SlideShare a Scribd company logo
1 of 10
1. Introduction to ABC Company.
The ABC Computer Company was started in the mid 2008 with the aim of
developing software for the PC users. The company developed the first professional
word-processing package for the DOS environment, called ABC zoom (version 4).
The company has now developed a group of products for the Windows environment.
Although the company makes software for the use of all, its specific aim is to provide
the software and fonts. To that end, the company provides its software and expertise
to the various groups doing that work.
The founder of Tibetan Computer Company, Mr. Tony Duff, is a translator who
directs the company
The ABC Computer Company effectively became a part of the Australian Heritage
Project and continued to develop its software in the context of a aboriginal text
preservation project. As a result of the two projects working together, several fine
fonts were developed. These typefaces are considered by Australians to be the best
available.
Another outcome was the word processor called zoom (version 4). It was based in
WordPerfect for DOS and, because of its many features, became regarded as the
only software suitable for serious publishing. It is still used by most people in
Australia.
With the decline of DOS, the company stopped developing the DOS-based
program and turned its attention to developing a set of standalone programs for
Windows that could do all of the things needed for publishing.
Three stand-alone programs for Windows have been produced and are being
actively developed.
In 2009, a Macintosh version of PDF Reader was made available. Three
Translation software (dictionaries) are available for the Macintosh in that
format. We hope in the future to make their texts and other reference works
available in the Macintosh, too.
The products of ABC Computer Company can be purchased through a number of
distributors around the world. However, the company focuses on electronic sales
and delivery of its products.
Role as IT Consultant /Support Person
There are different roles that can be played as an IT consultant:
the advisory role and action role.Determining which one to play will depend upon the
client's style, how you work together and the nature of the project.
Advisory Role
The most common role we will play as an IT consultant is that of an advisor to the
client. We will need to research and investigate, then review the information that is
collected. After everything has been evaluated, one has to present a report and
recommendations for the next steps to the client, and client is responsible for
carrying out these steps.
Action
Sometimes a client will have a project planned and evaluated , and they simply need
an IT consultant to complete it for them. We have the skills to complete the job, this
can be an easy task because we have the guidelines already set for them.
Regardless of what role we take, we are responsible for completing the job assigned
by your clients in a way that best meets their needs. Our role will most likely change
depending upon the project, and we should gauge it by the method that will be best
for your client.
2.
3.
In the case where super high speed Internet access is provided to a business, the
high-speed connection would be brought all the way up to the different department
premises using the Ethernet (Optical Fiber). Typically the carrier would bring fibre to
the building and would use the Demarcation device as a port extension to the core
router at the customer premise. Using this setup and equipment, wire speed service
is brought all the way to all the departments.
In the growing environment of carrier-grade Ethernet networks and IP-services such
as VoIP and IPTV, ensuring Service Level Agreements and assuring the best Quality
of Service possible evolved from being a competitive advantage to an absolute
necessity. In order to achieve the expected performance, all the departments need
enhanced equipments and capabilities, as well as devices used to actually measure
performance of their own network as well as end-to-end links while disregarding.
4. Physical network of each department.
All the departments are connected with the switch which is finally connected with the
Router.The internal Network is protected.In between the internal network and the
external network i.e the internet there is a protection wall Firewall.Firewall blocks all
the external and unauthorised users from logging into the ABC network.
5.
User/ Device/ Network Requirements.
With current Ethernet solutions, a service provider cannot test or diagnose the entire
link, or ensure its SLA end-to-end. The Last Mile is invisible to operators’ testing
equipments, or will include the customer’s network which can in turn affect the
results.
The EDD creates a clear demarcation point between carrier’s and the customer’s
networks and provides visibility all the way to the various departments.
This solution allows the operator to effectively isolate
the departments network when testing and monitoring the end-to-end link, and thus
eliminate diagnostic errors due to end-customer activities.
Because an Ethernet Demarcation Device is always in the data path, it should be
able to sustain wire speed rates and introduce no significant delay or jitter while
sporting a bullet-proof reliability in order to avoid any impact on network
performance. Furthermore, to be Per-Flow Statistics effective and fulfill its core
tasks, the Demarcation device should also feature intelligent loopbacks, and allow
tracking of bandwidth utilization of every stream delivered.
The Ethernet Demarcation Device (EDD), using a high-performance architecture,
minimizes intrinsic packet-jitter and latency, and offers the solution to these
challenges by implementing standards-based OAM, loop-back capabilities.
Providing per-flow statistics,
The Ethernet Demarcation Device (EDD
6.
Upgrading Device:
The ABC Company is still using the same old networks with all the hub’s and cables
which makes a hard configuration for all the users and system administration to
configure the network.
As an IT Consultant we can suggest them to go with the secured Wireless networks.
Connecting all the departments by access points and secured networks protecting
using WEP technology and encrypted password..
All the departments can communicate internally but for the external network to
communicate needs authorised access.It can be further protected using Firewall.
Internal network can be fully secured using Firewall so that external unauthorised
users and intrusions can be monitored.
7.Easy steps to test the network and device:
Steps
1. Open a command prompt.
1. Click on the "Start" button.
2. Select "Run". A window will open with a text box.
3. Type cmd
in the text box.
1.
1. Click "Ok" or press [Enter]. The command prompt will then appear. This is the default
command-line interface for Windows.
2. Test the loop-back address. Type ping 127.0.0.1
. It is the same for every computer, so you do not need to change this. This will test your computer's
network chip, not your modem, router, or Internet connection.
1.
1. You can continuously test a connection using the command ping 64.233.161.99 -t
1.
1. Place -n 20
at the end of the command to send 20 pings. Replace the number 20 with any
value (the value will be limited to a 32-bit or 64-bit integer).
1. Look at the output.
1. If everything is correct, you will see:
Reply from 127.0.0.1: bytes...
Reply from 127.0.0.1: bytes...
Reply from 127.0.0.1: bytes...
Reply from 127.0.0.1: bytes...
2. Then it will tell you the ping statistics. This should say 0% loss.
3. Keep an eye on the response time, as it represents the connection's latency between you and
the server. Double digit values, such as 50ms, is very good. This varies drastically depending
upon where the server is in relation to your computer. Generally, most connections should
have latency less than a few hundred milliseconds. If there is no network connection, you will
see the output "Request timed out" repeated four times.
2. Test your local Gateway. Find your Default Gateway's IP address:
1. Click on the "Start" button.
2. Select "Run". A window will open with a text box.
3. Type ipconfig in the text box.
1.
1. Click "Ok" or press [Enter]. The command prompt will then appear with output from the ipconfig
command.
2. Find the listing for "Default Gateway". This is the IP you can use in a ping to test the connection
between your computer and your router or ISP.
2. Test beyond your local network. Test the connectivity of your modem, router, network, or
Internet connection by using an IP address on the Internet.
3. Check Domain Name Resolution. Instead of an IP address, type in a site's domain name, such
as www.google.com. Pining a domain name tests your computer and network's ability to resolve
network names (translating them to IP addresses).
4. Measure network and Internet performance (Windows NT, 2000, XP, and Vista only). Use the
tracert
command to measure the response of each hop in a network path. Your
connection to any one server will require multiple "hops" between other
servers and networking components. The fewer number of hops, the better.
Most connections to a server on the Internet will include at least a dozen
hops. To test:
1. With the command prompt open, type tracert xxx.xxx.xxx.xxx
, replacing xxx.xxx.xxx.xxx with an IP address on the Internet.
1.
1. Press [Enter] and watch as each hop is 'pinged' and logged. The first ping should be your
computer, modem, or router, and the last ping should be your target address.
2. Notice that the response time for points farther away from you will be greater than those closer
to you.
You can also use commands such as "ipconfig" to find out your IP address.
If you use a dial-up connection, then you may see higher latencies, or even lost packets (% loss).
An alternative method to start a ping:
1. Click on the "Start" button.
2. Select "Programs" or "All Programs".
3. Select "Accessories".
4. Select "Command Prompt".
5. Type in ping
1. Press [Space].
2. Type in a website address.
3. It will return a set of numbers, separated by periods.
Type those numbers into the address bar of you Internet browser
8.
Peripheral installation on a Network.
Designing Network
Settle on a peer-to-peer network or a client/server network.
Pick you network system software.
Pick a network language.
Figure out what hardware you need.
Decide on what degree of information security you need.
Choose software and hardware solutions to handle day-to-day management
chores.
Rolling Out Your Network
Rolling out your network requires the following steps:
Run and test network cables.
Install the server or servers if you’re setting up a client/server network. (If you
are setting up a peer-to-peer network, you typically don’t have to worry about
any dedicated servers.)
Set up the workstation hardware.
Plug in and cable the Network Interface Cards (NICs – these connect the
network to the LAN).
Install the hub or hubs (if you are using twisted-pair cable).
Install printers.
Load up the server software (the NOS, or Network Operating System) if your
network is a client/server type.
Install the workstation software.
Install modem hardware for remote dail-up (if you want the users to be able to
dial into the network).
Install the programs you want to run (application software).
Managing Network(Printer):
Printer can be added to any department and further it can be shared to all the
department as shown in the figure.
Print Inspector can be used for further easy accessibility. Print Inspector
immediately starts monitoring any printer added to the list of monitored
printers. The program captures all jobs sent to the printer by computers in the
network. When a job is done, the program writes information about it to the
database.
Submitted by Roshan Basnet
306939

More Related Content

What's hot

Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressingUccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressingShu Shin
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
How Does the Internet Work? : Notes
How Does the Internet Work? : NotesHow Does the Internet Work? : Notes
How Does the Internet Work? : NotesSubhajit Sahu
 
Pears
PearsPears
Pearsthips
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
How to use packet tracer
How to use packet tracerHow to use packet tracer
How to use packet tracerYunita Siswanti
 
Presentation 1 The Internet
Presentation 1 The InternetPresentation 1 The Internet
Presentation 1 The Internetjeckman1360
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
Nat presentation
Nat presentationNat presentation
Nat presentationhassoon3
 
Excel Based IP Functions
Excel Based IP FunctionsExcel Based IP Functions
Excel Based IP FunctionsRajiv Bhardwaj
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMEILLEN IVY PORTUGUEZ
 
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003  -may10_-_lect02a_-_intro_to_networking_commands_softwareUccn1003  -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_softwareShu Shin
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshopAli Nezhad
 

What's hot (20)

Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressingUccn1003  -may10_-_lect01b_-_intro_to_network_devices_addressing
Uccn1003 -may10_-_lect01b_-_intro_to_network_devices_addressing
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
How Does the Internet Work? : Notes
How Does the Internet Work? : NotesHow Does the Internet Work? : Notes
How Does the Internet Work? : Notes
 
Mantra
MantraMantra
Mantra
 
C n practical file
C n practical fileC n practical file
C n practical file
 
Pears
PearsPears
Pears
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
K1102026669
K1102026669K1102026669
K1102026669
 
How to use packet tracer
How to use packet tracerHow to use packet tracer
How to use packet tracer
 
Skype
SkypeSkype
Skype
 
Point of preference (POP)
Point of preference (POP)Point of preference (POP)
Point of preference (POP)
 
Presentation 1 The Internet
Presentation 1 The InternetPresentation 1 The Internet
Presentation 1 The Internet
 
Ip and mac adress
Ip and mac adressIp and mac adress
Ip and mac adress
 
Networking question
Networking questionNetworking question
Networking question
 
Nat presentation
Nat presentationNat presentation
Nat presentation
 
Wan notes
Wan notesWan notes
Wan notes
 
Excel Based IP Functions
Excel Based IP FunctionsExcel Based IP Functions
Excel Based IP Functions
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003  -may10_-_lect02a_-_intro_to_networking_commands_softwareUccn1003  -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshop
 

Similar to Network Design for a company

Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
Week 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitWeek 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitDavid Nesbit II
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answermandarshetye45
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web TechnologyArun Kumar
 

Similar to Network Design for a company (20)

Smart (3 files merged)
Smart (3 files merged)Smart (3 files merged)
Smart (3 files merged)
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Week 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbitWeek 4_Project Part 2_DNesbit
Week 4_Project Part 2_DNesbit
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
RFP-Final3
RFP-Final3RFP-Final3
RFP-Final3
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking
NetworkingNetworking
Networking
 
iot
iotiot
iot
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Network Design for a company

  • 1. 1. Introduction to ABC Company. The ABC Computer Company was started in the mid 2008 with the aim of developing software for the PC users. The company developed the first professional word-processing package for the DOS environment, called ABC zoom (version 4). The company has now developed a group of products for the Windows environment. Although the company makes software for the use of all, its specific aim is to provide the software and fonts. To that end, the company provides its software and expertise to the various groups doing that work. The founder of Tibetan Computer Company, Mr. Tony Duff, is a translator who directs the company The ABC Computer Company effectively became a part of the Australian Heritage Project and continued to develop its software in the context of a aboriginal text preservation project. As a result of the two projects working together, several fine fonts were developed. These typefaces are considered by Australians to be the best available. Another outcome was the word processor called zoom (version 4). It was based in WordPerfect for DOS and, because of its many features, became regarded as the only software suitable for serious publishing. It is still used by most people in Australia. With the decline of DOS, the company stopped developing the DOS-based program and turned its attention to developing a set of standalone programs for Windows that could do all of the things needed for publishing. Three stand-alone programs for Windows have been produced and are being actively developed. In 2009, a Macintosh version of PDF Reader was made available. Three Translation software (dictionaries) are available for the Macintosh in that format. We hope in the future to make their texts and other reference works available in the Macintosh, too. The products of ABC Computer Company can be purchased through a number of distributors around the world. However, the company focuses on electronic sales and delivery of its products. Role as IT Consultant /Support Person There are different roles that can be played as an IT consultant: the advisory role and action role.Determining which one to play will depend upon the client's style, how you work together and the nature of the project. Advisory Role The most common role we will play as an IT consultant is that of an advisor to the client. We will need to research and investigate, then review the information that is
  • 2. collected. After everything has been evaluated, one has to present a report and recommendations for the next steps to the client, and client is responsible for carrying out these steps. Action Sometimes a client will have a project planned and evaluated , and they simply need an IT consultant to complete it for them. We have the skills to complete the job, this can be an easy task because we have the guidelines already set for them. Regardless of what role we take, we are responsible for completing the job assigned by your clients in a way that best meets their needs. Our role will most likely change depending upon the project, and we should gauge it by the method that will be best for your client. 2.
  • 3. 3. In the case where super high speed Internet access is provided to a business, the high-speed connection would be brought all the way up to the different department premises using the Ethernet (Optical Fiber). Typically the carrier would bring fibre to the building and would use the Demarcation device as a port extension to the core router at the customer premise. Using this setup and equipment, wire speed service is brought all the way to all the departments. In the growing environment of carrier-grade Ethernet networks and IP-services such as VoIP and IPTV, ensuring Service Level Agreements and assuring the best Quality of Service possible evolved from being a competitive advantage to an absolute necessity. In order to achieve the expected performance, all the departments need enhanced equipments and capabilities, as well as devices used to actually measure performance of their own network as well as end-to-end links while disregarding. 4. Physical network of each department.
  • 4. All the departments are connected with the switch which is finally connected with the Router.The internal Network is protected.In between the internal network and the external network i.e the internet there is a protection wall Firewall.Firewall blocks all the external and unauthorised users from logging into the ABC network. 5. User/ Device/ Network Requirements.
  • 5. With current Ethernet solutions, a service provider cannot test or diagnose the entire link, or ensure its SLA end-to-end. The Last Mile is invisible to operators’ testing equipments, or will include the customer’s network which can in turn affect the results. The EDD creates a clear demarcation point between carrier’s and the customer’s networks and provides visibility all the way to the various departments. This solution allows the operator to effectively isolate the departments network when testing and monitoring the end-to-end link, and thus eliminate diagnostic errors due to end-customer activities. Because an Ethernet Demarcation Device is always in the data path, it should be able to sustain wire speed rates and introduce no significant delay or jitter while sporting a bullet-proof reliability in order to avoid any impact on network performance. Furthermore, to be Per-Flow Statistics effective and fulfill its core tasks, the Demarcation device should also feature intelligent loopbacks, and allow tracking of bandwidth utilization of every stream delivered. The Ethernet Demarcation Device (EDD), using a high-performance architecture, minimizes intrinsic packet-jitter and latency, and offers the solution to these challenges by implementing standards-based OAM, loop-back capabilities. Providing per-flow statistics, The Ethernet Demarcation Device (EDD 6. Upgrading Device:
  • 6. The ABC Company is still using the same old networks with all the hub’s and cables which makes a hard configuration for all the users and system administration to configure the network. As an IT Consultant we can suggest them to go with the secured Wireless networks. Connecting all the departments by access points and secured networks protecting using WEP technology and encrypted password.. All the departments can communicate internally but for the external network to communicate needs authorised access.It can be further protected using Firewall. Internal network can be fully secured using Firewall so that external unauthorised users and intrusions can be monitored. 7.Easy steps to test the network and device: Steps 1. Open a command prompt. 1. Click on the "Start" button. 2. Select "Run". A window will open with a text box.
  • 7. 3. Type cmd in the text box. 1. 1. Click "Ok" or press [Enter]. The command prompt will then appear. This is the default command-line interface for Windows. 2. Test the loop-back address. Type ping 127.0.0.1 . It is the same for every computer, so you do not need to change this. This will test your computer's network chip, not your modem, router, or Internet connection. 1. 1. You can continuously test a connection using the command ping 64.233.161.99 -t 1. 1. Place -n 20 at the end of the command to send 20 pings. Replace the number 20 with any value (the value will be limited to a 32-bit or 64-bit integer). 1. Look at the output. 1. If everything is correct, you will see: Reply from 127.0.0.1: bytes... Reply from 127.0.0.1: bytes... Reply from 127.0.0.1: bytes... Reply from 127.0.0.1: bytes... 2. Then it will tell you the ping statistics. This should say 0% loss. 3. Keep an eye on the response time, as it represents the connection's latency between you and the server. Double digit values, such as 50ms, is very good. This varies drastically depending upon where the server is in relation to your computer. Generally, most connections should have latency less than a few hundred milliseconds. If there is no network connection, you will see the output "Request timed out" repeated four times. 2. Test your local Gateway. Find your Default Gateway's IP address: 1. Click on the "Start" button. 2. Select "Run". A window will open with a text box. 3. Type ipconfig in the text box.
  • 8. 1. 1. Click "Ok" or press [Enter]. The command prompt will then appear with output from the ipconfig command. 2. Find the listing for "Default Gateway". This is the IP you can use in a ping to test the connection between your computer and your router or ISP. 2. Test beyond your local network. Test the connectivity of your modem, router, network, or Internet connection by using an IP address on the Internet. 3. Check Domain Name Resolution. Instead of an IP address, type in a site's domain name, such as www.google.com. Pining a domain name tests your computer and network's ability to resolve network names (translating them to IP addresses). 4. Measure network and Internet performance (Windows NT, 2000, XP, and Vista only). Use the tracert command to measure the response of each hop in a network path. Your connection to any one server will require multiple "hops" between other servers and networking components. The fewer number of hops, the better. Most connections to a server on the Internet will include at least a dozen hops. To test: 1. With the command prompt open, type tracert xxx.xxx.xxx.xxx , replacing xxx.xxx.xxx.xxx with an IP address on the Internet. 1. 1. Press [Enter] and watch as each hop is 'pinged' and logged. The first ping should be your computer, modem, or router, and the last ping should be your target address. 2. Notice that the response time for points farther away from you will be greater than those closer to you. You can also use commands such as "ipconfig" to find out your IP address. If you use a dial-up connection, then you may see higher latencies, or even lost packets (% loss). An alternative method to start a ping: 1. Click on the "Start" button. 2. Select "Programs" or "All Programs". 3. Select "Accessories".
  • 9. 4. Select "Command Prompt". 5. Type in ping 1. Press [Space]. 2. Type in a website address. 3. It will return a set of numbers, separated by periods. Type those numbers into the address bar of you Internet browser 8. Peripheral installation on a Network. Designing Network Settle on a peer-to-peer network or a client/server network. Pick you network system software. Pick a network language. Figure out what hardware you need. Decide on what degree of information security you need. Choose software and hardware solutions to handle day-to-day management chores. Rolling Out Your Network Rolling out your network requires the following steps: Run and test network cables. Install the server or servers if you’re setting up a client/server network. (If you are setting up a peer-to-peer network, you typically don’t have to worry about any dedicated servers.) Set up the workstation hardware. Plug in and cable the Network Interface Cards (NICs – these connect the network to the LAN). Install the hub or hubs (if you are using twisted-pair cable). Install printers. Load up the server software (the NOS, or Network Operating System) if your network is a client/server type. Install the workstation software. Install modem hardware for remote dail-up (if you want the users to be able to dial into the network). Install the programs you want to run (application software). Managing Network(Printer):
  • 10. Printer can be added to any department and further it can be shared to all the department as shown in the figure. Print Inspector can be used for further easy accessibility. Print Inspector immediately starts monitoring any printer added to the list of monitored printers. The program captures all jobs sent to the printer by computers in the network. When a job is done, the program writes information about it to the database. Submitted by Roshan Basnet 306939