The document outlines the 10 key steps to take when designing and implementing a new computer network: 1) conduct a feasibility study, 2) create a network project plan, 3) describe the current network, 4) identify new network requirements, 5) determine the geographic scope, 6) calculate circuit requirements, 7) establish security and control needs, 8) design network configurations, 9) calculate costs, and 10) implement the new network. The feasibility study involves analyzing the problem and potential solutions to determine if the network project is feasible and makes business sense.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government.
The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF).
This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions.
A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl
Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security
Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipCSCJournals
Due to the complexity and the high performance requirement of multimedia applications, the design of embedded systems is the subject of different types of design constraints such as execution time, time to market, energy consumption, etc. Some approaches of joint software/hardware design (Co-design) were proposed in order to help the designer to seek an adequacy between applications and architecture that satisfies the different design constraints. This paper presents a new methodology for hardware/software partitioning on reconfigurable multimedia system on chip, based on dynamic and static steps. The first one uses the dynamic profiling and the second one uses the design trotter tools. The validation of our approach is made through 3D image synthesis.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government.
The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF).
This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions.
A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl
Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security
Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipCSCJournals
Due to the complexity and the high performance requirement of multimedia applications, the design of embedded systems is the subject of different types of design constraints such as execution time, time to market, energy consumption, etc. Some approaches of joint software/hardware design (Co-design) were proposed in order to help the designer to seek an adequacy between applications and architecture that satisfies the different design constraints. This paper presents a new methodology for hardware/software partitioning on reconfigurable multimedia system on chip, based on dynamic and static steps. The first one uses the dynamic profiling and the second one uses the design trotter tools. The validation of our approach is made through 3D image synthesis.
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
Public safety is undergoing a revolution in situation awareness due to the inclusion of multimedia. Unfortunately, many public safety communication networks were not designed or envisioned to support multimedia and the wealth of other data intensive applications. The increasing use of data and multimedia applications to enhance first responder situation awareness requires that the backhaul network must be capable of supporting this demand. This paper will explore several options available for backhauling large amounts of data in real time
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxgalerussel59292
age 1
Question 1.1. (TCO 1) An important aspect of a network management system involves (Points : 5)
managing connectivity between all PDAs and mainframe systems.
collecting and analyzing data to support organizational business needs.
keeping track of some client/server applications.
keeping track of most multimedia applications.
both managing connectivity between all PDAs and mainframe systems and keeping track of some client/server applications.
Question 2.2. (TCO 1) One of the main goals of network management is to make operations more _____ and operators more productive. (Points : 5)
secure
stable
productive
efficient
Both productive and efficient
Question 3.3. (TCO 2) Which is not one of the four steps of the network management life cycle? (Points : 5)
Monitor
Operate
Decommission
Plan
Both monitor and plan
Question 4.4. (TCO 2) In the network management system, the interface between the manager and the network device is known as the _____. (Points : 5)
manager
agent
console
application programming interface (API)
NMS
Question 5.5. (TCO 2) Which is not a part of all management agents? (Points : 5)
The MIB
Core agent logic
Management interface
XML
Both core agent logic and XML
Question 6.6. (TCO 3) One of the key words found in the definition of network management is operation. Select the best definition of operation from the following choices. (Points : 5)
Performing repairs and upgrades and taking corrective and preventive proactive measures to make the network run better
Keeping the network up and running smoothly
Configuring resources in the network to support a given service
Keeping track of resources in the network and how they are assigned
None of the above
Question 7.7. (TCO 3) Select the name of the language used for the definition of management information used with SNMP. (Points : 5)
Guidelines for the definition of managed objects (GDMO)
Abstract syntax notation version 1 (ASN.1)
Managed object format (MOF)
Structure of management information (SMI)
Object protocol language for management (OPLMv2)
Question 8.8. (TCO 3) Which item does not fall under the configuration management functional responsibility? (Points : 5)
Configuring alarm-forwarding information
Reconciling the as-built network to the as-planned network
Managing software images running on the network
Synchronizing cached network configuration information with the network's actual configuration
Performing backup and restore operations
Question 9.9. (TCO 4) Which is not one of the reasons why polling a managed device for operational data and state information is generally done? (Points : 5)
Troubleshooting
Device viewing
Diagnostics
Device update
.
A CASE Lab Report - Project File on "ATM - Banking System"joyousbharat
A CASE Lab Report - Project File on "ATM - Banking System"
The software to be designed will control a simulated automated teller machine
(ATM) having a magnetic stripe reader for reading an ATM card, a keyboard and
display for interaction with the customer, a slot for depositing envelopes, a
dispenser for cash (in multiples of $20), a printer for printing customer receipts, and
a key-operated switch to allow an operator to start or stop the machine. The ATM
will communicate with the bank's computer over an appropriate communication
link. (The software on the latter is not part of the requirements for this problem.)
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxelinoraudley582231
DISCUSSION 1
The Internet of Things (IoT) is based upon emerging applications of technologies. A number of security researchers have expressed concerns that this blending of emerging technologies with the Internet will provide new opportunities for cyber criminals and terrorists.
Pick one of the emerging applications of technologies that belongs to the Internet of Things (see the readings and videos for this week) and research how it can be attacked by bad guys. Using the security criteria from the five pillars of information assurance, write a 250+ word analysis of the risks and vulnerabilities associated with your chosen technology. The five pillars are:
1 confidentiality
2 integrity
3 availability
4 authentication
5 nonrepudiation
Remember to cite your sources using APA format in-text citations and include an APA format reference list at the end of your response posting.
DISCUSSION 2
The International Telecommunications Union (2005) report described four categories of technologies which can be linked together to form an Internet of Things.
Enabling Technologies:
1. Tagging things: RFID and similar technologies
2. Feeling things: Sensor technologies
3. Thinking things: Smart technologies
4. Shrinking things: Nanotechnology
Choose one of these categories.
What are the leading technologies in your selected category?
How do they contribute to the Internet of Things?
What types of privacy or security concerns surround the technologies in your selected category?
Your initial posting should be 250+ words and be supported by citations and references in APA format.
Reference
International Telecommunications Union. (2005). ITU Internet reports 2005: The Internet of things [Executive Summary]. Retrieved from http://www.itu.int/osg/spu/publications/internetofthings/InternetofThings_summary.pdf
MATH233 Unit 1 Individual Project
To communicate most effectively, network administrators attempt to maximize bandwidth and throughput speeds to achieve high data transmission rates within the building’s CAT5e cables. These performance data transfer rates are given in multiples of unit bits per second (bps). In the table below, the school’s IT department estimates the network throughput that is required in the near future. The network manager has asked you to use these data to analyze the current traffic load and the network's overall capacity.
Estimates given in the table below suggest that your network throughput can transfer Gigabits (Gb) of data in seconds for each user.
For each question, be sure to show all your work details for full credit.Round all numerical answers to three decimal places.
1. Research and define the concepts of maximum theoretical throughput, channel capacity, and bandwidth. Next, explain the difference between CAT5e and CAT6 Ethernet cables. What specific speeds can each of these cables handle? Listing credible cited resources, please answer these below.
2. In the table below, based on the first letter of your last name, pleas.
A VNF modeling approach for verification purposesIJECEIAES
Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays, model checking tools, SAT solvers, and Theorem Provers are available for formal verification of such properties in virtualized networks. Unfortunately, most of those verification tools accept input descriptions written in specification languages that are difficult to use for people not experienced in formal methods. Also, in order to enable the use of formal verification tools in real scenarios, vendors of Virtual Network Functions (VNFs) should provide abstract mathematical models of their functions, coded in the specific input languages of the verification tools. This process is error-prone, time-consuming, and often outside the VNF developers’ expertise. This paper presents a framework that we designed for automatically extracting verification models starting from a Java-based representation of a given VNF. It comprises a Java library of classes to define VNFs in a more developer-friendly way, and a tool to translate VNF definitions into formal verification models of different verification tools.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
Public safety is undergoing a revolution in situation awareness due to the inclusion of multimedia. Unfortunately, many public safety communication networks were not designed or envisioned to support multimedia and the wealth of other data intensive applications. The increasing use of data and multimedia applications to enhance first responder situation awareness requires that the backhaul network must be capable of supporting this demand. This paper will explore several options available for backhauling large amounts of data in real time
age 1Question 1.1. (TCO 1) An important aspect of a network mana.docxgalerussel59292
age 1
Question 1.1. (TCO 1) An important aspect of a network management system involves (Points : 5)
managing connectivity between all PDAs and mainframe systems.
collecting and analyzing data to support organizational business needs.
keeping track of some client/server applications.
keeping track of most multimedia applications.
both managing connectivity between all PDAs and mainframe systems and keeping track of some client/server applications.
Question 2.2. (TCO 1) One of the main goals of network management is to make operations more _____ and operators more productive. (Points : 5)
secure
stable
productive
efficient
Both productive and efficient
Question 3.3. (TCO 2) Which is not one of the four steps of the network management life cycle? (Points : 5)
Monitor
Operate
Decommission
Plan
Both monitor and plan
Question 4.4. (TCO 2) In the network management system, the interface between the manager and the network device is known as the _____. (Points : 5)
manager
agent
console
application programming interface (API)
NMS
Question 5.5. (TCO 2) Which is not a part of all management agents? (Points : 5)
The MIB
Core agent logic
Management interface
XML
Both core agent logic and XML
Question 6.6. (TCO 3) One of the key words found in the definition of network management is operation. Select the best definition of operation from the following choices. (Points : 5)
Performing repairs and upgrades and taking corrective and preventive proactive measures to make the network run better
Keeping the network up and running smoothly
Configuring resources in the network to support a given service
Keeping track of resources in the network and how they are assigned
None of the above
Question 7.7. (TCO 3) Select the name of the language used for the definition of management information used with SNMP. (Points : 5)
Guidelines for the definition of managed objects (GDMO)
Abstract syntax notation version 1 (ASN.1)
Managed object format (MOF)
Structure of management information (SMI)
Object protocol language for management (OPLMv2)
Question 8.8. (TCO 3) Which item does not fall under the configuration management functional responsibility? (Points : 5)
Configuring alarm-forwarding information
Reconciling the as-built network to the as-planned network
Managing software images running on the network
Synchronizing cached network configuration information with the network's actual configuration
Performing backup and restore operations
Question 9.9. (TCO 4) Which is not one of the reasons why polling a managed device for operational data and state information is generally done? (Points : 5)
Troubleshooting
Device viewing
Diagnostics
Device update
.
A CASE Lab Report - Project File on "ATM - Banking System"joyousbharat
A CASE Lab Report - Project File on "ATM - Banking System"
The software to be designed will control a simulated automated teller machine
(ATM) having a magnetic stripe reader for reading an ATM card, a keyboard and
display for interaction with the customer, a slot for depositing envelopes, a
dispenser for cash (in multiples of $20), a printer for printing customer receipts, and
a key-operated switch to allow an operator to start or stop the machine. The ATM
will communicate with the bank's computer over an appropriate communication
link. (The software on the latter is not part of the requirements for this problem.)
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxelinoraudley582231
DISCUSSION 1
The Internet of Things (IoT) is based upon emerging applications of technologies. A number of security researchers have expressed concerns that this blending of emerging technologies with the Internet will provide new opportunities for cyber criminals and terrorists.
Pick one of the emerging applications of technologies that belongs to the Internet of Things (see the readings and videos for this week) and research how it can be attacked by bad guys. Using the security criteria from the five pillars of information assurance, write a 250+ word analysis of the risks and vulnerabilities associated with your chosen technology. The five pillars are:
1 confidentiality
2 integrity
3 availability
4 authentication
5 nonrepudiation
Remember to cite your sources using APA format in-text citations and include an APA format reference list at the end of your response posting.
DISCUSSION 2
The International Telecommunications Union (2005) report described four categories of technologies which can be linked together to form an Internet of Things.
Enabling Technologies:
1. Tagging things: RFID and similar technologies
2. Feeling things: Sensor technologies
3. Thinking things: Smart technologies
4. Shrinking things: Nanotechnology
Choose one of these categories.
What are the leading technologies in your selected category?
How do they contribute to the Internet of Things?
What types of privacy or security concerns surround the technologies in your selected category?
Your initial posting should be 250+ words and be supported by citations and references in APA format.
Reference
International Telecommunications Union. (2005). ITU Internet reports 2005: The Internet of things [Executive Summary]. Retrieved from http://www.itu.int/osg/spu/publications/internetofthings/InternetofThings_summary.pdf
MATH233 Unit 1 Individual Project
To communicate most effectively, network administrators attempt to maximize bandwidth and throughput speeds to achieve high data transmission rates within the building’s CAT5e cables. These performance data transfer rates are given in multiples of unit bits per second (bps). In the table below, the school’s IT department estimates the network throughput that is required in the near future. The network manager has asked you to use these data to analyze the current traffic load and the network's overall capacity.
Estimates given in the table below suggest that your network throughput can transfer Gigabits (Gb) of data in seconds for each user.
For each question, be sure to show all your work details for full credit.Round all numerical answers to three decimal places.
1. Research and define the concepts of maximum theoretical throughput, channel capacity, and bandwidth. Next, explain the difference between CAT5e and CAT6 Ethernet cables. What specific speeds can each of these cables handle? Listing credible cited resources, please answer these below.
2. In the table below, based on the first letter of your last name, pleas.
A VNF modeling approach for verification purposesIJECEIAES
Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays, model checking tools, SAT solvers, and Theorem Provers are available for formal verification of such properties in virtualized networks. Unfortunately, most of those verification tools accept input descriptions written in specification languages that are difficult to use for people not experienced in formal methods. Also, in order to enable the use of formal verification tools in real scenarios, vendors of Virtual Network Functions (VNFs) should provide abstract mathematical models of their functions, coded in the specific input languages of the verification tools. This process is error-prone, time-consuming, and often outside the VNF developers’ expertise. This paper presents a framework that we designed for automatically extracting verification models starting from a Java-based representation of a given VNF. It comprises a Java library of classes to define VNFs in a more developer-friendly way, and a tool to translate VNF definitions into formal verification models of different verification tools.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
1. Network Design and Implementation: Steps
1. Feasibility study
2. Network Project Plan
3. Description of the Current Network
4. New Network Requirements
5. Identifying Geographic Scope
6. Circuit Requirement Calculations
7. Network Security and Control Requirements
8. Network Configurations
9. Network Cost Calculations
10. Implementation
2. 1. Feasibility Study
The purpose of a feasibility study is to determine the
possibility of improving the current network or developing a
new network.
The primary purpose of the feasibility study is to identify the
problem which could be solved or an opportunity which could
be ceased by the network development project (clearly, in
writing).
The feasibility study can be based on
a needs assessment in the organization
competition
a business opportunity
inter-organizational relationships
globalization
etc.
3. 1. Feasibility Study continued...
The result of the phase is a Feasibility Study Report:
the problem or the opportunity described
objectives for the potential network development project (major,
intermediate, wishes)
potential solutions (one is never enough)
technical, operational, and economic feasibility of potential solutions
recommendation
The Feasibility Study usually results in a decision
start the network development project
extend the feasibility study (clarifications, new alternative solutions,
change of scope)
postpone the project
reject.
4. Some Examples of Objectives for NW dev.
implementing an electronic commerce business idea (e.g.,
electronic payment services for small businesses using EDI,
the WWW and the Internet)
competitive advantage
improving quality of service
faster delivery of information/digital products
implementing virtual teams
need to improve
communications channels
need to bust organizational boundaries
need to reengineer
improving the corporate infrastructure
cost containment
5. 2. Network Project Plan
The purpose of the Network Project Plan is to
describe project phases
produce project resource plans (people, hours, equipment, funding etc.)
describe the project organization
produce timetables
determine checkpoints
define deliverables
evaluation criteria for the network development project
The result of the Network Project Plan phase is a detailed
report which describes the concrete steps, timetables,
resources and funding requirements for reaching the
objectives defined in the feasibility study.
6. 3. Description of the Current Network
The purpose of the Description of the Current Network is to
gain complete understanding of the current situation in order
to design the network.
This translates into:
1. describing the current network
applications and their data transmission needs
nodes and their operating systems
networks (network types, operating systems, devices and circuits)
descriptions are presented in the organizational context (geographical
locations, organizational units, ranks and numbers of users, informal
organizations)
2. describing the information needs for the new network (see 1.)
7. 3. Description of the Current Network continued...
Techniques include
interviews
researching the applications and networks
estimating and sampling for volumes, timings and patterns
comparing the current network and existing alternatives.
The result of the phase is a Current Network
Description. It includes
organization charts
geographical network configurations
summaries of interviews
summaries of comparisons
data flow diagrams
8. 4. New Network Requirements
The purpose of New Network Requirements phase is to
produce a list of requirements for the new network.
Requirements are derived from the objectives (see Feasibility
Study) and refined by the results obtained in previous phases.
Requirements are influenced by the the organization’s long
and short term plans (strategic plans, IT strategic plans,
plans of refocusing the business changes in products or
services, organizational change, growth, downsizing,
acquisitions, mergers, spin offs etc.)
The result of the Network Requirement Phase is a detailed
list of business requirements translated into technical
requirements (e.g., circuit capacities, processing times,
reliability, security, speed requirements).
Requirements can be mandatory, desirable or wished.
9. 5. Identify Geographic Scope
The purpose of Identifying Geographic Scope is to produce
an accurate, detailed geographic map of the new network.
The scope of the network can be:
international
country
city or state
local facility
Start with the highest level
Draw connections (lines, concentrator sites, multipoint
locations)
for international, country, city or state use maps
for local facilities use blue prints of the building
The result of the phase is detailed maps and drawings of the
10. 6. Circuit Requirement Calculations
The purpose of Circuit Requirement Calculations is to
produce a detailed estimate of the transmission capacity
required.
Circuit Requirement Calculations include
total characters transmitted per day (and/or hour) on each circuit
(average or peak circuit traffic)
message volumes (current and estimated) (accuracy often not major
concern)
response time criteria and evaluations
The result of the phase is traffic analysis reports. Circuit
requirements are added to the maps drawn in the previous
phase (5. Identify Geographic Scope).
11. 7. Network Security and Control Requirements
The purpose of Network Security and Control Requirements
phase is to include all security and control mechanisms into
the new network plans.
Security and control requirements are derived from the
organization’s security policies.
The result of the Network Security and Control phase is a
detailed document of the security and control requirements
concerning the new network. This document refers to the
geographic maps and blue prints.
12. 8. Network Configurations
The purpose of Network Configurations phase is to configure
the circuits, hardware, and software between the computers
in the network.
The steps (iterative):
evaluating software (may limit hardware and network protocol choices)
evaluating hardware
designing the type and
placement of network circuits choosing network protocols (e.g., TCP/IP,
SNA)
considerations: internetworking, expansion, inter-
organizational needs
(don’t forget diagnostics and maintenance tools)
use models and simulations where needed.
The result of Network Configurations phase is several
13. 9. Network Costs
The purpose of the Network Cost phase is to produce
cost/benefit analysis for the alternative configurations.
Sources of costs:
circuit costs
internetworking device costs (repeaters, bridges, gateways etc.)
other hardware costs (servers, cards, memory, printers, desktop
computers etc.)
software costs (network
operating system application software, middleware, protocol conversion
software, etc.)
network management costs (special hardware, software, and training
needed to develop a network management system)
personnel costs (network administrator, consultants, technicians etc.)
14. 9. Network Costs continued...
Types of costs:
initial versus recurring costs
direct versus indirect costs
the problem of identifying intangible benefits
The result of the Network Cost phase is a Request for
Proposal (RFP).
RFP is a detailed requirements document for vendors.
Its list of contents includes:
Organizational background information
Network Requirements
Service Requirements
Description of the Bidding Process
Information Required from Vendor
15. 10. Implementation
Implementation phase includes “making it work” and
evaluating the new network against the evaluation criteria.
Strategies:
a pilot project
chronological cutover
phased implementation
direct cutover (not recommended)
Follow-ups for several months.
The result of this phase is the new network in production
16. A feasibility study is usually conducted for a single application or small
group of related applications. The level of detail included in a feasibility
study sits between that of an information systems plan and the more
detailed requirements specifications. If an information systems plan
exists, a feasibility study should refine and build on the core work
products developed during the planning project. If a significant amount
of time has elapsed since the information systems plan was developed,
care should be taken to include any significant business changes that may
have occurred.
17. FS1 Define Project Scope
FS2 Activity Analysis
FS3 Needs Analysis
FS4 Conceptual Modelling
FS5 Use Case Modelling
FS6 Identify Non-Functional Requirements
FS7 Identify Options
FS8 Select Option
The feasibility study generates a number of options for acquiring a new
application. These options are evaluated for technical and financial
feasibility
FS9 Plan Acquisition Strategy
FS10 Develop Business Case
a Business Case for the proposed acquisition is developed.
18. THE FEASIBILITY STUDY
Is it possible?, is it practicable?, can it be done?
Not only economic feasibility, but also technical
feasibility, schedule feasibility, operational
feasibility.
Economic feasibility - are the benefits greater than
the costs? (see CBA)
Technical feasibility - do we ‘have the
technology’?; if not, can we get it ?
Schedule feasibility - will the system be ready on
time?
Operational feasibility - do we have the resources
to build the system?, will the system be
acceptable?, will people use it?
19. FEASIBILITY ISSUES
We cannot properly answer many of these
questions at this stage.
For example, data on actual costs and benefits is
not available, we don’t know what resources will be
at our disposal.
The feasibility study is an educated guess. Often a
‘rough and ready’ approach’
Some elements of feasibility will be more important
than others and some may directly conflict.
Sometimes ‘external considerations’ are more
important than the narrow feasibility issues
discussed here.
20. OTHER QUESTIONS ADDRESSED IN THE FEASIBILITY
STUDY
What are the requirements of the users?
What data is needed? Where does it originate?
How much data is needed?
What are the main functions and characteristics of
the proposed system?
What are the design alternatives? ( e.g. simple v
sophisticated, manual v computer)
What are the development alternatives? ( which
methodology?, do we need prototyping or pilot
studies?)
Is all of this consistent with the business and IT
strategy?
21. THE FEASIBILITY REPORT
The feasibility study will normally be carried out by
analysts or consultants who interview potential
users and review documentation.
The feasibility report should include a description
of functional requirements and possible alternative
solutions.
It should cover the four aspects of economic,
technical, schedule and operational feasibility
together with recommendations on the best way to
proceed.