Documente Academic
Documente Profesional
Documente Cultură
Established in the year 2008, we, Allanasons Limited, are engaged in trading and exporting a
wide range of Cereals, Spices and Agro Products. In a very short period of time, our company is
counted amongst largest net foreign exchange earners with a turnover of Rs. 3500 Crores (US$ 750
million) for the financial year 2008-09. We are rewarded by various awards like Premier Trading
House by the Government of India, Golden Trophy by APEDA (Ministry of Commerce,
Government of India) and Outstanding Exporter of the Year 2008-09 by DHL-CNBC international
trade awards in the category of Agriculture, Foods & FMCG. Our constant endeavour is directed
towards the offering of hygienic and high nutritional level food items to the clients. In order to
achieve this, we possess well developed food safety systems with proper safeguard facilities and
technologies. Further, we are making heavy investments in creating world class integrated food
processing complexes. Our facilities are ISO 9001: 2000, HACCP and ISO 14001 (Environment
management system) certified. At present, we are supplying our range to the clients in more than 60
countries. Under the sincere guidance of our mentor, Mr Gani Ismail, we have achieved a
respected and distinct position in the market. His vast business knowledge and experienced have
helped us in providing maximum satisfaction top the clients.
Allanason is India's largest exporter of processed food products and agro commodities. The
Company has been designated as the Five Star Trading House by the Government of India.
Our team plays a key role in meeting heaped requirements of our clients across the world. We work
with experienced professionals, who help in earning a preeminent name for our organization. They
work in a hygienic condition to offer healthy and tasty range of Cereals, Spices and Agro Products.
We provide food safety training programs to enhance their knowledge and skill. Our team
comprises:
Procuring agents.
Quality controllers.
Warehouse & Packaging personnel.
Sales & Marketing executives
Allana Group has achieved enviable growth in its exports, clocking 44% over the last two years.
Added to that, it has demonstrated its leadership in manufacture, marketing and sales of its branded
processed foods.
We are the World's Largest Producer and Exporter of Frozen Halal Boneless Buffalo Meat.
But, that's not all; Allanasons is also India's single largest exporter of frozen meat, processed/frozen
fruit and vegetable products.
The Group has made substantial investments in creating world-class integrated food processing
complexes. Facilities which have been certified for quality and product safety systems under ISO
9001:2000 and HACCP. And ISO 14001 (Environment Management System) too! Similarly we are
having OHSAS 18000 towards an international occupational health and safety management system
specification.
For its new range of value added, branded consumer frozen food products to be launched shortly,
the Group is constructing additional Food Processing Plants with large investments in machinery
and manpower.
What's more, Allanasons is India's largest exporter of coffee as also leading exporter of cereals and
frozen marine products. The Group has also set up plants for processing, preserving and freezing of
Marine Products, which are approved in accordance with stringent quality standards for export to
Europe.
Allanasons' contribution to India's export effort has been recognized by the Government of India,
APEDA (Ministry of Commerce), Federation of Indian Export Organizations and various State
Governments in the form of numerous awards at national, state, and organizational levels.
Allanasons. India's largest exporter of processed food products and agro commodities. The
Company has been designated as the Five Star Trading House by the Government of India. We are
the World's Largest Producer and Exporter of Frozen Halal Boneless Buffalo Meat!
But, that's not all. Allanasons is also India's single largest exporter of frozen meat, processed/frozen
fruit and vegetable products.
India's Largest Exporter of Frozen Halal Buffalo Meat, Coffee, Fruit Concentrates and Purees...
What's more, Allanasons is India's largest exporter of coffee as also leading exporter of cereals and
frozen marine products. The Group has also set up plants for processing, preserving and freezing of
Marine Products, which are approved in accordance with stringent quality standards for export to
Europe. The Group has made substantial investments in creating world-class integrated food
processing complexes. Facilities, which have been certified for quality and product safety systems
under ISO 9001:2000 and HACCP. And ISO 14001 (Environment Management System) too
COMPANY PROFILE
Our parent firm was established in Bombay in 1865 as a trading company, dealing in agricultural
commodities. This family business has in the last 135 years grown into a large group of companies
headed by Allanasons Limited which was incorporated in 1973 to consolidate and centralise the
export activities of the Allana Group. Today Allanasons Limited is the second largest net foreign
exchange earner in the private sector of India.
We have pioneered the export of many food items from India, such as onions, potatoes, fruits,
vegetables, eggs, whole fish, and processed meat. It is with a sense of pride and achievement we
claim that our efforts and value of exports have been consistently recognised by the Government of
India, Ministry of Commerce, by granting us the highest status given for exporting organisations,
which presently is Super Star Trading House. We are a Super Star Trading House with Golden
Status - the highest achievable status.
We are the largest producers and exporters of processed foods and agro-commodities from India.
Our group companies own and operate Asia's most modern, integrated meat processing complexes,
setup according to highest international standards and specifications, incorporating the latest
technology and automation in all stages of production. We offer a wide range of quality products from genuinely halal frozen meat, canned meat, lamb carcasses, mutton cubes, frozen marine
products, coffee, tea, spices, frozen fruit and vegetable products, sterilised meat and bone meal, to
leather.
While the accent is still on agro-based products, over the years we have diversified into other
manufacturing activities, including vanaspati (hydrogenated vegetable oils), foundry chemicals,
ceramics, and paints.
In the following pages you will find details of our products and our achievements in the export
sector of India.
ABOUT US
Allanasons. India's largest exporter of processed food products and agro commodities. The
Company has been designated as the Five Star Trading House by the Government of India. Allana
Group has achieved enviable growth in its exports, clocking 44% over the last two years. Added to
that, it has demonstrated its leadership in manufacture, marketing and sales of its branded processed
foods.
We are the World's Largest Producer and Exporter of Frozen Halal Boneless Buffalo Meat.
But, that's not all. Allanasons is also India's single largest exporter of frozen meat, processed/frozen
fruit and vegetable products.
The Group has made substantial investments in creating world-class integrated food processing
complexes. Facilities, which have been certified for quality and product safety systems under ISO
9001:2000 and HACCP. And ISO 14001 (Environment Management System) too! Similarly we are
having OHSAS 18000 towards an international occupational health and safety management system
specification.
For its new range of value added, branded consumer frozen food products to be launched shortly,
the Group is constructing additional Food Processing Plants with large investments in machinery
and manpower.
What's more, Allanasons is India's largest exporter of coffee as also leading exporter of cereals and
frozen marine products. The Group has also set up plants for processing, preserving and freezing of
Marine Products, which are approved in accordance with stringent quality standards for export to
Europe.
Allanasons' contribution to India's export effort has been recognized by the Government of India,
APEDA (Ministry of Commerce), Federation of Indian Export Organizations and various State
Governments in the form of numerous awards at national, state, and organizational levels.
PRODUCTS
1. Meat Products : Frozen Halal Buffalo Meat
The Allana Group enjoys the distinction of being the pioneer (1969) in the export of
deboned and deglanded frozen Buffalo meat, exporting its products currently to 64 countries
world-wide, including South East Asia, Middle East, CIS, Africa and Pacific Basin Nations,
singularly accounting for about 60% of meat exports from India.
We are the World's Largest Producer and Exporter of Frozen Halal Boneless Buffalo Meat!
Range of products:
Fresh, frozen boneless Buffalo Halal meat.
Chilled boneless Buffalo meat Compensated boneless Buffalo meat is supplied in
natural proportion of the cuts and is guaranteed 93 % chemically lean canned corned
meat.
Full range of fresh quick frozen offals ( fancy / variety meat )
2. Canned Meat
FRIGORIFICO ALLANA LIMITED a member of ALLANA Group of companies Corned
meat manufacturing plant is the most modern integrated meat complex in Asia. It is located
in the Disease free zone - Aurangabad District of Maharashtra State in India. It has been
designed and built to meet the most stringent EEC and FDA standards. In this vertically
integrated plant the main products namely, Corned Meat and Frozen Meat are processed on
the upper floor while the by-products processing is carried out on the ground floor to
maintain plant hygiene standard at the highest level. All animals slaughtered at the ultramodern abattoir-cum-meat complex undergo ante mortem and continuous post-mortem
inspection, carried out by the government veterinarians and the entire Corned Meat
processing operation is under the supervision of Central Government Inspection Agency.
The Group contributes to the development of sustainable seafood by procuring from vessels
using turtle-safe fishnets thus avoiding accidental by catch. In addition, the Group actively
contributes to the neighbourhood of its processing facilities. For Instance the discharge from
effluent treatment plants is used to grow trees in coastal areas and provide water to
neighbouring farms.
All fruits are sourced directly from select orchards, with special emphasis on the optimum
ripening of the fruit prior to processing. The fruit is sorted; machine washed and then put
through an automatic continuous process of sterilization / pasteurization. For Frozen
products, the product is quickly chilled to minus 20C prior to filling and freezing.
This HTST processing, followed by ultra-low temperature filling, retains maximum natural
flavour and aroma of the fruit. For Aseptic products, UHT process is followed by quick
cooling prior to filling.
NETWORKING
A computer network or data network is a telecommunications network which allows computers to
exchange data. In computer networks, networked computing devices pass data to each other
along network links (data connections). The connections between nodes are established using
either cable media or wireless media. The best-known computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network nodes.
[1]
Nodes can include hosts such as personal computers, phones, servers as well as networking
hardware. Two such devices can be said to be networked together when one device is able to
exchange information with the other device, whether or not they have a direct connection to each
other.
Computer networks differ in the transmission media used to carry their signals, the communications
protocols to organize network traffic, the network's size, topology and organizational intent. In most
cases, communications protocols are layered on (i.e. work using) other more specific or more
general communications protocols, except for the physical layer that directly deals with the
transmission media.
Computer networks support applications such as access to the World Wide Web, shared use
of application and storage servers, printers, and fax machines, and use of email and instant
messaging applications
The chronology of significant computer-network developments includes:
In the late 1950s early networks of communicating computers included the military
radar system Semi-Automatic Ground Environment (SAGE).
In 1959 Anatolia Ivanovich Kitov proposed to the Central Committee of the Communist
Party of the Soviet Union a detailed plan for the re-organisation of the control of the
Soviet armed forces and of the Soviet economy on the basis of a network of computing
centres.
In 1960 the commercial airline reservation system semi-automatic business research
environment (SABRE) went online with two connected mainframes.
In 1962 J.C.R. Licklider developed a working group he called the "Intergalactic
Computer Network", a precursor to the ARPANET, at the Advanced Research Projects
Agency (ARPA).
In 1964 researchers at Dartmouth College developed the Dartmouth Time Sharing
System for distributed users of large computer systems. The same year, at
Massachusetts, a research group supported by General Electric and Bell Labs used a
computer to route and manage telephone connections.
Throughout
the
1960s, Leonard
Kleinrock, Paul
Baran,
and Donald
Switching for Local Computer Networks"[4] and collaborated on several patents received
in 1977 and 1978. In 1979 Robert Metcalfe pursued making Ethernet an open standard
In 1976 John Murphy of Data point Corporation created ARCNET, a token-passing
network first used to share storage devices.
In 1995 the transmission speed capacity for Ethernet increased from 10 Mbit/s to 100
Mbit/s. By 1998, Ethernet supported transmission speeds of a Gigabit. The ability of
Ethernet to scale easily (such as quickly adapting to support new fibre optic cable
speeds) is a contributing factor to its continued use as of 2015
TYPES OF NETWORKS:
M
M
A
A
N
N
LA
L
A
N
N
W
W
A
A
N
N
SA
S
A
N
N
C
C
A
A
N
N
PA
P
A
N
N
1. LAN: (Local Area Network)
A Local Area Network is a privately owned computer network covering a small Networks
geographical area, like a home, office, or groups of buildings e.g. a school Network. A LAN is
used to connect the computers and other network devices so that the devices can communicate
with each other to share the resources. The resources to be shared can be a hardware device
like printer, software like an application program or data. The size of LAN is usually small. The
various devices in LAN are connected to central devices called Hub or Switch using a cable.
Now-a-days LANs are being installed using wireless technologies. Such a system makes use of
access point or APs to transmit and receive data. One of the computers in a network can become
a server serving all the remaining computers called Clients.
For example, a library will have a wired or wireless LAN Network for users to interconnect
local networking devices e.g., printers and servers to connect to the internet.
LAN offers high speed communication of data rates of 4 to 16 megabits per second
(Mbps). IEEE has projects investigating the standardization of 100 Grit/s, and possibly 40
Grit/s. LANs Network may have connections with other LANs Network via leased lines, leased
services.
one
of
the
oldest,
simplest,
and
least
expensive
types
of
Local-
Area Network protocol, similar in purpose to Ethernet or Token Ring. ARCNET was the first
widely available networking system for microcomputers and became popular in the 1980s for
office automation tasks. ARCnet was introduced by Data point Corporation in 1977.
A special advantage of ARCNET is that it permits various types of transmission media twisted-pair wire, coaxial cable, and fibre optic cable - to be mixed on the same network. The
specification is ANSI 878.1. It can have up to 255 nodes per network. A new specification,
called ARCnet Plus, will support data rates of 20 Mbps
Ethernet is a family of computer networking technologies for local area networks commercially
introduced in 1980. Standardized in IEEE 802.3, Ethernet has largely replaced competing wired
local area network technologies. Ethernet uses a bus or star topology Network and supports data
transfer rates of 10 Mbps. Ethernet Network uses the CSMA/CD access method to handle
simultaneous demands. It is one of the most widely implemented LAN standards. A newer
version of Ethernet Network, called 100Base-T (or Fast Ethernet), supports data transfer rates of
100 Mbps. And the newest version, Gigabit Ethernet supports data rates of 1 gigabit (1,000
megabits) per second. Ethernet is a physical and data link layer technology for local area
networks (LANs). Ethernet Network was invented by engineer Robert Metcalfe.
A MAN can be created as a single network such as Cable TV Network, covering the entire
city or a group of several Local Area Networks (LANs). It this way resource can be shared
from LAN to LAN and from computer to computer also. MANs are usually owned by large
organizations to interconnect its various branches across a city.
MAN is based on IEEE 802.6 standard known as DQDB (Distributed Queue Dual Bus).
DQDB uses two unidirectional cables (buses) and all the computers are connected to these
two buses. Each bus has a specialized device that initiates the transmission activity. This
device is called head end. Data that is to be sent to the computer on the right hand side of the
sender is transmitted on upper bus. Data that is to be sent to the left hand side of the sender
is transmitted on lower bus.
The two most important components of MANs are security and standardization. Security is
important because information is being shared between dissimilar systems. Standardization
is necessary to ensure reliable data communication.
A MAN usually interconnects a number of local area networks using a high-capacity
backbone technology, such as fibre-optical links, and provides up-link services to wide area
networks and the Internet.
The Metropolitan Area Networks (MAN) protocols are mostly at the data link level (layer 2
in the OSI model), which are defined by IEEE, ITU-T, etc.
Computers connected to a Wide Area Networks are often connected through public
networks, such as the telephone system. They can also be connected through leased lines or
satellites. The largest WAN in existence is the Internet. Some segments of the Internet, like
VPN based extranets, are also WANs in themselves. Finally, many WANs are corporate or
research networks that utilize leased lines.
Numerous WANs have been constructed, including public packet networks, large corporate
networks, military networks, banking networks, stock brokerage networks, and airline
reservation networks.
Organizations supporting WANs using the Internet Protocol are known as Network Service
Providers (NSPs). These form the core of the Internet.
By connecting the NSP WANs together using links at Internet Packet Interchanges
(sometimes called "peering points") a global communication infrastructure is formed.
WANs (wide area networks) generally utilize different and much more expensive
networking equipment than do LANs (Local Area Networks). Key technologies often found
in WANs (wide area networks) include SONET, Frame Relay, and ATM.
An enterprise WAN (wide area networks) connects an entire organization including all
LANs (Local Area Networks) at various sites. This term is used for large, widespread
organizations such as corporations, universities and governments.
Global WANs (wide area networks) also span the world but they do not have to connect
LANS (Local Area Networks) within a single organization. The Internet is an example of a
global WAN. It connects diverse locations, organizations and institutions throughout the
world. Global WANS (wide area networks) can be public or private. Private WANs (wide
area networks) are called Intranet which belongs to an organization. Public WANs (wide
area networks) are open to everybody so that anybody can connect and use the resources and
services available.
A Campus Area Network (CAN) is a computer network that links the buildings and consists
of two or more local area networks (LANs) within the limited geographical area. It can be
the college campus, enterprise campus, office buildings, military base, industrial complex.
CAN is one of the type of MAN (Metropolitan Area Network) on the area smaller than
MAN.
The Campus networks usually use the LAN technologies, such as Ethernet, Token Ring,
Fiber Distributed Data Interface (FDDI), Fast Ethernet, Gigabit Ethernet and Asynchronous
Transfer Mode (ATM). Computer and Networks Area provides solutions that contain the
libraries with a great number of predesigned vector stencils, a set of professional looking
examples that you can change for your needs. All these allow you create the Campus Area
Network of any complexity in a few minutes.
Wireless Personal Area Network (WPAN) which is virtually a synonym since almost any
personal area network would need to function wirelessly. Conceptually, the difference between a
PAN (personal area network) and a wireless LAN (Local Area Network) is that the former tends
to be centred around one person Network while the latter is a local area network (LAN) that is
connected without wires Network and serving multiple users.
ROUTERS
A router is a networking device that forwards data packets between computer networks. A router is
connected to two or more data lines from different networks (as opposed to a network switch, which
connects data lines from one single network). When a data packet comes in on one of the lines, the
router reads the address information in the packet to determine its ultimate destination. Then, using
information in its routing table or routing policy, it directs the packet to the next network on its
journey. This creates an overlay internetwork. Routers perform the "traffic directing" functions on
the Internet. A data packet is typically forwarded from one router to another through the networks
that constitute the internetwork until it reaches its destination node.
The most familiar type of routers are home and small office routers that simply pass data, such as
web pages, email, IM, and videos between the home computers and the Internet. An example of a
router would be the owner's cable or DSL router, which connects to the Internet through an ISP.
More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to
the powerful core routers that forward data at high speed along the optical fibre lines of the Internet
backbone. Though routers are typically dedicated hardware devices, use of software-based routers
has grown increasingly common.
When multiple routers are used in interconnected networks, the routers exchange information about
destination addresses using a dynamic routing protocol. Each router builds up a table listing the
preferred routes between any two systems on the interconnected networks. A router has interfaces
for different physical types of network connections, such as copper cables, fibre optic, or wireless
transmission. It also contains firmware for different networking communications protocol standards.
Each network interface uses this specialized computer software to enable data packets to be
forwarded from one protocol transmission system to another.
Routers may also be used to connect two or more logical groups of computer devices known as
subnets, each with a different sub-network address. The subnet addresses recorded in the router do
not necessarily map directly to the physical interface connections.
A router has two stages of operation called planes:
1. Control plane: A router maintains a routing table that lists which route should be used to
forward a data packet, and through which physical interface connection. It does this using
internal pre-configured directive, called static routes, or by learning routes using a dynamic
routing protocol. Static and dynamic routes are stored in the Routing Information Base
(RIB). The control-plane logic then strips the RIB from non-essential directives and builds a
Forwarding Information Base (FIB) to be used by the forwarding-plane.
2. Forwarding plane: The router forwards data packets between incoming and outgoing
interface connections. It routes them to the correct network type using information that the
packet header contains. It uses data recorded in the routing table control plane.
Routers may provide connectivity within enterprises, between enterprises and the Internet, or
between internet service providers' (ISPs) networks. The largest routers (such as the Cisco CRS-1 or
Juniper T1600) interconnect the various ISPs, or may be used in large enterprise networks. Smaller
routers usually provide connectivity for typical home and office networks. Other networking
solutions may be provided by a backbone Wireless Distribution System (WDS), which avoids the
costs of introducing networking cables into buildings.
All sizes of routers may be found inside enterprises. The most powerful routers are usually found in
ISPs, academic and research facilities. Large businesses may also need more powerful routers to
cope with ever increasing demands of intranet data traffic. A three-layer model is in common use,
not all of which need be present in smaller networks
Routers intended for ISP and major enterprise connectivity usually exchange routing information
using the Border Gateway Protocol (BGP). RFC 4098 standard defines the types of BGP routers
according to their functions:
1. Edge router: Also called a Provider Edge router, is placed at the edge of an ISP network. The
router uses External BGP to EBGP routers in other ISPs, or a large enterprise Autonomous
System.
2. Subscriber edge router: Also called a Customer Edge router is located at the edge of the
subscriber's network; it also uses EBGP to its provider's Autonomous System. It is typically
used in an (enterprise) organization.
3. Inter-provider border router: Interconnecting ISPs is a BGP router that maintains BGP
sessions with other BGP routers in ISP Autonomous Systems.
4. Core router: A core router resides within an Autonomous System as a back bone to carry
traffic between edge routers.
5. Within an ISP: In the ISP's Autonomous System, a router uses internal BGP to communicate
with other ISP edge routers, other intranet core routers, or the ISP's intranet provider border
routers.
6. "Internet backbone:" The Internet no longer has a clearly identifiable backbone, unlike its
predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make up
what could be considered to be the current Internet backbone core. [14] ISPs operate all four
types of the BGP routers described here. An ISP "core" router is used to interconnect its
edge and border routers. Core routers may also have specialized functions in virtual private
networks based on a combination of BGP and Multi-Protocol Label Switching protocols.[1
7. Port forwarding: Routers are also used for port forwarding between private Internets
connected servers.
8. Voice/Data/Fax/Video Processing Routers: Commonly referred to as access servers or
gateways, these devices are used to route and process voice, data, video and fax traffic on
the Internet. Since 2005, most long-distance phone calls have been processed as IP traffic
(VOIP) through a voice gateway. Use of access server type routers expanded with the advent
of the Internet, first with dial-up access and another resurgence with voice phone service.
SWITCHES
In electrical engineering, a switch is an electrical component that can break an electrical circuit,
interrupting the current or diverting it from one conductor to another. The mechanism of a switch
may be operated directly by a human operator to control a circuit (for example, a light switch or a
keyboard button), may be operated by a moving object such as a door-operated switch, or may be
operated by some sensing element for pressure, temperature or flow. A relay is a switch that is
operated by electricity. Switches are made to handle a wide range of voltages and currents; very
large switches may be used to isolate high-voltage circuits in electrical substations. The most
familiar form of switch is a manually operated electromechanical device with one or more sets of
electrical contacts, which are connected to external circuits. Each set of contacts can be in one of
two states: either "closed" meaning the contacts are touching and electricity can flow between them,
or "open", meaning the contacts are separated and the switch is no conducting. The mechanism
actuating the transition between these two states (open or closed) can be either a "toggle" (flip
switch for continuous "on" or "off") or "momentary" (push-for "on" or push-for "off") type.
An ideal switch would have no voltage drop when closed, and would have no limits on voltage or
current rating. It would have zero rise time and fall time during state changes, and would change
state without "bouncing" between on and off positions.
Practical switches fall short of this ideal; they have resistance, limits on the current and voltage they
can handle, finite switching time, etc. The ideal switch is often used in circuit analysis as it greatly
simplifies the system of equations to be solved, but this can lead to a less accurate solution.
Theoretical treatment of the effects of non-ideal properties is required in the design of large
networks of switches, as for example used in telephone exchanges
In electronics, switches are classified according to the arrangement of their contacts. A pair of
contacts is said to be "closed" when current can flow from one to the other. When the contacts are
separated by an insulating air gap, they are said to be "open", and no current can flow between them
at normal voltages. The terms "make" for closure of contacts and "break" for opening of contacts
are also widely used.
The terms pole and throw are also used to describe switch contact variations. The number of "poles"
is the number of separate circuits which are controlled by a single switch. For example, a "2-pole"
switch has two separate identical sets of contacts controlled by the same switch. The number of
"throws" is the number of separate wiring path choices other than "open" that the switch can adopt
for each pole. A single-throw switch has one pair of contacts that can either be closed or open. A
double-throw switch has a contact that can be connected to either of two other contacts; a triplethrow has a contact which can be connected to one of three other contacts, etc.
In a switch where the contacts remain in one state unless actuated, such as a push-button switch, the
contacts can either be normally open (abbreviated "n.o." or "no") until closed by operation of the
switch, or normally closed ("n.c." or "nc") and opened by the switch action. A switch with both
types of contact is called changeover switch. These may be "make-before-break" ("MBB" or
shorting) which momentarily connects both circuits, or may be "break-before-make" ("BBM" or
non-shorting) which interrupts one circuit before closing the other. These terms have given rise to
abbreviations for the types of switch which are used in the electronics industry such as "single-pole,
single-throw" (SPST) (the simplest type, "on or off") or "single-pole, double-throw" (SPDT),
MANAGE ENGINE:
1. Server and Application Performance Monitoring:
Get deep performance insight into complex, dynamic environments; Reduce
troubleshooting time and improve performance of your business-critical applications.
Out-of-the box support for 50+ apps spanning physical, virtual, and cloud
environments.
Detect performance bottlenecks early, identify root cause quickly, and resolve issues
proactively before they affect end users.
Know exactly how your users experience your applications with the help of real user
monitoring; ensure an optimal user experience for your web applications.
Get capacity planning and trending insights to help plan for business expansion
As you can see in Figure B, the process of setting up a monitor for a Hyper-V server is simple. I
merely provided a display name, the servers IP address, and a set of credentials for the server. After
that, I selected the monitor group that I had previously created and clicked Add Monitor.
One thing that I especially liked about the process of setting up a monitor was the help that
Applications Manager gave me. As you look at the screen capture above, you will notice the help
card. The help card lists things like privilege requirements, firewall requirements, and license usage.
In spite of the fact that it was so easy to set up a monitor, I couldnt help but wonder about setting
up monitoring in larger organizations with hundreds of Hyper-V hosts. As I looked at the screen
shown above however, I noticed the Bulk Import link. Clicking this link took me to a screen that
gave me the chance to import a CSV file containing the data for all of my Hyper-V servers.
After setting up monitors for all of my Hyper-V servers and giving the Applications Manager time
to collect some monitoring information, I decided to check on my Hyper-V servers. Much to my
surprise, all of my Hyper-V servers were listed as being in a critical state, as shown in Figure C.
The reason why the server health was listed as critical was because the Hyper-V Image
Management Service and the Hyper-V Networking Management Service were both down. The
problem is however, that these services do not exist in Windows Server 2012 R2 Hyper-V. It would
be nice if Applications Manager had a way of detecting the Hyper-V version and monitoring
accordingly. Fortunately, it was easy enough to disable the monitoring of the non-existent services.
The next thing that I wanted to check out was monitoring for virtual machines. When you create a
Hyper-V Server monitor, there is a check box that you can select to monitor the performance of
virtual machines. I went back and enabled this function for one of my host servers. It is worth
noting that each monitored VM consumes a monitor license.
After I enabled performance monitoring for virtual machines, I decided to check out the reporting
function to see what sort of information was being monitored. When I arrived at the Reports screen,
I selected the Virtualization option and then expanded the Select Attribute drop down list. As you
can see in Figure D, there are roughly about 25 different metrics that you can report on. Some of
these metrics apply to the host server, while others apply to the virtual machines. The software also
allows you to configure alarms based on threshold values for any of these metrics.
Figure D: There are roughly about 25 different virtualization metrics that you can report on.
You can see what a report looks like in Figure E. This particular report displays the top ten host
servers with regard to the number of VMs that are running on them. Keep in mind that this
particular report only displays active VMs. VMs that are powered off are not included in the report.
As you can see in the figure, you have the option of exporting the report to a PDF or CSV file. You
can also E-mail or print the report.
While I was checking out the various reporting options, I decided to have a look at the Capacity
Planning options. ManageEngine provides reports on undersized servers, oversized servers, and idle
servers. For example, if you look at Figure F, you can see what the Undersized Servers report looks
like. This report treats a server as undersized if the CPU or memory utilization is 90% or higher for
at least 50% of the time. These threshold values can be adjusted in the event that you have different
criteria for determining whether a server is undersized.
The thing that I like best about this particular report is that there is a very clear indication (in bright
green in my case) as to whether or not a server is undersized. Just to the right of the diagnosis is the
criteria used in establishing the diagnosis. This makes it really easy to determine at a glance which
resources are undersized.
On a different note, I also really liked the SLA report. ManageEngine allows you to define a service
level agreement for your network resources. You can then use a dashboard to see which resources
are meeting your SLA.
To give you a more concrete example, take a look at Figure G. Even though I had not yet
established an SLA for my servers, ManageEngine was smart enough to pick up on the fact that I
had a major availability problem, with an overall availability of just 15.05%. The reason for this
problem is that I keep most of my lab servers turned off when I am not using them in an effort to
save power. Even though I knew the cause of the outage, I wanted to see what else ManageEngine
could tell me.
SOLAR WIND
Solar Wind develops enterprise information technology (IT) infrastructure management software for
IT professionals. SolarWinds is headquartered in Austin, Texas, with sales and product development
offices in Salt Lake City, Utah, Boulder, Colorado, Cork, Ireland, Brno, Czech Republic, Singapore,
Chennai, India, and Sydney, Australia. The company hosts an online community called thwack
In 2007, SolarWinds raised funding from Austin Ventures, Bain Capital and Insight Venture
Partners. Following the funding, SolarWinds acquired several companies including Neon Software
and monitor Corp. and opened a European sales office in Ireland.
SolarWinds completed its initial public offering of $112.5 million in 2009.The company introduced
the SolarWinds Certified Professional Program (SCP) for network management, to test
professionals in five areas: network management fundamentals, network management planning,
network management operation, network performance troubleshooting and Orion Network
Performance Monitor (NPM) administration and service.
In 2012, SolarWinds total revenue reached $269 million. In 2013, SolarWinds announced plans to
invest $50 million on an operations hub in Salt Lake City.
In June 2014, the company purchased the Swedish web-monitoring company Pingdom.
In August 2014, SolarWinds announced the launch of its deep packet inspection (DPI) free tool
SolarWinds Response Time Viewer for Wireshark. It is the latest to join more than 30 free tools
from SolarWinds' IT management product family. In October 2014, SolarWinds is among Forbes
Best Small Companies of 2014, and the company was ranked 11th overall.
In January 2015, SolarWinds acquired the San Francisco based metrics and monitoring company
Librato, for $40 million.
In April 2015, SolarWinds acquired Seattle based log management service Papertrail, for $41
million leading provider of powerful and affordable IT management software, today announced
survey results highlighting the impact of application performance and availability on business end
users, and their experiences with and expectations of IT when problems arise.
Chief
among the findings is that while the application is now the heart of businesses of all sizes and its
performance is the lifeblood of success, IT continues to struggle to ensure its performance and
availability. The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace
have made the application the disruptive technology that will drive business IT into the coming
decades. At the same time, the application delivery chain is becoming more complex to support as
applications become more networked, virtualization drives IT infrastructure convergence and
abstraction and end users become more mobile
Applications affect nearly every aspect of our world. And not just business, but well beyond. Today,
applications impact peoples lives in ways never imagined just five to ten years ago, said Suaad
Sait, executive vice president, products and markets, SolarWinds. The resulting importance of
Installation is fast, and setup-screens help configure the Monitor. First up: configuration of the
device name or IP that will be monitored, as well as SNMP version and community string. The
Network Device Monitor supports SNMP versions 1, 2c, and 3, so security options can be
configured at this point.
Next, you have the option of choosing what information youd like to monitor, using what
SolarWinds calls a Universal Device Poller or UDP. You have three options here use the built in
UDPs, use a UDP from the Thwack content exchange, or build your own.
The built-in UDPs are pretty skimpy, so the best bet is to use Thwack or build your own poller.
Fortunately, SolarWinds has done a great job of making this painless. The tool is perfectly
integrated with Thwack, and choosing that option presents a list of hundreds of user-generated
UDPs. Just browse for one that looks like it will work for you, select it, and hit next. You can then
test it out to confirm that it works with your system.
Choosing to build your own UDP will launch the MIB browser. Browse through the tree to find the
objects you want to monitor, then use the Test button to confirm that your device supports that
object. The tool also includes a MIB compiler, so you can load MIBs provided by your hardware or
software manufacturer.
Or, you could monitor an interface for bandwidth use. In the example below, I set a threshold so that
exceeding 250Kb caused an alarm. You can see the status light for FastEthernet 0/1 changes to red
once the threshold is exceeded. Network Device Manager excels in ad-hoc monitoring scenarios
like this.
The only real problem with the tool is that it can only monitor a single device. Because of this, the
Network Device Monitor has limited real-world application. But, even with that limitation I can
still think of many uses. Its also a great introduction to the more advanced features found in
SolarWinds Network Performance Monitor the next logical step up. (Recently reviewed here)
It also helps to have some basic knowledge of how SNMP works if you plan to build a custom
UDP. Importing MIB files and finding Object IDs is not difficult, but understanding the results can
be complicated. If your SNMP skills are a little rusty, you may want to check out our tutorial on
SNMP basics to help you get started.
The Network Device Monitor is a great addition to the selection of free tools SolarWinds offers.
Though its clearly designed to promote their full network monitoring systems, it stands on its own
as a useful tool that can help you manage your network.
FORTIGATE
The FortiGate Cookbook provides examples, or recipes, of basic and advanced FortiGate
configurations to administrators who are unfamiliar with the unit. All examples require access to the
graphical user interface (GUI), also known as the web-based manager.
Each example begins with a description of the desired configuration, followed by step-by step
instructions. Some topics include extra help sections, containing tips for dealing with some common
challenges of using a FortiGate unit.
Using the FortiGate Cookbook, you can go from idea to execution in simple steps, configuring a
secure network for better productivity with reduced risk.
The Cookbook is divided into the following chapters:
1.
2.
3.
4.
5.
methods.
6. SSL VPN: recipes about SSL virtual private networks (VPNs), including authentication
methods.
Model and firmware: GUI menus, options, and interface names may vary depending on the
FortiGate model you are using and the firmware build. For example, the menu Router >
Static > Static Routes is not available on some models.
Also, on different models, the Ethernet interface that would normally connect to the Internet could
be named port1, wan1, wan2, or external.
Also, some features are only available through the CLI on certain FortiGate models, generally the
desktop models (FortiGate/WiFi-20 to 90 Series).
FortiGate ports:
The specific ports being used in the documentation are chosen as examples. When you are
configuring your FortiGate unit, you can substitute your own ports, provided that they have the
same function.
For example, in most recipes, wan1 is the port used to provide the FortiGate unit with access to the
Internet. If your FortiGate uses a different port for this function, you should use that port in the parts
of the configuration that the recipe uses wan1.
2.
Some FortiOS features can be turned off, which means they will not appear in the GUI. If an
option required for a recipe does not appear, go to System > Config > Features and make
sure that option is turned on.
Text elements: Bold text indicates the name of a GUI field or feature. When
required, italic text indicates information that you must enter.
Icons: Several icons are used throughout the FortiGate Cookbook:
1) The exclamation icon indicates a warning, which includes information that
should be read carefully before continuing with the recipe.
2) The light bulb icon indicates a note, which includes information that may be
useful but is not strictly necessary for completion of the recipe.
Selecting OK/Apply: Always select OK or Apply when you complete a GUI step.
Because this must be done frequently, it is an assumed step and is not included in
most recipes.
Extra help: Switch mode vs Interface mode: This section contains information to help you
determine which internal switch mode your FortiGate should use, a decision that should be
made before the FortiGate is installed.
What are Switch mode and Interface mode and why are they used?
In Switch mode, all the internal interfaces are part of the same subnet and treated as a single
interface, called either lan or internal by default, depending on the FortiGate model. Switch
mode is used when the network layout is basic, with most users being on the same subnet.
In Interface mode, the physical interfaces of the FortiGate unit are handled individually,
with each interface having its own IP address. Interfaces can also be combined by
configuring them as part of either hardware or software switches, which allow multiple
interfaces to be treated as a single interface. This mode is ideal for complex networks that
use different subnets to compartmentalize the network traffic.
Which mode is your FortiGate in by default?
The default mode that a FortiGate starts in varies depending on the model. To determine
which mode your FortiGate unit is in, go to System > Network > Interfaces. Locate the lan
or internal interface. If the interface is listed as a Physical Interface in the Type column, then
your FortiGate is in Switch mode. If the interface is a Hardware Switch, then your FortiGate
is in Interface mode.
How do you change the mode?
If you need to change the mode your FortiGate unit is in, first make sure that none of the
physical ports that make up the lan or internal interface are referenced in the FortiGate
configuration. Then go to System > Dashboard > Status and enter either of the following
commands into the CLI Console:
1. Command to change the FortiGate to switch mode: config system global set internalswitch-mode switch end.
2. Command to change the FortiGate to interface mode: config system global set internal
switch-mode interface end
Results: Connecting a private network to the Internet using NAT/Route mode. In this
example, you will learn how to connect and configure a new FortiGate unit in NAT/Route
mode to securely connect a private network to the Internet.
In NAT/Route mode, a FortiGate unit is installed as a gateway or router between two
networks. In most cases, it is used between a private network and the Internet. This allows
the FortiGate to hide the IP addresses of the private network using network address
translation (NAT).
If you have not already done so, ensure that your FortiGate is using the correct internal
switch mode.
1. Connecting the network devices and logging onto the FortiGate
2. Configuring the FortiGates interfaces
3. Adding a default route
4. (Optional) Setting the FortiGates DNS servers
5. Creating a policy to allow traffic from the internal network to the Internet
1. Connecting the network devices and logging onto the FortiGate:
Connect the FortiGates Internetfacing interface (typically WAN1) to your ISP-supplied equipment
and Connect a PC to the FortiGate using an internal port (typically port 1). Power on the ISPs
equipment, the FortiGate unit, and the PC on the internal network.
ISP FortiGate Internal Network port 1 WAN 1:
From the PC on the internal network, connect to the FortiGates web-based manager using either
FortiExplorer or an Internet browser (for information about connecting to the web-based manager,
please see your models QuickStart Guide).
Login using an admin account (the default admin account has the username admin and no
password).
5. Creating a policy to allow traffic from the internal network to the Internet:
Some FortiGate models include an IPv4 security policy in the default configuration. If you have one
of these models, edit it to include the logging options shown below, then proceed to the results
section.
Go to Policy & Objects > Policy > IPv4 and create a new policy (if your network uses IPv6
addresses, go to Policy & Objects > Policy > IPv6).
Set the Incoming Interface to the internal interface and the Outgoing Interface to the Internet-facing
interface.
Make sure the Action is set to ACCEPT. Turn on NAT and make sure Use Destination Interface
Address is selected.
Connecting a private network to the Internet using NAT/Route mode 9
Scroll down to view the Logging Options. In order to view the results later, enable Log Allowed
Traffic and select All Sessions.
6. Results:
You can now browse the Internet using any computer that connects to the FortiGates internal
interface.
You can view information about the traffic being processed by your FortiGate by going to System >
FortiView > All Sessions and finding traffic that has the internal interface as the Src Interface and
the Internet-facing interface as Dst Interface.
BIBLOGRAPHY:
[1] http://www.solarwinds.com/
[2] https://en.wikipedia.org/wiki/SolarWinds
[3] http://www.fortinet.com/products/fortigate/
[4] http://www.fortinet.com/sites/default/files/productdatasheets/FortiGate-92D.pdf
[5] https://www.manageengine.com/products/applications_manager/sql/
[6] https://blogs.manageengine.com/application-performance-2/appmanager.html
[7] http://docs.aws.amazon.com//UserGuide/USER_ConnectToMicrosoftSQLServerInstance.html
[8] http://au.manageengine.com/applications_manager/
[9] https://en.wikipedia.org/wiki/Network_switch
[10] http://www.webopedia.com/TERM/S/switch.html
[11] https://en.wikipedia.org/wiki/Router_(computing)
[12] http://study.com/types-of-networks-lan-wan-wlan-man-san-pan-epn-vpn.html
[13] http://ccm.net/contents/266-types-of-networks
[14] https://en.wikipedia.org/wiki/Computer_network
[15] http://compnetworking.about.com/cs/basicnetworking/f/whatsnetworking.htm
[16] http://www.allana.com/corp/index.html
[17] http://www.allana.com/corp/index_meat_cm.html