...5.3 Design Phase IP address? Software hardware use? Design phase is the most important and analytical phase. The network design is developed based on the technical and business requirements obtained from the planning phases. The network design specification is a comprehensive detailed design that meets current business and technical requirements. It provides high availability, reliability, security, scalability, and performance. The design includes physical, logical network diagrams and an equipment list. The project plan is updated with more specific and detailed information for implementation. 5.3.1 Network Topology Design After everything have been detailed in the plan phase, I proceed to design them according to the paperwork or project plan. During this stage, I have design the topology for the new office which meet the requirement and criteria stated. Both physical and logical diagram are being created in this phase. The application or software that I used to design the topology is Creately.com and Packet Tracer 7.0. Creately.com is an online application that provides user to draw UML diagram, flowchart, network diagram and many more. The reason that I used this online application is it is free and easy to use instead of I need to draw by myself for the physical topology. Figure 4 - Creately Homepage GUI Figure 5 - Cisco...
Words: 838 - Pages: 4
...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...
Words: 4941 - Pages: 20
...BUY THIS COURSE AT: http://myessaybank.com/essay_bag/view_paper/id/1890 | Management Effectiveness Using Technology Resources | Phase 1 - Task 1 | Task Type: | Discussion Board | Deliverable Length: | See assignment details | | | | | Primary Discussion Response is due by WednesdayYou have been called in by your boss. The company is considering buying another smaller firm; however, some business analysis is needed for your company management to make its final decision about purchasing. Your boss has asked you to look at the firm that he or she is considering to buy in terms of competitive advantage. You have been asked to explain to senior management how you would provide this information. You have been tasked with using Porter's five forces to make this determination. Discuss and defend to your management how utilizing Porter's five forces to analyze any organization or industry would provide an understanding of competitive advantage. | | Phase 1 - Task 2 | Task Type: | Individual Project | Deliverable Length: | See assignment details | The company that you are working for is considering buying another smaller firm. However, there is some business analysis needed for your company to make its final decision about purchasing. Throughout this course, you will be working on creating the Business Strategy and Management Plan.Keep in mind that the final Business Strategy and Management Plan template should contain the following...
Words: 3060 - Pages: 13
...Brittany Martin IT245-1303A-03 Introduction to Network Management Phase 3 DB 8-1-2013 This week in phase 3 we are on the subject of how OSI (Open Systems Interconnection) model and TCP/IP (Transmission Control Protocol/Internet Protocol) are similar and how they are different. There are 7 layers in the OSI model and there are only 4 layers in TCP/IP. The 7 layers in OSI are application, presentation, session, transport, network, data link, and physical with application being the highest and physical being the lowest of the model (Harney, n.d.). The 4 layers of TCP/IP are application, transport, internet, and subnet (Harney, n.d.). In the OSI model the application layer simply handles a lot of software protocols such as DNS, and HTTP. The presentation layer transfers data from one end to the other. The session layer handles connection between two devices. The transport layer makes sure information is formatted in the proper way. The network layer sends information over to the proper web address. The data link layer makes sure data is small enough to be sent across the network to arrive in the correct place. The physical layer deals with all hardware including NIC’s, hubs, and Ethernet cabling. The TCP/IP only has 4 layers because one or more layers of the OSI models is composed in the TCP/IP model (OSI Model vs. TCP/IP Model, n.d.). In the application layer it deals with the user and how data is handled with that user. The transport layer deals with communication...
Words: 400 - Pages: 2
...Unit 9 Assignment 2 Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1: Passive and Active Reconnaissance Passive reconnaissance: This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work. It can also be the result of researching the company through the internet via search engines. Active Reconnaissance: This is the process of actually scanning the network to find out IP address and services that the network provides. This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using. This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers. This can result in getting information such as the user accounts, IP addresses and computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access. There are several ways to do this such...
Words: 326 - Pages: 2
...Broadband 1) Definition The current available broadband solutions are cable, dialup(IDSN), satellite, ADSL(much like dialup) but higher rates 1500Kbps down and 256Kbps up,DSL(carries signal as digtal without have to convert it from analog and its faster) and wireless (Verizon ect) 2) Application I would use a wireless network that would allow everything to hook up to my network. 3) Troubleshooting I would start checking to see if it is network wide or certain sections of the network. If it is the entire network I would start looking towards my main switch and server but it was a certain section of the area of a network I would start at that switch and work my way back towards the server. Topic 4: TCP/IP 1) Definition 2) Application 3) Troubleshooting Check IP address, Subnet Mask, Default Gateway Topic 5: Client Server 1) Definition A domain is a is a form of a computer network in which all user accounts,...
Words: 992 - Pages: 4
...ASSIGNMENT-3 1) A path in a digital circuit-switched network has a data rate of I Mbps. The exchange of 1000 bits is required for the setup and teardown phases. The distance between two parties is 5000 km. Answer the following questions if the propagataion speed is 2 X 108 m: a. What is the total delay if 1000 bits of data are exchanged during the data transfer phase? b. What is the total delay if 100,000 bits of data are exchanged during the data transfer phase? c. What is the total delay if 1,000,000 bits of data are exchanged during the data transfer phase? d. Find the delay per 1000 bits of data for each of the above cases and compare them. What can you infer? Book Name: Data and Communication Networking...
Words: 990 - Pages: 4
...VPN Concepts A virtual private network (VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services: Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption. Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks. Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations...
Words: 6523 - Pages: 27
... TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol that...
Words: 2390 - Pages: 10
...Design of Five Phase Induction Motor Sanket M. Bhimgade#1 Swapnil C. Chaudhari#2 Roshan B. Durge#3 Vabeihrohnei Chozah#4 Parag P. Salunke#5 Department of Electrical Engineering Dr. Babasaheb Ambedkar Technological University, Lonere, Raigad (MS - 402 103) sanketbhimgade@gmail.com , 2swapnil.28492@gmail.com , 3roshan.durge16@gmail.com , 4pawhrohnei@gmail.com , 1 Abstract: The conversion of electrical energy into mechanical energy has been and continuous to be a dominant form of power transmission for industrial purposes. The alternating current (AC) electric induction motor has been an industry workhouse for electromechanical conversion for over 100 years. This paper introduces the fundamental electric and mechanical principles of 5 phase AC induction motor. In this paper, a generalized formula is proposed for the selection of number of slots required for 5-phase alternative current (AC) machine design and the criterion for selecting the starting points of each phases. Keywords: Induction motor. Five phase, Stator winding. current. The power per phase is P = VP IP cosϕ and the total power is the sum of the amount of power in each phase. If the currents are equal and the phase angles are the same as in Fig. 1, then the load on the system is balanced, the current in the neutral is zero and the total power is [1], =3 cos ∅ Or Or = √3 = 1.73 cos ∅ cos ∅ I. INTRODUCTION In general, the induction machines having three-phase windings are...
Words: 3545 - Pages: 15
...(CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM RAM circuitry sends a slightly different electrical input to the bits that need to store a 1 versus a 0 to control the capacitors . Essentially, RAM chooses one of two inputs to each bit, which results in either a full or partial charge in the capacitor, which in turn represents either a 1 or 0, respectively. Writing Individual Bits in Byte 4 of RAM 7 Figure 1-4 Converting Binary...
Words: 11596 - Pages: 47
... | | | | | Table of Contents Introduction 3 Problem Statement 4 Analysis 5 Recommended Solution and Implementation 9 References 12 Appendix A 14 Appendix B 15 Introduction Tridoc Medical Services is a medical office that was founded by three doctors. The office has six employees, besides the three doctors, working for it. There are three medical assistances and three employees who work the front desk. The office has decided to upgrade their current telephony system to a new VoIP system. The office does not have any equipment, wiring, or software for a VoIP network. To create the network, there will need to be network cabling installed throughout the office to each location where a phone is located. New IP phones will need to be installed where each network drop is placed. There will need to be a proxy server...
Words: 2642 - Pages: 11
...origin – 01 copy h) Certificate of Arrival Material issue by Project Director – 01 copy Thanking You. With best regards, BILL OF EXCHANGE NO.ARMA/BTCL/01/2009 TOTAL L/C VALUE BANGLADESH TAKA=2,48,60,000.00 CLAIM AMOUNT BANGLADESH TAKA=1,36,73,000.00 At sight of this first Bill of Exchange the same tenor and date being unpaid pay to: Exim Bank Ltd., Malibagh Branch, 484 D.I.T. Road, Malibagh, Dhaka-1217 or order of the sum of BDT.2,48,60,000.00 (Say in word Two Crore Forty Eight Lac Sixty Thousand) only. Account of : Supply, Transportation, Installation, Testing and Commissioning of 100 KVA, Single Phase 50Hz, 45a # 2A, Diesel Engine Generator sets. Drawn under: One Bank Ltd., Kawran Bazar Branch, HRC Bhaban, 46 Kawran Bazar C/A, Dhaka. L/C No.1882-09-99-0047 dated 28.04.2009 Contract No.DP/L-09/IP/07-08/Upa-zilla Growth Center Project/204 DATED 15.04.2009. To: One Bank Ltd., Kawran Bazar Branch, HRC Bhaban, 46 Kawran Bazar C/A, Dhaka. A/C: Bangladesh Telecommunications Company Limited (BTCL). BILL OF EXCHANGE NO.BE/ARMA/BTCL/01/2009 TOTAL L/C VALUE BANGLADESH TAKA=2,48,60,000.00 CLAIM...
Words: 1375 - Pages: 6
...| | A. The Nature of the Re-entry Project (ReP) | 3 | B. The Rationale behind the ReP Requirement | 3 | C. Characteristics of the ReP | 4 | II. Phases of Re-entry Project Execution | | Phase 1: Formulating the Proposal | 6 | Proposal Abstract | 6 | Chapter I: The Performance Gap | 7 | Chapter II: The Intervention | 8 | Endorsement of ReP Proposal by Institutional Partner | 9 | Phase 2: Designing the Plan | 10 | Chapter III: The Plan | 11 | Endorsement of ReP Plan by the Faculty Adviser | 11 | Powerpoint Presentation Version of Chapter III | 12 | Phase 3: Implementing the Plan | 12 | Progress Reports | 12 | Phase 4: Reporting the Results | 13 | Chapter IV: The Final Report | 14 | Endorsement of Report by the Faculty Adviser | 14 | Powerpoint Presentation Version of Chapter IV | 14 | Final ReP Document | 15 | III. Approval Procedure | | A. The ReP Proposal | 16 | B. The ReP Plan | 17 | C. The ReP Progress Reports | 19 | D. The ReP Final Report | 21 | IV. Terms of Reference for Panel Members | | A. Institutional Partner (IP) | 25 | B. Faculty Adviser (FA) | 26 | C. Program Representatives (PR) | 27 | | OUTLINE | | APPENDICES | Template of the Final ReP Document ...
Words: 6772 - Pages: 28
...available as a failover in case the main site goes down. There is also a need for the site to be redesigned to allow customers to order products online. The system development life cycle (SDLS) is involves seven phases or steps that are followed in developing an information system from conception up to disposition. The following is the seven-step phase of developing an information system by a software engineer: 1. Conceptual Planning 2. Planning and Requirements Definition 3. System design 4. Development and Testing 5. Implementation phase 6. Operations and Maintenance phase 7. Operations and Maintenance phase Conceptual Planning This is the first phase in the system development life cycle. In this phase the information system conceptual framework is constructed. This will include the evaluation and assessment of the system to be developed to determine the cost and risks associated with the system. The managers will also assess the benefits and the opportunities that will be associated with the system. In this first stage of the system development cycle, there will be also the division and designation of roles to be carried out by various agents in the development of an information system. Planning and Requirements Definition T his is the second phase in the system development...
Words: 3420 - Pages: 14