Procedures For Submission And Late Submission

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Salinda Upeka Malalgoda

Karunarathna H.D.T.R

12255792

P.C.P.W Goonetilleke

12256913

K.I.MADUSHANKA SILVA

12256244

Weerarthne W T Udayanga

Assessment Title

Main Assignment - ECI

Module Code

MIS2007L

Module Title

E Commerce Infrastructure

Date Submitted

06022013

Date Received

GradeMark

A SIGNED COPY OF THIS FORM MUST ACCOMPANY ALL SUBMISSIONS FOR ASSESSMENT.

STUDENTS SHOULD KEEP A COPY OF ALL WORK SUBMITTED.

Procedures for Submission and Late Submission

Ensure that you have checked the School’s procedures for the submission of assessments.

Note: There are penalties for the late submission of assessments. For further information please see the University’s Policy on Late Submission of Coursework, (http:www.ucd.ieregistrar)

Plagiarism: the unacknowledged inclusion of another person’s writings or ideas or works, in any formally presented work (including essays, examinations, projects, laboratory reports or presentations). The penalties associated with plagiarism designed to impose sanctions that reflect the seriousness of University’s commitment to academic integrity. Ensure that you have read the University’s Briefing for Students on Academic Integrity and Plagiarism and the UCD Plagiarism Statement, Plagiarism Policy and Procedures, (http:www.ucd.ieregistrar)

Declaration of Authorship

I declare that all material in this assessment is my own work except where there is clear acknowledgement and appropriate reference to the work of others.

Signed…… Salinda Upeka Malalgoda ……… Date ………06022013………

Assessment submission form_modula

Main and Alt Assignment

E-Commerce Infrastructure

Salinda Malalgoda - 12255918

Thilina Karunarathna - 12255902

Isuru Madusanka Silva - 12256913

Pandula Goonetilleke - 12255792

Udayanga Weerasekara - 12256244

2/6/2013

This is about Analyse the nature and volume of its business communications and describe where information is stored and accessed by the company and Using formal Network Analysis and Design techniques, which is propose a suitable ecommerce infrastructure for this company.

Table of Contents

This is about Analyse the nature and volume of its business communications and describe where information is stored and accessed by the company and Using formal Network Analysis and Design techniques, which is propose a suitable ecommerce infrastructure for this company.

This is about Analyse the nature and volume of its business communications and describe where information is stored and accessed by the company and Using formal Network Analysis and Design techniques, which is propose a suitable ecommerce infrastructure for this company.

Analyze the nature and volume of its business communications

Needs Analyzing

Our goal is to understand why their network been built and what sort of users & applications they have been used.

To improve poor performance

To enable new applications

To apply more security to their system

Upgrade old equipment and gain more speed

Because of above problems they desire to upgrade their network system according their geographical scope. So we trying to analyze and decide what will be the best e commerce infrastructure for that company and plan according to their capacity.

We identified what will be our objectives will be.

To define the geographical scope of the system

To define application and users that will use the network

About Company Nature

When we analyzing their Head office at Colombo 07, we identified what sort of communication they are doing in day to day business.

Their Head office is a 4 storied building.

They have including 9 branches across the country

They have one LAN and one WAN.

They using Hubs for data transmitting through the Local Area Network.

Security is less according to their capacity of computers.

Routers are using for their Wide Area Network.

All other branches to gain information have to access the Head Office main server first.

They are using 4-pair Twisted Pair cabling.

They Have 5 Logistic Departments in their office

Account Department

Information Technology Department

Marketing Department

Human Resource Department

Financial Department

IT department can access all the computers of other Departments.

Other All Departments shouldn’t access to other departments without authorization of the manager of each department.

They are not using security types such as domain controller.

They have a lack security system which we identified and trying to propose a far better system than they had.

They using Windows XP and windows server 2008 in client and server computers.

Users have to wait half n hour for the print job to download.

Network Design

They didn’t use a special technique to design their network. We decide to approach to the Building Block Network Design according to their needs which we done earlier.

Building Block Network Design

C:\Users\Salinda Malalgoda\Desktop\img005.gif

At the above of this documentation we done the first stage of building block network design which is need analyzing and but some parts still we have to do.

As we know the first step in Needs Analyzing Break the network into three conceptual parts (based on their scope).

As we decide we trying to first break up their Local Area Network into Virtual Local Area Networks.

Virtual LANs (VLANs)

Virtual LANs (VLANs) apply a Layer-2 switch into a multiple broadcast domain. Each VLAN has its own individual (common) broadcast domain (IP subnet). Individual ports and groups of ports can be assigning to a specific VLAN. Only ports focusing to the same VLAN able to communicate freely; ports which assigned to common VLAN requires a router to communicate with. Broadcasts from 1 VLAN will be sent out ports parting to another VLAN never. Please note: a Layer-2 switch which supports VLANs isn’t necessarily a Layer-3 switch. A Layer-3 switch, thus to supports VLANs, should be able to be capable of route, and cache Internet Protocol traffic flows. Layer-3 switch allows IP packets to be switch as opposed to routing, which will reduces latency.

So we planned to set a VLAN to each department and then we can use a domain controller to restrict their access to other department’s computers. So Security part will be at the bottom of this documentation and we first stepped into decide what is the best e-commerce infrastructure to this company. So as we decide to propose 5 Virtual Local Area Network and combine them into one Local Area Network. Dedicated Servers can use for different purposes such as File Servers, Communication Servers, Print Servers by each department.

As we know Information Technology Department should be able to access all the computer in all department for many reasons.

To maintain Pc faults.

To maintain network characteristics etc.

So we proposed to combine all VLAN into 1 Local Area Network in the building. At the later stage in this documentation we can see what we proposed Devices, Security and Costing Assessments.

Wide Area Network

According to first step in Needs Analyzing we need a core layer which is consisting with Distribution layers in LAN. As we know the company has 10 branches and need to transfer data with and make some transactions with the head office and other branches. So we decide to every Service branch that wants to access other branches need to access through Head office Server and do the transaction. We already know our Internet Provider will be SLT Telecom and we communicate with them and discuss about their Data links which we need to make this WAN smoothly. So through this WAN any branch can access Head office server and they can communicate with any branches also.

Problems We Looking For

We concern about mainly what are the issues regarding to our design and we mainly looking into Bandwidth Vs Latency commonly say slow network.

We try to propose a network which gives "FASTER" internet connection that’s our main responsible. In this organization there are 10 branches so Wide Area Network Should be there. We think about transaction within the head office which have a share point server and a branch office where clients access Head office’s server over the designed Wide Area Network. So our main concern is if some users inform into the helpdesk for note about slow connection what do we do?, Then company and other people should be able to buy a bigger WAN link which is wrong thing to do which is what’s really going on. As I mentioned earlier there two things to measure when we bother about company’s network link.

Bandwidth – How much data that we can we transfer at once. For example, in one packet from the source to destination we calculate this in KBps, MBps, or even in GBps if the company has lot of money.

Latency – This is how much time takes to transfer one packet from its source to destination. An electron will only travels at same speed on a (twisted pair)copper wire and increasing the bandwidth have no affect on this. So devices those process the data at various hops as an example routers, switches/Hubs and firewalls, also add to the latency. So, although the client and the server the longer transmission takes. In fact in more network devices, such as transmissions among different ISP’s, worsens this.

There is a way to handle when any data or file is transferred over the network between the client and the server. The file is broken up into packets and Headers and controls flags contain each of those packets up to plus the number of data. Here’s how it goes,

Server : Packet 1 comes

Client : Acknowledgment came

Server : Packet 2 comes

Client : Acknowledgment came

Server : Packet 3 comes

Client : Acknowledgment came

Server : Packet 4 comes

Client : Acknowledgment came

Server : Packet 5 comes

Client : Acknowledgment came

Server : Packet 6 comes

Client : Acknowledgment came

Server : Packet 7 comes

Client : Acknowledgment came

It goes until all of the packets that made up the entire file those are transmitted. We identified that bandwidth also affects the time for transmission by deciding how we can put data with minimum sizes to a packet and note that the TCP stack in our Operating System can also limit this scenario. As we know we try to describe that bandwidth also causes some issues when we try to include too much simultaneous conversation onto a pipe. We can monitor it by measuring link utilization.

Latency we can explain to the company as this. It takes one millisecond to transfer a packet between the server and client then the above packets in whole file copy would take 14milliseconds. We thought that as we move the client to a remote location and then latency will grows up, according to 100 milliseconds. Now the file copy operation will take 100 times longer than earlier: 1400 milliseconds, normally a file transfer wants exponentially more packets latency measurement which we called PING that might be 300 milliseconds.

We try to convert this problem to this company also and let’s consider the above information and look how this company will affected them

By throwing bandwidth at the share point server, we can allow many more clients (users) in branch offices in this company to have the same slow experience. Latency will cause those packets which made up the file transmission to be slow and inaccurate and their some business opportunities will be in danger.

Solutions we looking for

When we looking into design of this network, there’s some solutions we can consider about:

One major thing we thought is to place the servers closer to the clients which their previous network system unable to did. For a "cloud computing" service provider, that’s possible to have service closer to the consumers.

Reduce the hops between the client and server by subscribing to major Internet Service Provider such as SLT Telecom. But there’s always wil be users (clients) who many hop away which we cannot do anything to avoid it.

Some Advance Solutions

When a PC in the branch office access to a copy of file from the Head office server all security stuff will be involved with its transaction. The appliance at the Head Office server is a underdog among the server and the WAN connection and it listens to the streams and using has algorithm try to break down the data into some blocks which we planned to stored in the appliance according to a bunch of existing rules. When the data travels begin over the WAN connection to the branch office, the branch office appliance will also listening to the newest data and before caching them break in to blocks by using the hash algorithm. At this time no speed variance can be identified but the data stream continues to the client.

Think that another client in the same branch try to transfer this same file again then second client will also doing the normal file locking and the security stuff which are involve within it. Server believes talking to the client instead it talk to the appliance and make sure same data blocks will not be transmitted again. This will reduce the bandwidth utilization and also by deleting the need to transfer data at all we can reduce the latency also. Other than our security techniques file transferring can be local only at the branch its means between the appliance and the client.

So the system will work by using blocks the optimization will come to party when files that haven’t been requested yet over the WAN before.

Talking About Appliance

We describing that appliances work at a TCP level and this means WAN optimization can improve by several ways, e.g. Exchange, Oracle, SQL, Lotus Notes, tec. So the basic requirements are the data is not encrypted and not signed and the company also need to shut down SMB data signing in Group Policy and we also consider that these appliances are very much expensive and we make sure they will not widespread.

Propose Next Generation TCP Stack

As we consider about problems in WAN we try to introduce new TCP stack to this company and to their network system. This TCP stack isn’t the complete WAN solution but it imrove some areas of the WAN. Microsoft included the new TCP stack in Vista, Windows 7 and in Windows server 2008 and windows server 2008 R2. This will reduce our latency and here is a best example according to what we explained earlier when transfer packets before waiting for an acknowledgment.

Server : Packet 1

Server : Packet 2

Server : Packet 3

Server : Packet 4

Server : Packet 5

Server : Packet 6

Server : Packet 7

Client : I want Packet 3 again

Server : Packet 3

Client : Acknowledgment

As we explained in earlier example to transfer packets it took 1400 millisecond if our latency was 100 milliseconds but our new TCP stack will do it in 900 milliseconds.

Windows 7 & windows server 2008 R2 better together

As we know they are using windows XP and windows server 2008 we want to replace their operating system with windows 7(ultimate & enterprise) and windows server 2008 R2. This will allow Win 7 clients to accessing a branch office’s cache of whole data which are stored on a windows server 2008 R2 server and the protocols being optimized are SMB (file sharing), Http and Https which is logically, BITS which are 2 architectures.

Let’s find out with an example,

Client : Clients in the branch office which have a peer to peer network and he wants to download a file from the Head office server for a business purposes. Then all security stuff is done as this process. The client broadcast based on the Local Area Network to see whether other clients also have the file cached and it uses the hash ID for the file which is obtained from the main server. The file is downloaded from the head office server if no other client no access to it. After all security stuff another client will come and try to download another file and again it broadcasts using that hash ID. When First client responds and the second client transfer file over the LAN which is not the WAN. This uses one broadcast domain and it is limited to a VLAN. And then another problem is branch office’s cached content disabling because their computers hibernated or shuttled down.

Hosted: As we mentioned earlier in the branch office we replace server with Windows server 2008 R2 and then branch office client communicate with the server by using uncast instead of broadcast bases p2p model. This allow multiple VLAN’s because network tidies up.

We want to make sure and explain them that Branch Cache only supports to file based and not block level and caching and it also only caches when download and when uploading(saving) will be transferred over the WAN to the main(central) server and which is not optimized.

So finally we are planned to have the user (pc) in the branch office and roaming on the network and the server in the head office. We’ll always have latency when we transferring data between the remote client and the server even we described above solutions. What happens if closest client (user) logged in to the server may be central client can be access from anywhere it doesn’t matter from in a branch office, hotel, even at home but make sure data travels only over the WAN, not through the LAN.

As we know their users(clients) have to wait half n hour to print job to download and Windows server 2008 R2 solved that biggest problem which they have all printer drivers thanks to Easy Print. And also thanks to Microsoft XPS technology and make sure client runs Windows XP SP3 – 7. And Microsoft also added some applications like SSL interface which have ability to securely access those from TS gateway.

Windows server 2008 R2 called this as RDS (Remote Desktop Services) because VDI broker to access virtual desktops but we have risk in our hand to introduce to it because it have still its BETA version. By using that,

We can access familiar desktop applications.

We can reuse some administrative Systems.

Applications’ problems will reduce.

Helpdesk doesn’t need to change control to fix user issues.

So Our Main Goal is to give and describe and propose a better logical and physical design network system to the company which have more performance and less issues with it. And we try to use the latest technology design to implement a better network system and try to gain more & more performance than earlier System.

Describe the nature and function of component devices proposed for Local Area Network (LAN) and Wide Area Network (WAN).

Local Area Network (LAN)

Local Area Network is a usually high- speed network that covers a small geographical area. It is using for Information sharing and Resource Sharing. It is usually use in the single building or campus. Ethernet is most common LAN technology. A LAN requires hub, router, radio or radio technology.

Information sharing means, user can access the same files, exchanging the information/data through the emails or using internet.

Resource sharing means, organization having some hardware devices shared by all users within the organization. Etc. printers, scanners, fax machines, laptops, PCs and PDAs. Having some software packages shared by all users on a LAN. Reduced the hardware cost. User devices must consist of specialized hardware as well,

Example – bar code scanners and patient monitoring

Basic Local Area Network (LAN)

NIC (Network Interface Card) NIC (Network Interface Card)

Cables Cables

Client Hub Network Server

In the network a computer act as a server and other computers are act as a clients. The server is connected to a hub, clients are also connected to the same hub. Now that the computers each a have one a common electric door (hub), they can use the hub pass signal back and forth. To direct these signals, Routers are another name for Hub. The router is the similar of an electronic traffic that handles data traffic between the computers.

Network Interface card means every computer in the network it must have a net work card installed, name is Network Interface Card (NIC). These devices each have a primary address. In hard-wired networks, called another name for cabling Ethernet runs from the network card to hub. In a wireless the network cards and ROUTERS communicate with each other by using radio waves.

Routers means it used to, on single network have ability to use resources on other network frames would have go through number of networks connecting to number of networks called Routers.

Ethernet

Ethernet is a part of the technology that provides data-link and physical specification for controlling access to a shared to a network medium. It has emerged as the dominant technology used in the LAN networking.

There are several benefits over the LAN technologies

Easy to install and manage

Inexpensive

Flexible and scalable

Easy to interoperate between vendors.

Ethernet Standards

The 802 committee

Committee of the institute for Electrical and Electronics Engineers (IEEE).

Created the 802 MAN/Local Area Network Standards Committee for LAN standards.

This committee is usually called the 802 Committee.

The 802 Committee creates groups working for common types of standards.

802.1 for General Standards

802.3 for Ethernet Standards

802.11 for wireless LAN standards.

802.16 for WiMax Wireless Metropolitan Area Network .

The 802.3 Working Group

This group is in charge of making Ethernet standards.

The terms 802.3 and Ethernet are interchangeable today.

Figure6-4 shows Ethernet physical layers standards.

Ethernet also has data link layer standards.

Ethernet Cabling Types

4-Pair Unshielded Twisted Pair (UTP)

Coaxial Cabling

Twisted – Pair cabling (TP)

Fiber Optic cabling

4-Pair Unshielded Twisted Pair (UTP)

Ethernet is the dominant LAN standards family.

Ethernet LANs usually use 4-pair unshielded twisted pair wiring to merge hosts to the closers switch.

They also use Unshielded Twisted Pair to merge switches to other switches.

Unshielded Twisted Pair cabling uses copper wires.

Unshielded Twisted Pair mostly used for telecommunication and customer networks. It contains of various types of copper wires that have twisted into similar pair. Unshielded Twisted Pair cable doesn’t give as larger bandwidth or as good security from interference as coaxial cables or fiber optic, but it is less high cost and easier to handle it.

twisted-pair-cable-utp.jpg

Unshielded Twisted Pair (UTP)

There are some types of twisted pair cables, recognize by the number of twists per inch of the copper pairs.

CAT 3- 3 twists per inch

CAT 5- 5 twists per inch

CAT 5e – same as the CAT 5 but pairs are twist around each other.

CAT6 – 6 twists per inch, improved insulation.

Cord organization

A long of Unshielded Twisted Pair wiring is a cord.

Each cord has eight copper wires.

Each wire is insulated with dielectric (non conducting) insulation.

The wires are used four pairs.

Each pair’s two are twisted it each around other several times per one inch.

There is an outer plastic jacket that covers the four pairs.

Connectors

RJ-45 connector is the standard connector.

It plugs to an RJ- 45 jack in a host.

Characteristics

Inexpensive and easy to purchase.

Easy to install.

Represent in channel for access a links between a HOST and the closers SWITCH.

Uncrimped_rj-45_connector_close-up.jpg

RJ – 45 Connector

Coaxial Cables

Coaxial cables consist of a single wire surrounded by insulation, a metallic shield, and a plastic sheath. The shield use to protect against electromagnetic interference (EMI). This can cause attenuation, a reduction of the strength and quality of a signal. EMI can be generated by a variety of sources, such as florescent light ballasts, microwaves, cell phones, and radio transmitters. Coaxial cables are commonly used in television to homes and business.

Less prone to interference than Twisted Pair (TP) due to shield

More expensive than Twisted Pair (TP).

Using in TV cables.

There are two types of coaxial cables were used in historically in Ethernet networks such as

Thinnet

Thicknet

coaxla.gif

Coaxial Cable

Both Coaxial Cables and Twisted Pair Cables transmitting electronic signals, Fiber Optics use to transmit the signals, it is very fast than the other cables. Ethernet have two types of fiber cables such as

Single mode Fiber

It has a small glass core,0 it is allowing a single ray or mode of light to go across it. This will reduces the attenuation and dispersion of the LED or Laser signal.

It is provide high bandwidth over very long distances, measured in kilometers.

Multimode Fiber

It has a large core. Allowing multiple modes of light to transmit it. It supported for shorter distance.

Twisted – Pair cabling (TP)

Twisted pair usually use for telephones and Local Area Networks (LAN).

Decrease the electromagnetic interference.

Twisted pairs cables have number of pairs of wires.

Telephones used 2 pairs.

LAN used4 pairs.

Also used in telephone trunk lines

Shielded twisted pair can also use but cost is very expensive.

twisted-pair-cable.gif

Twisted Pair Cabling

Fiber Optics Cables

It is use a LED or Laser light to transmit a signal.

Signal transmits through the glass or plastic fiber.

It has extremely high capacity, useful for broadband.

It is properly worked under the harsh environment.

Types of fiber optics

Multimode fiber( mention in above)

Single mode fiber(mention in above)

Graded index multimode

Decrease problem by changing the refractive resources of the fiber to refocus the transmission.

It can be used over distance up to about 1000 meters.

fiber-optics.jpg

Fiber Optics

Optical Fiber Wavelength

Windows for every good glass propagation

850 nanometers (nm) +/-50mm

1310 nanometers (nm) +/-50mm

1550 nanometers (nm) +/- 50mm

Longer wavelength travel deeply.

Longer wavelength are more expensive to generate

For LAN distance, 850nm dominates because it gives sufficient distance.

Unshielded Twisted Pair VS Fiber Optics

Fiber is good for going deeply, not going faster

Unshielded Twisted Pair and Fiber Optics can be used for speeds up 10 Gbps

Fiber optics can span longer distances

Less than 100 meters, use less expensive 4 pair unshielded twisted pair.

Beyond 100 meters, fiber optics is very useful.

Hubs, Switches, Routes

Switches are generally identified as Layer -2 devices(Data-Link Layer), as switches process information stored in the Data-Link header of a frame (such as MAC address in Ethernet).similarly, routers and identified as layer-3 devices(Network Layer), as routers process logical addressing information in the Network header of a packet (such as an IP address).

Following icons will be used represent network devices

switch.jpg

m switch.jpg router.jpg hub.jpg

Hubs

Amplify signal.

All devices in the same collision domain.

All devices in the same broadcast domain.

All devices share available bandwidth

Hubs are belongs to physical layer. It is use to connect network devices together for communication. Hubs can also call as repeaters.

Thus, hubs will always forward every frame out every port, excluding the port originating the frame. Hubs do not differentiate between frame types, and thus will always forward unicasts, multicasts, and broadcasts out every port bur the originating port.

Ethernet hubs operate at half-duplex, which allows a device to either transmit or receive data, but not simultaneously. Ethernet utilizes Carrier Sense Multiple Access with Collision Detect (CSMS/CD) to control media access. Host devices monitor the physical link, and will only transmit a frame if the link is idle.

If these two devices transmit simultaneously, a collision will happen. if collision will identify, the hub will discard the frames and signal the host devices. Both devices take a random time amount and after that transmit the signal again.

Multiple hubs that are uplinked together still all belong to one collision domain. Increase the number of host devices in a single collision domain will increase the number of collisions. This can significantly degrade performance.

Hubs also used to only one broadcast domain- a hub will forward both broadcasts and multicasts out every port but the originating port. A broadcast domain is a logical segmentation of a network, dictating how far a broadcast (or multicast) frame can propagate.

Hub

Client A Client B Client C

How hubs are working

Switches

This is way how packet are switching to the destination

` Client Host

Packet switch A

Packet switch C

Packet Switch B

Packet switch E

Packet switch D

Packet switch F

Destination Host

Physical Link

Data Link

Packet switch A receives packet addressed to Destination Host .packet switch A decided to send the Frames/Packets to C or B. This is forwarding decision.

The packet switches do not know the entire path. Its only knows the next switch (B or C).

Physical links are the connection between two switches devices.

Data Link is the packets path through the network

Ex. Client Host  A  B  E F  Destination Host

This is the entire path of that particular packet.

Data link layer forwarding was original referred to as bridging. Bridging is a largely deprecated term (mostly for marketing purposes), and Data- Link layer forwarding is now commonly referred to as switching.

There some subtle technologies difference between bridging and switching. Switches usually have a higher port-density, and can perform forwarding decisions at wire speed, due to specialized hardware circuits called ASICs(application-specific Integrated Circuits). Otherwise, bridges and switches are nearly identical in functions.

Ethernet switches build MAC- address tables through a dynamic learning process. A switch behaves much like a hub when first powered on. The switch will flood every frame, including uncasts, out every port but the originating port.

The switches will then build the MAC-address table by examining the source MAC address of each frame. Consider the following diagram

Computer A

Computer B

Fa0/11

Fa0/10

When Computer A send a frame to Computer B, the switch will add Computer A’s MAC address to its table, associating it with port fa0/10. However, the switch will not learn Computer B’s MAC address until Computer B sends a frames to Computer A, or to another device connected to the switch. Switches always learn from the source MAC address.

While hubs were limited to half-duplex communication; switches can operate in full duplex. Each individual port on a switch belongs to is own collision domain. Thus switches create more collision domains, which results in fewer collisions. Like hubs though, switches belong to only one broadcast domain. A layer-2 switch will forward both broadcasts and multicasts out every port but the originating port. only layer-3 devices separate broadcast domains.

Routers

Usually hardware devices are designed to take incoming packets, analyzing and send packets to the destination. Converting the packet, dropping the packets or performing other actions.

A router has lot of benefits than the other devices (hub and switch). Hub used to transfer the data between computers or network devices, doesn’t analyze or can do something with the data it is transferring. Routers can identify the data be sent to a network, change its package and send it to another different networks. Routers usually used in home networks because it share a single network with a multiple computers. There are two types of routers and wireless routers. Router also using internet to share data and files among the users.

Details of security proposed for the conduct of ecommerce in company

Importance of the security system of the company

This company is a financial company. Security of the system is really important and they cannot afford even a micro meter error in the security system. There are millions of important data transactions within few seconds in this system. Small error or bad situation will allow huge expenditure for company to fix that again. Initiating a system must include very solid infrastructures to the security system of the whole system. Restricting unauthorized access to the system must be controlled in a vast way. Spending huge amounts for the security system will be not much of a problem for the security system. Company is having so many competitors and they cannot afford that information to be gone to the out siders. They have to have a really good control about the access. They must assure no hacking will be done.

Physical security of the system

When thinking about the physical security there are several things we have to consider about as we need to protect physical devices in order to have a good security to the valuable data of the system. There are common threats for any network system’s security

Theft of identity

Theft of data

Destruction of property

With the most valuable data in the company there will be high risks of hackers. Sometimes the place where the servers situated also can be in a risk.

There must be a high security system for the servers. Servers need to have separate rooms in each branch and the security of each of the rooms should be in a high state. There will be security camera for the security of each server. Access for the room of the server will be given to only system administrator of the branch. There must be special lock for the room and the server must be kept in another place where it has another lock. Room must have sufficient cooling system with proper ventilation. There must be no water leaks and no fire initiating matters. Fire proof materials must be used as the covers of the server. Apart from those there must be help of the security guard of the each branch to check the room at least in intervals of 3 hours.

Employees must be restricted from entering to the server room. Out siders should not know about the network room. There must be proper fire extinguish system for this server room.it will be great if the company can fix an alarm for the unauthorized breach to the server room.

Information security of the system

Basically there will be many restrictions to the people who access to the system. There must be proper management of information with guided controls. Each branch will be very strictly controlled the access and the data transaction of its clients and server. The main branch will be given much more caring about these accessing to data and authorization to the main server.

Following basic guidelines will be followed in order to maintain a proper security system to the system

All the client computers will be have a access in many profiles and each type of employees have different profiles and they will be given specific passwords each

Access to the server will be strictly controlled

Net access will be given to the employees with the restrictions(no face book, you tube access etc)

No one will be allowed to use the administrator computer except for the administrator.

Administrator will be bonded with the company for minimum 5 years

Usage of the usb drivers will be restricted and if they want to use those they will be needed the special permission from the administrator

Security of the server

Server will be mainly controlled by the security software which will be specifically designed for the server and it will be controlled by the administrator of the branch. There will be hardware added in addition to prevent virus/Trojan and unwanted attacks. All the access will be monitored by the administrator. All the unusual activities will be informed to the administrator of the branch. Administrator will have a server check every 12 hours intervals.

Server will be added with following security appliances.

Active devices

This will block the unwanted traffic and help server to do a good job

Passive device

This will detect unwanted traffic and report it

Preventative devices

These devices will scan networks and it will automatically identify the potential security problems

With the above devices all the unwanted problems will be reduced to the minimum level. Risk will be in a minimum level.

Workstation security

All the employees who are authorized to use the client computers will be provided with a password for them. They will be allowed with the different capabilities of accessing. Operational level employees will not be allowed to access to the internet while all the administrative level people will allow with their computers to the internet.

Operational level employee’s profiles will be not allowed with the USB usage. All the client computers will include with security software. Access to the social media and you tube will be restricted in operational level computers using firewalls. Apart from that access for the other client computers of the other department will be restricted with firewalls. If there is specific need to access to the cross departments it will be gone through the administrator of the branch.

Network security

Network will be secured with the system administrator’s special control. Configurations will be changed only if there is a specific requirement from the administrative of the company. Each client computer will be installed software which restricts change of the configuration settings of the network.

Fire walls

Fire walls will be activated in the network to restrict the access to unwanted places for the restricted client computers. Facebook, you tube and other social media will be restricted for the employees. Actually as this is a finance company where they deal with offline transactions they will never be wanted to use Facebook for the business purposes. Restricting the social media will give a great security from the threats of the social media spams, viruses, and trogons.

Securing of the applications

Applications in the each client computer will be secured using security software which will be installed in each client computer. And different profile will have different group of applications according to the usage. When the top management level can use the usb drivers there will be specific security software to control the viruses and mainly Trojans. The main application which will be shared with all the clients will be hourly examined hourly. Applications in the server will be checked by the security software which is specifically stored in the servers.

There will be a special place dedicated in the server to have copies of all the applications which are being used in the branch. If there is a failure those saved files will be used as backups. Every client computer will have a security check every 2 hours.

Prepare and approximate costing for your proposal

We are designing this network using Building Block Network design . That is the new technology of designing the network . Also the costing of the building block system is simpler and cost effective than traditional network design model which used to make old systems . Cost assessment is the third phase of the building block network design . it divided into the two parts

Off the shelf

Request for proposal

Request for proposal is the way of make a costing of the system and it will make with having a meetings of board of directors . This analysis is really based on the real world operating cost data . final proposal should include minimum of these purchase price , energy cost , fuel cost refueling infrastructure cost , maintain and service costs , vehicle depreciation costs , cost of labors and timing , floor space requirements cost these are the things we have to refer costs in normal company .

In this network system we used lot of new technologies and lot of new equipment to get a best performance from the system . so these are things that we used to build this system and the costs of the equipment’s that have to buy for that system .

We made this cost assessment for this process :-

Circuit cost .

Internetworking devices cost .

Hardware costs .

Network management cost including training needed for network management .

Test and maintaining costs for monitoring equipment and supporting on site repairs .

Operation costs for run the network .

these are the thing that we take to prepare the cost assessment .

we are going to make a local area network for this company and it will need a cables for connecting LAN .

we use Unshielded twisted pair and Shielded twisted pair for inter connecting the computers of the system and we need to use at least 200 meters of both from both of cables .

Need at least 200 meters coaxial cables for the network and have to buy those cables also .

And want 1200 meters of fiber optic cables for wide area networking to connecting two LANs and need speedy connection for the system so that’s why we are using fiber optic cables and it will cost high because they are very expensive .

We need 20 switches for switching and we are going to buy D-Link Web mart DGS-1210-10P switches because it’s the best switch in the market now and its cheap than other switches and it’s a quality switches. Cost of the one switch is rs.29000 but get a maximum result we need to buy these good quality switches have to fixed them to our system .

We need wireless routers for connect some devices to the system and so we need to buy some routers . we going to buy Cisco ASR 1001 - Router one router is rs.9750 and 10 routers needed . and need special routers for WAN .

Currently they using Windows XP as a operating system of the users computer and the they are using windows server 2008 in a server machine , we introduce them to the widows 7 for a user computers and windows server 2008 R2 in a server machines . there a 200+ computers have to buy a original Operating systems for those computers and have to buy windows server 2008 R2 Original software for the servers .

We need Antivirus software for company using computers for protecting from spams and viruses that can come out from the network through the internet or somewhere . To protecting from those threats we need to buy a good antivirus software for those 200+ computers .it will also add to the costing .

Company needed training instructors after make the network system . because after making the network system users must need a good knowledge of the system it will give by these training instructors . have to pay them for their job so that cost also added to the costing list .

To connecting branches we have to take a data link from the SLT . if we have a 10 branches we have to buy 10 data links from the SLT we have to pay them for take those services cost of that all added .

After made the system we if there some fault of the network system we have to fix it quickly to fix the system we have to take a service from the technician of that subject so we have to pay him also that future cost is also have to add to the costing , and after we make the system we have test the system by the tester of that subject so have to pay him for his job that cost also goes to the costing .

We have to pay the operation cost that we have to pay when we are doing these system , to electricity , labor cost who working some outside works to take some ladders to cabling who support to fixed some cables , and electricians who doing electrical works to fix switches routers and all we have to pay for them also that additional cost also must be add to the costing part .

b1Confirmation Certificate

Congratulations!

You have successfully completed the Library Plagiarism Quiz.

Student Name: ..... Salinda Upeka Malalgoda........

Student Number: .....12255918..........

Date: ...........18/11/2012...................

THIS IS TO CERTIFY THAT (signature)…….............Salinda…….................HAS COMPLETED THE PLAGIARISM QUIZ

Remember that the confirmation certificate is a statement by you that you understand plagiarism and know how to avoid it. If you think that you do not understand plagiarism and how to avoid it after working through this tutorial, you should confer with your module coordinator, no matter what score you have obtained on the test.

Please print out this page and attach a copy of the certificate to the final page in all assignments you submit on each module as part of your programme

(It is your responsibility to print the certificate, complete the information, sign it, and keep a copy of it for your records)

b1Confirmation Certificate

Congratulations!

You have successfully completed the Library Plagiarism Quiz.

Student Name: ..... Karunarathna H.D.T.R..........

Student Number: .....12255902..........

Date: ...........29/10/2012.........................

THIS IS TO CERTIFY THAT (signature)…................…Thilina……................... HAS COMPLETED THE PLAGIARISM QUIZ

Remember that the confirmation certificate is a statement by you that you understand plagiarism and know how to avoid it. If you think that you do not understand plagiarism and how to avoid it after working through this tutorial, you should confer with your module coordinator, no matter what score you have obtained on the test.

Please print out this page and attach a copy of the certificate to the final page in all assignments you submit on each module as part of your programme

(It is your responsibility to print the certificate, complete the information, sign it, and keep a copy of it for your records

b1Confirmation Certificate

Congratulations!

You have successfully completed the Library Plagiarism Quiz.

Student Name: ..... P.C.P.W Goonetilleke..........

Student Number: .....12255792..........

Date: ............18/11/2012............................

THIS IS TO CERTIFY THAT (signature)…............…Pandula.................…… HAS COMPLETED THE PLAGIARISM QUIZ

Remember that the confirmation certificate is a statement by you that you understand plagiarism and know how to avoid it. If you think that you do not understand plagiarism and how to avoid it after working through this tutorial, you should confer with your module coordinator, no matter what score you have obtained on the test.

Please print out this page and attach a copy of the certificate to the final page in all assignments you submit on each module as part of your programme

(It is your responsibility to print the certificate, complete the information, sign it, and keep a copy of it for your records)

b1Confirmation Certificate

Congratulations!

You have successfully completed the Library Plagiarism Quiz.

Student Name: ..... K.I.MADUSHANKA SILVA..........

Student Number: .....12256913..........

Date: ..........18/11/2012.......................

THIS IS TO CERTIFY THAT (signature)…................…Isuru.....……...............HAS COMPLETED THE PLAGIARISM QUIZ

Remember that the confirmation certificate is a statement by you that you understand plagiarism and know how to avoid it. If you think that you do not understand plagiarism and how to avoid it after working through this tutorial, you should confer with your module coordinator, no matter what score you have obtained on the test.

Please print out this page and attach a copy of the certificate to the final page in all assignments you submit on each module as part of your programme

(It is your responsibility to print the certificate, complete the information, sign it, and keep a copy of it for your records)

b1Confirmation Certificate

Congratulations!

You have successfully completed the Library Plagiarism Quiz.

Student Name: ..... Weerarthne W T Udayanga..........

Student Number: .....12256244..........

Date: ..........18/11/2012.......................

THIS IS TO CERTIFY THAT (signature)……..............Udayanga…...............… HAS COMPLETED THE PLAGIARISM QUIZ

Remember that the confirmation certificate is a statement by you that you understand plagiarism and know how to avoid it. If you think that you do not understand plagiarism and how to avoid it after working through this tutorial, you should confer with your module coordinator, no matter what score you have obtained on the test.

Please print out this page and attach a copy of the certificate to the final page in all assignments you submit on each module as part of your programme

(It is your responsibility to print the certificate, complete the information, sign it, and keep a copy of it for your records)



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now