...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................
Words: 1948 - Pages: 8
...June 2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is...
Words: 4335 - Pages: 18
...VOIP NETWORK SERVICE IMPLEMENTATION TABLE OF CONTENTS - Executive Summary------------------------------------------------------------------------ 1 - Introduction--------------------------------------------------------------------------------- 2 - What is Voip-------------------------------------------------------------------------------- 3 - How Voip Works-------------------------------------------------------------------------- 4 - Advantages and Requirements for Voip------------------------------------------------ 6 - Disadvantages of Voip-------------------------------------------------------------------- 7 - Voice Over IP Solutions------------------------------------------------------------------10 - Conclusion----------------------------------------------------------------------------------12 - References----------------------------------------------------------------------------------13 EXECUTIVE SUMMARY The term “Voice over Internet Protocol” (VoIP) describes the transport of voice over IP based networks; it is a generic term that covers deployments ranging in complexity from hobbyists using the internet to get free phone calls on a peer to peer basis, to full scale PSTN replacement networks. In carrier networks VoIP has been mainly deployed in enterprise networks or as a trunking technology to reduce transport costs in voice ...
Words: 2981 - Pages: 12
...planning or designing a computer network. Such factors include meeting the needs of the business, traffic and bandwidth requirements, budget considerations, scalability, etc. "Scalability refers to the extent of network growth that should be supported. For corporate network, scalability is a major consideration. Provision must be made to add users, applications, additional sites, and external network connections" (TutorialsWeb). It is important to have a system or methodology to follow to ensure you account for the necessary and critical aspects of the design process that will provide the best possible network solution for your company. The first step is considering the needs of the business. This is accomplished by understanding what the company does, how they currently function and operate to generate revenue, as well as having a good understanding of the company's business model. Once you have a good understanding of the company's business requirements, you can then determine specific design requirements. The second step then is defining the technical requirements of the network based on the information gathered from assessing the needs of the business. In this step of the planning process, technical considerations such as performance requirements, availability, scalability, standards compatibility, and rapid deployment are evaluated (Hummel). Only when these first two steps are followed in this order will you succeed in designing a network that best suits the customer and...
Words: 669 - Pages: 3
...Coursework Assignment Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is located on a single campus called Campus A. Students and staff use the network services from hosts on various different user networks, as shown in Figure 1 . Due to an increasing number of security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to propose security enhancements, and produce a report. The aim of the exercise is to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design should tackle the following components: Provide best practice network egress and ingress filtering at the network perimeter. Create a perimeter firewall, with an appropriate topology to provide the organisations services, including public web, and mail servers. The firewall should have a closed security stance, and provide public services in a secure way. Provide secure access to all devices, from the security management subnet. Additionally, research should be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against these using network defenses. This part of the coursework will be research only and be confined to a part of the Research Section. You will be required...
Words: 607 - Pages: 3
...for Change Synergetic Solutions Inc is a 6 million dollar systems integration company. They specialize in assembling and reselling leading computer brands. It has 300 employees mainly in sales and service. Most of them only poses basic computer assembly and troubleshooting skills with a few higher skilled individuals functioning as specialists. The forces catalysts for change at Synergetic were both internal and external. The stagnant systems integration market were a reason why CEO Harold Redd looked into the network solutions business of designing and implementing complex computing networks. He also landed an order worth 1.2 million dollars for designing a network. There are also 5 million dollars in future orders waiting. Due to this the network solutions business now accounts for 20% of the total revenues for the company. Internal Factors The CEO has made the decision to focus on the network solutions business and raise its revenues to 80% of total sales. He has set a target of 12 million dollars in sales in the end of the next nine months. He has set quarterly growth targets for revenue...
Words: 909 - Pages: 4
...Service Request SR-rm-022 Robert Vermette BSA/375-Fundementals of Business Systems Development January 19, 2013 Jeffery Comrie Analysis of the Riordan HR system My report will be regarding the main information collecting strategies that we will use for this project, depending on "Analyzing HR System.” A few main aspects will be recognized that is linked to the accomplishment of what is called the information collecting procedure. The scope and feasibility will be defined to assist us in accepting the significance of this project. This report will provide awareness for the project and may be able to recognize a range of options for the information to move forward Information Gathering procedures The data or information that is collected is an important step in any part of the plan. It ought to be conceded out in an organized way for procuring the targets of the development and accumulating the correct data. Data should be combined from options that express dependable data and provide the intention of the project. The collection of data collecting resources should be completed in compliance to the necessities of the development. For accumulating the data, two main options will be used, first and second options. Both of these will be supportive in collecting applicable and helpful information. “The first resource, questionnaire or meeting strategies can be used to collect information. Interviews can...
Words: 3563 - Pages: 15
...Due to the current nature of infrastructure within the various geographical locations and populations’ who are involved in conflict, the Department of Defense (DoD) has adapted, and began to implement policy that is intended to disrupt internal subversion. The objective is to combat enemy insurgents and their agenda, in order to develop a peaceful infrastructure. The theatre of conflict both on U.S., and foreign soil, (namely Iraq, and Afghanistan) consist of enemies who do not have the capabilities to engage our coalition forces through conventional warfare. Conventional warfare is: opposing forces who engage one another using conventional weapon systems and tactics, in order to degrade or destroy their opponents abilities to operate. Due to the superior capacity of coalition forces both economically, and tactically, the way in which the enemy operates in current theatre has deviated from conventional forms of fighting. Enemy Insurgents use unconventional warfare in their fighting tactics, and this irregular warfare involves many actors from civilian population to enemy combatants, and resources. Because of the fast changing wartime climate, the DoD has developed policy that was nonexistent a mere ten years ago. The DoD has developed the Counter Insurgency Initiatives in order to implement policy that gives guidance to actors involved in current theatre combat operations. Insurgency is the organized use of subversion and violence, to seize, nullify, or challenge political...
Words: 1381 - Pages: 6
...Operational Systems Analytical Systems Usage Definitely need to be used. Carry ‘bread and butter’ operations of the company Not mandatory to be used. Enable employees to do the job better Cost Fixed cost. Cost is justifiable. No ROI The ROI is zero if system is not used Requirements Requirements are well defined Very fuzzy requirements Importance Efficiency is the top most (measurable) Effectiveness is the top most (not measurable) Data type Internal, hard data(historical) External, soft data(future) Data quality Complete. Timely. 100% accurate For what decisions, the data is going to be used? Balance quality of data with cost. Satisficing data is enough. Design process Waterfall Spiral Implementation Full scale at first go-live Evolves due to changes in environment. Implementation will not be completed. User responsibility End users of an agreed system Analytical systems are owned and driven by users. Example Credit card Transaction processing system Succession Planning system 3. Why Analytical systems are a different breed 1. Analytical systems need not be mandatorily used. 2. They help the employees to do their job better. 3. The users should recognize that business cannot function as usual and they should have the desire and ability to change how they do their jobs. The usage of analytical systems depends on this. 4....
Words: 1703 - Pages: 7
...comes to technology it leads to the internet. Many people can communicate with other people in various places through the internet. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security. Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. It is widely know now that threats from inside the company is far more dangerous than attacks from outside. These facts shows that any company must plan an implement policies to defend their network security from inside and outside intruders. These companies must find how intruders attack in order to protect their information assets. This will help make their network security more effective in blocking threats either from outside or inside the company. Within my paper I will discuss that I am the Information Technology (IT) Director for a small, growing firm and my tasked would be to develop an electronic resource security policy to deploy within my organization. I will discuss the differences between the terms implementation and policy and describe the importance of their separation. Then develop an outline of a security policy which addresses areas that are identified as problems. Then, I will identify...
Words: 1183 - Pages: 5
...Practice Research Group, Discipline of Business Information Systems, Faculty of Economics and Business, The University of Sydney, Sydney, NSW 2006, Australia Available online 19 April 2007 Abstract The purpose of this paper is to theoretically and empirically explore how public e-procurement policies are translated into practice. The theoretical argument draws on actor network theory (ANT), coupled with Colebatch’s [Colebatch, H. K. (2002). Policy (2nd ed.). Maidenhead, Open University Press.] social construct of policy, to analyze the actors, actions, and circumstances through which understanding of public e-procurement comes to stabilize (or not) into a coherent policy for action. Drawing on three case studies of central government agencies in Italy, Scotland, and Western Australia, we suggest new intellectual perspectives and methodological heuristics that may assist researchers and practitioners analytical efforts in examining sociotechnical change and the implications for policy development and implementation. © 2007 Elsevier Inc. All rights reserved. Keywords: E-government; E-procurement; Actor network theory; Social construction of policy 1. Introduction Public e-procurement, as an information system (IS) enabled innovation in government, is transforming technological platforms and the way governments in Western countries procure goods and services and engage with suppliers (Lee, Tan & Trimi, 2005; Moe, 2004). ⁎ Corresponding author. E-mail addresses: c.hardy@econ.usyd...
Words: 12195 - Pages: 49
...Define user documentation Written or other visual information about an application system, how it works, and how to use it. (17) . User documentation refers to the documentation for a product or service provided to the end users. The user documentation is designed to assist end users to use the product or service. This is often referred to as user assistance. The user documentation is a part of the overall product delivered to the customer. The sections of a user manual often include: * A cover page * A title page and copyright page * A preface, containing details of related documents and information on how to navigate the user guide * A contents page * A guide on how to use at least the main functions of the system * A troubleshooting section detailing possible errors or problems that may occur, along with how to fix them * A FAQ (Frequently Asked Questions) * Where to find further help, and contact details * A glossary and, for larger documents, an index realized the importance of documentation many years ago when I joined an organization to head its IT function. The previous IT head had left the organization a couple of months ago. The managing director called me over and voiced his expectation. He told me that all ground work had been done for ordering new set of servers and application packages and that I should act upon it soon. I promised to take a look at the situation and revert with plans. However, when I sat in my department...
Words: 2026 - Pages: 9
...------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable use policy with the organization’s goals for compliance * Mitigate the common risks and threats caused by users within the User Domain with the implementation of an acceptable use policy (AUP) * Draft an acceptable use policy (AUP) in accordance with the policy framework definition incorporating a policy statement, standards, procedures, and guidelines Part 1 – Craft an Organization-Wide Security Management Policy for Acceptable Use Worksheet Overview In this hands-on lab, you are to create an organization-wide acceptable use policy (AUP) that follows a recent compliance law for a mock organization. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations thrrxampexoughout the region * Online banking and use of the Internet is a strength of your bank given limited human resources * The customer service department is the most critical business function/operation for the organization * The organization wants to...
Words: 639 - Pages: 3
...EHR/CPOE Implementation Executive Summary This thesis follows the implementation of Computerized Patient Order Entry/Electronic Health Record (CPOE/EHR) system implemented by Partners Healthcare System (PHS) during 2002-2003 for all its constituent practitioners. It looks at the problems faced during implementation of the system and identifies new potential problems that the system may encounter. Particularly in consideration is the effort it takes to convince healthcare professionals to switch to CPOE/EHR, the cost of installing the system, the potential of automating redundancies in the system and the potential of healthcare professionals getting skewed data out of the system suggestions. It looks at the management challenges faced by the administration when bringing about CPOE/EHR to PHS and divulges in some techniques that were used for tackling these issues. It defines ways in which the system is being used to improve patient healthcare and save millions of dollars for the government, healthcare facilities and patients alike. This thesis also finds ways to combat the potential problems that may arise later and the system and looks at related government policies and statutes which apply to the implementation. Finally some metrics of success are discussed their effectiveness in driving a result. Problem Definition CPOE/EHR Implementation can face a host of problems that can hinder the process flow and the acceptability of the system by the people involved. The initial...
Words: 7032 - Pages: 29
...PRIORITIES IN E-GOVERNANCE RESEARCH PAPER SUBMITTED BY Lokesh Sharma Ankita Prasad Contents Abstract 4 Introduction 4 Research Objective 8 Literature Review 9 Research Approach 10 Impact Assessment of various projects 11 Union Government MMPs 11 MCA21 11 Online Passport Services: 12 Online Income Tax 13 Pension 14 Banking 15 E-office 15 Central Excise 16 U.I.D 17 Insurance 17 State Government MMPs 18 Land Records 18 Road Transport 18 Agriculture 19 Police 19 Treasuries 19 Municipality 20 Commercial Taxes 21 Gram Panchayats 21 Employment Exchange 21 Integrated MMP 22 CSC 22 e-Courts 22 e-Trade 22 India Portal 23 National Service Delivery Gateway 23 e-Biz 23 e-Procurement 23 Prioritizing with respect to parameters 24 Conclusion 25 References 26 Abstract e-Governance is the form of interaction between government and citizens ,businesses and other arms of government using information technology .These technology can help government is fulfilling various needs like improved interaction between business and industries ,better delivery of services to citizens ,improved interactions with business and industry ,better...
Words: 6788 - Pages: 28