SlideShare a Scribd company logo
1 of 34
Download to read offline
[Date]
1
CERTIFICATE
This is to certify that Network Developer Company embodies the
original work done by Zeeshan Alam Raza, Usman Javed, Ali Khan,
and Husnian Liaqat during this project submission as a partial
fulfillment of the requirement for the System Design Project of Network
Solution Company Final Semester, Of University of Central Punjab
Okara Campus.
Instructor’s Name:
________________
Prof. Khalid Rashid
University Of Central Punjab
[Date]
2
ACKNOWLEDGEMENT
The satisfaction that accompanies that the successful completion of any
task would be incomplete without the mention of people whose
ceaseless cooperation made it possible, whose constant guidance and
encouragement crown all efforts with success.
We are grateful to our project guide Prof. Khalid Rashid for the
guidance, inspiration and constructive suggestions that helpful us in the
preparation of this project.
We also thank our colleagues who have helped in successful completion
of the project.
Team Nexus 4…..!
Zeeshan Alam Raza
Usman Javed
Ali Khan
Husnian Liaqat
[Date]
3
Special Thanks
This project consumed huge amount of work, research and dedication. Still,
implementation would not have been possible if we did not have a support of many
individuals and organizations. Therefore we would like to extend our sincere
gratitude to all of them.
First of all we are thankful to [Hammer Head Networks] for providing necessary
guidance concerning projects implementation.
We are also grateful to [Moazam Mahmood and Waqas Mustafa] for provision of
expertise, and technical support in the implementation. Without their superior
knowledge and experience, the Project would like in quality of outcomes, and thus
their support has been essential.
We would like to express our sincere thanks towards volunteer researchers who
devoted their time and knowledge in the implementation of this project.
Nevertheless, we express our gratitude toward our families and colleagues for
their kind co-operation and encouragement which help us in completion of this
project.
[Date]
4
Requirements of Network developing company:
 Intranet based company
 Service provider
 Network developer
 Hierarchy level of management
 Network model
 Design server room
 Facilities
 Cyber security
 Define local server
 Operating system
 Software, Hardware requirement
 Defined Terminal system
 Distribution of services
[Date]
5
What is Company’s Intranet?
An intranet is a private network, accessible only to an organization's staff.
Generally a wide range of information and services from the organization's
internal IT systems are available from this that would not be available from the
outside, and one company-wide intranet can constitute an important focal point of
internal communication and collaboration, and provide a single starting point to
access internal and external resources.
Why organizations use this service?
o Increasingly, intranets are being used to deliver tools, e.g. collaboration (to
facilitate working in groups and teleconferencing) or sophisticated corporate
directories, sales and customer relationship management tools, project
management etc., to advance productivity.
o Intranets are also being used as corporate culture-change platforms.
o Intranet user-experience, editorial, and technology team’s work together to
produce in-house sites. Most commonly, intranets are managed by the
communications, HR or CIO departments of large organizations, or some
combination of these.
Intranet Software
Microsoft SharePoint is the dominant software used for creating intranets.
However other used software are
• Google Sites
• Igloo Software
• IBM Web sphere
• Hyper office
• Jive Software
• Oracle Fusion Middleware
[Date]
6
Service provider
At green tech, our strategy has empowered dozens of global service provider
to capture the opportunities made possible by the internet .we help enable
service providers to transform the experience, transform the business and
transform the architecture with cloud based capabilities. Service provider
with Green tech has more options to increase revenue and decreased
operating expense and enhanced agility.
[Date]
7
Network developer
Green Tech network developer provide access to Green tech technologies
and support resources that enables third party development of business
solutions that unified data , voice , video and mobile communication on
Green Tech development platform . The program also allows developer to
take advantages of Green tech brand, market leadership position and
installed based to help drive position business result for themselves and
their customers.
[Date]
8
Level of Management
The level of management is divided into three different level of hierarchy:
1. Top level management
2. Middle level management
3. Lower level management
[Date]
9
Network Model
[Date]
10
Telecommunication network model
[Date]
11
Developing a server room
Developing a secure and efficient server room is a top priority for IT
professionals. A server room should function as a carefully controlled
environment. Choice of location, the amount of space required and the related
power requirements are all important factors that need to be considered when
building or redesigning a server room. Green Tech team of experts is trained to
assess these factors and dozens more to design a server room perfectly suited to
your needs.
Business Requirements
[Date]
12
Internal Structured of Server room
A server room is a room, usually air-conditioned, and devoted to the continuous
operation of computer servers. An entire building or station devoted to this
purpose is a data center. The computers in a server rooms are usually headless
systems that can be operated remotely via KVM switch or remote administration
software, such as Secure Shell (Ssh), VNC, and remote desktop.
Design Consideration
• Location
Your first task in finding the best spot for the server room inside existing building
is to determine your server room size. These requirements should be based on
existing and expected future needs.
1. Equipment installed in server rooms may be quite heavy. Be aware of a floor
loading demands.
2. Internet discussions between IT professionals provide pages of detailed
advices regarding positioning of the facility.
3. Server room is best to be placed in a basement or on a lower ground floor
preferably in a central area of the building. If you decide to place the room below
groundwater line, flooding possibility should be addressed.
4. Floors, walls and roofs must be of adequately sound construction to prevent
unauthorized access to the server room.
• Space Requirements and Separate Rooms Solutions
1. Sever room must accommodate all of your equipment and have space for
growth.
2. Solution must allow enough space for cabling and maintenance access to the
side and back of server racks and other installed equipment.
3. The room size required by the power systems will be relative to the needed
capacity and required level of reliability and redundancy.
[Date]
13
4. In redundant installations dedicated room should be granted for each system
to allow physical disjointing.
• Objects typically installed in dedicated electrical space outside the
core server room area:
• Automatic transfer switches - ATS
• Switchgears of service entrance
• Unit substation transformers
• load banks
• tie breakers
• Generator with paralleling switchgears
• Uninterruptible power supplies - UPS
• UPS batteries
• Distribution boards.
• Objects typically installed within the server room area
• Power strips
• Remote power panels - RPPs
• Power distribution units – PDU. (ANSI/BICSI 2011, 21-22.)
 Power Supply
Server room power systems are not to be taken lightly. Without robust solution
for a power supply, it would be impossible to operate the whole scale of
equipment that most organizations have.
1. Calculate maximum load ratings from all the hardware you will have
installed from the beginning.
2. When you install new power systems, check the quality of the power coming
into the building to make sure that it is within standards demanded by
hardware manufactures or the applicable Authority Having Jurisdiction
(AHJ).
3. Power strips attached to power hips are the best way of delivering power to
the server racks regardless of are you using raised floor or not.
4. Power strips are power outlets on the end of flexible power cables – power
whips - which can be attached to the rack.
[Date]
14
• Uninterruptable Power Supply
An Uninterruptible Power Supply (UPS) is a device that is assembled between
the mains and the ICT device to avoid undesired features of the mains from
unfavorably affecting the operation of the device. Such undesirable features to
be mentioned are: outages, surges, bad harmonics, etc.
• Lighting
Well-designed lighting in the server room is very important. Main task for
lighting in the server room is to provide a productive visual working
environment for ICT specialists. Adjustable task lighting can be a very good
solution especially for server installation work (Sustainable Computing).
1. Reacting to the need of energy consumption reduction many server rooms
operate an automated lighting system using motion sensors.
2. Using efficient LED lighting with automated lighting controls can contribute
greatly to energy savings.
3. LED lighting is especially suitable for server room lighting due to its low
heat output.
4. Emergency lighting is an essential part of safety installations.
5. Emergency lighting is used when the supply to the normal operational
lighting fails and should therefore be powered from an independent source of
that supplying the normal lighting.
6. Pay attention to emergency lighting implementation quality, because they
play a role in situations when human life might be in danger.
[Date]
15
Server room
Cabling
[Date]
16
Security
When it comes to information security, physical security is the foundation for your
overall strategy. Server room security enhancements protect your expensive ICT
equipment and your client’s business continuity. Succeeding in physical security
implementation will reduce downtime from accidents, interference or theft. Chosen
physical security systems should deliver advanced protection for server rooms.
Such security measures like access control systems or CCTV surveillance help
achieving high level of physical security and therefore improving information
security in general.
1. ANSI/BICSI Best Practices paper (2011) recommends following: server
room secured video monitoring and access control system database should be
provided.
2. Front end user interface of these systems should reside in secure operations
facility.
3. Chosen physical security systems should deliver advanced protection for
server rooms.
4. Such security measures like access control systems or CCTV surveillance
help achieving high level of physical security and therefore improving information
security in general.
5. Front end user interface of these systems should reside in secure operations
facility.
6. Surveillance is an important tool for fighting crime and protecting public
areas.
7. In combination with intruder alarms and access control systems, it enables
remote viewing of your server room from any place 24/7.
[Date]
17
Develop a local area network in a company
Working:
o Communication
o Router receive data from the internet
o Transmits towards the servers
o Then send data towards all the computer
For local server with Apache, php, my sql
o Apache 2.2.15 win 32 x 86
o PHP 5.3.2 vc x 86 thread safe installer
o My SQL 5.1.46.x86 32bit msl installer
o PHP my admin 3.2.2
[Date]
18
Facilities
Apache
The original version of Apache was written for UNIX, but there are now versions
that run under OS/2, Windows and other platforms.
Apache is the most popular web server available. The reasons behind its
popularity, to name a few, are:
1 It is free to download and install.
2 It is open source: the source code is visible to anyone and everyone, which
basically enables anyone (who can rise up to the challenge) to adjust the code,
optimize it, and fix errors and security holes. People can add new features and
write new modules.
3 It suits all needs: Apache can be used for small websites of one or two
pages, or huge websites of hundreds and thousands of pages, serving millions of
regular visitors each month. It can serve both static and dynamic content.
Apache's main role is all about communication over networks, and it uses the
TCP/IP protocol Transmission Control Protocol/Internet Protocol which allows
devices with IP addresses within the same network to communicate with one
another.
The Apache server is set up to run through configuration files, in which directives
are added to control its behavior. In its idle state, Apache listens to the IP
addresses identified in its config file (HTTPD. conf). Whenever it receives a
request, it analyzes the headers, applies the rules specified for it in the Config file,
and take action.
[Date]
19
SQL Server
SQL Server is a Microsoft product used to manage and store information.
Technically, SQL Server is a “relational database management system” (RDMS).
Broken apart, this term means two things. First, that data stored inside SQL Server
will be housed in a “relational database”, and second, that SQL Server is an
entire “management system”, not just a database. SQL itself stands for Structured
Query Language. This is the language used to manage and administer the
database server.
SQL Server is a Relational Database Management System. Data is stored is Tables
consisting of columns and rows. Tables can be linked, or “Related”, to one
another. Tables and objects that belong to the same family or require similar
security are collectively stored in a Database.
Telnet
Telnet is a simple, text-based network protocol that is used for accessing remote
computers over TCP/IP networks like the Internet. Telnet was created and
launched in 1969 and, historically speaking, you can say that it was the first
Internet.
Telnet brought extraordinary change. Using it meant you could simultaneously
connect multiple users to a single server. In order to connect to the server, people
only needed access to a terminal, which could be the simplest and cheapest
computer available. This computer didn't need to have powerful hardware, it only
needed a network connection and a text based interface. Basically, their Telnet
Client was like a Command Prompt that people could use in order to work with
their servers. This brought a huge boost in productivity.
In Windows, you can add two Telnet related features:
Telnet Server - if you install this feature, you will be able to configure your
Windows computer to run as a Telnet server. This means that your computer will
listen for incoming connections and allow others to use it. If you're not beneath a
firewall and you have a public IP address, anyone in the world will be able to
remote control your computer using a Telnet Client.
Telnet Client - this will enable you to connect through Telnet to any server of this
type, using just a Command Prompt window.
[Date]
20
Gopher
The Gopher protocol is a TCP/IP application layer protocol designed for
distributing, searching, and retrieving documents over the Internet. The Gopher
protocol was strongly oriented towards a menu-document design and presented an
alternative to the World Wide Web in its early stages, but ultimately HTTP became
the dominant protocol. The Gopher ecosystem is often regarded as the effective
predecessor of the World Wide Web.
Information accessible via Gopher is stored on many computers all over the
Internet. These computers are called Gopher servers. Information stored on many
kinds of non-gopher servers is also available via special gopher servers that act as
gateways (protocol translators). Virtually, any popular computer (Mac, UNIX box,
PC, or larger computer) can be used as a server.
Gopher clients for mobile devices
The bandwidth-sparing simple interface of Gopher would be a good match for
mobile phones and personal digital assistants (PDAs), but so far, mobile
adaptations of HTML and XML and other simplified content have proven more
popular. The PyGopherd server provides a built-in WML front-end to Gopher sites
served with it.
The early 2010s have seen a renewed interest in native Gopher clients for popular
smartphones. Overbite, an open source client for Android 1.5+ was released in
alpha stage in 2010.
Pocket Gopher was also released in 2010, along with its source code, for several
Java ME compatible devices. I Gopher was released in 2011 as a proprietary
client for iPhone and iPod devices.
Gopher's hierarchical structure provided a platform for the first large-scale
electronic library connections .Gopher has been described by some enthusiasts as
"faster and more efficient and so much more organized" than today's Web services
.The Gopher protocol is still in use by enthusiasts, and although it has been almost
entirely supplanted by the Web, a small population of actively maintained servers
remains.
[Date]
21
System requirement
 Software:
o Red Hat Linux 7 Unleashed (OS)
o Marionnet (Simulator)
o Apache (PHP)
o MY SQL
o Sophos (antivirus)
 Hardware:
[Date]
22
Distributed of services
An interrelated arrangement of people, storage facilities and transportation
systems that moves goods and services from producers to consumers. A
distribution network is the system a company uses to get products from the
manufacturer to the retailer. A fast and reliable distribution network is essential to
a successful business because customers must be able to get products and services
when they want them.
Diagrams
[Date]
23
Terminal server
Generally in information technology, a terminal server is a hardware device or
server that provides terminals (PCs, printers, and other devices) with a common
connection point to a local or wide area network. The terminals connect to the
terminal server from their RS-232C or RS-423 serial port. The other side of the
terminal server connects through network interface cards (NIC) to a local area
network (LAN) (usually an Ethernet or token ring LAN) through modems to the
dial-in/out wide area network, or to an X.25 network or a 3270 gateway.
[Date]
24
Description
Terminal servers are centralized systems that can be logged into and on which
software can be run. There is a Terminal Server on which Linus and Linus
software is installed. UNIX and MAC OS users can make use of MS-Windows
applications via the terminal server. On these servers, data fields are available
that are provided centrally.
[Date]
25
Initial work for project and Draft note
[Date]
26
[Date]
27
[Date]
28
[Date]
29
[Date]
30
Communication with Partner Company for information
[Date]
31
Snapshot of communication between Employees
[Date]
32
[Date]
33
[Date]
34
CONCLUSION
This project has been a rewarding experience in more than one way. The entire
project work has enlightened us in the following areas.
 We have gained an insight into the working of the Networking
coming. This represents a typical real world situation.
 Our understanding of network developer company has been
strengthened this is because in order to generate the final reports
of requirement analysis designing has to be properly followed.
 Scheduling a project and adhering to that schedule creates a
strong sense of time management.
 Sense of teamwork has developed and confidence of handling real
life project has increased to a great extent.
 Initially, there were problem with the validation but with
discussions, we were to implement validations.

More Related Content

What's hot

Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochurecwoodson
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds
 
Presentation data center design overview
Presentation   data center design overviewPresentation   data center design overview
Presentation data center design overviewxKinAnx
 
002 srikanth system & network administrator 8+yrs
002 srikanth system & network administrator 8+yrs002 srikanth system & network administrator 8+yrs
002 srikanth system & network administrator 8+yrsSREEKANTH Kama
 
Myths and realities about designing high availability data centers
Myths and realities about designing high availability data centersMyths and realities about designing high availability data centers
Myths and realities about designing high availability data centersMorrison Hershfield
 
Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16Phillip Carey
 
Data Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation ProviderData Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation ProviderHostway|HOSTING
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Muhammad Ahad
 
David Kester Resume Deskside
David Kester Resume DesksideDavid Kester Resume Deskside
David Kester Resume Desksidedk112th
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds
 
Resume Of Alan Weir
Resume Of Alan WeirResume Of Alan Weir
Resume Of Alan Weirapweir12
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALJohn Bernal
 
Five key emerging trends impacting Data Centers in 2016
Five key emerging trends impacting Data Centers in 2016 Five key emerging trends impacting Data Centers in 2016
Five key emerging trends impacting Data Centers in 2016 Greg Stover
 
Classification of data center operations technology management tools
Classification of data center operations technology management toolsClassification of data center operations technology management tools
Classification of data center operations technology management toolsSchneider Electric India
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and designYeonki Choi
 
NER & Emerson Infrastructure Optimization Capabilties Storyboard
NER & Emerson   Infrastructure Optimization Capabilties StoryboardNER & Emerson   Infrastructure Optimization Capabilties Storyboard
NER & Emerson Infrastructure Optimization Capabilties StoryboardGreg Stover
 
Speed up system deployment with Dell Connected Configuration services
Speed up system deployment with Dell Connected Configuration servicesSpeed up system deployment with Dell Connected Configuration services
Speed up system deployment with Dell Connected Configuration servicesPrincipled Technologies
 
Document in Microsoft Internet Explorer - Copy.doc
Document in Microsoft Internet Explorer - Copy.docDocument in Microsoft Internet Explorer - Copy.doc
Document in Microsoft Internet Explorer - Copy.docRaymond Weaver
 

What's hot (20)

Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
 
SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012SolarWinds IPAM vs MS Win Server 2012
SolarWinds IPAM vs MS Win Server 2012
 
Presentation data center design overview
Presentation   data center design overviewPresentation   data center design overview
Presentation data center design overview
 
002 srikanth system & network administrator 8+yrs
002 srikanth system & network administrator 8+yrs002 srikanth system & network administrator 8+yrs
002 srikanth system & network administrator 8+yrs
 
Myths and realities about designing high availability data centers
Myths and realities about designing high availability data centersMyths and realities about designing high availability data centers
Myths and realities about designing high availability data centers
 
Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16Phillip_Carey_Resume-12_5_16
Phillip_Carey_Resume-12_5_16
 
Data Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation ProviderData Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation Provider
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
 
David Kester Resume Deskside
David Kester Resume DesksideDavid Kester Resume Deskside
David Kester Resume Deskside
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
 
Resume Of Alan Weir
Resume Of Alan WeirResume Of Alan Weir
Resume Of Alan Weir
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
 
Five key emerging trends impacting Data Centers in 2016
Five key emerging trends impacting Data Centers in 2016 Five key emerging trends impacting Data Centers in 2016
Five key emerging trends impacting Data Centers in 2016
 
Classification of data center operations technology management tools
Classification of data center operations technology management toolsClassification of data center operations technology management tools
Classification of data center operations technology management tools
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
DanielPGray2017
DanielPGray2017DanielPGray2017
DanielPGray2017
 
NER & Emerson Infrastructure Optimization Capabilties Storyboard
NER & Emerson   Infrastructure Optimization Capabilties StoryboardNER & Emerson   Infrastructure Optimization Capabilties Storyboard
NER & Emerson Infrastructure Optimization Capabilties Storyboard
 
Speed up system deployment with Dell Connected Configuration services
Speed up system deployment with Dell Connected Configuration servicesSpeed up system deployment with Dell Connected Configuration services
Speed up system deployment with Dell Connected Configuration services
 
Document in Microsoft Internet Explorer - Copy.doc
Document in Microsoft Internet Explorer - Copy.docDocument in Microsoft Internet Explorer - Copy.doc
Document in Microsoft Internet Explorer - Copy.doc
 

Viewers also liked

Ejercicios mate iii
Ejercicios mate iiiEjercicios mate iii
Ejercicios mate iiiyamel02
 
Fennoskandia Pekka Kivikas
Fennoskandia Pekka KivikasFennoskandia Pekka Kivikas
Fennoskandia Pekka KivikasRockArtKivikas
 
Hezkuntzaren altxor ezkutua
Hezkuntzaren altxor ezkutuaHezkuntzaren altxor ezkutua
Hezkuntzaren altxor ezkutuaIzar Verhorst
 
Pautas administracion
Pautas  administracion Pautas  administracion
Pautas administracion yadirett
 
Dureza vickers 1
Dureza vickers 1Dureza vickers 1
Dureza vickers 1Arpus Supra
 
Ws the myth, the truth and a history repeated para slideshare and slideboomb
Ws the myth, the truth and a history repeated para slideshare and slideboombWs the myth, the truth and a history repeated para slideshare and slideboomb
Ws the myth, the truth and a history repeated para slideshare and slideboombFJHerrada
 
Interculturality Castelli
Interculturality CastelliInterculturality Castelli
Interculturality Castellirominabaez
 
Hezkuntza:Altxor ezkutua
Hezkuntza:Altxor ezkutuaHezkuntza:Altxor ezkutua
Hezkuntza:Altxor ezkutuaAne Redondo
 
Ejercicios mate iii
Ejercicios mate iiiEjercicios mate iii
Ejercicios mate iiiyamel02
 
Vision ontoepistemica carlos suarez
Vision ontoepistemica carlos suarez Vision ontoepistemica carlos suarez
Vision ontoepistemica carlos suarez Carlos Suarez
 
Audience Theory
Audience TheoryAudience Theory
Audience TheoryktDan
 
ANCILLARY TEXT: Digipak Elements
ANCILLARY TEXT: Digipak Elements ANCILLARY TEXT: Digipak Elements
ANCILLARY TEXT: Digipak Elements ktDan
 
Evaluation of-total-quality-management-implementation-as-engineering-practice...
Evaluation of-total-quality-management-implementation-as-engineering-practice...Evaluation of-total-quality-management-implementation-as-engineering-practice...
Evaluation of-total-quality-management-implementation-as-engineering-practice...Ali Salah
 
Connectivist Learning Theory
Connectivist Learning TheoryConnectivist Learning Theory
Connectivist Learning TheoryCath Farrant
 
SWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNG
SWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNGSWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNG
SWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNGFurkan Özgür
 

Viewers also liked (17)

Ejercicios mate iii
Ejercicios mate iiiEjercicios mate iii
Ejercicios mate iii
 
Fennoskandia Pekka Kivikas
Fennoskandia Pekka KivikasFennoskandia Pekka Kivikas
Fennoskandia Pekka Kivikas
 
Hezkuntzaren altxor ezkutua
Hezkuntzaren altxor ezkutuaHezkuntzaren altxor ezkutua
Hezkuntzaren altxor ezkutua
 
Pautas administracion
Pautas  administracion Pautas  administracion
Pautas administracion
 
Introducción mvc
Introducción mvcIntroducción mvc
Introducción mvc
 
Dureza vickers 1
Dureza vickers 1Dureza vickers 1
Dureza vickers 1
 
Ws the myth, the truth and a history repeated para slideshare and slideboomb
Ws the myth, the truth and a history repeated para slideshare and slideboombWs the myth, the truth and a history repeated para slideshare and slideboomb
Ws the myth, the truth and a history repeated para slideshare and slideboomb
 
Interculturality Castelli
Interculturality CastelliInterculturality Castelli
Interculturality Castelli
 
Hezkuntza:Altxor ezkutua
Hezkuntza:Altxor ezkutuaHezkuntza:Altxor ezkutua
Hezkuntza:Altxor ezkutua
 
Ejercicios mate iii
Ejercicios mate iiiEjercicios mate iii
Ejercicios mate iii
 
Vision ontoepistemica carlos suarez
Vision ontoepistemica carlos suarez Vision ontoepistemica carlos suarez
Vision ontoepistemica carlos suarez
 
Animation
AnimationAnimation
Animation
 
Audience Theory
Audience TheoryAudience Theory
Audience Theory
 
ANCILLARY TEXT: Digipak Elements
ANCILLARY TEXT: Digipak Elements ANCILLARY TEXT: Digipak Elements
ANCILLARY TEXT: Digipak Elements
 
Evaluation of-total-quality-management-implementation-as-engineering-practice...
Evaluation of-total-quality-management-implementation-as-engineering-practice...Evaluation of-total-quality-management-implementation-as-engineering-practice...
Evaluation of-total-quality-management-implementation-as-engineering-practice...
 
Connectivist Learning Theory
Connectivist Learning TheoryConnectivist Learning Theory
Connectivist Learning Theory
 
SWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNG
SWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNGSWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNG
SWOT VE PEST ANALİZİ - ÜLKER / YILDIZ HOLDİNG
 

Similar to Network developer company report

REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementRicardo Pereira
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science PlatformDecision Science Community
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxBluechip Gulf IT Services
 
Deployability
DeployabilityDeployability
DeployabilityLen Bass
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud ComputingCentriLogic
 
EarthLink Business Cloud Hosting
EarthLink Business Cloud HostingEarthLink Business Cloud Hosting
EarthLink Business Cloud HostingMike Ricca
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1Craig Burma
 
IBM Software Defined Networking = Brave New World of IT
IBM Software Defined Networking = Brave New World of  ITIBM Software Defined Networking = Brave New World of  IT
IBM Software Defined Networking = Brave New World of ITSteve Cole
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptxJanani S
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxphilipnelson29183
 
CC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptxCC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptx121910301016gitam
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingUOS
 

Similar to Network developer company report (20)

REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network Management
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science Platform
 
Week2
Week2Week2
Week2
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptx
 
Deployability
DeployabilityDeployability
Deployability
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud Computing
 
EarthLink Business Cloud Hosting
EarthLink Business Cloud HostingEarthLink Business Cloud Hosting
EarthLink Business Cloud Hosting
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
IBM Software Defined Networking = Brave New World of IT
IBM Software Defined Networking = Brave New World of  ITIBM Software Defined Networking = Brave New World of  IT
IBM Software Defined Networking = Brave New World of IT
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
CC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptxCC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptx
 
GRANT DELP724
GRANT DELP724GRANT DELP724
GRANT DELP724
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
E magic case study
E magic case studyE magic case study
E magic case study
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Network developer company report

  • 1. [Date] 1 CERTIFICATE This is to certify that Network Developer Company embodies the original work done by Zeeshan Alam Raza, Usman Javed, Ali Khan, and Husnian Liaqat during this project submission as a partial fulfillment of the requirement for the System Design Project of Network Solution Company Final Semester, Of University of Central Punjab Okara Campus. Instructor’s Name: ________________ Prof. Khalid Rashid University Of Central Punjab
  • 2. [Date] 2 ACKNOWLEDGEMENT The satisfaction that accompanies that the successful completion of any task would be incomplete without the mention of people whose ceaseless cooperation made it possible, whose constant guidance and encouragement crown all efforts with success. We are grateful to our project guide Prof. Khalid Rashid for the guidance, inspiration and constructive suggestions that helpful us in the preparation of this project. We also thank our colleagues who have helped in successful completion of the project. Team Nexus 4…..! Zeeshan Alam Raza Usman Javed Ali Khan Husnian Liaqat
  • 3. [Date] 3 Special Thanks This project consumed huge amount of work, research and dedication. Still, implementation would not have been possible if we did not have a support of many individuals and organizations. Therefore we would like to extend our sincere gratitude to all of them. First of all we are thankful to [Hammer Head Networks] for providing necessary guidance concerning projects implementation. We are also grateful to [Moazam Mahmood and Waqas Mustafa] for provision of expertise, and technical support in the implementation. Without their superior knowledge and experience, the Project would like in quality of outcomes, and thus their support has been essential. We would like to express our sincere thanks towards volunteer researchers who devoted their time and knowledge in the implementation of this project. Nevertheless, we express our gratitude toward our families and colleagues for their kind co-operation and encouragement which help us in completion of this project.
  • 4. [Date] 4 Requirements of Network developing company:  Intranet based company  Service provider  Network developer  Hierarchy level of management  Network model  Design server room  Facilities  Cyber security  Define local server  Operating system  Software, Hardware requirement  Defined Terminal system  Distribution of services
  • 5. [Date] 5 What is Company’s Intranet? An intranet is a private network, accessible only to an organization's staff. Generally a wide range of information and services from the organization's internal IT systems are available from this that would not be available from the outside, and one company-wide intranet can constitute an important focal point of internal communication and collaboration, and provide a single starting point to access internal and external resources. Why organizations use this service? o Increasingly, intranets are being used to deliver tools, e.g. collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. o Intranets are also being used as corporate culture-change platforms. o Intranet user-experience, editorial, and technology team’s work together to produce in-house sites. Most commonly, intranets are managed by the communications, HR or CIO departments of large organizations, or some combination of these. Intranet Software Microsoft SharePoint is the dominant software used for creating intranets. However other used software are • Google Sites • Igloo Software • IBM Web sphere • Hyper office • Jive Software • Oracle Fusion Middleware
  • 6. [Date] 6 Service provider At green tech, our strategy has empowered dozens of global service provider to capture the opportunities made possible by the internet .we help enable service providers to transform the experience, transform the business and transform the architecture with cloud based capabilities. Service provider with Green tech has more options to increase revenue and decreased operating expense and enhanced agility.
  • 7. [Date] 7 Network developer Green Tech network developer provide access to Green tech technologies and support resources that enables third party development of business solutions that unified data , voice , video and mobile communication on Green Tech development platform . The program also allows developer to take advantages of Green tech brand, market leadership position and installed based to help drive position business result for themselves and their customers.
  • 8. [Date] 8 Level of Management The level of management is divided into three different level of hierarchy: 1. Top level management 2. Middle level management 3. Lower level management
  • 11. [Date] 11 Developing a server room Developing a secure and efficient server room is a top priority for IT professionals. A server room should function as a carefully controlled environment. Choice of location, the amount of space required and the related power requirements are all important factors that need to be considered when building or redesigning a server room. Green Tech team of experts is trained to assess these factors and dozens more to design a server room perfectly suited to your needs. Business Requirements
  • 12. [Date] 12 Internal Structured of Server room A server room is a room, usually air-conditioned, and devoted to the continuous operation of computer servers. An entire building or station devoted to this purpose is a data center. The computers in a server rooms are usually headless systems that can be operated remotely via KVM switch or remote administration software, such as Secure Shell (Ssh), VNC, and remote desktop. Design Consideration • Location Your first task in finding the best spot for the server room inside existing building is to determine your server room size. These requirements should be based on existing and expected future needs. 1. Equipment installed in server rooms may be quite heavy. Be aware of a floor loading demands. 2. Internet discussions between IT professionals provide pages of detailed advices regarding positioning of the facility. 3. Server room is best to be placed in a basement or on a lower ground floor preferably in a central area of the building. If you decide to place the room below groundwater line, flooding possibility should be addressed. 4. Floors, walls and roofs must be of adequately sound construction to prevent unauthorized access to the server room. • Space Requirements and Separate Rooms Solutions 1. Sever room must accommodate all of your equipment and have space for growth. 2. Solution must allow enough space for cabling and maintenance access to the side and back of server racks and other installed equipment. 3. The room size required by the power systems will be relative to the needed capacity and required level of reliability and redundancy.
  • 13. [Date] 13 4. In redundant installations dedicated room should be granted for each system to allow physical disjointing. • Objects typically installed in dedicated electrical space outside the core server room area: • Automatic transfer switches - ATS • Switchgears of service entrance • Unit substation transformers • load banks • tie breakers • Generator with paralleling switchgears • Uninterruptible power supplies - UPS • UPS batteries • Distribution boards. • Objects typically installed within the server room area • Power strips • Remote power panels - RPPs • Power distribution units – PDU. (ANSI/BICSI 2011, 21-22.)  Power Supply Server room power systems are not to be taken lightly. Without robust solution for a power supply, it would be impossible to operate the whole scale of equipment that most organizations have. 1. Calculate maximum load ratings from all the hardware you will have installed from the beginning. 2. When you install new power systems, check the quality of the power coming into the building to make sure that it is within standards demanded by hardware manufactures or the applicable Authority Having Jurisdiction (AHJ). 3. Power strips attached to power hips are the best way of delivering power to the server racks regardless of are you using raised floor or not. 4. Power strips are power outlets on the end of flexible power cables – power whips - which can be attached to the rack.
  • 14. [Date] 14 • Uninterruptable Power Supply An Uninterruptible Power Supply (UPS) is a device that is assembled between the mains and the ICT device to avoid undesired features of the mains from unfavorably affecting the operation of the device. Such undesirable features to be mentioned are: outages, surges, bad harmonics, etc. • Lighting Well-designed lighting in the server room is very important. Main task for lighting in the server room is to provide a productive visual working environment for ICT specialists. Adjustable task lighting can be a very good solution especially for server installation work (Sustainable Computing). 1. Reacting to the need of energy consumption reduction many server rooms operate an automated lighting system using motion sensors. 2. Using efficient LED lighting with automated lighting controls can contribute greatly to energy savings. 3. LED lighting is especially suitable for server room lighting due to its low heat output. 4. Emergency lighting is an essential part of safety installations. 5. Emergency lighting is used when the supply to the normal operational lighting fails and should therefore be powered from an independent source of that supplying the normal lighting. 6. Pay attention to emergency lighting implementation quality, because they play a role in situations when human life might be in danger.
  • 16. [Date] 16 Security When it comes to information security, physical security is the foundation for your overall strategy. Server room security enhancements protect your expensive ICT equipment and your client’s business continuity. Succeeding in physical security implementation will reduce downtime from accidents, interference or theft. Chosen physical security systems should deliver advanced protection for server rooms. Such security measures like access control systems or CCTV surveillance help achieving high level of physical security and therefore improving information security in general. 1. ANSI/BICSI Best Practices paper (2011) recommends following: server room secured video monitoring and access control system database should be provided. 2. Front end user interface of these systems should reside in secure operations facility. 3. Chosen physical security systems should deliver advanced protection for server rooms. 4. Such security measures like access control systems or CCTV surveillance help achieving high level of physical security and therefore improving information security in general. 5. Front end user interface of these systems should reside in secure operations facility. 6. Surveillance is an important tool for fighting crime and protecting public areas. 7. In combination with intruder alarms and access control systems, it enables remote viewing of your server room from any place 24/7.
  • 17. [Date] 17 Develop a local area network in a company Working: o Communication o Router receive data from the internet o Transmits towards the servers o Then send data towards all the computer For local server with Apache, php, my sql o Apache 2.2.15 win 32 x 86 o PHP 5.3.2 vc x 86 thread safe installer o My SQL 5.1.46.x86 32bit msl installer o PHP my admin 3.2.2
  • 18. [Date] 18 Facilities Apache The original version of Apache was written for UNIX, but there are now versions that run under OS/2, Windows and other platforms. Apache is the most popular web server available. The reasons behind its popularity, to name a few, are: 1 It is free to download and install. 2 It is open source: the source code is visible to anyone and everyone, which basically enables anyone (who can rise up to the challenge) to adjust the code, optimize it, and fix errors and security holes. People can add new features and write new modules. 3 It suits all needs: Apache can be used for small websites of one or two pages, or huge websites of hundreds and thousands of pages, serving millions of regular visitors each month. It can serve both static and dynamic content. Apache's main role is all about communication over networks, and it uses the TCP/IP protocol Transmission Control Protocol/Internet Protocol which allows devices with IP addresses within the same network to communicate with one another. The Apache server is set up to run through configuration files, in which directives are added to control its behavior. In its idle state, Apache listens to the IP addresses identified in its config file (HTTPD. conf). Whenever it receives a request, it analyzes the headers, applies the rules specified for it in the Config file, and take action.
  • 19. [Date] 19 SQL Server SQL Server is a Microsoft product used to manage and store information. Technically, SQL Server is a “relational database management system” (RDMS). Broken apart, this term means two things. First, that data stored inside SQL Server will be housed in a “relational database”, and second, that SQL Server is an entire “management system”, not just a database. SQL itself stands for Structured Query Language. This is the language used to manage and administer the database server. SQL Server is a Relational Database Management System. Data is stored is Tables consisting of columns and rows. Tables can be linked, or “Related”, to one another. Tables and objects that belong to the same family or require similar security are collectively stored in a Database. Telnet Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. Telnet was created and launched in 1969 and, historically speaking, you can say that it was the first Internet. Telnet brought extraordinary change. Using it meant you could simultaneously connect multiple users to a single server. In order to connect to the server, people only needed access to a terminal, which could be the simplest and cheapest computer available. This computer didn't need to have powerful hardware, it only needed a network connection and a text based interface. Basically, their Telnet Client was like a Command Prompt that people could use in order to work with their servers. This brought a huge boost in productivity. In Windows, you can add two Telnet related features: Telnet Server - if you install this feature, you will be able to configure your Windows computer to run as a Telnet server. This means that your computer will listen for incoming connections and allow others to use it. If you're not beneath a firewall and you have a public IP address, anyone in the world will be able to remote control your computer using a Telnet Client. Telnet Client - this will enable you to connect through Telnet to any server of this type, using just a Command Prompt window.
  • 20. [Date] 20 Gopher The Gopher protocol is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet. The Gopher protocol was strongly oriented towards a menu-document design and presented an alternative to the World Wide Web in its early stages, but ultimately HTTP became the dominant protocol. The Gopher ecosystem is often regarded as the effective predecessor of the World Wide Web. Information accessible via Gopher is stored on many computers all over the Internet. These computers are called Gopher servers. Information stored on many kinds of non-gopher servers is also available via special gopher servers that act as gateways (protocol translators). Virtually, any popular computer (Mac, UNIX box, PC, or larger computer) can be used as a server. Gopher clients for mobile devices The bandwidth-sparing simple interface of Gopher would be a good match for mobile phones and personal digital assistants (PDAs), but so far, mobile adaptations of HTML and XML and other simplified content have proven more popular. The PyGopherd server provides a built-in WML front-end to Gopher sites served with it. The early 2010s have seen a renewed interest in native Gopher clients for popular smartphones. Overbite, an open source client for Android 1.5+ was released in alpha stage in 2010. Pocket Gopher was also released in 2010, along with its source code, for several Java ME compatible devices. I Gopher was released in 2011 as a proprietary client for iPhone and iPod devices. Gopher's hierarchical structure provided a platform for the first large-scale electronic library connections .Gopher has been described by some enthusiasts as "faster and more efficient and so much more organized" than today's Web services .The Gopher protocol is still in use by enthusiasts, and although it has been almost entirely supplanted by the Web, a small population of actively maintained servers remains.
  • 21. [Date] 21 System requirement  Software: o Red Hat Linux 7 Unleashed (OS) o Marionnet (Simulator) o Apache (PHP) o MY SQL o Sophos (antivirus)  Hardware:
  • 22. [Date] 22 Distributed of services An interrelated arrangement of people, storage facilities and transportation systems that moves goods and services from producers to consumers. A distribution network is the system a company uses to get products from the manufacturer to the retailer. A fast and reliable distribution network is essential to a successful business because customers must be able to get products and services when they want them. Diagrams
  • 23. [Date] 23 Terminal server Generally in information technology, a terminal server is a hardware device or server that provides terminals (PCs, printers, and other devices) with a common connection point to a local or wide area network. The terminals connect to the terminal server from their RS-232C or RS-423 serial port. The other side of the terminal server connects through network interface cards (NIC) to a local area network (LAN) (usually an Ethernet or token ring LAN) through modems to the dial-in/out wide area network, or to an X.25 network or a 3270 gateway.
  • 24. [Date] 24 Description Terminal servers are centralized systems that can be logged into and on which software can be run. There is a Terminal Server on which Linus and Linus software is installed. UNIX and MAC OS users can make use of MS-Windows applications via the terminal server. On these servers, data fields are available that are provided centrally.
  • 25. [Date] 25 Initial work for project and Draft note
  • 30. [Date] 30 Communication with Partner Company for information
  • 34. [Date] 34 CONCLUSION This project has been a rewarding experience in more than one way. The entire project work has enlightened us in the following areas.  We have gained an insight into the working of the Networking coming. This represents a typical real world situation.  Our understanding of network developer company has been strengthened this is because in order to generate the final reports of requirement analysis designing has to be properly followed.  Scheduling a project and adhering to that schedule creates a strong sense of time management.  Sense of teamwork has developed and confidence of handling real life project has increased to a great extent.  Initially, there were problem with the validation but with discussions, we were to implement validations.