Download ELA TECHNOLOGIES

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Transcript
ELA
TECHNOLOGIES
Company Profile
About ELATECH
Digital Signature Certificate
Networking
Computing
Professional Services
www.elatech.net
ELA TECHNOLOGIES
• ELA TECHNOLOGIES is a privately held IT professional and Management services organization. The
company has been providing Digital Signature Certificates (DSC), Comprehensive Network & computing
solutions across all industry segments.
• ELA
TECHNOLOGIES is authorized LRAA (LOCAL REGISTRATION AUTHORITY
ADMINISTRATOR) for SIFY Safescript. (DSC Issuing authority). ELA has presence physically as well as
virtually across the country which enables us to serve our customer at the best.
• ELA TECHNOLOGIES consults management of your complex IT infrastructure. Our processes are
defined to manage your IT infrastructure efficiently and effectively, ensuring you complete peace of mind and
enabling you process your strategic business continuity effectively. We provide technology solutions partnering
with the best brands in IT Infrastructure. We also provide strategic consulting designed to deliver value
enhancing your company’s bottom line.
• Our business goal is to develop creative, cost-effective solution, from the design phase, through supply,
installation, and provide maintenance and more importantly, excellence in support.
www.elatech.net
LOCAL REGISTRATION
AUTHORITY ADMINISTRATOR
LRAA
•
•
•
•
•
Trusted Third Party
An organization which collect application form.
Dose Primary Verification of Document.
Forward application form and document to – CA.
Forward DSC Token to applicant once it approved by – CA.
www.elatech.net
NETWORKING
A computer network or data network is a telecommunications network that allows computers to exchange
data. In computer networks, networked computing devices pass data to each other along data connections.



A computer network is a telecommunications network that allows computers to exchange data.
The physical connection between networked computing devices is established using either cable
media or wireless media.
The best-known computer network is the internet.
Computer network
 A collection of computing devices that are
connected in various ways in order to communicate
and share resources.
 Usually, the connections between computers in a
network are made using physical wires or cables.
 However, some connections are wireless, using
radio waves or infrared signals.
Types of Network

Based on the size and the coverage
area, networks are categorized into the
following types:
 Personal Area Networks (PANs)
 Local Area Networks (LANs)
 Metropolitan Area Networks (MANs)
 Wide Area Networks (WANs)
www.elatech.net
PERSONAL AREA NETWORKS (PANs)
 A personal area network (PAN) is a computer network used for communication
among computer and different information technological devices close to one
person.
 Is a small network established for communication between different devices, such
as laptops, computers, mobiles, and PDAs.
 A pan may include wired and wireless devices.
 The reach of a pan typically extends to 10 meters.
www.elatech.net
Local Area Network(LANs)
 A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school, office building, or closely
positioned group of buildings.
 Each computer or device on the network is a node.
 Wired LANs are most likely based on Ethernet technology.
www.elatech.net
Metropolitan Area Network (MAN)
 It is relatively larger than LAN and extends across a city or a metropolitan.
 It is created by connecting two or more LANs located at different locations in
a city.
www.elatech.net
Wide Area Network(WANs)
 A wide area network (WAN) is a computer network that covers a large
geographic area such as a city, country, or spans even intercontinental distances.
 A WAN uses a communications channel that combines many types of media
such as telephone lines, cables, and air waves.

A WAN often makes use of transmission facilities provided by common
carriers, such as telephone companies.
 One of the most prominent examples of the
existing wans is the Internet.
www.elatech.net
ROUTING
Routing is the process of selecting best
paths in a network. In the past, the term
routing was also used to mean forwarding
network traffic among networks. However
this latter function is much better described
as simply forwarding. Routing is performed
for many kinds of networks, including the
telephone network (circuit switching),
electronic data networks (such as the
Internet), and transportation networks.
www.elatech.net
SWITCHING
Switches can be a valuable asset to
networking. Overall, they can increase the
capacity and speed of your network.
However, switching should not be seen as a
cure-all for network issues. Before
incorporating network switching, you must
first ask yourself two important questions:
First, how can you tell if your network will
benefit from switching? Second, how do you
add switches to your network design to
provide the most benefit?
www.elatech.net
SECURITY
Network security consists of the provisions and
policies adopted by a network administrator to
prevent and monitor unauthorized access,
misuse, modification, or denial of a computer
network and network-accessible resources.
Network security involves the authorization of
access to data in a network, which is controlled
by the network administrator. Users choose or
are assigned an ID and password or other
authenticating information that allows them
access to information and programs within their
authority.
www.elatech.net
WIRELESS
A wireless network is any type of computer
network that uses wireless data connections
for
connecting
network
nodes.
Wireless networking is a method by which
homes, telecommunications networks and
enterprise (business) installations avoid the
costly process of introducing cables into a
building, or as a connection between various
equipment
locations.
Wireless
telecommunications networks are generally
implemented and administered using radio
communication. This implementation takes
place at the physical level (layer) of the OSI
model network structure.
www.elatech.net
COMPUTING
Computing is any goal-oriented activity requiring, benefiting from, or creating algorithmic processe.g. through computers. Computing includes designing, developing and building hardware and
software systems; processing, structuring, and managing various info.
A machine capable of following instruction to alter data in a desirable way and to perform at least
some of these operations without human intervention.
A computer is a programmable machine that receives input, stores and manipulates data, and
provides output in a useful format.
Computer was used as an electronic device that allows inputting data and having it stored, processed,
or otherwise manipulated quickly and efficiently.
www.elatech.net
SERVER
A server is a system (software and suitable computer hardware)
that responds to requests across a computer network to provide,
or help to provide, a network service. Servers can be run on a
dedicated computer, which is also often referred to as "the
server", but many networked computers are capable of hosting
servers. In many cases, a computer can provide several services
and have several servers running.
The term server is used quite broadly in information technology.
Despite the many server-branded products available (such as
server versions of hardware, software or operating systems), in
theory any computerized process that shares a resource to one or
more client processes is a server. To illustrate this, take the
common example of file sharing. While the existence of files on
a machine does not classify it as a server, the mechanism which
shares these files to clients by the operating system is the server.
www.elatech.net
TYPES OF SERVER
Application server a server dedicated to running certain software applications
Catalog server a central search point for information across a distributed network
Communications server carrier-grade computing platform for communications networks
Compute server, a server intended for intensive (esp. scientific) computations
Database server provides database services to other computer programs or computers
Fax server provides fax services for clients
File server provides remote access to files
Game server a server that video game clients connect to in order to play online together
Home server a server for the home
Mail server handles transport of and access to email
Mobile Server or Server on the Go is an Intel Xeon processor based server class laptop form factor
computer.
Name server or DNS
Print server provides printer services
Proxy server acts as an intermediary for requests from clients seeking resources from other servers
Sound server provides multimedia broadcasting, streaming.
www.elatech.net
What Is STORAGE
And What Problems Does It Solve?
Computer data storage, often called storage or
memory, is a technology consisting of
computer components and recording media
used to retain digital data. It is a core function
and fundamental component of computers.
The central processing unit (CPU) of a
computer is what manipulates data by
performing computations.
www.elatech.net
THE WORLD HAS CHANGED
New
Applications
Compressed
Planning Horizon
105
52
Planning cycle – a
thing of the past
Massive storage demand,
unpredictable future
IT-as-a-Service
89%
of workloads virtualized
by 2015
Massive consolidation,
unpredictable workloads
www.elatech.net
Virtualization
Virtualization is a term used across the IT field to refer to a number
of different technologies. Different types of virtualization include
storage virtualization, data virtualization, server virtualization (a type
of hardware virtualization), application virtualization, network
virtualization, operating system virtualization, and paravirtualization.
Virtualization is primarily about organization and efficiency. It can
mean separating something large (the “real” environment, whether
that be an individual operating system or an actual physical server)
into component parts (the “virtual” environments), which allows a
number of different instances of the technology to run
simultaneously and with reduced or nonexistent interference. It can
also mean forming a larger, composite virtual environment composed
of a number of smaller systems.
www.elatech.net
Storage Virtualization
This type of virtualization allows numerous hard drives or
other storage devices to be combined into one virtual
environment (VE) for storage. Administrators for a
business’s network are then able to manage everything from
one centralized location, which obviously greatly simplifies
administration. It’s easier to know the amount of available
resources at a quick glance, back up the system more
efficiently, etc.
Additionally, migrating data and storage expansion can be
accomplished more smoothly using this type of
virtualization. Data can be transferred between one device
and another with no disruption to operability. Plus, if a
device’s storage maxes out, it is easy to allot additional room
within the overall storage threshold.
www.elatech.net
Data Virtualization
Virtualizing data means that a user can access the same information from multiple physical locations. Data
virtualization moves the data to a server, maps it to its original location, and allows you to view it. This allows you
to scroll through the data as if looking at a webpage, without having to bring it directly onto your computer or
another server.
Lieutenant Commander Data from Star Trek should, however, never be virtualized. He should instead remain in
our hearts, where he belongs. Beam him up, sure – but only beam him to a different location. Never just beam
him.
www.elatech.net
Server Virtualization or Hardware Virtualization
Virtualizing hardware such as a server is perhaps the most
common sense of virtualization for hosting customers. A virtual
private server (VPS), also called a virtual dedicated server (VDS),
allows a server the ability to use multiple operating systems and
multiple applications which might otherwise conflict or perform
the same essential function.
Bringing the functionalities of multiple servers into one server
means that servers can be consolidated, reducing hardware
expenses and decreasing administrative costs.
Upgrading, patching, and disaster recovery planning (DRP) all
become vastly simplified. The network additionally becomes
more energy-efficient (also another cost-saving benefit) and
utilizes resources more effectively.
www.elatech.net
Application Virtualization
Essentially, virtualizing an application separates the
operating system from the application. The
application then runs on the server or another remote
computer rather than on the computer where it is
being used. One major benefit of application
virtualization is that you can run incompatible
applications at the same time. You can also run an
application that is not designed for the operating
system of the computer from which you are accessing
it.
Finally, virtualizing applications means that they do
not have to be downloaded to the end-user’s
computer. This allows for easier management of
these applications if they’re on one of your network’s
servers. If they are not on your network’s servers, you
have less worries about a poorly coded application
interfering with computer operations.
www.elatech.net
Network Virtualization
Combining all of the resources within your network,
allowing the administrator of the network to share those
resources across all users, is called network
virtualization. The network is divided into a number of
different channels, each of which contains a portion of
the bandwidth of the network. This makes it easier for
the administrator to assign resources as users need them.
Access to the network as a whole from an individual
computer means that it is easier for individual employees
of the business to work on the same file – there is no
need to transfer or download it. In fact, it is the same
file… similar to working on a file within Google Drive.
It also means that the entire network can be accessed
from any computer within the network. This practice
makes it simpler to perform business operations without
having to be working on a particular computer.
www.elatech.net
Operating System Virtualization
This type of virtualization, also called
container-based virtualization, uses the same
operating system on a server but chops it up
into component parts. Each virtual
environment has its own sets of rules and
access – is its own virtual server – with the one
exception that it all must be compatible with
the same operating system.
Open VPN is an example of an open source
version of OS virtualization. Another example
is Oracle Solaris.
www.elatech.net
PROFESSIONAL SERVICES
Regardless of your size, ELA Technologies can customize a solution to fit your needs. We work on a
collaborative process wherein we consult with your team to determine what solutions will work best for
your business. Our unbiased and no-nonsense approach allows us to find the most cost effective solution,
enabling your business to better manage growth into the future.
Our suite of Professional Services include :






Consulting
Designing
Integration
Implementation
Maintenance
Facilities Management
www.elatech.net
Consulting
Information technology consulting (also called IT consulting, computer consultancy, computing
consultancy, technology consulting, business and technology services or IT advisory) Here we
focuses on advising businesses on how best to use information technology to meet Customer business
objectives. In addition to providing advice, IT consultancies often estimate, manage, implement, deploy,
and administer IT systems on businesses.
As IT consultant we possess the following skills:








Advisory skills
Technical skills
Business skills
Communication skills
Management skills
Advisory language skills
Business and management language skills
Technical language skills
www.elatech.net
Designing
A traditional network planning methodology involves five layers of
planning, namely:
• business planning
• long-term and medium-term network planning
• short-term network planning
• IT asset sourcing
• operations and maintenance.
Each of these layers incorporates plans for different time horizons, i.e.
the business planning layer determines the planning that the operator
must perform to ensure that the network will perform as required for its
intended life-span. The Operations and Maintenance layer, however,
examines how the network will run on a day-to-day basis.
The network planning process begins with the acquisition of external
information. This includes:
• forecasts of how the new network/service will operate;
• the economic information concerning costs; and
• the technical details of the network’s capabilities.
www.elatech.net
Integration
We use or combine data from multiple sources while maintaining the integrity and reliability of the data.
In today’s dynamic environment, businesses rely on communication networks as a key element of success. While
applications or devices may be the focus of a new IT initiative, your network is the vehicle by which your customers
and employees are able to take advantage of new functions. Your network also enables collection of real-time data
from applications—and increasingly, from sensors—that you depend on to make decisions about your business.
Now, more than ever, your network must be high performance, continuously available and secure in order to achieve
your business objectives.
Network integration services from ELATECH can help you create a network that enables your IT infrastructure to
adapt to rapidly changing business needs and emerging technologies. These services—planning, design, deployment
and ongoing monitoring and management—help you provide the ubiquitous access to applications and data
necessary to meet today’s business requirements.
We consultative approach to help you navigate the available options and deliver a network that contributes optimally
to meeting your business goals. Our skilled professionals are focused on helping you to smooth transitions and
improve service delivery. By using an approach that facilitates collaboration between your business units and IT and
networking organizations, ELATECH can help you derive more business value from your network.
www.elatech.net
Implementation
ELATECH Implementation expertise include Design, Supply,
Installation, Test & Certification Activities.
Principle Certify Technical Experts team enable ELATECH
to meet customers business support logical requirements.
Our proven activity's are as below.
Understanding requirement.
Time Management.
Signal point of contact.
Timely update.
Skilled, responsive team.
Positive attitude.
www.elatech.net
Maintenance
It is obvious and understood the value of IT
equipment's.
Maintenance support can be provided by to way.
1) Physical & 2) Remotely.
It depends on IT infrastructure & requirement of
up-time what type of support one organization go
for.
We support.
Remotely.
7x5
8x8
24x7
Residence Engineer.
www.elatech.net
Facilities Management
At ELATECH Our goal is to deliver tangible business benefits to our customers. To achieve this, we offer a range
of unrivalled end-to-end IT infrastructure management services:
We take over your overall management of varied IT assets across vendors. We capture all the service requests logged
via mail, telephone or the Web. These include call management, asset and inventory management, client recovery
services and vendor management. We boost the performance of your data center by proactively monitoring,
forecasting and realigning IT resources. We undertake network, server, security and database administration; data
backup; and application support. We also support your end-users with services such as desktop / laptop operations,
LAN management, peripherals support, mail management, antivirus system management, and installation and
configuration of client desktop applications.
Providing Maintenance for IT Infrastructure.
Hardware Redundancy.
Providing on-site support engineer.
Call log with principal behalf of customer.
Temporary hardware arrangement on rental.
Training to customer IT staff.
www.elatech.net
Few of Our Clients.
Bharat Serrum India Ltd.
Daman Hospitality Pvt. Ltd.
Shawman Software Pvt. Ltd.
Jubilant Group Of Companies.
Eastern Cargo Pvt. Ltd.
Waaree Industries Ltd.
Mahagenco
ECIL
Graphiti Multimedia Pvt. Ltd.
Akash Entertainment Pvt. Ltd.
Corromandal General Insurance Company Ltd.
Corromandal Fertilizers Ltd.
Mafatlal Cypherspace Pvt. Ltd
Waterfront Show Pvt. Ltd.
Eureka Forbs Ltd.
JP Scientific Instruments
Mumbai
Daman (UT)
Mumbai
Mumbai
Mumbai
Mumbai
Mumbai
Hydrabad
Mumbai
Mumbai
Mumbai
Mumbai
Mumbai
Lawasa
Pune
Vadodara
www.elatech.net
Few of Our Clients.
Hindustan Rubbers Silvassa
Oxford Rubbers Pvt Ltd
BMW Steels ltd
Artech communications
Ishah International
Sreevari Engineers Private limited
Anatech Instruments
Quality Manufacturing Company
Bengal Tools Ltd
Pall India Pvt Ltd
Martin Engineering Company India Pvt Ltd
Amco Industries
Omega Engineering Works
DFW Envirotech India Pvt Ltd
AEROTRONIX
Envirotech Online Equipements Pvt Ltd
Silvassa
Bangalore
Hathras
Mumbai
Mumbai
Tiruchirapali
Mumbai
Mumbai
Kolkata
Mumbai
Pune
Haridwar
Haridwar
Nagpur
Trichy
Hydrabad
www.elatech.net
THANK YOU