...5.3 Design Phase IP address? Software hardware use? Design phase is the most important and analytical phase. The network design is developed based on the technical and business requirements obtained from the planning phases. The network design specification is a comprehensive detailed design that meets current business and technical requirements. It provides high availability, reliability, security, scalability, and performance. The design includes physical, logical network diagrams and an equipment list. The project plan is updated with more specific and detailed information for implementation. 5.3.1 Network Topology Design After everything have been detailed in the plan phase, I proceed to design them according to the paperwork or project plan. During this stage, I have design the topology for the new office which meet the requirement and criteria stated. Both physical and logical diagram are being created in this phase. The application or software that I used to design the topology is Creately.com and Packet Tracer 7.0. Creately.com is an online application that provides user to draw UML diagram, flowchart, network diagram and many more. The reason that I used this online application is it is free and easy to use instead of I need to draw by myself for the physical topology. Figure 4 - Creately Homepage GUI Figure 5 - Cisco...
Words: 838 - Pages: 4
...BUY THIS COURSE AT: http://myessaybank.com/essay_bag/view_paper/id/1890 | Management Effectiveness Using Technology Resources | Phase 1 - Task 1 | Task Type: | Discussion Board | Deliverable Length: | See assignment details | | | | | Primary Discussion Response is due by WednesdayYou have been called in by your boss. The company is considering buying another smaller firm; however, some business analysis is needed for your company management to make its final decision about purchasing. Your boss has asked you to look at the firm that he or she is considering to buy in terms of competitive advantage. You have been asked to explain to senior management how you would provide this information. You have been tasked with using Porter's five forces to make this determination. Discuss and defend to your management how utilizing Porter's five forces to analyze any organization or industry would provide an understanding of competitive advantage. | | Phase 1 - Task 2 | Task Type: | Individual Project | Deliverable Length: | See assignment details | The company that you are working for is considering buying another smaller firm. However, there is some business analysis needed for your company to make its final decision about purchasing. Throughout this course, you will be working on creating the Business Strategy and Management Plan.Keep in mind that the final Business Strategy and Management Plan template should contain the following...
Words: 3060 - Pages: 13
...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...
Words: 4941 - Pages: 20
...Unit 9 Assignment 2 Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1: Passive and Active Reconnaissance Passive reconnaissance: This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work. It can also be the result of researching the company through the internet via search engines. Active Reconnaissance: This is the process of actually scanning the network to find out IP address and services that the network provides. This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using. This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers. This can result in getting information such as the user accounts, IP addresses and computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access. There are several ways to do this such...
Words: 326 - Pages: 2
...The current available broadband solutions are cable, dialup(IDSN), satellite, ADSL(much like dialup) but higher rates 1500Kbps down and 256Kbps up,DSL(carries signal as digtal without have to convert it from analog and its faster) and wireless (Verizon ect) 2) Application I would use a wireless network that would allow everything to hook up to my network. 3) Troubleshooting I would start checking to see if it is network wide or certain sections of the network. If it is the entire network I would start looking towards my main switch and server but it was a certain section of the area of a network I would start at that switch and work my way back towards the server. Topic 4: TCP/IP 1) Definition 2) Application 3) Troubleshooting Check IP address, Subnet Mask, Default Gateway Topic 5: Client Server 1) Definition A domain is a is a form of a computer network in which all user accounts,...
Words: 992 - Pages: 4
...Design of Five Phase Induction Motor Sanket M. Bhimgade#1 Swapnil C. Chaudhari#2 Roshan B. Durge#3 Vabeihrohnei Chozah#4 Parag P. Salunke#5 Department of Electrical Engineering Dr. Babasaheb Ambedkar Technological University, Lonere, Raigad (MS - 402 103) sanketbhimgade@gmail.com , 2swapnil.28492@gmail.com , 3roshan.durge16@gmail.com , 4pawhrohnei@gmail.com , 1 Abstract: The conversion of electrical energy into mechanical energy has been and continuous to be a dominant form of power transmission for industrial purposes. The alternating current (AC) electric induction motor has been an industry workhouse for electromechanical conversion for over 100 years. This paper introduces the fundamental electric and mechanical principles of 5 phase AC induction motor. In this paper, a generalized formula is proposed for the selection of number of slots required for 5-phase alternative current (AC) machine design and the criterion for selecting the starting points of each phases. Keywords: Induction motor. Five phase, Stator winding. current. The power per phase is P = VP IP cosϕ and the total power is the sum of the amount of power in each phase. If the currents are equal and the phase angles are the same as in Fig. 1, then the load on the system is balanced, the current in the neutral is zero and the total power is [1], =3 cos ∅ Or Or = √3 = 1.73 cos ∅ cos ∅ I. INTRODUCTION In general, the induction machines having three-phase windings are...
Words: 3545 - Pages: 15
...ASSIGNMENT-3 1) A path in a digital circuit-switched network has a data rate of I Mbps. The exchange of 1000 bits is required for the setup and teardown phases. The distance between two parties is 5000 km. Answer the following questions if the propagataion speed is 2 X 108 m: a. What is the total delay if 1000 bits of data are exchanged during the data transfer phase? b. What is the total delay if 100,000 bits of data are exchanged during the data transfer phase? c. What is the total delay if 1,000,000 bits of data are exchanged during the data transfer phase? d. Find the delay per 1000 bits of data for each of the above cases and compare them. What can you infer? Book Name: Data and Communication Networking...
Words: 990 - Pages: 4
...produce watts of power. With radio or sound waves there is amplitude the decibels (dB) of the wave, frequency (Hz) the number of waves per second, and the phase or direction in which the wave begins. As the radio or sound wave dB increases it causes a spike to indicate the value of 1 in this representation, a normal pulse of sound with no spike represents a 0 along the phase. Much like electricity, radio waves transmit the information in the form of pulses. In this case there is no voltage or amperes to produce watts of power. With radio or sound waves there is amplitude the decibels (dB) of the wave, frequency (Hz) the number of waves per second, and the phase or direction in which the wave begins. As the radio or sound wave dB increases it causes a spike to indicate the value of 1 in this representation, a normal pulse of sound with no spike represents a 0 along the phase. -5 volts -5 volts +5 volts +5 volts Electrical transmission of the letter “A” using the ASCII numbering for the letter A. In the electrical diagram a positive voltage resembles the number 1 and the negative side a 0. In this case the ASCII unit for the letter A would be 01000001. A copper wire transmits electricity in the form of voltage (electrical pressure) and Amperes (flow). Each pulse of voltage represents a 1, and a non-pulse, or absence, a 0 or -5 volt. Electrical transmission of the letter “A” using the ASCII numbering for the letter A. In the electrical diagram a positive voltage resembles the...
Words: 2069 - Pages: 9
...Lab 1 Assessment Worksheet Develop an Attack & Penetration Plan 1. List the 5 steps of the hacking process. * Reconnaissance * Scanning * Gaining Access * Maintaining Access * Covering Tracks 2. In order to exploit or attack the targeted systems, the first initial step I would do to collect as much information as possible about the targets prior to devising an attack and penetration test plan would be reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. The reconnaissance phase can have many different faces, and depending on the goal of the attacker, various tools and applications can be used. Nslookup can be used to look up all the available host on a network through the DNS server. You can get IP address information of hosts on your targeted network. You can also get the information of the purpose of the hosts. Whois lookup is a protocol that can be used to interrogate the servers operated by regional internet registries which holds information about every IP/Domain registered on the internet. You can get information about your target such as; the name of the owner, address of the owner. IP ranges that a certain IP belongs to, contact information like emails and phone numbers, administrators names and server names. You can also just use your targets web site. Sometimes the targets website can reveal way too much information without realizing it, and just by looking at the information they have...
Words: 1233 - Pages: 5
...data processing model to meet business operational requirements. The central computing environment has traditionally included an IBM mainframe and over 50 networked Hewlett-Packard and Sun servers [KRAN04, CLAR02, HIGG02]. The mainframe supports a wide range of applications, including Oracle financial database, e-mail, Microsoft Exchange, Web, PeopleSoft, and a data warehouse application. C8-1 In 2002, the IT division established six goals for assuring that IT services continued to meet the needs of a growing company with heavy reliance on data and applications: 1. Implement an enterprise data warehouse. 2. Build a global network. 3. Move to enterprise-wide architecture. 4. Establish six-sigma quality for Carlson clients. 5. Facilitate outsourcing and exchange. 6. Leverage existing technology and resources. The key to meeting these goals was to implement a storage area...
Words: 1575 - Pages: 7
...-9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization D & S Residential Services has been providing services for individuals with intellectual and developmental disabilities for more than 20 years and serve more than 1900 individuals in Tennessee, Texas, and...
Words: 4303 - Pages: 18
...[pic] Summer Practical Training At Reliance Communications, Navi Mumbai INTRODUCTION: MINS is an IP based solution that shall be designed to cater to a subscriber base of around 1000 subscribers. It shall support all the features and functionalities provided by the legacy switching systems. MINS was required as the rate of the “Qualcomm chipset “for the BSC (base station controller) was rising day by day. Qualcomm company is extracting 5$ per subscriber from any Indian company for using their chipset that why in MINS, BSC is constructed not using any hardware but by binding the system by some algorithms. It means that in MINS, software is prepared which can do the work of the hardware chip for BSC instead of using that Qualcomm chipset. The basic aim of designing of the MINS project is the removal of the Qualcomm chipset for BSC. MINS is not the whole network; it is the part of a network which contains following networks identities. They are:- 1. BTS CONTROLLER-Base transceiver system controller 2. BSC-Base station controller 3. MSC-Mobile switching centre 4. HLR-Home location register 5. VLR-Visitor location register MINS also contains some essential parts other than which are specified above. They may be either the parts of the four of them specified above or other ones. They should be considered in following lines as they come into the act. Some assumptions are made...
Words: 6859 - Pages: 28
...Summer Practical Training At Reliance Communications, Navi Mumbai INTRODUCTION: MINS is an IP based solution that shall be designed to cater to a subscriber base of around 1000 subscribers. It shall support all the features and functionalities provided by the legacy switching systems. MINS was required as the rate of the “Qualcomm chipset “for the BSC (base station controller) was rising day by day. Qualcomm company is extracting 5$ per subscriber from any Indian company for using their chipset that why in MINS, BSC is constructed not using any hardware but by binding the system by some algorithms. It means that in MINS, software is prepared which can do the work of the hardware chip for BSC instead of using that Qualcomm chipset. The basic aim of designing of the MINS project is the removal of the Qualcomm chipset for BSC. MINS is not the whole network; it is the part of a network which contains following networks identities. They are:- 1. BTS CONTROLLER-Base transceiver system controller 2. BSC-Base station controller 3. MSC-Mobile switching centre 4. HLR-Home location register 5. VLR-Visitor location register MINS also contains some essential parts other than which are specified above. They may be either the parts of the four of them specified above or other ones. They should be considered in following lines as they come into the act. Some assumptions are made preparing the MINS project. They are:- SSD (Shared secret data) is...
Words: 6843 - Pages: 28
... TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol that...
Words: 2390 - Pages: 10
...THOMAS FORD IT255 MR. CARTER LIST PHASES OF A COMPUTER ATTACK Phase 1 - Reconnaissance Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including * Internet searches * Social engineering * Dumpster diving * Domain name management/search services * Non-intrusive network scanning Phase 2 - Scanning Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including * Open ports * Open services * Vulnerable applications, including operating systems * Weak protection of data in transit * Make and model of each piece of LAN/WAN equipment Phase 3 - Gaining Access Gaining access to resources is the whole point of a modern-day attack. The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices. In addition to the defensive steps described above, security managers should make every effort to ensure end-user devices and servers are not easily accessible by unauthenticated users. This includes denying local administrator access to business users and closely monitoring...
Words: 485 - Pages: 2