Académique Documents
Professionnel Documents
Culture Documents
Introduction
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 1
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 1
Investigate Method that can be used for automatic recording of library item loaned
or returned by customer. Pay particular attention to:
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 2
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
a)
b)
Method of recording the customer making the loan or returned the item are
below.
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 3
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
If Overdue the item, then for each time $0.50 per customer set of fine.
Once a fine is created, it must be paid to clear the Customer's record
d)
If required to entry data manually then I can use library Entry Book, for example:
S/L no Customer Customer ID Address Item type Item title ISBN no Date of Signature
name issue
1 Jhon U08861 E1 CD Mission Y12-80 26/05/2008
2 Smith D08065 E14 DVD KARZ UC14-1 26/05/2008
3 Gayem S05665 T41/5 BOOK SADU U963-47 20/05/2008
4 Patron A00168 GF7 BOOK H.O.G T 78568 15/05/2008
5 Bond S18744 Bichdown CD IELTS-2 W85214 16/05/2008
6 Myckl N85700 T99/2 CD IELTS-4 Y 2-45-1 12/05/2008
7 Hussy S04767 43Y DVD Superman Y12-694 06/05/2008
e)
Equipment required to implementing computerized system.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 4
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Router: A router is used to route data packets between the deffrent branch
networks.
Connector: RJ 45 connector with RJ 45 Jack and fiber optic connector.
UPS : (for servers ) uninterrupted power supply of 12 KVA capacity with backup
time of 180 minuet at full load.
f)
The cost to install the equipment in the ten branch library
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 5
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Optic Connector
Netgear FVS318 10/100 Firewall Router 20 146$ 2920$
Mbps 8-Port VPN/Firewall
Router:
TOTAL COST 27881.05$
Recommendation:-
I have used network equipment to install the network in 10 branch library for
computerized system.
At first computer used, without computer we can not think computerized system, to
insure computerized system I have used to each branch of server computer Windows
2003 server data center addition application.
Windows Server 2003, Datacenter Edition is designed for infrastructures demanding
high security and reliability. Windows Server 2003 is available for x86, Itanium, and
x86_64 processors. It supports a maximum of up to 32 processors on 32-bit or 64
processors on 64-bit hardware. 32-bit architecture also limits memory addressability to
128 GB, while the 64-bit versions support up to 2 TB. Windows Server 2003,
Datacenter Edition, also allows limiting processor and memory usage on a per-
application basis.
Windows Server 2003, Datacenter Edition, also supports 8-node clustering. Clustering
increases availability and fault tolerance of server installations, by distributing and
replicating the service among many servers
And for central server I have used Linux operating system, it is designed for general
purpose use on desktops and servers, distributions may be specialized for different
purposes including: computer architecture support, embedded systems, stability,
security, localization to a specific region or language, targeting of specific user groups,
support for real-time applications, or commitment to a given desktop environment.
Furthermore, some distributions deliberately include only free software. Currently, over
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 6
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
three hundred distributions are actively developed, with about a dozen distributions
being most popular for general-purpose use
Barcode redder used for recording library item and customer detail, when a customer
want to loan or return item to library, librarian will be check item Barcode and customer
ID Barcode use an array of hundreds of tiny light sensors lined up in a row in the head
of the reader, Item and customer detail will store to database in server. Its help to
librarian for find item and customer detail quickly, I think that barcode redder will be
help to record correct information.
Interconnecting link used to establish network connection within different branch.
Without interconnecting link con not establish computerized network.
NIC Card used to connect computer with network, the purpose of the network card is to
prepare, send, and control data on the library network. A network card is the physical
interface between the computer and cable.
Bridge A bridge would allow these segments to see each other and use the same
network resources.
Firewall Modular hardware firewall system having Gigabyte Ethernet port, VPN access
port supporting DMZ configuration
Repeater used to interconnect tow part of network cable. By use repeater signal will be
proper amplitudes to send other part in long distance.
Connector used to connect cable with NIC card and other device
I have used router to routing date packet. It reads the information in each packet to tell
where it is going.
UPS: (uninterruptible power supply) USED for back up electricity, by use UPS I can be
protect data from loss when eclectic are unavailable.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 7
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 2
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 8
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
a)
From any branch data would be stored to the database by library management
application using the network.
When input data from any branch, data would be store/update to a central
server.
To each branch will be a server (request server).
All branch will be maintain by Central server(database server)
There are will be uses Hewlett-Packard 300GB universal hot-plug Ultra320 SCSI
hard drive. (The Compaq 146GB factory integrated hard drive is a storage
solution that has a FC-AL interface Type. Fiber Channel Arbitrated Loop or FC-
AL allows many servers and storage devices to be connected into a storage
network. This configuration offers flexibility, performance and reliability
advantages to high-end systems. This drive is an upgrade and has a data
transfer rate of 200MB per second and offers the flexibility and expandability to
meet any end-users growing storage capacity requirements.)
Any one / members can fiend information of library item to any branch.
b)
The detail supplied to the customer.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 9
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
After processing loan or return item, to the customer supplied detailes including the…
1. Membership ID
2. Item name
3. Item Serial No
4. Date of issue/Return
5. Due (if any)
6. Member Address
7. Phone number
c)
Security and data protection issue for municipal library
There is no definitive blueprint for designing a secure network; network security has to
be custom tailored to fit the needs of your network, not anyone else's. Consider, for
example, a midsize law firm network. The firm may have a special case information
system that provides access to the firm's cases to lawyers while they are on the road.
While in the office, they no doubt provide all staff with a connection to the Internet.
Network security for such a firm would need to allow access to the case information
system for authorized users on the outside of the network, while simultaneously
ensuring that full access to the Internet is always available to staff on the inside of the
network.
Contrast such a firm to a standard public library with a bibliographic database that
needs to be made available to all users on the Internet and in the library. Good network
security protects your network in a manner that is consistent with its purpose. That
being said, it is important to look at network security from as many angles as possible.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 10
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
The Internet is will be available for public use during library hours for the
purpose of study, reference and research,
Patrons/Brower is required to sign an Internet Registration Form and accept this
online Internet Usage Policy.
Patrons/ Brower are can NOT to be installing their own software programs on
the Library’s computers.
Anti-virus is used to identify and remove computer viruses, as well as many
other types of harmful computer software, collectively referred to as malware.
While the first antivirus software was designed exclusively to combat computer
viruses.
Database can access with a limited number of licenses needs to have regulated
access.
I will be provide unfiltered Internet access to staff but only filtered Internet
access to patrons.
The Library has implemented software filtering on all of its public Internet
computers. The software protects against access to visual depictions of
obscenity and materials that are "harmful to minors"
Filtering software will block many specific sites that may be offensive to some
users, but may not block all materials that may be offensive to all users.
Users should be aware that the Internet is not a secure medium and that third
parties May be able to obtain information regarding users' activities. However,
Ash field library will not release information on the use of specific Internet
resources by Members of the public except as required by law or necessary for
the proper operation Of the Library.
Recommendation:-
In this task I have define the way of store Data and .Where I will be store all data to
central device via branch server there are have a storage area network (NAS) for store
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 11
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
all information of municipal library The primary purpose of NAS is the transfer of data
between computer systems and storage elements and among multiple storage
elements, and to each branch have a 16 GB hard disk for store branch personal
information.
When any one search for any library item to any branch of library, if found this item in
this library then Ok, otherwise he / she can find this item to other branch of this library
by network via accessing library database on to central server. If found this item then
he or she can go physically to this library branch for collection this item.
Task – 3
Investigate the possible network topologies that could be create
the network (LAN) within each branch library and the network
arose the whole Municipal Library Department. Explain how the
topology operates.
Provide a recommendation for which topology to use for each
branch and for the whole department including reasons for this
recommendation.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 12
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
The possible network topology is used to municipal library are STAR topology. That
could be used to create the network (LAN) within each breach library and the network
across the whole municipal library department.
The star LAN topology, each station is directly connected to a common central node.
Typically, each station attaches to a central node, referred to as the star coupler, via
two point-to-point links, one for transmission and one for reception. In general, there
are two alternatives for the operation of the central node. One approach is for the
central node to operate in a broadcast fashion. A transmission of a frame from one
station to the node is retransmitted on all of the outgoing links. In this case, although
the arrangement is physically a star, it is logically a bus; a transmission from any
station is received by all other stations, and only one station at a time may
successfully transmit. Another approach is for the central node to act as a frame
switching device. An incoming frame is buffered in the node and then retransmitted
on an outgoing link to the destination station.
Switch
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 13
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 14
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Recommendation:-
I have used star topology to create network (LAN) within each branch library and the
across the whole Municipal Library Department, Because Star networks are relatively
easy to install and manage, Easy to detect faults and to remove parts, No disruptions to
the network then connecting or removing devices, Reduces risk of failure, Expanding
the network is simple and Managing the network is centralized.
Task – 4
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 15
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
The network media that could be used within each branch library:
To ensure the network media that could be used within each branch library and to
connect between different sites in the whole Municipal Library Department. I will to
need to ensure data transfer rates.
The Network media that I will be use within each Branch Library.
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 16
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 17
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Recommendation:
I will be use to install municipal library network as a network media Fiber optic cable
(for connect branch with central server), UTP cable (for interconnect branch network)
Reason of choice this medium:
UTP cable
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 18
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Task – 5
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 19
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Disasters in libraries have many causes, from the dramatic: arson, lightning, tornadoes,
hurricanes and earthquakes to the mundane: electrical faults, Hardware or software
failure, virus attack and burst pipes. A disaster control plan is the written documentation
that records the countermeasures taken against an event which is wholly unexpected
and damages
Building the collections of an institution. It is a document which all organizations,
Maintenance
A not just of
regime libraries,
planned should have.
and documented building maintenance will go a long way
towards minimizing the risk of floods, fire, theft, vandalism and invasion by pests.
Disastershould
Routines Plansinclude regular temperature and humidity checks in areas
Generally,as
designated a disaster plan
vulnerable to describes
damp. activities for preventative, responsive and recovery
initiatives. Typically, a disaster plan consists of the following sections:
Equipment Maintenance
Candidate name:
Equipment MD. IbrahimisAmin
maintenance NCC candidate
essential both toNO: Examination
ensure that equipment Cycle:
failure doesMarch
not2009
Assignment
cause title: Municipal
a disaster library the
and to assure department Module
reliability name: Enterprise
of equipment in aNetwork (EN)
disaster Page no: 20
situation.
Ensure that equipment stored to deal with a disaster is included in maintenance
routines
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Storage backup
I will be Keep important financial and database records organized and safe ” Make
backup copies of all critical files such as customer detail, item detail, accounting and
employee payroll data, as well as customer lists, and inventory and store these records
in a safe off-site location and ISP server. By using virtual backup method, these
methods are….
The Virtual Full Backup method was pioneered by R1Soft and overcomes limitations of
the other known backup methods.
The chief drawbacks to all of the other backup methods that Virtual Full Backups
overcome are:
The need for a periodic Full Backup to be done e.g. every week. The weekly
Full Backup that other methods require is extremely time consuming and
intensive on critical server Disk I/O resources.
Incremental Backup methods make restoring very complex as each incremental
must be replayed to return files to a particular point in time.
Incremental and Differential Backup methods provide no long term archiving or
convenient rotation of old backups. For example you can not point and click
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 21
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Delete an Incremental backup without breaking other backup sets and loosing
data.
The other backup methods are based on tape and do not properly take
advantage of disk based storage. For example a Deltas or unchanged file is
stored in every Incremental backup set multiple times. This makes sense when I
storage media am tape and it needs to be duplicate in each tape. Much Disk
Based backup use Virtual Tape Library (VTL) software to make a file appear like
a large tape. If the storage medium is Disk Based there is no need to store a
Delta or unchanged file more than once! Virtual Full Backups overcome this
limitation.
Hard copy
I will be Keep all information to hard copy in a safe off site.
Reference
Serial No URL Date Type of
reference
1 http://www.m25lib.ac.uk/m25dcp/prevent.html 18/01/2009 Text
2 http://wiki.r1soft.com/display/TP/Backup+Method+ 19/012009 Text
-+Virtual+Full+Backup75
3 http://en.wikipedia.org/wiki/Star_network 18/012009 Text
4 http://www.system3x.com/as400_cabling/ 09/022009 PDF
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 22
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)
Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009
Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 23