Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
ELA TECHNOLOGIES Company Profile About ELATECH Digital Signature Certificate Networking Computing Professional Services www.elatech.net ELA TECHNOLOGIES • ELA TECHNOLOGIES is a privately held IT professional and Management services organization. The company has been providing Digital Signature Certificates (DSC), Comprehensive Network & computing solutions across all industry segments. • ELA TECHNOLOGIES is authorized LRAA (LOCAL REGISTRATION AUTHORITY ADMINISTRATOR) for SIFY Safescript. (DSC Issuing authority). ELA has presence physically as well as virtually across the country which enables us to serve our customer at the best. • ELA TECHNOLOGIES consults management of your complex IT infrastructure. Our processes are defined to manage your IT infrastructure efficiently and effectively, ensuring you complete peace of mind and enabling you process your strategic business continuity effectively. We provide technology solutions partnering with the best brands in IT Infrastructure. We also provide strategic consulting designed to deliver value enhancing your company’s bottom line. • Our business goal is to develop creative, cost-effective solution, from the design phase, through supply, installation, and provide maintenance and more importantly, excellence in support. www.elatech.net LOCAL REGISTRATION AUTHORITY ADMINISTRATOR LRAA • • • • • Trusted Third Party An organization which collect application form. Dose Primary Verification of Document. Forward application form and document to – CA. Forward DSC Token to applicant once it approved by – CA. www.elatech.net NETWORKING A computer network or data network is a telecommunications network that allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections. A computer network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the internet. Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources. Usually, the connections between computers in a network are made using physical wires or cables. However, some connections are wireless, using radio waves or infrared signals. Types of Network Based on the size and the coverage area, networks are categorized into the following types: Personal Area Networks (PANs) Local Area Networks (LANs) Metropolitan Area Networks (MANs) Wide Area Networks (WANs) www.elatech.net PERSONAL AREA NETWORKS (PANs) A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Is a small network established for communication between different devices, such as laptops, computers, mobiles, and PDAs. A pan may include wired and wireless devices. The reach of a pan typically extends to 10 meters. www.elatech.net Local Area Network(LANs) A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Wired LANs are most likely based on Ethernet technology. www.elatech.net Metropolitan Area Network (MAN) It is relatively larger than LAN and extends across a city or a metropolitan. It is created by connecting two or more LANs located at different locations in a city. www.elatech.net Wide Area Network(WANs) A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances. A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often makes use of transmission facilities provided by common carriers, such as telephone companies. One of the most prominent examples of the existing wans is the Internet. www.elatech.net ROUTING Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks. www.elatech.net SWITCHING Switches can be a valuable asset to networking. Overall, they can increase the capacity and speed of your network. However, switching should not be seen as a cure-all for network issues. Before incorporating network switching, you must first ask yourself two important questions: First, how can you tell if your network will benefit from switching? Second, how do you add switches to your network design to provide the most benefit? www.elatech.net SECURITY Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. www.elatech.net WIRELESS A wireless network is any type of computer network that uses wireless data connections for connecting network nodes. Wireless networking is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure. www.elatech.net COMPUTING Computing is any goal-oriented activity requiring, benefiting from, or creating algorithmic processe.g. through computers. Computing includes designing, developing and building hardware and software systems; processing, structuring, and managing various info. A machine capable of following instruction to alter data in a desirable way and to perform at least some of these operations without human intervention. A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format. Computer was used as an electronic device that allows inputting data and having it stored, processed, or otherwise manipulated quickly and efficiently. www.elatech.net SERVER A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide, or help to provide, a network service. Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. In many cases, a computer can provide several services and have several servers running. The term server is used quite broadly in information technology. Despite the many server-branded products available (such as server versions of hardware, software or operating systems), in theory any computerized process that shares a resource to one or more client processes is a server. To illustrate this, take the common example of file sharing. While the existence of files on a machine does not classify it as a server, the mechanism which shares these files to clients by the operating system is the server. www.elatech.net TYPES OF SERVER Application server a server dedicated to running certain software applications Catalog server a central search point for information across a distributed network Communications server carrier-grade computing platform for communications networks Compute server, a server intended for intensive (esp. scientific) computations Database server provides database services to other computer programs or computers Fax server provides fax services for clients File server provides remote access to files Game server a server that video game clients connect to in order to play online together Home server a server for the home Mail server handles transport of and access to email Mobile Server or Server on the Go is an Intel Xeon processor based server class laptop form factor computer. Name server or DNS Print server provides printer services Proxy server acts as an intermediary for requests from clients seeking resources from other servers Sound server provides multimedia broadcasting, streaming. www.elatech.net What Is STORAGE And What Problems Does It Solve? Computer data storage, often called storage or memory, is a technology consisting of computer components and recording media used to retain digital data. It is a core function and fundamental component of computers. The central processing unit (CPU) of a computer is what manipulates data by performing computations. www.elatech.net THE WORLD HAS CHANGED New Applications Compressed Planning Horizon 105 52 Planning cycle – a thing of the past Massive storage demand, unpredictable future IT-as-a-Service 89% of workloads virtualized by 2015 Massive consolidation, unpredictable workloads www.elatech.net Virtualization Virtualization is a term used across the IT field to refer to a number of different technologies. Different types of virtualization include storage virtualization, data virtualization, server virtualization (a type of hardware virtualization), application virtualization, network virtualization, operating system virtualization, and paravirtualization. Virtualization is primarily about organization and efficiency. It can mean separating something large (the “real” environment, whether that be an individual operating system or an actual physical server) into component parts (the “virtual” environments), which allows a number of different instances of the technology to run simultaneously and with reduced or nonexistent interference. It can also mean forming a larger, composite virtual environment composed of a number of smaller systems. www.elatech.net Storage Virtualization This type of virtualization allows numerous hard drives or other storage devices to be combined into one virtual environment (VE) for storage. Administrators for a business’s network are then able to manage everything from one centralized location, which obviously greatly simplifies administration. It’s easier to know the amount of available resources at a quick glance, back up the system more efficiently, etc. Additionally, migrating data and storage expansion can be accomplished more smoothly using this type of virtualization. Data can be transferred between one device and another with no disruption to operability. Plus, if a device’s storage maxes out, it is easy to allot additional room within the overall storage threshold. www.elatech.net Data Virtualization Virtualizing data means that a user can access the same information from multiple physical locations. Data virtualization moves the data to a server, maps it to its original location, and allows you to view it. This allows you to scroll through the data as if looking at a webpage, without having to bring it directly onto your computer or another server. Lieutenant Commander Data from Star Trek should, however, never be virtualized. He should instead remain in our hearts, where he belongs. Beam him up, sure – but only beam him to a different location. Never just beam him. www.elatech.net Server Virtualization or Hardware Virtualization Virtualizing hardware such as a server is perhaps the most common sense of virtualization for hosting customers. A virtual private server (VPS), also called a virtual dedicated server (VDS), allows a server the ability to use multiple operating systems and multiple applications which might otherwise conflict or perform the same essential function. Bringing the functionalities of multiple servers into one server means that servers can be consolidated, reducing hardware expenses and decreasing administrative costs. Upgrading, patching, and disaster recovery planning (DRP) all become vastly simplified. The network additionally becomes more energy-efficient (also another cost-saving benefit) and utilizes resources more effectively. www.elatech.net Application Virtualization Essentially, virtualizing an application separates the operating system from the application. The application then runs on the server or another remote computer rather than on the computer where it is being used. One major benefit of application virtualization is that you can run incompatible applications at the same time. You can also run an application that is not designed for the operating system of the computer from which you are accessing it. Finally, virtualizing applications means that they do not have to be downloaded to the end-user’s computer. This allows for easier management of these applications if they’re on one of your network’s servers. If they are not on your network’s servers, you have less worries about a poorly coded application interfering with computer operations. www.elatech.net Network Virtualization Combining all of the resources within your network, allowing the administrator of the network to share those resources across all users, is called network virtualization. The network is divided into a number of different channels, each of which contains a portion of the bandwidth of the network. This makes it easier for the administrator to assign resources as users need them. Access to the network as a whole from an individual computer means that it is easier for individual employees of the business to work on the same file – there is no need to transfer or download it. In fact, it is the same file… similar to working on a file within Google Drive. It also means that the entire network can be accessed from any computer within the network. This practice makes it simpler to perform business operations without having to be working on a particular computer. www.elatech.net Operating System Virtualization This type of virtualization, also called container-based virtualization, uses the same operating system on a server but chops it up into component parts. Each virtual environment has its own sets of rules and access – is its own virtual server – with the one exception that it all must be compatible with the same operating system. Open VPN is an example of an open source version of OS virtualization. Another example is Oracle Solaris. www.elatech.net PROFESSIONAL SERVICES Regardless of your size, ELA Technologies can customize a solution to fit your needs. We work on a collaborative process wherein we consult with your team to determine what solutions will work best for your business. Our unbiased and no-nonsense approach allows us to find the most cost effective solution, enabling your business to better manage growth into the future. Our suite of Professional Services include : Consulting Designing Integration Implementation Maintenance Facilities Management www.elatech.net Consulting Information technology consulting (also called IT consulting, computer consultancy, computing consultancy, technology consulting, business and technology services or IT advisory) Here we focuses on advising businesses on how best to use information technology to meet Customer business objectives. In addition to providing advice, IT consultancies often estimate, manage, implement, deploy, and administer IT systems on businesses. As IT consultant we possess the following skills: Advisory skills Technical skills Business skills Communication skills Management skills Advisory language skills Business and management language skills Technical language skills www.elatech.net Designing A traditional network planning methodology involves five layers of planning, namely: • business planning • long-term and medium-term network planning • short-term network planning • IT asset sourcing • operations and maintenance. Each of these layers incorporates plans for different time horizons, i.e. the business planning layer determines the planning that the operator must perform to ensure that the network will perform as required for its intended life-span. The Operations and Maintenance layer, however, examines how the network will run on a day-to-day basis. The network planning process begins with the acquisition of external information. This includes: • forecasts of how the new network/service will operate; • the economic information concerning costs; and • the technical details of the network’s capabilities. www.elatech.net Integration We use or combine data from multiple sources while maintaining the integrity and reliability of the data. In today’s dynamic environment, businesses rely on communication networks as a key element of success. While applications or devices may be the focus of a new IT initiative, your network is the vehicle by which your customers and employees are able to take advantage of new functions. Your network also enables collection of real-time data from applications—and increasingly, from sensors—that you depend on to make decisions about your business. Now, more than ever, your network must be high performance, continuously available and secure in order to achieve your business objectives. Network integration services from ELATECH can help you create a network that enables your IT infrastructure to adapt to rapidly changing business needs and emerging technologies. These services—planning, design, deployment and ongoing monitoring and management—help you provide the ubiquitous access to applications and data necessary to meet today’s business requirements. We consultative approach to help you navigate the available options and deliver a network that contributes optimally to meeting your business goals. Our skilled professionals are focused on helping you to smooth transitions and improve service delivery. By using an approach that facilitates collaboration between your business units and IT and networking organizations, ELATECH can help you derive more business value from your network. www.elatech.net Implementation ELATECH Implementation expertise include Design, Supply, Installation, Test & Certification Activities. Principle Certify Technical Experts team enable ELATECH to meet customers business support logical requirements. Our proven activity's are as below. Understanding requirement. Time Management. Signal point of contact. Timely update. Skilled, responsive team. Positive attitude. www.elatech.net Maintenance It is obvious and understood the value of IT equipment's. Maintenance support can be provided by to way. 1) Physical & 2) Remotely. It depends on IT infrastructure & requirement of up-time what type of support one organization go for. We support. Remotely. 7x5 8x8 24x7 Residence Engineer. www.elatech.net Facilities Management At ELATECH Our goal is to deliver tangible business benefits to our customers. To achieve this, we offer a range of unrivalled end-to-end IT infrastructure management services: We take over your overall management of varied IT assets across vendors. We capture all the service requests logged via mail, telephone or the Web. These include call management, asset and inventory management, client recovery services and vendor management. We boost the performance of your data center by proactively monitoring, forecasting and realigning IT resources. We undertake network, server, security and database administration; data backup; and application support. We also support your end-users with services such as desktop / laptop operations, LAN management, peripherals support, mail management, antivirus system management, and installation and configuration of client desktop applications. Providing Maintenance for IT Infrastructure. Hardware Redundancy. Providing on-site support engineer. Call log with principal behalf of customer. Temporary hardware arrangement on rental. Training to customer IT staff. www.elatech.net Few of Our Clients. Bharat Serrum India Ltd. Daman Hospitality Pvt. Ltd. Shawman Software Pvt. Ltd. Jubilant Group Of Companies. Eastern Cargo Pvt. Ltd. Waaree Industries Ltd. Mahagenco ECIL Graphiti Multimedia Pvt. Ltd. Akash Entertainment Pvt. Ltd. Corromandal General Insurance Company Ltd. Corromandal Fertilizers Ltd. Mafatlal Cypherspace Pvt. Ltd Waterfront Show Pvt. Ltd. Eureka Forbs Ltd. JP Scientific Instruments Mumbai Daman (UT) Mumbai Mumbai Mumbai Mumbai Mumbai Hydrabad Mumbai Mumbai Mumbai Mumbai Mumbai Lawasa Pune Vadodara www.elatech.net Few of Our Clients. Hindustan Rubbers Silvassa Oxford Rubbers Pvt Ltd BMW Steels ltd Artech communications Ishah International Sreevari Engineers Private limited Anatech Instruments Quality Manufacturing Company Bengal Tools Ltd Pall India Pvt Ltd Martin Engineering Company India Pvt Ltd Amco Industries Omega Engineering Works DFW Envirotech India Pvt Ltd AEROTRONIX Envirotech Online Equipements Pvt Ltd Silvassa Bangalore Hathras Mumbai Mumbai Tiruchirapali Mumbai Mumbai Kolkata Mumbai Pune Haridwar Haridwar Nagpur Trichy Hydrabad www.elatech.net THANK YOU