used for the following: ? User ID creation ? Task creation and close ? Incident resolving ? Permission USER ID CREATION Users are the people to whom we are enabling the IT services. For this we have to create identification of user, so that we can counter the p roblem if any comes. THE PROCESS IS AS FOLLOW: Figure3.9 bmc remedy user screen

TASK CREATION & CLOSE Figure3.10 bmc remedy task creation screen

INCIDENT RESOLVING Figure3.11 incident management screen PERMISSION 1. Task User: Task User permission grants general access to the Task Manage ment System. With general TMS access the user will be permitted to query and mod ify tasks. This permission is superseded by TMS Manager and supersedes Task View er. 2. Task Manager: Task Manager permission grants access to the Task Manageme nt System with additional privileges to modify Task independent of Assignment Gr oup/Assignee. This permission group also grants access to create and modify Tas ks. This permission supersedes Task User and Task Viewer. 3. Task Process Config: Task Process Config grants access to setup and modi fy the Task Management System Process configuration forms. This permission is u sed for setting up and trouble shooting TMS Process functions 4. Task Administrator: Grants access to setup and modify the Task Managemen t System configuration and real-time forms. This is a computed group containing Task Application Config, Task Process Config and Task Manager. 5. Task Application Config: Grants access to setup and modify the Task Man agement System configuration forms. This permission is used for setting up and trouble shooting TMS configuration functions.

MARIMBA BMC BladeLogic Client Automation is formerly known as Marimba. It automates the entire lifecycle of desktops, laptops and client devices and ma intains continuous compliance over software, patches, configuration settings, po wer settings, and security content through a powerful policy-based management sy stem that: ? Discovers, manages, and documents configurations for client devices like POS systems, handhelds, kiosks, and ATMs ? Configures, updates, and patches client endpoints to ensure total compl iance and prevent security vulnerabilities ? Installs, updates, and repairs application software and content to ensur e successful application releases ? Tracks, harvests, and reuses software licenses to control costs and ensu re compliance with corporate license agreements ? Manages advanced PC power settings to help establish and enforce Green I T initiatives ? Supports popular client platforms, such as: Microsoft Windows (including Windows 7), Windows Mobile, Red Hat and SUSE Linux Figure3.12 real time enforcement of patch policies By implementing BMC BladeLogic Client Automation, one can: ? Attain first-time success rates of up to 95% or more for configuration c hanges even in highly distributed environments ? Eliminate 90% of the manual steps required by other patch management sys tems ? Deploy software to hundreds of thousands of diverse endpoints with minim

al hardware infrastructure and bandwidth usage ? Enforce policy-driven compliance, while also saving on license costs and minimizing security vulnerabilities ? Reduce client power consumption by up to 70% ? Reduce annual software spend and gain clear insight to overall software usage

CONFIGURING LOTUS INTRODUCTION IBM Lotus Software delivers robust collaboration software that empowers people t o connect, collaborate, and innovate while optimizing the way they work. With Lo tus you can drive better business outcomes through smarter collaboration. What is Notes -- the Manager version Lotus Notes is an application suite that includes the following components: e-mail calendaring and scheduling address book database web server programming Unlike other application suites (like Microsoft Office) that split these pieces of functionality into separate products (like Outlook, Access, Front Page, etc.) , Lotus Notes presents all of these components using a single front-end. For many people, Lotus Notes is an e-mail system. While this is not necessarily it's largest strength as a product, e-mail is probably the most recognizable com ponent that it has. It has most or all of the features of the other popular e-ma il products on the market, including calendaring and scheduling, and it uses sta ndards-based mail protocols such as POP3 and SMTP. Because Notes has both a clie nt and a server piece, users can use it to read and respond to e-mail, and admin istrators can use it as an entire e-mail environment. For all practical purposes though, everything in Notes is a database. Individual users have their own e-mail databases, and different sets of users can share ap plication databases that can display, add, or manipulate information. Besides da ta, a database can also contain modules of programming code that will perform ba ckground, scheduled, or on-demand tasks for a user. The Lotus Notes client is a desktop application that organizes and displays data bases on a user's local workstation. The physical database files can be stored e ither on the workstation itself or on a server. A typical Notes client "workspac e" will have icons for a handful of local databases as well as a number of datab ases that reside on one or several Notes servers. All of these icons can be grou ped together, so that the distinction between local and remote data becomes very trivial. The databases themselves can be highly customized to present the data that is as sociated with them. A Lotus Notes developer can design forms to display individu al data records, and views to display whole sets of data. In some cases, the dat a that is displayed doesn't have to come only from the database that you're in - it can also come from one or more other Notes or non-Notes databases. Because the programming layer is built-in to the Notes databases, a developer ca

n embed code throughout the database design to automate certain actions or react ions without having to install or configure external programs or processes. This built-in programming layer also makes it possible to create workflow applicatio ns that interact very fluidly between both application databases and e-mail. If all or some of your user base doesn't want to use the Notes client, the capab ility to automatically display Notes databases on the web is available as well. Since version 4.5, the Notes server software has shipped with a web server compo nent called "Domino", which translates Notes data into web pages and serves them up as a web site. Internet programming technologies such as JavaScript and Java are native to Notes, so these can be easily incorporated into Notes databases a nd design elements (either on the web or on the client). The Domino web server c an also be configured to interact with things such as IIS, Apache, and Java serv lets and JSP pages, so you can enhance your Domino website using other (possibly pre-existing) technologies within your environment. On a slightly more technical level, Notes/Domino provides a very granular securi ty model that allows a developer to "lock down" access to all or parts of a data base. In this way, you can combine private and public data within a single datab ase or across a single server. While the security is normally administered throu gh a corporate Notes address book, it can also tie in to the user accounts in an NT domain or any LDAP-aware directory service. Some examples of typical Notes applications are: e-mail (obviously) discussion forums document repositories expense approval systems web-based request systems Using the capabilities of Notes to interact with other database systems and othe r web technologies, you could also use it as a client-based or web-based informa tion portal that ties together a number of different data sources. Lotus Notes c an be a stand-alone data repository, a front-end to numerous other data reposito ries, or many things in-between. Lotus Notes enables teams of people to communicate with each other, collaborate on shared documents, and generate custom workflow applications. The teams may al l be connected to the same local area network, or may be connected via modem or remote access bridges. Information is generally stored on a scaleable Notes server in the form of an en crypted relational database, in which various types of data can be stored. Users can create their own forms, providing a customized view of the data. Fax, voice mail, and pager gateways enhance the portability of the data. Interfaces to the Internet and legacy databases on mainframes further increase the scope of data portability. The end user sees Notes as a window called the workspace (Figure 1) containing i cons that represent databases. These databases may be stored on a Notes server o r on a local disk or file server. Opening a database presents the user with a vi ew (Figure 2) of the database, and a list of documents (Figure 3). A view may be thought of as the sorted result of a search. Each database may have one or more views, and always has a default view. Opening a document displays a form throug h which the document s fields (or items) are presented. Figure4.1 lotus workspace screen

HOW TO CONFIGURE LOTUS Below are the given steps regarding configuring of lotus notes. Step 1: Installing Lotus Notes Click on Download Lotus Notes to start downloading Lotus Notes client software.

Run the self extracting file Notes7.exe. It will create a directory called C:\Lo tus7. (HINT: A Win Zip Self-Extractor window appears, please click on Unzip. When the files have been expanded click OK. Then click Close.) Run setup.exe from the C:\Lotus7\Clients\W32Intel\ folder. ClickNext.

Figure4.2 notes installation wizard On the License Agreement screen, checkmark I accept the terms in the license agr eement and click Next. Figure4.3 license agreement Type your name and organization name and click Next> button Figure4.4 installation wizard screen Click Next> to accept the default destination folders. Figure4.5 install wizard Click Next> to accept the default features Figure4.6 custom setup screen Make sure that the box Make Notes my default email program is unchecked. Click I nstall to begin installation. Figure4.7 ready to install screen The installation of Lotus Notes begins. After installation is complete, click Fi nish. Installation of Lotus Notes completes. Step 2: Configuring Lotus Notes Client Launch Lotus Notes by selecting Start > Programs > Lotus Applications > Lotus No tes. You will have a screen that looks like the one below. Click Next> (Note: If you see a different screen, it may be because you have installed a previous ver sion of Lotus Notes before or this is not the first time you attempt to install Lotus Notes 6 on your computer) Figure4.8 lotus notes client configuration Type in your name in the Your name box, and uncheck the I want to connect to a D omino server box. Click Next>. Figure4.9 lotus notes client configuration Make sure that none of the boxes are checked and click Next>. Figure4.10 lotus notes client configuration Click OK when the Notes setup is complete.

Figure4.11 lotus notes complete msg Lotus Notes will open the Welcome page with Notes 6 setup options. Click on the No thanks, just give me the defaults option. Figure4.12 lotus welcome page

Then you will have the Lotus Notes? default Welcome page on the screen. Figure4.13 lotus main page CONFIGURATION MANAGEMENT The Definition: A logical model of the infrastructure or a service by identifying, controlling, m aintaining and verifying the versions of Configuration Items in existence. Figure5.1 how to manage configuration Goal of Configuration Management: To provide IT infrastructure control through the identification, registration, m onitoring, and management of: All the Configuration Items of the IT infrastructure in scope All configurations ,versions ,and their documentation All changes, errors, service level agreements, and history of the components in General Relationships between the different components Exceptions between configuration records and the real infrastructure Configuration Management is responsible for: Specification of versions, configuration status accounting of all current and hi storical data concerned with each CI throughout its lifecycle Documentation of the relationship between all Cis Tracing records about any CI Ensuring that only authorised changes on a Configuration Item have been implemen ted CIs are accepted and correctly recorded in the Configuration Management system. All components that are part of the IT infrastructure are called onfiguration It ems (CIs). Configuration Items: Are required to provide services, Should be clearly identifiable, Are submitted for changes and Have to be administered Figure5.2 Conf. mgmt. data base Configuration Items have: a) A category b) Relationships c) An attribute d) A status Other records and data associated with a CI include incidents, known errors, and problems, and corporate data about employees, suppliers, locations, business un its, and procedures. Examples of CIs: Personal computers, Network components, Service Level Agreements, Manuals, Appli cations

ROUTER In a layman language , router is the device which routes the information from th

e source to destination. Router is the essential device used for networking.Ther e are various commands which are used to install router. Various protocols used in routing information are: 1> 2> 3> 4>

RIP EIGRP IGRP OSPF etc.

Figure 5.3 CISCO ROUTERS

Figure router at lan There are various companies which manufacture router but the leader of today is ISCO At reliance communication also CISCO g of ROBUST & SECURE network.

C

routers are used for communicating and settin

Configuring the Router Now what are the various commands & methods by which we in REIANCE COMMUNICATION install cisco routers.

Figure5.4 router I. Set a Hostname The first order of business in configuring a router is to choose a hostname for the router. This name is not used by the router itself and is entirely for human consumption. The hostname you set replaces "Router" in the prompt and can be us eful in distinguishing which router you are connected to when telnetting among s everal routers. This line also appears within the first 20 lines of the configur ation file and can be used to distinguish saved configurations of one router fro m another. The form of this command is hostname II. Establishing Enable Password Protection Before connecting the router to your network it is also a good idea to set the e nable password. This password is used to gain privileged access to the router so it should not be an obvious password. The format of this command is as follows: enable password This password may contain any alphanumeric characters up to 80 including spaces but MUST NOT START with a number or a space. The password is stored in an unencr ypted (plain text) format in the configuration file. Obviously, it is desirable to have the password encrypted before it is saved. To do this, use: service password-encryption This will cause all passwords in the system to be encrypted before being stored in a saved configuration using Cisco's proprietary encryption algorithm. III. Optionally Enable UDP and TCP network services Cisco routers support standard network services for TCP and UDP such as echo, di scard, daytime, and so forth. These services are enabled with the commands service tcp-small-servers service udp-small-servers

It should be noted that these package all standard network services in one bundl e. Without creating access lists, it is not possible to disallow any of the serv ices these create. Cisco also supports a finger daemon to give information about who is connected to a given router. This service is enabled by default. Finger may be disabled as follows no service finger IV. Configure Console and Network Access Initially, the only device setup for access is the console. When placed in the f ield, it is more convenient to program and maintain the routers through a telnet connection than it is to dial up into each router to configure or monitor the s ystem. In order to do this, virtual ttys (vtys) must be configured. Generally, 5 vtys should be configured however, the router will support up to 100. Each shou ld be given a timeout to avoid all vtys being in use. If all vtys are in use, fu rther connection attempts will result in a "connection refused". It is probably a good idea to force the user to enter a password before he can login to the rou ter through a vty as well. An example of this configuration is shown below. line vty 0 4 exec-timeout 30 0 login password steamboat This creates 5 vtys numbered 0 through 4. Each vty has a timeout of 30 minutes a nd 0 seconds. These vtys require a password for login. This password is "steambo at". Note: If password-encryption is enabled, this password is encrypted before being stored in the router's configuration. The minimum number of vtys that may be enabled is 5. Usually you do not want to require a password for console access but you would l ike to specify a timeout. line con 0 exec-timeout 15 0 V. Configure Serial and Ethernet Interfaces By far, the easiest interfaces to configure are ethernet interfaces. To bring up an ethernet interface, all that is necessary is to assign it an IP address, ass ociate a netmask with that address, and turn up the interface. For example, to b ring online the ethernet interface on a 2501 and assign it the IP address 150.15 1.152.1 with a class C netmask (255.255.255.0), the following commands would be used: interface Ethernet0 ip address 150.151.152.1 255.255.255.0 no shutdown ? ? ? ?

Configuring the CIP card and the virtual interfaces. Add IP Routes and Set a Default Route Configure Frame Relay Configuring Access Lists and Network Security

Cisco Router Configuration Commands Requirement Cisco Command Set a console password to cisco Router(config)#line con 0 Router(config-line)#login Router(config-line)#password cisco Set a telnet password Router(config)#line vty 0 4 Router(config-line)#login Router(config-line)#password cisco Stop console timing out Router(config)#line con 0 Router(config-line)#exec-timeout 0 0 Set the enable password to cisco Router(config)#enable password cisco Set the enable secret password to peter. This password overrides the enable password and is encypted within the config fi le Router(config)#enable secret peter

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF