Proplus Solutions provides a full product line for network solutions, including computer repair services, laptop services, desktops, servers, routers, firewalls, switches, printers and more.

Address:No.48A, Raja Street, Ganapathypudur, Coimbatore-641006, Tamilnadu, INDIA

Phone: (+91) 422 4349314
Mobile:  (+91) 9943009372 Mail:info[at]propluslogics.com Web: http://www.propluslogics.com
Our Social Links

We believe that using these channels to easily communicate with your customers is an excellent habit.

  04224349314
Follow Us
Top
 

Network Maintenance

Proplus Solutions > Services > Network Maintenance

Network Maintenance

Computer network is an interconnection between two or more computers by communication channels. These computers are connected electronically to share information and resources. There are many types of computer networks. LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network) are the frequently used networks. You may have problems in creating the network, computer network maintenance, troubleshooting and etc. If you mess up while troubleshooting your network may end up with frequent network failures. We provides proactive and reactive services to prevent the failures as follows:

Network-integration2-1300x535-min

Computer network is an interconnection between two or more computers by communication channels. These computers are connected electronically to share information and resources. There are many types of computer networks. LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network) are the frequently used networks. You may have problems in creating the network, computer network maintenance, troubleshooting and etc. If you mess up while troubleshooting your network may end up with frequent network failures. We provides proactive and reactive services to prevent the failures as follows:

  • Cabling-Network cabling solutions that are customized to meet customers’ needs for voice, video, and data integration.
  • Building and Campus LAN-Infrastructure deployment using equipment that comprise cabling, switches, router, and firewall for single or multi-site location.
  • Extranet / Intranet-Provision of secured VPN/router connectivity solution for enterprises over the Internet.
  • Remote Access-Includes basic and high-speed solutions for remote offices and mobile workers. These solutions are integrated with remote access technologies and robust security solutions such as 2-factor tokens and PKI authentication.
  • Hotspot with Wireless Access-Secured wireless LAN solutions for mobile applications and areas unreachable by wireline technologies.

Custom Solutions:

  • Network Integration Services excels in providing custom solutions to industry specific hardware and software needs. We create solutions to business needs by utilizing standard industry hardware such as tablets, pc’s and laptops and build a software solution system to meet that need.

Key Benefits:

  •   Custom built software solutions
  •   Custom hardware solutions
3.2-network-security

Computer network is an interconnection between two or more computers by communication channels. These computers are connected electronically to share information and resources. There are many types of computer networks. LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network) are the frequently used networks. You may have problems in creating the network, computer network maintenance, troubleshooting and etc. If you mess up while troubleshooting your network may end up with frequent network failures. We provides proactive and reactive services to prevent the failures as follows:

1. Message confidentiality

  • It means that the content of a message when transmitted across a network must remain confidential, i.e. only the intended receiver and no one else should be able to read the message.
  • The users therefore, want to encrypt the message they send so that an eavesdropper on the network will not be able to read the contents of the message.

2. Message Integrity

  • It means the data must reach the destination without any adulteration i.e. exactly as it was sent.
  • There must be no changes during transmission, neither accidentally nor maliciously.
  • Integrity of a message is ensured by attaching a checksum to the message.
  • The algorithm for generating the checksum ensures that an intruder cannot alter the checksum or the message.

3. Message Authentication

  • In message authentication the receiver needs to be .sure of the sender’s identity i.e. the receiver has to make sure that the actual sender is the same as claimed to be.
  • There are different methods to check the genuineness of the sender :
    1. The two parties share a common secret code word. A party is required to show the secret code word to the other for authentication.
    2. Authentication can be done by sending digital signature.
    3. A trusted third party verifies the authenticity. One such way is to use digital certificates issued by a recognized certification authority.

4. Message non-reproduction

  • Non-repudiation means that a sender must not be able to deny sending a message that it actually sent.
  • The burden of proof falls on the receiver.
  • Non-reproduction is not only in respect of the ownership of the message; the receiver must prove that the contents of the message are also the same as the sender sent.
  • Non-repudiation is achieved by authentication and integrity mechanisms.

5. Entity Authentication

  • In entity authentication (or user identification) the entity or user is verified prior to access to the system resources.
3.3-Network-troubleshot

Problems encountered in IP networking can have several sources. Most obvious are those where either the client’s machine or the target machine are mis-configured, malfunctioning or, in the extreme case, shut down. If the problem is unrelated to either the target or the source machine, then other possibilities include problems with the Domain Name Services or a variety of forms of network problems somewhere between the target and source machine.

This set of tests assumes that the client is attempting to connect to a specific target machine via TCP/IP. Target machines may be web, mail, ftp, news or compute servers or stand-alone telnet services. This would include any machine accessed by identifying it with an “internet” style address (e.g., www.ucsc.edu). Administrative Systems (Banner, PPS, etc) use the TCP/IP network and connections to them will fail along with other TCP/IP target machines if the client’s network isn’t working.

  • Can client load a URL or get an error message from server
  • Can client connect using IP address rather than IP name
  • Attempt to Connect from Separate Machine
  • Check state of the client’s network

Client Side Troubleshooting

If the problem appears to be more connected with the machine attempting to make a connection (the source machine) than with the target machine, further testing is necessary to determine whether the problem is with a part of the network or the client’s machine itself.

  • Perform Standard Machine Checks and Network Equipment Swap
  • Have Client Telnet to Local Router
  • Test Client’s Local Router from another location.

Target Side Troubleshooting

If the problem appears to be more connected with the machine to which the client is trying to connect (the target machine) than it does with the client’s (source) machine, further testing is necessary to determine whether the problem is with a part of the network or the target machine itself. For these tests, it is useful to know to what sub net the target is physically attached, and what the router address is for that sub net.

  • Start with the Obvious
  • Verify Target Information
  • Try to ping a machine in the target’s network.