Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ss
oc
ia
te
ID
:3
9
54
7
Networking Basics
C3: Protected
Credential
Information:
Version and
Date:
NETWORK/PPT/0508/1.0
ss
oc
ia
te
ID
:3
9
54
7
Created By:
Confidential
Icons Used
Questions
ss
oc
ia
te
ID
Coding
Standards
:3
9
54
7
Tools
Hands on
Exercise
Demonstration
Test Your
Understanding
Reference
A Welcome
Break
Contacts
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
Efficient communication
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
ss
oc
ia
te
ID
:3
9
Confidential
10
54
7
ss
oc
ia
te
ID
:3
9
parts of a city
Requires more expensive bandwidth than LAN
Uses microwave or Optical Fiber Cable (OFC) is typically used as
transmission media
Confidential
ss
oc
ia
te
ID
:3
9
54
7
continents
The transmission media is typically hired from a thirdparty service
provider
Offices are connected typically through satellite or undersea OFC
Bandwidth is much more expensive than LAN or MAN
Confidential
Network Elements
ss
oc
ia
te
ID
:3
9
54
7
Network Elements
Network Services
Transmission Media
Network Topology
and Protocols
Confidential
13
Network Services
ss
oc
ia
te
ID
Peer-to-Peer
:3
9
54
7
Client-Server
Combination
Confidential
14
Peer-to-Peer Networks
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
ss
oc
ia
te
ID
:3
9
LOW COST
Confidential
54
7
ss
oc
ia
te
ID
:3
9
Confidential
Client-Server Networks
The following are the features of a clientserver network:
Consists of client and server computers
Server computers are optimized to provide service
54
7
ss
oc
ia
te
ID
:3
9
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Advantages:
Strong central security
Central file storage
Resource sharing controlled by
administrators
Easy management of large
number of users
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
:3
9
File services
Print services
Message services
Application services
Database services
ss
oc
ia
te
ID
54
7
Confidential
File Services
File services are offered by network applications designed to
efficiently store, retrieve, and move data files between a client
and a server.
54
7
:3
9
ss
oc
ia
te
ID
File archiving
Confidential
Print Services
Print services are offered by network applications that
manage access to printers.
54
7
:3
9
ss
oc
ia
te
ID
Confidential
Message Services
Message services include storing, accessing, and delivering
text, binary, graphic, digitized video, and audio data.
Message services:
54
7
message
Perform the following functions:
Transport data from point to point and notify the user of awaiting
ss
oc
ia
te
ID
:3
9
Confidential
Database Services
Database services provide serverbased data storage and
retrieval for clients who request data from specialized servers.
54
7
:3
9
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
26
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
28
Transmission Media
The following are the features of transmission media:
Before a network service can be shared, networked computers must have a
Cable
Wireless
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Types of Cables
Coaxial Cable
Confidential
30
:3
9
54
7
ss
oc
ia
te
ID
Disturbances
Attenuation
Crosstalk
EMI
Confidential
31
Attenuation
:3
9
54
7
ss
oc
ia
te
ID
Confidential
32
54
7
Crosstalk
Crosstalk occurs when signals of one cable get mixed with signals of an adjacent
cable due to EMI.
Crosstalk can be overcome using Shielded Twisted Pair (STP) cables.
ss
oc
ia
te
ID
:3
9
Confidential
54
7
ss
oc
ia
te
ID
:3
9
Confidential
54
7
Advantages
ss
oc
ia
te
ID
:3
9
Relatively inexpensive
Easy to install and manage
Less Cost
STP
Disadvantages
Advantages
Disadvantages
More expensive
Harder to install
Unsuitable for more than 155 Mbps
Confidential
35
Coaxial Cable
The following are the features of a coaxial cable:
It is made of two conductors that share a common axis.
The center is a insulated stiff solid copper wire.
The center, in turn, is surrounded by a metallic foil as a shield from EMI.
The outer cover is usually made of nonconducting material, such as teflon,
plastic, or rubber.
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
Thinnet
:3
9
54
7
Coaxial Cable
Thicknet
Diameter 0.5 inch
Transmit signals up to 500
meter without attenuation
More cost
Confidential
54
7
Disadvantages:
:3
9
ss
oc
ia
te
ID
Confidential
Fiber-Optic Cable
The following are the features of a fiberoptic cable:
It is made of a light conducting glass or plastic core.
The core is surrounded by a glass called cladding.
54
7
ss
oc
ia
te
ID
:3
9
Confidential
Disadvantages:
54
7
Immune to interference
Low attenuation
:3
9
ss
oc
ia
te
ID
installation
Relatively complex to configure and install
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Wireless Connectivity
Wireless media transmit and receive electromagnetic signals
without an electrical or optical conductor
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Advantages:
54
7
Disadvantages:
:3
9
ss
oc
ia
te
ID
Confidential
54
7
Advantage: Can be established in a more cost effective and easier way than
cable in inhospitable terrain or congested area.
Disadvantage: Complex installation and line of sight required.
:3
9
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Media Connectivity
Media Connectivity Hardware: The interfaces and devices
that are used to connect computing devices and transmission
media are called media connectivity hardware.
54
7
ss
oc
ia
te
ID
:3
9
Confidential
Modem
Interface Card
ss
oc
ia
te
ID
Connectors
:3
9
54
7
Hub
Switch
2007, Cognizant Technology Solutions
Router
Multiplexer
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
Gateway:
:3
9
ss
oc
ia
te
ID
Confidential
54
7
ss
oc
ia
te
ID
:3
9
Confidential
54
7
Identifies which devices are connected to its ports and forwards packets
ss
oc
ia
te
ID
:3
9
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
segment.
Are used to efficiently utilize the entire bandwidth of a transmission
media, which provides more capacity than what a single signal can
carry.
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
56
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
58
Network Topology
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Bus Topology
It is a linear topology where computers are connected to each other
:3
9
Disadvantages:
54
7
ss
oc
ia
te
ID
Confidential
Star Topology
In a star topology, computers are connected through a central device called
a hub or a switch.
Advantages:
It is easy to add more computers to extend the network.
It is easy to troubleshoot the network problem.
Failure of one computer does not affect the network.
:3
9
Disadvantages:
54
7
ss
oc
ia
te
ID
Confidential
Ring Topology
:3
9
54
7
In a ring topology:
Computers are connected in a circle.
Data transmitted moves in a single direction.
A computer sends data along with a packet called Token.
Destination computer sends a receive note after receiving the token from source
computer.
ss
oc
ia
te
ID
Advantages:
Highly efficient in case of heavy network traffic
It allows equal access to all users
Disadvantages:
Adding or removing a computer disrupts the network
Troubleshooting is very difficult
When a computer fails, the network fails
2007, Cognizant Technology Solutions
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Others Topologies
Star - Bus Topology: The hubs of more than one star network are
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
65
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
67
54
7
:3
9
ss
oc
ia
te
ID
correctly?
Confidential
Network Models
The following are the facts regarding network models:
Because the networking industry grew in response to different needs,
ss
oc
ia
te
ID
:3
9
54
7
Confidential
OSI Model
The OSI reference model consists of the following seven
layers:
Application
54
7
Presentation
Session
Network
ss
oc
ia
te
ID
Data Link
:3
9
Transport
Physical
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Physical Layer
The physical layer coordinates the rules for transmitting bits.
This layer defines:
54
7
:3
9
medium
Bit transmission encoding and timing rules
ss
oc
ia
te
ID
Modems
Confidential
multiple devices within the same logical network based on physical device
addressing.
The basic purposes for data link layer protocol implementations are :
Organizing physical layer bits into logical groups of information called frames
Detecting errors
Controlling data flow
Identifying computers on the network
:3
9
54
7
ss
oc
ia
te
ID
The network connectivity hardware associated with data link layer are:
Switches
Network Interface Boards
Confidential
Network Layer
The network layer describes methods for moving information
between multiple independent networks based on network
layer addressing.
54
7
:3
9
ss
oc
ia
te
ID
IPX
Confidential
Transport Layer
The transport layer compensates for lack of reliable, or
connectionoriented connection services in the lower layers.
54
7
:3
9
Segment development
ss
oc
ia
te
ID
UDP
Confidential
Session Layer
54
7
:3
9
ss
oc
ia
te
ID
Session administration
Confidential
Presentation Layer
54
7
:3
9
Translation
ss
oc
ia
te
ID
ASCII, EBCDIC
Confidential
Application Layer
The application layer includes all the functions specific to each
network service. This layer provides file, print, message,
application, and database services.
Network services
:3
9
Service advertisement
54
7
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
ss
oc
ia
te
ID
:3
9
communication network
Confidential
TCP/IP
File transfer
Remote login
Electronic mail
Remote printing
Remote executions
Name and terminal servers
Network file systems
ss
oc
ia
te
ID
:3
9
54
7
Overview of TCP/IP:
It provides the ability to facilitate communication and share resources
between varying networks and platforms.
TCP and IP are two separate protocols.
TCP is connectionoriented and IP is connectionless.
IP is a routable protocol, means two nodes communicating through IP do
not need to be physically on the same wire.
The following are the functions of TCP/IP:
Confidential
TCP/IP Addressing
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
IP Addressing
Confidential
ss
oc
ia
te
ID
:3
9
54
7
IP Address Classes
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
address space.
The following are the features of private address space:
54
7
:3
9
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Addressing Guidelines
The following are the network addressing guidelines:
The network ID must be unique
The number, 127, is reserved for diagnostic loopback function
54
7
:3
9
ss
oc
ia
te
ID
Confidential
54
7
IPv6:
:3
9
IP version 6 (IPv6) is a new version of the Internet Protocol based on IPv4. IPv4
and IPv6 are demultiplexed at the media layer. For example, IPv6 packets are
carried over Ethernet with the content type 86DD (hexadecimal) instead of
IPv4s 0800.
IPv6 increases the IP address size from 32 bits to 128 bits, to support more
levels of addressing hierarchy, a much greater number of addressable nodes
and simpler autoconfiguration of addresses. Scalability of multicast addresses
is introduced. A new type of address called an anycast address is also defined, to
send a packet to any one of a group of nodes.
ss
oc
ia
te
ID
Confidential
:3
9
54
7
the IPv6 header and the transport layer header. Changes in the way IP
header options are encoded allow more efficient forwarding, less
stringent limits on the length of options, and greater flexibility for
introducing new options in the future. The extension headers are: Hop
byHop Option, Routing (Type 0), Fragment, Destination Option,
Authentication, Encapsulation Payload.
ss
oc
ia
te
ID
Confidential
UDP
User Datagram Protocol (UDP):
Provides a simple, but unreliable message service for transaction
ss
oc
ia
te
ID
:3
9
54
7
oriented services. Each UDP header carries both a source port identifier
and destination port identifier, allowing highlevel protocols to target
specific applications and services among hosts.
Confidential
802.11:
ss
oc
ia
te
ID
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the
first WLAN standard. They called it 802.11 after the name of the group formed
to oversee its development. Unfortunately, 802.11 only supported a maximum
network bandwidth of 2 Mbps too slow for most applications. For this reason,
ordinary 802.11 wireless products are no longer manufactured.
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
802.11g:
ss
oc
ia
te
ID
In 2002 and 2003, WLAN products supporting a newer standard called 802.11g
emerged on the market. 802.11g attempts to combine the best of both 802.11a
and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4
Ghz frequency for greater range. 802.11g is backwards compatible with
802.11b, meaning that 802.11g access points will work with 802.11b wireless
network adapters and vice versa.
:3
9
54
7
Confidential
802.11n:
54
7
The newest IEEE standard in the WiFi category is 802.11n. It was designed to
improve on 802.11g in the amount of bandwidth supported by utilizing multiple
wireless signals and antennas (called MIMO technology) instead of one.
When this standard is finalized, 802.11n connections should support data rates
of over 100 Mbps. 802.11n also offers somewhat better range over earlier WiFi
standards due to its increased signal intensity. 802.11n equipment will be
backward compatible with 802.11g gear.
Pros of 802.11n fastest maximum speed and best signal range; more resistant
to signal interference from outside sources.
Cons of 802.11n standard is not yet finalized; costs more than 802.11g; the use
of multiple signals may greatly interfere with nearby 802.11b/g based
networks.
ss
oc
ia
te
ID
:3
9
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
99
3. What are the TCP Ports used for Telnet, FTP, and SMTP?
54
7
ss
oc
ia
te
ID
:3
9
a)
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
101
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
Circuit switching:
ss
oc
ia
te
ID
:3
9
Packet switching:
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
:3
9
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
Frame Relay
It is a industry standard, switched data link layer protocol that handles multiple
virtual circuits.
It eliminates some of the timeconsuming processes (such as error correction
and flow control) that were employed in X.25.
ss
oc
ia
te
ID
:3
9
Confidential
54
7
:3
9
The local router sends a challenge message and the remote node
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
110
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
112
What is a Firewall?
ss
oc
ia
te
ID
:3
9
54
7
Confidential
Firewall Operations
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
54
7
:3
9
authorized users can access the network, and that the data cannot be
intercepted
Is cost effective
ss
oc
ia
te
ID
Confidential
54
7
Data encryption
:3
9
ss
oc
ia
te
ID
Confidential
Disadvantages:
:3
9
54
7
ss
oc
ia
te
ID
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
123
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
125
54
7
:3
9
For example, try to access a network resource. Or, use the IPConfig tool
to verify the configuration. To use the IPConfig tool to verify the TCP/IP
configuration on the computer that is experiencing the problem, click
Start, click Run, and then type cmd. Then, use one of the follow methods:
ss
oc
ia
te
ID
Type ipconfig, and then press ENTER to view the basic network
configuration.
Type ipconfig /all, and then press ENTER to view a detailed configuration
report for all interfaces. This report includes any remote access adapters.
Confidential
}
}
ss
oc
ia
te
ID
:3
9
54
7
If the local IP address is returned as 0.0.0.0, the DHCP Media Sensing feature
override is turned on. The feature override is turned on because the network
adapter detected the lack of connection to a network or because TCP/IP detected an
IP address that duplicates a manually configured IP address.
Confidential
127
ss
oc
ia
te
ID
:3
9
54
7
Static on the line, occasional severe disruption while you are using the
phone line, or transmission of portions of someone else's phone
conversation may point to this issue. To resolve this behavior, call your
local telephone company to have them check the phone lines.
NOTE: Most telephone companies charge for services they perform inside a
home, but not for work on connections outside the home. Ask the
telephone company for information about service charges.
You can investigate possible ISP changes by finding out whether your ISP is
now part of another company or is reporting slow connections because of
network issues. To resolve such issues, you may need to switch to a more
reliable ISP.
2007, Cognizant Technology Solutions
Confidential
54
7
Inability to connect through your phone line at any rate faster than 28.8 kilobits per
second (Kbps) may suggest this cause. To resolve this issue, call the telephone
company to find out about connection speeds in your area and how you can improve
them.
Environmental Interference:
ss
oc
ia
te
ID
:3
9
Frequent disconnections characterize this issue. To resolve this behavior, start your
computer in Safe mode and check for multiple modem drivers in the modem, sound,
video, and game controllers. Verify that the modem driver is correct. If it is not,
remove the current modem driver and install the correct one.
Modem sounds that come through other devices, coinciding with a slowdown of the
connection, may point to environmental interference. For example, modem sound
may come through computer speakers, and interference may come from some other
electronic item in the room. To resolve this behavior, separate the telephone lines
from other wires. Also, try testing the computer's ability to connect in a different
room, using a different telephone jack.
Confidential
54
7
The computer may slow down while you are running programs in the
background. To resolve this behavior, use the Msconfig utility to disable the
programs in the Startup folder. Restart the computer, and then test the
connection.
ss
oc
ia
te
ID
:3
9
Slow speeds can occur during peak hours for Internet use. If the ISP is
putting many connections into a small combined connection, normal
customer demand can overload the capacity of the combined connection.
To resolve this behavior, you may need to switch to a more reliable ISP.
Confidential
130
ss
oc
ia
te
ID
:3
9
54
7
Confidential
ss
oc
ia
te
ID
:3
9
54
7
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\P
arameters\
and
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP\
Parameters\
Command Usage: netsh int ip reset [ log_file_name]
To successfully execute the command, you must specify a log file name
where actions taken by netsh will be recorded. For example, typing
either of the examples that are listed in the "Command Samples" section
later in this article at a command prompt would reset the TCP/IP stack
on a system and record the actions that were taken in the log file,
Resetlog.txt. The first sample creates the log file in the current directory,
while the second sample demonstrates the use of a path where the log
will be created. In either case, where the specified log file already exists,
the new log will be appended to the end of the existing file.
2007, Cognizant Technology Solutions
Confidential
132
Windows XP?
To set up a connection to a VPN, follow these steps:
ss
oc
ia
te
ID
:3
9
54
7
1. On the computer that is running Windows XP, confirm that the connection to the
Internet is correctly configured.
2. Click Start, and then click Control Panel.
3. In Control Panel, doubleclick Network Connections.
4. Click Create a new connection.
5. In the Network Connection Wizard, click Next.
6. Click Connect to the network at my workplace, and then click Next.
7. Click Virtual Private Network connection, and then click Next.
8. If you are prompted to, do one of the following:
}
If you use a dialup connection to connect to the Internet, click Automatically dial this
initial connection, and then click your dialup Internet connection from the list.
If you use a fulltime connection such as a cable modem, click Do not dial the initial
connection.
Confidential
ss
oc
ia
te
ID
:3
9
54
7
9. Click Next.
10. Type the name of your company or type a descriptive name for the connection,
and then click Next.
11. Type the host name or the Internet Protocol (IP) address of the computer that you
want to connect to, and then click Next.
12. Click Anyone's use if you want the connection to be available to anyone who logs
on to the computer, or click My use only to make it available only when you log on
to the computer, and then click Next.
13. Click to select the Add a shortcut to this connection to my desktop check box if
you want to create a shortcut on the desktop, and then click Finish.
14. If you are prompted to connect, click No.
15. In the Network Connections window, rightclick the new connection.
16. Click Properties, and then configure more options for the connection:
}
If you are connecting to a domain, click the Options tab, and then click to select the
Include Windows logon domain check box to specify whether to request Windows logon
domain information before you try to connect.
If you want the computer to redial the connection if the line is dropped, click the Options
tab, and then click to select the Redial if line is dropped check box.
2007, Cognizant Technology Solutions
Confidential
134
Click Start, point to Connect To, and then click the new connection.
If you added a connection shortcut to the desktop, doubleclick the shortcut on the
desktop.
ss
oc
ia
te
ID
:3
9
54
7
2. If you are not currently connected to the Internet, Windows offers to connect to the
Internet.
3. After your computer connects to the Internet, the VPN server prompts you for your
user name and password. Type your user name and password, and then click
Connect. Your network resources should be available to you in just like they are
when you connect directly to the network.
4. To disconnect from the VPN, rightclick the icon for the connection, and then click
Disconnect.
Note: If you cannot connect to shared resources on the remote network by
computer, you can use the remote computer's IP address to connect by using UNC
(\\<IP_Address>\Share_name). Edit the hosts file in the
Windows\System32\Drivers\ folder, and add an entry to map the remote server's
name to its IP address. Then use the computer name in a UNC connection
(\\Server_name\Share_name).
2007, Cognizant Technology Solutions
Confidential
ss
oc
ia
te
ID
:3
9
54
7
Confidential
136
54
7
ss
oc
ia
te
ID
Application services
:3
9
File services
Database services
Confidential
54
7
:3
9
ss
oc
ia
te
ID
Confidential
54
7
:3
9
ss
oc
ia
te
ID
Confidential
:3
9
54
7
ss
oc
ia
te
ID
Confidential
54
7
ss
oc
ia
te
ID
:3
9
Confidential
54
7
URL:
:3
9
ss
oc
ia
te
ID
www.readingcollege.ac.uk/netgcrs/ courses/NTwkingTech/CSERV/01.htm
www.elearners.com/course/35259.htm
www.cisco.com
www.ciscopress.com
Disclaimer: Parts of the content of this course is based on the materials available from the Web sites and books
listed above. The materials that can be accessed from linked sites are not maintained by Cognizant Academy and
we are not responsible for the contents thereof. All trademarks, service marks, and trade names in this course are
the marks of the respective owner(s).
2007, Cognizant Technology Solutions
Confidential
142
ss
oc
ia
te
ID
:3
9
54
7