This document summarizes a network design project for the Basis building. The network connects devices across two floors and includes computers, printers, switches, routers, cables, sensors, CCTV cameras, and smart door locks. The design aims to digitize the building and provide high security. Key aspects summarized are the network topology, devices and servers used, total cost, advantages and disadvantages.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
This Presentation consists of the detailed analysis of OSI & TCP/IP Model used for data transmission in Computer Network. It is very beneficial for any BTech, BCA, MCA, MTech students, or who is interested in networking field.
MEMBERS:
Abletes, Charles Chille
Agustin, Eloisa Marie U.
Curammeng, Alona Jane E.
Galvan, Cyrus Kim
Macaysa, Czyryl Anne A.
Pagtaccunan, Roshiela Mae V.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
This Presentation consists of the detailed analysis of OSI & TCP/IP Model used for data transmission in Computer Network. It is very beneficial for any BTech, BCA, MCA, MTech students, or who is interested in networking field.
MEMBERS:
Abletes, Charles Chille
Agustin, Eloisa Marie U.
Curammeng, Alona Jane E.
Galvan, Cyrus Kim
Macaysa, Czyryl Anne A.
Pagtaccunan, Roshiela Mae V.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Error detection and correction
Data link control and protocols
Point-to-Point access (PPP)
Multiple Access
Local Area Networks: Ethernet
Wireless LANS
Virtual Circuit Switching: Frame Relay and ATM
Standard Client / Server Protocols: Worldwide- web and HTTP,FTP, Electronic mail, Telnet, Secured Shell, Domain name system. Application layer: DNS: Name space – domain name space – distribution of name space Electronic mail Architecture – FILE transfer: FTP WWW and HTTP: Architecture – web documents – HTTP Network Security: Introduction - definitions – two categories - symmetric key cryptography – traditional ciphers – asymmetric key cryptography
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Error detection and correction
Data link control and protocols
Point-to-Point access (PPP)
Multiple Access
Local Area Networks: Ethernet
Wireless LANS
Virtual Circuit Switching: Frame Relay and ATM
Standard Client / Server Protocols: Worldwide- web and HTTP,FTP, Electronic mail, Telnet, Secured Shell, Domain name system. Application layer: DNS: Name space – domain name space – distribution of name space Electronic mail Architecture – FILE transfer: FTP WWW and HTTP: Architecture – web documents – HTTP Network Security: Introduction - definitions – two categories - symmetric key cryptography – traditional ciphers – asymmetric key cryptography
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
Day by day the scope of networked embedded system is rapidly increasing for monitoring & controlling either home
appliances or industry devices. The World Wide Web is a global system of interconnected computer networks that utilizes the
standard Internet Protocol Suite (TCP/IP) and allows the user to interface many real-time Embedded applications similar to data
acquisition, Industrial automations and safety measures etc,. Users can monitor & control remote machines/systems by using an
embedded web server. The main objective of this system is used to monitor the industrial parameters and control the various
machines/systems in the industry from anywhere in the world through embedded web server. The machine/instrument is
monitored and controlled by ARM 7 and in-build web server with GPRS technology. Various sensor’s are used to monitor the
parameters like pressure, speed and temperature in the industry. A relay is used in this system to control the machine/instrument
by giving ON/OFF command in the web page. The embedded device communicates through General Packet Radio Service
(GPRS). GPRS technology along with GSM can be accessed from anywhere in the world.
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Chapter 3 - Islamic Banking Products and Services.pptx
Cse318,lab report
1. Project Name: BASIS NETWORKING DESIGN
Course Code: CSE 318
Course Title: ComputerNetwork Lab
Submitted To
PranabBandhu Nath
Senior Lecturer,
Dept. of CSE,
City University, Dhaka.
Submitted By
Md Farhadul Alam Himel
ID: 181472629
Program: CSE(Day)
Batch: 51
Date of Submission: 31/10/2021
2. To display the network design on Basis building , using cisco packet tracer. I built a two floor
building network design. Here mainly focus on digitalization and smart network procedure and
give high security.
Device: Computer, Printer, Switch, Router, Wire Cable, Some digital devices like smart door
lock device etc. I’m using some sensor like motion sensor, smoke detector sensor etc. I also use a
CCTV camera for security and use an alarm and speaker for emergency purposes.
Device Works and Price (each device): Every device works for every work. I’m describing
each device part by part here.
Computer: I’m using a computer in every office, hall room, training room, manager room,
information room,all the rooms for communicating each room to another room. Every Computer
connected to a server. If anyone wants to give mail or transfer files that person can transfer files
or mail one computer to another computer. This project, I’m using two types of computer
desktop computer and Laptop computer.
Switch: A network switch (also called switching hub, bridging hub, and is networking hardware
that connects devices on a computer network by using packet switching to receive and forward
data to the destination device.
Router: A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Then, using information in its
routing table or routing policy, it directs the packet to the next network on its journey.
Motion Detector: A motion detector is an electrical device that utilizes a sensor to detect nearby
motion. Such a device is often integrated as a component of a system that automatically performs
a task or alerts a user of motion in an area.
CCTV Camera: This camera only for monitoring. It give high security.
AC: An air conditioner is a system or a machine that treats air in a defined, usually enclosed area
via a refrigeration cycle in which warm air is removed and replaced with cooler air. In
construction, a complete system of heating, ventilation, and air conditioning is referred to as
HVAC.
SIREN: When a service issues an alarm, the alarm interface sends the alarm to the chosen
monitors (for example, SDI trace, Cisco RIS Data Collector). The monitor forwards the alarm or
writes it to its final destination.
SMOKE DETECTOR: A smoke detector is a device that senses smoke, typically as an
indicator of fire. Commercial smoke detectors issue a signal to a fire alarm control panel as part
of a fire alarm system.
3. Smart Door Lock: A smart lock is arguably the most important part of a truly smart, connected
home. Not only will it allow you to come and go as you please, it will also monitor who is
entering and leaving your home while you're away.
Server: Network Server is a computer in Network that is designated to provide one or more
network service. For example file server, database server etc.
Full View of Project:
This is the full view of my project. Project name is Basis Networks Design. In this project, I’m
design 2stored building networks design. Every building have some room. Now I’m describe
about floor design-
Ground Floor: This floor is use for car parking and transport car store. There have security
garage door, CCTV camera, smoke detector, siren and motion detector.
4. First Floor: This floor has one information room, one training room and one conference room,
one office room. Every room have AC, Security Door, CCTV camera, fire monitor.
Information room: Information room have 3 Desktop Computer, one printer. All are connected
to switch.
Training Room: In training room have 3 Desktop Computer, one printer. All are connected to
switch. This room are connected to digital device and main server by using wire cable and
Switch.
Office Room: Class room have a computer and a laptop. All room are connected to Smart
device.
conference room: In conference room have 5 Desktop Computer, one printer. All are connected
to switch. This room are connected to digital device and main server by using wire cable and
Switch.
5. Second Floor: This floor have manager room, training room, officer room and a server room.
Every room have AC, Security Door, CCTV camera.
Manager room: This room have a computer, a laptop, a printer and wireless lan controller. This
are connecter to the server by using cable, wire and switch. All room are connected to Smart
device.
Training room 1: This room have 4 computer. This are connecter to the server by using cable,
wire and switch. All room are connected to Smart device.
Training room 2: This room have 4 computer. This are connecter to the server by using cable,
wire and switch. All room are connected to Smart device.
Training room 3: This room have 3 computer. This are connecter to the server by using cable,
wire and switch. All room are connected to Smart device.
officer room : This room have 3 computer. This are connecter to the server by using cable, wire
and switch. All room are connected to Smart device.
Hall room : This room have 2 computer and a laptop. This are connecter to the server by using
cable, wire and switch. All room are connected to Smart device.
6. Server Room: This room have one computer and server device. Main server is build this room.
All networks monitor by using this server. DNS, DHCP, Email, Iot and Ftp all server are in this
room. All room are connected to Smart device.
Server Details: In this project, I’m using DNS, DHCP, Email, FTP, IOT those five server.
DNS Server: The Domain Name System (DNS) is the phonebook of the Internet. When user’s
type domain names such as 'google.com' or 'nytimes.com' into web browsers, DNS is responsible
for finding the correct IP address for those sites. In this project, I’m using DNS server.
www.basis.com
7. DHCP Server: A DHCP Server is a network server that automatically provides and assigns IP
addresses, default gateways and other network parameters to client devices. It relies on the
standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to
broadcast queries by clients.
8. Email Server: A mail server (or email server) is a computer system that sends and receives
email. Mail servers send and receive email using standard email protocols. For example, the
SMTP protocol sends messages and handles outgoing mail requests. The IMAP and POP3
protocols receive messages and are used to process incoming mail.
9. FTP Server: The File Transfer Protocol is a standard network protocol used for the transfer of
computer files between a client and server on a computer network. FTP is built on a client-server
model architecture using separate control and data connections between the client and the server.
10. IoT server
IoT Data Server is a "Data Integration Controller" consisting of high reliable industrial computer
and non-programming data integration software.These functions will help the data management
in various scenes from the production cell system to production line, factory, cloud system.
12. 10. Smart AC Transtec INVERTER
Split Air Conditioner
11 51,500 5,66,500
11. Smart door 11 40,000 4,40,000
12. Server setup DNS, DHCP, Email,
FTP, IOT
5 80,000 4,00000
13. Siren Bulgar alarm 1 1500 1500
Grand Total 6,024,950
Advantage of network design
The network design for the selected company will allow the company to have many advantages.
1. Efficient network performance.
2. Users can share devices such as printers.
3. Files can be shared easily among the users under same network.
4. Data can be easily backup on the server as all the data is stored on the file server.
Disadvantage of network design
There are few disadvantages of this network design which has been outline below.
1. Purchasing all the necessary equipment can be expensive.
2. Managing large network can be complicated.
3. Viruses can be spread through the network if the precaution is not taken properly.
4. If the file server breaks down the files on the file server become inaccessible.
13. This network topology security system:
1. Router use to maintain data security.
2. Secure perimeter system.
3. Switch use for data protect.
4. Packet filtering gateway.
5. Sensor networks.
6. Private network use.
7. Ip & Mac based internet connection.
8. User access authentication.
In this project work. I’m trying to give full effort to make this project properly. The network
design which has been designed for the company will make the system more robust and efficient
to use. However, the cost might seem a bit high but this will help in the long run to secure the
complete system. The success of a company depends specifically on the security of the network,
which they are using.
At last I would thank my honorable teacher who give me this
project.