CCNA Study Guide online cisco ccna training guide – collection of high quality CCNA tutorials.
These tutorials are prepared with single slogan; “provide best online CCNA training absolutely free”. This comprehensive collection of CCNA Study material is exactly; what you need to prepare for following exams CCNA Routing and Switching; Cisco Certified Entry Networking Technician (CCENT), Interconnecting Cisco Networking Devices – part 1 (ICND-1); Interconnecting Cisco Networking Devices – part 2 (ICND-2). CCNA certificate is a goal in your career journey. So to get this goal we arranged this exclusive CCNA training program in such a way that you get advantage from these CCNA tutorials in exam and after getting certificate in your job life.
Network Growth is a natural process, like other businesses; it must grow with time. Many larger companies start as small companies. The world-leading Microsoft company began with two people. A strategic plan will help you develop your company. Ideally, the network administrator has much time to make intelligent decisions about network growth in sequence with the company’s development. The following elements are essential for deciding when scaling a small network into an extensive one.
Network documentation – diagram of the physical and logical topology
Device inventory – The list of devices included in the network
Budget – itemized IT budget, including fiscal year equipment purchasing budget
Traffic analysis – protocols, applications, services, and their respective traffic requirements, e.g. bandwidth and disk/storage capacity, should be documented and planned.
Network segmentation requirements. Based on performance, Security, Management, and availability requirements.
Protocol Analysis
When network growth is in progress, it is important to understand the type of traffic that will be crossing the network, including current traffic flow. If the types of traffic are not known, a protocol analyzer can help recognize the traffic and its source.
During peak hours, try to capture the network traffic to determine the traffic types. Also, perform capture on different network segments to better understand. The figure below illustrates the network analyzer for different segments.
The protocol analyzer analyses the bases of its source and destination and the type of traffic sent to the destination. The analysis can be used to decide how to manage the traffic efficiently when relocating a server.
Employee Network Utilization
During Network Growth, a network administrator must understand how network usage will change. In addition to understanding changing traffic trends, a network administrator must know how network use changes.
The small network administrator can get “snapshots” of employee applications used for an essential part of the employee workforce occasionally. These snapshots may contain information about:
Without applications, the network is not very useful. Applications are software programs that communicate over the network or processes that give access to the network. There are two types of applications: network applications and application layer services.
Network Applications
Network applications are used to communicate over the network. Some end-user applications apply application layer protocols and are able to communicate directly with the lower layers of the protocol stack. For example, Email clients are a network application.
Application Layer Services
Network print spooling and file transfer over the network are requisite application layer services for using network resources. These services are the software programs that interface with the network and organize the data for transfer. Several types of data, e.g. text, graphics, audio, and video, are wanted different network services to ensure that the data is ready for processing.
Each application or network service uses protocols which describe the standards and formats for data. There is no way to format data without standard network protocols. Before understanding the role of network services, understanding protocols is very important. In the Windows operating system, we can view the current application, services, and running process, as shown in the above figure. The following are the standard protocols used in networking:-
DNS
DNS was created to change the numeric address into a simple, recognizable name. The DNS is short for Domain Name System (Service or Server).
Telnet
Telnet is a service that allows network administrators to log in to a host remotely and control it just like they are working locally.
Email Server
SMTP, POP3, or IMAP send email messages from clients to servers over the Internet.
DHCP Server
DHCP is the service that automatically assigns the IP address, subnet mask, default gateway, and other information to clients.
Web Server
Web servers transfer information and data between web clients and web servers. The majority of websites are accessed through HTTP (Hypertext Transfer Protocol)
FTP Server
The FTP service allows the download and upload of files between a client and a server.
Voice and Video Applications
Streaming media is very important for businesses to communicate with customers and business partners. The network administrators must care about the equipment configuration and installation and ensure it meets the requirements of real-time applications. The administrator also determines whether the present switches and cabling can support the traffic that will be added shortly.
VoIP
VOIP stands for Voice Over Internet Protocol. In standard terms, VOIP is a call service over the Internet. VOIP requires a quality Internet connection to get phone service through an Internet connection instead of the local phone company. We can also use VoIP with traditional phone service because VOIP service providers typically offer lower call rates than traditional phone services.
We can also use a traditional phone set using ATA (analogue telephone adapter), which converts the analogue signal into digital IP packets and vice versa. The administrator can attach the device between a traditional analogue phone and the Ethernet switch. VoIP is too much less expensive than an integrated IP telephony solution, but the quality does not meet the same standards.
IP Telephony
In IP telephony, the ATA adapter is no longer required because the IP phone itself performs the voice-to-IP conversion. IP phones also use a separate server for call control and signalling.
Real-time Applications
A real-time application is a software program that works within a time frame the user senses as current. This software uses the Real-Time Transport Protocol (RTP) and Real-Time Transport Control Protocol (RTCP).
The QoS mechanism controls the latency of less than a defined value, usually measured in seconds. For example, video conferencing applications, online gaming, and video chatting are Real-time applications.
Redundancy is another important factor in the network design. It provides reliability in the network. In a business community, the breakdown of the network can be very costly. So, to maintain reliability in a small network, the network design requires redundancy. It also helps to eliminate single points of network failure. There are several ways to achieve redundancy in a small network.
Network redundancy can be achieved by installing standby and alternate network devices, e.g. routers and switches. However, it can also be achieved by installing duplicate network links for important areas within the network. In the case of a redundant network, when the primary path is not available, the redundant path can immediately start to ensure minimal downtime and continuity of network services.
The Small networks typically give a single route in the direction of the Internet using one or more default gateways. If the gateway fails, the whole network loses connectivity to the Internet. So, in this case, it may be suitable for a small business network to pay for a second service provider as a backup. The figure below illustrates a redundant network.
Traffic Management
Traffic management is another consideration for network administrators. There are different types of traffic management and their behaviour in the network design to consider. Real-time traffic management requires the configuration of routers and switches, such as voice and video, in a different way relative to other data traffic.
A good network design will also categorize traffic according to traffic priority; the table below shows the traffic categories. Finally, enhancing the staff’s efficiency and minimising network downtime is essential for a small network to minimize downtime. The table below illustrates the priorities for different types of network traffic.
IP address planning is essential for implementing a small network. All hosts within the small network should have a unique address, so we required IP address planning. The network administrator must plan and make the document the IP addressing scheme. The administrator should also maintain IP addresses based on the type of device to configure the addresses. The different types of devices that require IP addresses are:-
· Servers
· End devices
· Intermediary devices
· Hosts that are accessible from the Internet
The figure below illustrates the devices that need IP address planning to assign an IPv4 address.
Proper IP address planning and documentation are necessary for helping the network administrator to track device types and troubleshoot. Usually, the network administrator knows the ranges of IP addresses assigned to devices.
For example, if all hosts are assigned an IP address ranging from 100 to 200 and the servers are assigned an IP address between the range of 220 – to 250, it is easy to find the traffic by IP address, and it is beneficial when troubleshooting the network traffic issues using a protocol analyzer. Suppose the IP address scheme is properly documented. Then the network administrator can easily control access to the available resources on the network.
The IP addressing scheme is necessary for hosts that provide resources to internal and external networks, such as e-commerce servers. Without proper planning, security and accessibility are not possible. If a host has a random address assigned from the address range, blocking access to this host is difficult. Different device types should assign their own logical block of addresses within the network’s address range.
When you are a network administrator and want to set up a small network, if you only have a few computers, you may assign your network private IP addresses from the 192.168.0.0 to 192.168.255.255 range. There are enough addresses available for a small network. If your laptop needs internet access, you may need a public IP address, which you must buy from ISPs.
Small network topologies and techniques are too important for network professionals because the majority of businesses require a small network. The small network’s design is generally very simple. Generally, network topologies contain a single router and one or more switches.
The small networks may have access points (possibly built into the router) and IP phones. As for the internet requirement, the small networks usually use only a single WAN connection provided by internet service providers. The internet connection may be in DSL, cable, or Ethernet. The figure below displays the typical small network.
The small network also requires the same skills as managing a larger network. The main work in the small network is maintenance and troubleshooting after the one-time installation of equipment. Securing devices and information on the network is important for the network administrator.
Device Selection for a Small Network
These networks also require planning and design according to the user’s needs. Network planning ensures the user’s requirements, the network’s cost, and implementation options. For a small network implementation, the type of intermediate devices is very important for the design. For the selection of intermediate devices, some important factors require measurement.
Type of Intermediate Devices
For implementing a small network, the first design consideration is the type of intermediate devices that must be used in the network. While selecting intermediate devices, some factors need to be measured.
Cost
The capacity and features of the intermediate devices decide their price. The capacity of the intermediate device is based on the number and types of ports available. The network management capabilities, embedded security technologies, and advanced switching technologies also affect the cost of the devices. The cost of cable that connects all network devices is also considered. Redundancy is another reason that affects the cost of the network.
Ports/Interfaces Speed and Types
The interface and port choice on intermediate devices router or switch) is an important decision. Some computers have built-in 1 Gb/s NICs. 10 Gb/s ports are also available on newer computers, workstations, and servers. It is too expensive to accommodate increased speed on Layer 2 devices that allow the network to evolve without replacing central devices.
Expandability
Both fixed and modular types of network devices are available. Fixed devices have a fixed number and type of ports or interfaces available, which cannot be changed, while modular devices have expansion slots that give the flexibility to add new modules per requirements. Switches are also available with extra ports for high-speed links.
Operating System Features and Services
The operating system feature usually depends on the version of the operating system. A network device usually supports features and services, such as:
In the network, devices are labelled with numeric numbers called IP addresses to send and receive data over networks. Domain Name Service (DNS) was created to change the numeric address into a simple, recognizable name. DNS is short for Domain Name System (Service or Server). It is an extensive database that resides on various computers. It contains the names and IP addresses of different Internet hosts and domains. It is the Internet’s equivalent of a phone book.
The domain name system is an essential service because domain names are easy for people to remember and access on computers, servers, and websites based on IP addresses. A domain name, such as https://networkustad.com, is much easier for humans to remember that its IP address is 64.91.237.241. If the IP address of https://networkustad.com changes, it is transparent to the user because the domain name remains the same. The new address will be linked to the existing domain name.
The domain name system defines an automatic service that matches resource names with the required numeric IP address, including query format, responses, and data. The domain name system protocol uses a single format called a message for all types of client queries and server responses, error messages, and the transfer of resource record information bet]. Ween servers.
The domain name system is its complete network. If one domain name server doesn’t know how to translate a particular domain name, it asks for another domain name system, and so on, until the correct IP address is returned. The Figure below illustrates the steps involved in the domain name system resolution.
DNS Message Format
The domain name server has two types of messages: query and response. The query message has a header and question records, and the response message has a header, question records, answer records, authoritative records, and additional records. The domain name server stores names, addresses and other records to resolve the names. Some types of records are the following:
A – The IPv4 address of An end device
AAA – The IPv6 address record of an end devices
NS – An authoritative name server
PTR – Record has the name of a node in the DNS namespace.
SRC – Record has information about a server
TXT – Record contains arbitrary text
MX – A mail exchange record
Whenever a host sends a query for name resolution, the domain name system process first checks its own stored records to resolve the name. If the record is not found in its own stored records, it forwards the query to other servers to resolve the name. Once a name is resolved and returned to the requesting server, the server stores the IP address for the time being in the event that the same name is requested again. The figure above illustrates that process.
The DNS Client service on Windows PCs also stores names in memory after they have been resolved. The ipconfig /displaydns command displays all later resolved entries that are cached in memory. The domain name system uses the message format below for all types of client queries and responses, error messages, and resource record sharing between DNS servers.
The domain name system has two types of messages: query and response. Both have the same format. The query message consists of a header and the question records, and the response message contains a header, question records, answer records, authoritative records, and additional records, as shown in the figure.
Header
The header is an essential element for any message because the header contains necessary control fields. In DNS messages, the header section carries several key control flags and is also where we find out which additional sections are even being used in the message. The header also states whether the message is a query or a response. The header for query and response are the same as shown in the figure. The length of the header is 12 bytes.
Questions
The question section has fields describing a question to a name server, which may be a query or response. If the message has a query, then this section contains the question expressing the query. If the message is a response, this section has the question sent in the query to which this is the response.
Answers
The answer section has resource records that answer the question. If the message has a non-error response, this section has the resource record(s) that match the query to which this is the response.
Authority
The authority section has one or more resource records that point toward an authoritative name server. If the message is an error response, this section may contain resource record(s) identifying DNS servers, which can be queried instead.
Additional
The additional records section has Resource records that relate to the query but are not strictly answers for the question. If the message is a non-error response, then this section may contain resource records that do not match the query but are related to it.
Fully Qualified Domain Name (FQDN)
To understand the DNS hierarchy, knowing about a Fully Qualified Domain Name (FQDN) is essential. A fully qualified domain name (FQDN) consists of the hostname and domain name. The hostname is not case-sensitive and can also contain alphabetic and numeric letters.
An FQDN is the domain name that specifies its exact site in the DNS hierarchy. It specifies all domain levels, including root and top-level domains. The example of FQDN is “mail.fschub.com” where “mail” is the hostname and the “fschub.com” is the domain name.
DNS Hierarchy
The DNS uses a hierarchical system database for resolving name addresses. DNS uses domain names to form the hierarchy. The DNS hierarchy is comprised of the following five elements:
1) Root Level
2) Top-Level Domains
3) Second-Level Domains
4) Sub-Domain
5) Host
Root Level
The DNS root zone is the uppermost level in the DNS hierarchy tree. The root name server is the server for the root zone. These servers contain information that makes up the root zone, the global list of top-level domains. The root name servers are critical as they are the first step in resolving a domain name. The root name server is the authoritative server that serves the DNS root zone. These servers contain the global list of the top-level domains. 12 different organizations operate the root servers:
University of Maryland
VeriSign Global Registry Services
Cogent Communications
University of Southern California, Information Sciences Institute
Internet Systems Consortium, Inc.
NASA Ames Research Center
VeriSign Global Registry Services
US Army Research Lab
US DoD Network Information Center
Netnod
WIDE Project
RIPE NCC
ICANN
Top Level Domains (TLDs)
TLDs are the next level in the DNS hierarchy. Many TLDs serve at the moment. As we have seen, the TLDs are classified into two subcategories. The different top-level domains represent either the type of organization or the country of origin. Examples of top-level domains are:
.com – A business or industry
.org – A non-profit organization
.edu – Educational Institutions
.gov – Government Intuitions
.mil – Military Groups
.net – Major network Support Centers
.org – Nonprofit Organizations and others
.int – International Organization
.au – Australia
.pk – Pakistan
.us – United States
Second-Level Domains
Second-level Domains come after TLDs in the DNS hierarchy. These domains are directly below the TLDs. The second-level domain is an important part of the DNS. There are no limits to the second-level domain like the TLDs. If the domain is available, anyone can buy it.
Sub-domain
The subdomain is the last level in the DNS servers. It is part of the main domain. The only domain that is not only a subdomain is the root domain. For example, alfa.example.com and bravo.example.com are subdomains of the example.com domain, which in turn is a subdomain of the com top-level domain (TLD).
This is the DNS hierarchy and elements of the DNS hierarchy. The DNS hierarchy is just like an inverted tree. The figure below illustrates the hierarchy of DNS.
The nslookup Command
The domain name server addresses are essential for network device configuration. Generally, the ISPs provide the IP addresses for the DNS servers. The host usually requests to connect to a remote device by name; the requesting client queries the name server to resolve the name to the IP address.
Operating systems also have a utility called nslookup that allows users to manually query the name servers to resolve a given hostname. nslookup can also be used to troubleshoot name resolution issues and verify the current status of the name servers.
Dynamic Host Configuration Protocol (DHCP) is a protocol that provides fast, automatic, and central management for allotting IP addresses within a network. The Protocol automates the assigned IP addresses, subnet masks, gateways, and other networking parameters. This is dynamic or automatic IP addressing. The alternative to dynamic addressing is static addressing. In static addressing, the network administrator manually assigns and configures IP addresses on hosts.
When a client requests an IP address from a Dynamic Host Configuration Protocol server, the server chooses an address from a configured range of addresses called a pool and assigns it to the client device on a lease basis.
Dynamic Host Configuration Protocol is an ideal and efficient system on a more extensive network to configure IP address settings where the client’s changes occur frequently. A New User may arrive and want a connection, and someone may want to leave the network. Static IP address configuration is too complicated in such a more extensive network.
Clients get IP addresses automatically from the DHCP server on a leased basis. If the client is connected to the network and the lease period has expired, the dynamic host configuration protocol automatically renews the lease period. If the client powers down his device or unplugs the network cable, the address is free for the pool to reuse.
DHCP Servers
We can use a variety of devices as DHCP servers. The Dynamic Host Configuration Protocol server in most networks is generally a local and dedicated PC-based server. The home user’s DHCP server is usually a local router that connects the home network to the ISP. Several networks use both static and DHCP address settings.
The network administrator uses static addressing for network devices, and DHCP is for general purposes. The figure below illustrates the types of Dynamic Host Configuration Protocol servers that can be used.
Types of Dynamic Host Configuration Protocol
Two types of Dynamic Host Configuration Protocols, DHCPv4 and DHCPv6, give similar services to their clients. The main difference between DHCPv4 and DHCPv6 is the gateway. DHCPv6 does not give a default gateway address. The gateway can only be obtained automatically from the router’s Router Advertisement message.
When a device configured for DHCPv4 boots up or connects to the network, the DHCP client sends a DHCP discover message to discover any available Dynamic Host Configuration Protocol server.
When the Dynamic Host Configuration Protocol server receives (DHCPDISCOVER) message, it replies with a DHCPOFFER message. The offer message has the IPv4 address, including a subnet mask, the IPv4 address of the DNS server, and the IPv4 address of the default gateway. The offer also includes the duration of the lease period.
Multiple DHCP servers
The client may receive various SCOFFERS messages if multiple DHCP servers exist on the network. So, the client should choose between them and send a DHCPREQUEST message. The DHCPREQUEST message identifies the exact server and lease offer the client accepts. A client can also request an address previously allocated to the client.
The server should allow the previously used IP address on a priority basis. Once the DHCP server has made an offer for the chosen IP address, the device responds to the DHCP server with a DHCPREQUEST packet to accept the offered IP address. Then, the server replies with an ack message to confirm the specific IP address for this device and define the lease time. If the server decides the device cannot have the IP address, it will send a NACK.
For example, if the client requests the IPv4 address or the server offers an address that is still available, the server returns a DHCPACK (DHCP Acknowledge) message. The message acknowledges to the client that the lease has been finalized. The server responds with a DHCP negative acknowledgement (DHCPNAK) message if the offer is no longer valid.
If the client received a DHCPNAK message, then the selection process should start again with a new DHCPDISCOVER message from the client. The client’s lease should be renewed before the lease expires through another DHCPREQUEST message. The DHCP server is responsible for assigning a unique IP address to the host. DHCPv6 has a similar set of messages: SOLICIT, ADVERTISE, INFORMATION REQUEST, and REPLY.
File Transfer Protocol is another standard Internet protocol for transmitting files between computers over TCP/IP connections. It is an application layer protocol. It was first created in 1971 to transfer data between a client and a server. To use this protocol, a computer’s FTP client application is required to send and receive data from a server running an FTP daemon (FTPd). The File Transfer Protocol (FTP) is client-server protocols that work on two channels between client and server:
· Command channel for controlling the conversation between host and server
· Data channel for transmitting and receiving files between client and server
Clients initiate a connection to the servers to manage traffic using port 21, consisting of client commands and server replies. After the client commands and the server replies, the client establishes the second connection to the server to transfer actual data using TCP port 20. The connection to port 20 is established every time there is data to be transferred. The figure below illustrates the File Transfer Protocol (FTP) connection.
Depending on user rights, the FTP client can download, upload, delete, rename, move, and copy data on a server. A user typically needs to log on to the FTP server, such as https://www.goanywhere.com/solutions/secure-ftp, while some servers use anonymous users for some or all of their content available without login.
The File Transfer Protocol sessions work in two modes: passive and active. In active mode, when a client opens a session via a command channel request, the server then opens a data connection back to the client and starts transferring data.
In passive mode, the server, as an alternative, uses the command channel to send the client the information required to open a data channel. Because the client has initiated all connections in the passive mode, it works better across firewalls and NAT. The FTP client can work via a simple command-line interface with a graphical user interface (GUI), and the Web browsers can also serve as FTP clients.
The Server Message Block (SMB) is a network protocol that allows the host to share data within the same network. It shares directories, files, printers, and serial ports as quickly as on the local computer. It is a request-response protocol that uses TCP port 445 for communication. All the messages of the Server Message Block protocol have a standard format: a fixed-sized header with a variable size parameter and a data component.
The Server Message Block protocol suite is comparatively easy. It includes commands for resource operation that you might do on a local disk or printer, such as:
Creating new files and directories
Deleting files and directories
Opening and closing files
Searching for files and directories
Reading, writing, and editing files
Queuing and de-queuing files in a print spool
The Server Message Block servers make the file systems and resources available to the clients in the network. The clients make SMB requests for the available resources on the server using the commands, and the servers create Server Message Block response messages. The following are the SMB message types:-
· Initiate, authenticate, and terminate the sessions
· Control access to file and printer
· Allow to send and receive messages using the application
File sharing and printer sharing are both primary services of Microsoft networking. With the release of Windows 2000, Microsoft changed the original structure for using SMB. Before Windows 2000, the Server Message Block services used a non-TCP/IP protocol to execute name resolution, but after Windows 2000, all Microsoft products use DNS naming, which allows TCP/IP protocols to support SMB resource sharing. The figure below illustrates the establishment of the SMB protocol connection.
Using the Server Message Block, once the connection is established, the client user can reach the resources on the remote end as if the resource were local to the client host.
Although the Server Message Block protocol was initially created for Windows, it can now also be used by Linux, Unix, and Mac OSX, using software called Samba. Samba, Linux, Mac, Windows, and Unix computers can share duplicate files, folders, and printers.
What does SMB stand for in business? SMB, or Server Message Block, is a network protocol used in business settings to share files, printers, and other resources in a networked setting.
Email is one of the primary services running on the Internet. So, what application, protocol and services are required for email? The email server stores email messages in a database. Email uses the store-and-forward method for sending and storing messages.
Email clients communicate with the servers running mail services to send and receive an email. The client-connected server communicates with other mail servers to transport messages from one domain to another. The client does not communicate directly with another email client when sending an email. But, both mail clients rely on the mail server to transport messages.
The Email process uses three types of protocols: Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), and Internet Messaging Access Protocol (IMAP). The application layer process that sends mail uses SMTP, but a client retrieves email using POP or IMAP.
Simple Mail Transfer Protocol (SMTP) Operation
The SMTP message formats required a message body with the message header. The body of the message can hold any amount of text; the message header must have a properly formatted recipient email address and a sender address.
When a client sends an email message, the client SMTP process connects with a server SMTP process on port 25. When the client and server set up a connection, then the client tries to send the email message to the server. After the server receives the email message, it either places the message in a local account in case of the local recipient or forwards the message to another mail server for delivery.
If the destination email server is busy or not online, then the SMTP spool message will be sent later. The server periodically checks for the queue and attempts to send messages again. When the message expiration time is over and it is still in the queue, the message is returned to the sender as an undeliverable message.
The figure above illustrates the technique of message sending. The client sends an email message to admin@fschub.com. The SMTP / POP server-1 will receive the message. Server-1 will check the recipient’s list of local recipients. If found, the message will be placed on the local account. If not found, the message will be forwarded to SMTP / POP server-2.
Post Office Protocol (POP) Operation
The POP server passively listens on TCP port 110 for client connection requests. When a client needs to use the POP service, it sends a request to start a TCP connection with the server. On establishing a connection, the POP server sends a welcome to the client.
When the client and POP server set up a connection, both exchange commands and responses until the connection terminates. With POP, when clients download email messages, the server removes these messages.
The POP server has a temporary holding area for mail until it is downloaded to the clients. Because there is no central place for email message storage, it is not an attractive choice for a small business that needs centralized storage for backup.
Internet Messaging Access Protocol (IMAP) Operation
The Internet Message Access Protocol (commonly known as IMAP) is another protocol that describes a technique for retrieving email messages from a remote mail server. An IMAP server usually listens on port 143, and IMAP over SSL is assigned port number 993. Unlike POP, when the user connects to an IMAP server, mail copies are downloaded to the client application.
The original messages are reserved on the server until the user explicitly deletes them. Users view copies of the messages in their email client software.
The server stores Incoming email messages in the recipient’s email box. The user retrieves the messages with an email client that uses one of several email retrieval protocols. Most clients support the standard protocols, such as SMTP for sending an e-mail message and POP and IMAP for retrieving email.
The IMAP client can make a file hierarchy on the server to organize and store emails. When a user wants to delete a message, the server synchronizes that command and deletes the message from the mail server.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.