Thursday, July 14, 2011

Market Share of Networking Components in India FY2010-2011

Following are the Market values shares of each of the netwoking components in the FY 2010 - 2011. Compiled it from Voice&Data. All the values are in Crore INR.

Network Integration:
Total Market Share in India
in FY 2010 - 2011" 7,479
Wipro Infotech 1,411
HCL Comnet 1,209
Datacraft 1,123
HCL Infosys 783
Tulip 210
Others 2,743



Routers "Total Market Share in India
in FY 2010 - 2011" 3,405
Cisco 2031
Juniper 631
D-Link 38
Dax 35
Others 670



Switches "Total Market Share in India
in FY 2010 - 2011" 5,118
Cisco 3477
HP 495
Avaya-Nortel 68
Dax 42
D-Link 68
Others 968


IP Telephony "Total Market Share in India
in FY 2010 - 2011" 2,375
Avaya 552
Cisco 544
Alcatel Lucent 508
Siemens 467
Panasonic 140
Aastra 104
Coral Telecom 60



Wireless "Total Market Share in India
in FY 2010 - 2011" 435
Cisco 156
Ruckus Wireless 63
Netgear 35
Aruba Networks 32
D-Link 30
Others 119


Structured Cabling "Total Market Share in India
in FY 2010 - 2011" 1,382
TE Connectivity 440
DigiLink 246
Commscope 230
Molex 120
R&M 87
Belden 55
Panduit 54
Schneider Electric 45
Others 105



Audio-Video "Total Market Share in India
in FY 2010 - 2011" 337
Polycom 160
Cisco 105
Lifesize 30
Radvision 22
Others 20




Storage "Total Market Share in India
in FY 2010 - 2011" 1,587
EMC 388
IBM 332
HP 197
NetApp 158
Symantec 129
HDS 118
Oracle 113
Dell 45
Others 107

Wednesday, May 24, 2006

One thing I don't like about pix...

When I want to remove some command, I have the habbit of doing a sh run, copy that command and paste it with prepending with a "no". To do this, whenever I see the required command in the running config, I will copy it and press a tab so that it will stop the output of sh run and goes back to the config mode; then I would paste it after typing no.

This tab does not work on pix ! :-(

Thursday, April 27, 2006

RIP V1 – Some points to remember

Routing advertisements Transmit rules :

1. If the to-be-advertised network and the interface on which it has to be transmitted on, has same major networks and masks, then it sends the subnet.
2. If the to-be-advertised network and the interface on which it has to be transmitted on, has same major networks but different masks, then the router will drop the update.
3. If the to-be-advertised network and the interface on which it has to be transmitted on, has different major networks, then, the router sends the the major network alone/summarized route.

Receiving routing updates manipulating rules :

1. If the major network of the received updated and the interface on which it is received has same major network, then it assumes the mask of that interface.
2. If the major network of the received update and the interface on which it is received has different major network, then the router assumes the default mask .

· When a router received the update, it first stores in the router, then increments the metric by 1 and send it to the neighbor.

Wednesday, April 26, 2006

Inside/Outside Static/Dynamic NAT/PAT & Policy Nat.

I am skeptical about the 100% authenticity of these terminology, but I guess most of it should be correct.

Inside dynamic NAT
Translates between host addresses on more secure interfaces and a range or pool of IP addresses on a less secure interface. This provides a one-to-one mapping between internal and external addresses that allows internal users to share registered IP addresses and hides internal addresses from view on the public Internet.

Inside dynamic PAT
Translates between host addresses on more secure interfaces and a single address on a less secure interface. This provides a many-to-one mapping between internal and external addresses. This allows internal users to share a single registered IP address and hides internal addresses from view on the public Internet. PAT is supported for fewer applications than is NAT. For restrictions on its use, refer to the "How Application Inspection Works" section on page 5-1 in Chapter 5, "Configuring Application Inspection (Fixup)."

Inside static NAT
Provides a permanent, one-to-one mapping between an IP address on a more secure interface and an IP address on a less secure interface. This allows hosts to access the inside host from the public Internet without exposing the actual IP address.

Outside dynamic NAT
Translates between a host address on a less secure interface and a range or pool of IP addresses on a more secure interface. This provides a one-to-one mapping between an external and an internal address. This is most useful for controlling the addresses that appear on inside interfaces of the PIX Firewall and for connecting private networks with overlapping addresses.

Outside dynamic PAT
Translates between host addresses on less secure interfaces and a single address on a more secure interface. This provides a many-to-one mapping between external addresses and an internal address.

Outside static NAT
Provides a permanent, one-to-one mapping between an IP address on a less secure interface and an IP address on a more secure interface.

Policy NAT
Translates source and destination address pairs to different global statements, even if the source address is the same. For example, traffic from IP address A to server A can be translated to global address A, while traffic from IP address A to server B can be translated to global address B.


These definitions are from Config Guide 6.3 of PIX Firewall

What is this "Hide Nat"

I guess "Hide Nat" is just another term for PAT. Is is also called "masquerading" on Linux.

Tuesday, April 25, 2006

Inside/Outside Local/Global

"Local address" is an IP address that appears on the "inside" portion of the network. Similarly, "Global address" is any address that appears on the "outside" portion of the network. These terms would be helpful to understand the following terminology better:

Inside local address - The IP address assigned to a host on the inside network. This is the address configured as a parameter of the computer's OS or received via dynamic address allocation protocols such as DHCP. The address is likely not a legitimate IP address assigned by the Network Information Center (NIC) or service provider.

Inside global address - A legitimate IP address assigned by the NIC or service provider that represents one or more inside local IP addresses to the outside world.

Outside local address - The IP address of an outside host as it appears to the inside network. Not necessarily a legitimate address, it is allocated from an address space routable on the inside.

Outside global address - The IP address assigned to a host on the outside network by the host's owner. The address is allocated from a globally routable address or network space.
For better understanding, kindly look into the example given with a picture in the document
http://www.cisco.com/warp/public/556/8.html

Monday, April 24, 2006

Nat Transperancy

Yesterday, I was talking to Mohan about it. I read about this topic a couple of times but since I could not understand it clearly, leaft it at that.

If there is a NAT device between two IPSec end points, it will change the Source Address of the packet, which would fail the matching of Hash at the other end point. To avoid this kind of failure, we use Nat T. Nat T is configured on both ends to encapsulate the packet in a UDP packet with port number 4500. Nat device that is somewhere in between can change the source Address of this UDP packet only, but the original packet is intact, due to which Hash value will match at the remote end. This is Nat-T, simplified :-)