Assignment 1 Application Software, System software, Hardware, Networking and Equipment. Submitted By Roll Number Name !"#1$#1% Sandeep !auriya "ES !anagement &ollege and 'esearc( &entre, !umbai Application Software 1. Claim Tracer S!stem About " )(e claim tracker system de*eloped by tec(process payments ser*ices limited for "&"&" +ombard. "t was first released in t(e $%%$ under t(e name ,eb &laim tracker system. And later different *ersion (as been released as per user requirements c(anges. Purpose " )(e purpose t(e of claim tracker is to track t(e policy claim status online so t(at customer can easily comes to know about claim related information and different stages of t(e claims processing. )(e leads to more settlement on claim *ery as compare ot(er insurance company and satisfying customer due to unique ser*ices. The application is used for tracking marine & non-marine claims registered and providing the status update .for the same. Implementation & Setup " )(e de*elopment (as been done in t(e Asp.net $.% and back#end as sql ser*er $%%%. )(e implementation (as been done in t(e "&"&" +ombard en*ironment on (ig(ly configured ser*er. as it is t(e web based application so t(e publis( code (as been deployed on ser*er and accessing t(e t(roug( specific -'+ gi*en to user. Maintenance #Re$ular & %mer$enc!&' )(e maintenance (as been done by "&"&" +ombard as well as tec(process payment ser*ices limited. .rimary maintenance acti*ity is maintained by "&"&" +ombard like Ser*er space management, ser*er maintenance etc. and all query related to application (as been mail to tec(process on daily basis. )(ey sol*ed t(e query on daily t(roug( t(e interacti*e communication between business analyst and de*eloper. "n t(e cases of any emergency, tec(process always pro*ide t(e $/01 ser*ices to "&"&" +ombard for claim tracker system. "ES !anagement &ollege and 'esearc( &entre, !umbai Ris Mana$ement & Contin$enc! plan' )(e application can be (acked by (acker to a*oid t(is risk. )(e "&"&" +ombard (as implemented t(e different AS+& points to pre*ent from (acker. )(e (acker can2t (acked t(e application. )(e all contingency plan (as been (andled by company like disaster reco*ery. )(e 3' ser*er (as been maintained separately. Any problem (appened on t(e current ser*er, t(ey directly redirect to 3' ser*er. R(I & )uration " )(is application makes company claim related acti*ity *ery faster and t(ey generate more money t(an company e4pectation. So return on in*estment generates more money t(at in*ested in t(is application. )(is duration of application is increased e*ery year due to different c(anges in t(e application. )(e application will be continues till t(e company e4ist. *p$ra)e or Chan$e " )(e application was de*eloped in .net framework $.% and now upgraded to .net frame work 5.6 and now new *ersion of t(e .net framework (as been came in t(e market. Now "&"&" +ombard is planning to upgrade to /.6 and t(e c(anges request of t(e application (as t(e done e*ery year per new business c(anges in t(e company. "ES !anagement &ollege and 'esearc( &entre, !umbai +. ,rau) Intimation S!stem About " )(e fraud "ntimation system de*eloped by tec(process payments ser*ices limited for "&"&" +ombard. "t was first released in t(e $%%% under t(e name 7raud "ntimation system. And later different *ersion (as been released as per user requirements c(anges. )(e application de*eloped on )(ree#tier arc(itecture tracks t(e fraud details and action taken status. Purpose " )(e application is used for tracking fraud registered and pro*iding t(e status update for t(e same. )(e purpose of t(e application is to intimate t(e fraud by any in t(e company, if any one comes to know about t(e fraud done by (is subordinates or anyone in t(e organi8ation, t(e intimator can directly "ntimates fraud t(roug( login to t(is online fraud "ntimation system. Implementation & Setup " )(e de*elopment (as been done in t(e Asp.net $.% and back#end as sql ser*er $%%%. )(e implementation (as been done in t(e "&"&" +ombard en*ironment on (ig(ly configured ser*er. as it is t(e web based application so t(e publis( code (as been deployed on ser*er and accessing t(e t(roug( specific -'+ gi*en to user. Maintenance #Re$ular & %mer$enc!&' )(e maintenance (as been done by "&"&" +ombard as well as tec(process payment ser*ices limited. .rimary maintenance acti*ity is maintained by "&"&" +ombard like Ser*er space management, ser*er maintenance etc. and all query related to application (as been mail to tec(process on daily basis. )(ey sol*ed t(e query on daily t(roug( t(e interacti*e communication between business analyst and de*eloper. "n t(e cases of any emergency, tec(process always pro*ide t(e $/01 ser*ices to "&"&" +ombard for claim tracker system. "ES !anagement &ollege and 'esearc( &entre, !umbai Ris Mana$ement & Contin$enc! plan' As t(is is t(e fraud "ntimation application, )(e information cannot be re*ealed to anyone in t(e company so t(e application is controlled *arious risk management points. )(e application can be (acked by (acker to a*oid t(is risk. )(e "&"&" +ombard (as implemented t(e different AS+& points to pre*ent from (acker. )(e (acker can2t (acked t(e application. )(e all contingency plan (as been (andled by company like disaster reco*ery. )(e 3' ser*er (as been maintained separately. Any problem (appened on t(e current ser*er, t(ey directly redirect to 3' ser*er. R(I & )uration " )(is application is used intimate fraud related case like fake policy gi*en to customer and policy amount taken by users9 if t(is entire amount is sa*ed by company t(en ':" will be increased. So return on in*estment generates more money t(at in*ested in t(is application. )(is duration of application is increased e*ery year due to different c(anges in t(e application. )(e application will be continues till t(e company e4ist. *p$ra)e or Chan$e " )(e application was de*eloped in .net framework $.% and now upgraded to .net frame work 5.6 and now new *ersion of t(e .net framework (as been came in t(e market. Now "&"&" +ombard is planning to upgrade to /.6 and t(e c(anges request of t(e application (as t(e done e*ery year per new business c(anges in t(e company.
"ES !anagement &ollege and 'esearc( &entre, !umbai S!stem Software 1. -I(S software About' B":S software is stored on a non#*olatile ':! c(ip on t(e mot(erboard. "t is specifically designed to work wit( eac( particular model of computer, interfacing wit( *arious de*ices t(at make up t(e complementary c(ipset of t(e system. "n modern computer systems, t(e B":S contents are stored on a flas( memory c(ip so t(at t(e contents can be rewritten wit(out remo*ing t(e c(ip from t(e mot(erboard. )(is allows B":S software to be easily upgraded to add new features or fi4 bugs, but can make t(e computer *ulnerable to B":S root kits. Purpose " )(e fundamental purposes of t(e B":S are to initiali8e and test t(e system (ardware components, and to load a boot loader or an operating system from a mass memory de*ice. )(e B":S additionally pro*ides abstraction layer for t(e (ardware, i.e. a consistent way for application programs and operating systems to interact wit( t(e keyboard, display, and ot(er input0output de*ices. ;ariations in t(e system (ardware are (idden by t(e B":S from programs t(at use B":S ser*ices instead of directly accessing t(e (ardware. !odern operating systems ignore t(e abstraction layer pro*ided by t(e B":S and access t(e (ardware components directly. )(e B":S of t(e original "B! .&0<) (ad no interacti*e user interface. Error messages were displayed on t(e screen, or coded series of sounds were generated to signal errors. :ptions on t(e .& and <) were set by switc(es and =umpers on t(e main board and on perip(eral cards. !odern ,intel#compatible computers pro*ide a setup routine, accessed at system power#up by a particular key sequence. )(e user can configure (ardware options using t(e keyboard and *ideo display. "ES !anagement &ollege and 'esearc( &entre, !umbai Implementation & Setup' )(e "ntel B":S "mplementation )est Suite >B")S? pro*ides a bootable pre#:S en*ironment for testing B":Ses and in particular t(eir initiali8ation of "ntel processors, (ardware, and tec(nologies. B")S can *erify your B":S against many "ntel recommendations. "n addition, B")S includes "ntel@s official reference code as pro*ided to B":S, w(ic( you can use to o*erride your B":S@s (ardware initiali8ation wit( a known#good configuration, and t(en boot an :S. Aou mig(t want to use B")S if Aou@re a system or B":S de*eloper, and you want to *alidate t(at your system meets "ntel@s recommendations. Aou@re an :S or application de*eloper building on tec(nologies pro*ided by "ntel platforms, and you want to c(eck if your system >or one of your user@s systems? (as configured t(ose tec(nologies correctly. Aou@re an ad*anced user or de*eloper, and you want to c(eck your B":S to see if it configures "ntel (ardware correctly and if not, to make a stronger case to your B":S *endor to get it fi4ed. Aou need to poke (ardware in a low#le*el way, and you need a pre#:S en*ironment to work in to a*oid :S interference. B")S functionality fits in t(ree broad categories ;alidate run test suites to *erify recommendations &onfigure o*erride B":S using "ntel reference code "ES !anagement &ollege and 'esearc( &entre, !umbai Maintenance #Re$ular & %mer$enc!&' B":Sis a*ailable for download9 t(is is a maintenance update for t(e production '$.%.% release. )(is update can be manually downloaded or automatically downloaded directly from &&S using Eclipse -pdate !anager9 see t(e B":S !&S3B -ser@s Cuide for details on setting up automatic software updates. )(e ma=or updates from t(e last maintenance release, B":S !&S3B $.%./, are :ptimi8ed .++ and 33' configurations in "B+ and .latform +ibrary Added support for !A3 prelinker bypass mode -pdated components SAS0B":S, E3!A5 ++3, .A ++3, D!SS ++3, .&"e ++3, Hyperlink ++3, and <3&)ools Added programEe*m script to simplify updating E;! flas( contents Added "B+ command#line tool to modify configuration Added .:S) print of configuration registers Bug fi4es >see t(e 'elease Notes for full list? Ris Mana$ement & Contin$enc! plan' )(e 'isk in t(e B":S software is *arying computer to computer. !any released of t(e software (as (andled in t(e risk. )(e contingency is implemented to (andle different risk. R(I & .uration " )(e !icrosoft and "ntel (a*e generated more money in t(e B":S. )(e durability of t(e B":S is more t(an ot(er system software. )(e ':" of B":S (as more income t(an t(e in*ested income. *p$ra)e or chan$e' :ccasionally, a computer will need to (a*e its B":S updated. )(is is especially true of older mac(ines. As new de*ices and standards arise, t(e B":S needs to c(ange in order to "ES !anagement &ollege and 'esearc( &entre, !umbai understand t(e new (ardware. Since t(e B":S is stored in some form of ':!, c(anging it is a bit (arder t(an upgrading most ot(er types of software. )o c(ange t(e B":S itself, you@ll probably need a special program from t(e computer or B":S manufacturer. +ook at t(e B":S re*ision and date information displayed on system startup or c(eck wit( your computer manufacturer to find out w(at type of B":S you (a*e. )(en go to t(e B":S manufacturer@s ,eb site to see if an upgrade is a*ailable. 3ownload t(e upgrade and t(e utility program needed to install it. Sometimes t(e utility and update are combined in a single file to download. &opy t(e program, along wit( t(e B":S update, onto a floppy disk. 'estart your computer wit( t(e floppy disk in t(e dri*e, and t(e program erases t(e old B":S and writes t(e new one. Aou can find a B":S ,i8ard t(at will c(eck your B":S at B":S -pgrades. +. Microsoft /or) Software About' !icrosoft ,ord is a word processor de*eloped by !icrosoft. "t was first released in 1FG5 under t(e name !ulti#)ool ,ord for <eni4 systems.H5IH/IH6I Subsequent *ersions were later written for se*eral ot(er platforms including "B! .&s running 3:S >1FG5?, t(e Apple !acintos( >1FG6?, t(e A)J) -ni4 .& >1FG6?, Atari S) >1FGG?, S&: -N"< >1FF/?, :S0$ >1FGF?, and ,indows >1FGF?. &ommercial *ersions of ,ord are licensed as a standalone product or as a component of !icrosoft :ffice, ,indows ') or t(e discontinued !icrosoft ,orks Suite. 7reeware editions of ,ord are !icrosoft ,ord ;iewer and ,ord ,eb App on Sky3ri*e, bot( of w(ic( (a*e limited features. Purpose' !icrosoft ,ord is a word processing program t(at is part of t(e !icrosoft :ffice Suite package. )(e main purpose of ,ord is to create te4t documents t(at can be sa*ed electronically, printed on paper or sa*ed as .37 files. Implementation & Setup' "ES !anagement &ollege and 'esearc( &entre, !umbai )(is guide contains compre(ensi*e information about (ow to plan, install, configure, customi8e, and maintain !icrosoft 3ynamics &'! $%15 and !icrosoft 3ynamics &'! :nline. )(ere are easy steps for "mplement and setup t(e !icrosoft word. Maintenance #Re$ular & %mer$enc!&' )(e maintenance of word document is a*ailable wit( t(e !icrosoft, new released of t(e software as per new business industry required to complete t(e business requirement. )(e !icrosoft also pro*ides t(e customi8ed word software as per t(e company or new business requirement for !icrosoft word. Ris Mana$ement an) contin$enc! plan' 'isk is t(e possibility of an e*ent or condition t(at, if it occurred, would (a*e a negati*e impact on a pro=ect. After a pro=ect begins, e*ents t(at are difficult to anticipate mig(t create new risks. 7or e4ample, unseasonably rainy weat(er mig(t t(reaten t(e end date of a construction pro=ect. .repare a contingency plan As part of a good risk plan, you s(ould define t(e actions to take if risk e*ents occur, so t(at you can respond to t(ose e*ents quickly and effecti*ely. "dentify (ig(#risk tasks A critical part of risk management is identifying t(ose tasks t(at are most likely to take longer t(an e4pected, end beyond t(eir finis( dates, delay t(e start or finis( of ot(er tasks, or cause t(e pro=ect to finis( late. R(I & .uration' )(e !icrosoft (as regenerated t(e income on (is return (is in*estment in t(e !icrosoft word. )(e duration of t(e !icrosoft is depending upon t(e license period for purc(asing t(e !icrosoft word software. *p$ra)e or chan$e' )(e !icrosoft word software upgraded time to time as *ersion released by !icrosoft. "f you@re already using !icrosoft -pdate to get updates for your computer, ,indows -pdate in &ontrol .anel will automatically open and display your update status "ES !anagement &ollege and 'esearc( &entre, !umbai 0ar)ware 1. Ke!boar) About' "n computing, a keyboard is a typewriter#style de*ice, w(ic( uses an arrangement of buttons or keys, to act as mec(anical le*ers or electronic switc(es. 7ollowing t(e decline of punc( cards and paper tape, interaction *ia teleprinter#style keyboards became t(e main input de*ice for computers. A keyboard typically (as c(aracters engra*ed or printed on t(e keys and eac( press of a key typically corresponds to a single written symbol. Howe*er, to produce some symbols requires pressing and (olding se*eral keys simultaneously or in sequence. ,(ile most keyboard keys produce letters, numbers or signs >c(aracters?, ot(er keys or simultaneous key presses can produce actions or e4ecute computer commands. Purpose' "n normal usage, t(e keyboard is used to type te4t and numbers into a word processor, te4t editor or ot(er programs. "n a modern computer, t(e interpretation of key presses is generally left to t(e software. A computer keyboard distinguis(es eac( p(ysical key from e*ery ot(er and reports all key presses to t(e controlling software. Beyboards are also used for computer gaming, eit(er wit( regular keyboards or by using keyboards wit( special gaming features, w(ic( can e4pedite frequently used keystroke combinations. A keyboard is also used to gi*e commands to t(e operating system of a computer, suc( as ,indows@ &ontrol#Alt#3elete combination, w(ic( brings up a task window or s(uts down t(e mac(ine. A command#line interface is a type of user interface operated entirely t(roug( a keyboard, or anot(er de*ice performing t(e function of one. Implementation & Setup' )(e keyboard is used by connecting to t(e computer into t(e keyboard port. Now days, -SB keyboard is also coming so it is kind of plug and play kind of (ardware of t(e computer. )(e setup of t(e keyboard is *ery as compare to computer internal (ardware. "ES !anagement &ollege and 'esearc( &entre, !umbai Maintenance #Re$ular & emer$enc!&' :t(er t(an t(e monitor, you will probably need to clean t(e keyboard more often t(an t(e rest of t(e .&. 3ust and debris can collect between t(e keys can affect t(eir functioning. )(e surface of t(e keyboard and keys can be wiped o*er wit( a clot( lig(tly dampened wit( warm non#soapy water. Aou must a*oid getting t(e keyboard wet as it may cause damage to t(e keyboard circuits. )o gi*e t(e keyboard a t(oroug( clean or to do a close *isual inspection of t(e keyboard, remo*e its co*er. By remo*ing t(e key caps of t(e # >minus?, K >plus?, and Enter keys in t(e numeric keypad at t(e far#rig(t end of t(e keyboard, you can create a gap to remo*e t(e debris from t(e keyboard. Small non#static *acuum cleaners can be used to remo*e debris from t(e keyboard as well as ot(er small parts of t(e .&. )(ese usually (a*e a small brus( (ead attac(ed wit( a gooseneck t(at can be bent to pro*ide t(e best angle for cleaning. &ompressed#air can be used to dislodge debris from inaccessible parts of t(e keyboard. 3islodged debris can t(en be safely remo*ed by *acuum. +arge pieces of debris can be carefully remo*ed using non#static brus(es, twee8ers or probes. "f t(e keyboard (as (ad somet(ing spilled o*er it, you must act quickly to sa*e t(e keyboard circuits from permanent damage. "f a spill occurs o*er t(e keyboard of a laptop computer, t(e liquid may also penetrate t(roug( t(e keyboard to t(e case damaging ot(er components of t(e computer. "t is ine4pensi*e to replace a keyboard but e4pensi*e to repair or replace a laptop. "n t(e e*ent of a spill, immediately disconnect t(e keyboard from t(e computer, or disconnect t(e power from t(e laptop, and turn it upside down to pre*ent t(e liquid penetrating any furt(er. ,ipe or swab out all areas you can reac(. A (airdryer can be used to dry (ard#to#reac( areas, or lea*ing t(e keyboard upside down to dry o*ernig(t may work. Ensure t(at t(e keyboard is completely dry before reconnecting it to t(e computer. :nce you are satisfied t(at t(e keyboard is dry, reconnect and reboot t(e system, "ES !anagement &ollege and 'esearc( &entre, !umbai obser*ing t(e .:S) for keyboard errors, and test t(e keyboard by pressing e*ery key and *erifying its action. "f t(ere is still malfunction of t(e keys, you may need to replace t(e keyboard Ris Mana$ement & Contin$enc! plan' 'egular prolonged use of t(e keyboard and mouse may result in some people de*eloping ,'-+3s suc( as carpal tunnel syndrome and tendonitis so proper ad=ustment of keyboard is t(e 'isk !anagement. R(I & .uration' :ur local supplier is Coldtouc(, manufacturers of t(e popular Coldtouc( ;$ Ad=ustable Beyboard, a split ergonomic keyboard t(at promotes a (ealt(y typing posture. )(e Coldtouc( keyboard works wit( a .& or a !ac, and it (as (elped t(ousands of customers wit( repetiti*e stress in=uries associated wit( prolonged computer use. 3o8ens of large enterprise organi8ations (a*e run internal assessments of t(e *alue of Coldtouc( products. )(ese studies s(owed significant producti*ity gains and financial benefits. :ne e4ample customer found a return of o*er L1M% per employee o*er a t(ree year period due to workman2s compensation sa*ings and a reduction in absenteeism. Anot(er found dramatic impro*ement in o*erall employee satisfaction.
*p$ra)e & Chan$e ' Aou must be logged on as an administrator or a member of t(e Administrators group in order to complete t(is procedure. "f your computer is connected to a network, network policy settings may also pre*ent you from completing t(is procedure. 1. :pen Beyboard in &ontrol .anel. $. :n t(e Hardware tab, click .roperties. 5. :n t(e 3ri*er tab, click -pdate 3ri*er. /. 7ollow t(e instructions t(at appear on your screen. Aou can (a*e ,indows searc( for t(e dri*er, or point to t(e dri*er@s location yourself. "ES !anagement &ollege and 'esearc( &entre, !umbai +. Ran)om Access Memor! har)ware About' 'A! is a form of computer data storage. A random#access de*ice allows stored data to be accessed directly in any random order. "n contrast, ot(er data storage media suc( as (ard disks, &3s, 3;3s and magnetic tape, as well as early primary memory types suc( as drum memory, read and write data only in a predetermined order, consecuti*ely, because of mec(anical design limitations. )(erefore, t(e time to access a gi*en data location *aries significantly depending on its p(ysical location. Purpose' )(e purpose of 'A! is to store temporarily programs and data t(at are currently being used. "n t(is way, t(e processor is able to access t(e data fast. 'A! is a*ailable in multiples of 1M, for e4ample 1M!B, 5$!B or 1$G !B. )(e purpose of 'A! is to pro*ide a large area of memory w(ere programs t(at are being run can be stored. "t also allows data to be cac(ed w(ile it is waiting to be processed or sa*ed to t(e (ard dri*e. )(e purpose of 'A!, or 'andom Access !emory, is to gi*e t(e computer a place to store data temporarily. ,(en computer programs run t(ey need to be able to constantly access data. )o speed up t(e process t(e needed data is stored in t(e 'A! modules, w(ic( will clear w(en t(e program is terminated or t(e computer is turned off. Implementation & Setup' 'ead access memory >'A!? considers an important part in se*eral systems Suc( as computer and communication systems9 and t(ere is se*eral applications software t(at used for implements t(e digital circuits of 'A!. "n t(is pro=ect, multisim F application software was used to implement and simulate se*eral logic circuits of 'A! wit( many si8es at w(ic( implement 'A! circuit from sub 'A!. Also, it may be prepared as apart of equipments for t(e airborne computer system. "ES !anagement &ollege and 'esearc( &entre, !umbai Ris Mana$ement & Contin$enc! Plan' )(e performance of a 'A! dri*e is in general orders of magnitude faster t(an ot(er forms of storage media, suc( as an SS3, (ard dri*e, tape dri*e, or optical dri*e.H1I )(is performance gain is due to multiple factors, including access time, ma4imum t(roug(put and type of file system, as well as ot(ers. 7ile access time is greatly decreased since a 'A! dri*e is solid state >no mec(anical parts?. A p(ysical (ard dri*e or optical media, suc( as &3#':!, 3;3, and Blu#ray must mo*e a (ead or optical eye into position and tape dri*es must wind or rewind to a particular position on t(e media before reading or writing can occur. 'A! dri*es can access data wit( only t(e memory address of a gi*en file, wit( no mo*ement, alignment or positioning necessary. Second, t(e ma4imum t(roug(put of a 'A! dri*e is limited by t(e speed of t(e 'A!, t(e data bus, and t(e &.- of t(e computer. :t(er forms of storage media are furt(er limited by t(e speed of t(e storage bus, suc( as "3E >.A)A?, SA)A, -SB or 7irewire. &ompounding t(is limitation is t(e speed of t(e actual mec(anics of t(e dri*e motors, (eads and0or eyes. )(ird, t(e file system in use, suc( as N)7S, H7S, -7S, e4t$, etc., uses e4tra accesses, reads and writes to t(e dri*e, w(ic( alt(oug( small, can add up quickly, especially in t(e e*ent of many small files *s. few larger files >temporary internet folders, web cac(es, etc.?. Because t(e storage is in 'A!, it is *olatile memory, w(ic( means it will be lost in t(e e*ent of power loss, w(et(er intentional >computer reboot or s(utdown? or accidental >power failure or system cras(?. )(is is, in general, a weakness >t(e data must periodically be backed up to a persistent#storage medium to a*oid loss?, but is sometimes desirable for e4ample, w(en working wit( a decrypted copy of an encrypted file. "ES !anagement &ollege and 'esearc( &entre, !umbai R(I & )uration " "ntel &orporation is an American multinational semiconductor c(ip maker corporation (eadquartered in Santa &lara, &alifornia. "ntel is t(e world@s largest and (ig(est *alued semiconductor c(ip maker, based on re*enue.H5I "t is t(e in*entor of t(e 4GM series of microprocessors, t(e processors found in most personal computers. "ntel &orporation, founded on Nuly 1G, 1FMG, is a portmanteau of "ntegrated Electronics >t(e fact t(at OintelO is t(e term for intelligence information was also quite suitable?.H/I "ntel also makes mot(erboard c(ipsets, network interface controllers and integrated circuits, flas( memory, grap(ic c(ips, embedded processors and ot(er de*ices related to communications and computing. 7ounded by semiconductor pioneers 'obert Noyce and Cordon !oore and widely associated wit( t(e e4ecuti*e leaders(ip and *ision of Andrew Cro*e, "ntel combines ad*anced c(ip design capability wit( a leading#edge manufacturing capability. )(oug( "ntel was originally known primarily to engineers and tec(nologists, its O"ntel "nsideO ad*ertising campaign of t(e 1FF%s made it a (ouse(old name, along wit( its .entium processor. "ntel was an early de*eloper of S'A! and 3'A! memory c(ips, and t(is represented t(e ma=ority of its business until 1FG1. Alt(oug( "ntel created t(e world@s first commercial microprocessor c(ip in 1F11, it was not until t(e success of t(e personal computer >.&? t(at t(is became its primary business. 3uring t(e 1FF%s, "ntel in*ested (ea*ily in new microprocessor designs fostering t(e rapid growt( of t(e computer industry. 3uring t(is period "ntel became t(e dominant supplier of microprocessors for .&s, and was known for aggressi*e and sometimes illegal tactics in defense of its market position, particularly against Ad*anced !icro 3e*ices >A!3?, as well as a struggle wit( !icrosoft for control o*er t(e direction of t(e .& industry.H6IHMI )(e $%15 rankings of t(e world@s 1%% most *aluable brands publis(ed by !illward Brown :ptimor s(owed t(e company@s brand *alue at number M1. "ES !anagement &ollege and 'esearc( &entre, !umbai *p$ra)e or Chan$e' Adding 'A! is often t(e most cost#effecti*e upgrade you can make to speed up a sluggis( computer. .&s t(at (ad more t(an enoug( 'A! w(en t(ey were new often (a*e trouble keeping up wit( t(e demands of t(e latest programs after a few years. New operating systems almost always call for more memory, too. ,(en a computer runs s(ort of 'A!, it@s forced to swap t(e o*erflow data on and off of t(e (ard dri*e, w(ic( can significantly slow performance. )(e a*erage ,indows <. user s(ould be satisfied wit( 1CB of 'A!. :ur tests, w(ic( in*ol*e working wit( images and using Nero E4press to burn &3s, ran one#t(ird faster w(en we upgraded from 61$!B of 'A! to 1CB. .ower users w(o simultaneously run lots of demanding applications, or anyone regularly working wit( digital *ideo or ot(er large grap(ics files, will want at least $CB. "f you@re planning to upgrade your .& to ,indows ;ista, you can still get away wit( 1CB, but for a more comfortable e4perience we recommend $CB of 'A!. "ES !anagement &ollege and 'esearc( &entre, !umbai Networin$ 1. 1AN About' A local area network >+AN? is a computer network t(at interconnects computers in a limited area suc( as a (ome, sc(ool, computer laboratory, or office building using network media. )(e defining c(aracteristics of +ANs, in contrast to wide area networks >,ANs?, include t(eir smaller geograp(ic area, and non#inclusion of leased telecommunication lines.Hcitation neededI A'&NE), )oken 'ing and ot(er tec(nology standards (a*e been used in t(e past, but Et(ernet o*er twisted pair cabling, and ,i#7i are t(e two most common tec(nologies currently used to build +ANs. )(e increasing demand and use of computers in uni*ersities and researc( labs in t(e late 1FM%s generated t(e need to pro*ide (ig(#speed interconnections between computer systems. A 1F1% report from t(e +awrence 'adiation +aboratory detailing t(e growt( of t(eir O:ctopusO network ga*e a good indication of t(e situation. &ambridge 'ing was de*eloped at &ambridge -ni*ersity in 1F1/ but was ne*er de*eloped into a successful commercial product. Et(ernet was de*eloped at <ero4 .A'& in 1F15P1F16,H6I and filed as -.S. .atent /,%M5,$$%. "n 1F1M, after t(e system was deployed at .A'&, !etcalfe and Boggs publis(ed a seminal paper, OEt(ernet 3istributed .acket#Switc(ing for +ocal &omputer Networks.O A'&NE) was de*eloped by 3atapoint &orporation in 1F1M and announced in 1F11. "t (ad t(e first commercial installation in 3ecember 1F11 at &(ase !an(attan Bank in New Aork. Purpose' )(e purpose being to allow users to connect t(eir computers to a common ser*er or ser*ers. Ser*ers are =ust central computers to a network. Ser*ers contain data t(at could be of *arying types. )(ere@d data t(at are numbers for e4ample accounting data an accounting department needs to s(are wit( ot(er people in t(e accounting department. :r it could be p(otos t(at a marketing department s(ares wit( ot(er people in t(e marketing "ES !anagement &ollege and 'esearc( &entre, !umbai department w(en working on a marketing pro=ect. :r it could be sound data t(at would also be used by t(e marketing department on a pro=ect in*ol*ing t(e use of sound. :r it could be simply words0documents t(at people need to s(are amongst managers of t(e company. )(e +AN allows e*eryone to work on t(e same document and wit( t(e rig(t software0programs e*eryone can see t(e results in real time. )(at is per(aps one of t(e most powerful aspects of a centrali8ed ser*er t(at e*eryone is accessing at t(e same time from t(eir computers at t(eir desks or e*en from t(eir (ome. Aes accessing a +AN from (ome is possible too. Accessing a +AN is possible t(ese days from nearly anyw(ere a person can get a cell p(one signal since t(ere are now cards t(at you can insert into your computer and access t(e internet w(ic( mig(t also (a*e t(e +AN connected to it. So e*en t(oug( t(e title is +AN it isn@t necessarily all t(at +ocal. " t(ink you get t(e idea now of t(e purpose of a +AN. )(e safety aspect is great for a +AN also as t(e Network !anager is usually in c(arge of backing up all t(e data. )(ese assure t(at all t(e work t(at e*eryone does won2t be lost s(ould t(e ser*er cras( or get (acked or some ot(er disasters occur. )(at is w(y good Network !anagers store t(e company data in a safety deposit bo4 on a daily basis.
Implementation & Setup' ,ireless communications allows us to li*e and work in ways ne*er before possible, offering us fle4ibility, mobility and a link to our en*ironment t(at is almost magical. Anybody t(at uses cordless or cellular p(ones, pagers, ); remote controls, keyless car entry, or garage door openers will readily agree. ,(ile telecommunications and computer networking (a*e *astly increased our options on (ow and w(at we communicate, t(ey (a*e p(ysically constrained us by leas(ing us wit( a p(ysical wire to t(e network. But wireless communications brings us back to a form of communications t(at is in(erently natural to us. As creatures we do not like to be p(ysically constrained. Human speec( itself, despite its limited range, is wireless. "ES !anagement &ollege and 'esearc( &entre, !umbai Ris Mana$ement & Contin$enc! plan' &onnecting computers to networks significantly increases risk. Networks connect large numbers of users to s(are information and resources, but network security depends (ea*ily on t(e cooperation of eac( user. Security is as strong as t(e weakest link. Studies (a*e s(own t(at most of t(e abuses and frauds are carried out by aut(ori8ed users, not outsiders. As t(e number of +ANs and ,ANs increase, cost#effecti*e security becomes a muc( more significant issue to deter fraud, waste, and abuse and to a*oid embarrassment. ,(at t(eir security concerns s(ould be, and (ow to resol*e t(eir concerns. ,e will begin by introducing t(e concept of risk management and touc( on basic requirements for protecting +ANs. )(is will be followed by a summary of +AN components and features t(at will ser*e as a foundation for determining security requirements. +AN security requirements will t(en be discussed in terms of t(e risk assessment process, followed by a detailed discussion of (ow to implement +AN security in a step#by#step approac(. )(is s(ould pro*ide t(e necessary guidance in applying security procedures to specific +AN0,AN security risks and e4posures. R(I & )uration' ':" analysis for any tec(nology typically in*ol*es calculations t(at s(ow (ow a gi*en solution sa*es money, makes money or bot(. ,ireless +AN ':" analysis is no e4ception. Howe*er, t(e e4periences reported by t(ose w(o deploy it *ary dramatically. "n planning your ,+AN ':", you must address a few key questions Q Are you c(oosing between wireless and wired for a new +AN installationR :r are you deciding simply w(et(er or not to add a ,+AN to an e4isting wired +ANR Q Are you deploying in isolated workgroups, or are you building an enterprise solution >w(ic( will require deploying access points not =ust for client connections but possible also for point#to#point links?R "ES !anagement &ollege and 'esearc( &entre, !umbai Q How mobile are your employeesR 3o t(ey need to mo*e around frequently during t(e workdayR 3o t(ey work in eac( ot(er@s officesR 3o t(ey (a*e working meetings w(ere access to ser*er#based applications can be importantR *p$ra)e or Chan$e' )(e speed of your network affects nearly e*ery de*ice on your (ome network, w(et(er it be a (ome#t(eater .&, an e4ternal storage de*ice, or a gaming console. 7or most networks, t(e transfer rate of a faster Et(ernet connection >roug(ly 1$.6 megabytes per second? is t(e typical speed limit. )(at may be okay for transferring ordinary files, but it@s painfully slow if you@re trying to back up a .& to a network de*ice, for e4ample, or to stream a (ig(#definition mo*ie to your li*ing room. )(e solutionR !o*e up to a gigabit network. Switc(ing o*er to gigabit >1%%%#!bps? speeds increases your potential t(roug(put tenfold, minimi8ing your transfer times and greatly en(ancing your ability to stream (ig(#bandwidt( files to connected de*ices wit(out interference. Cigabit networking is now a sufficiently common feature of modern networking de*ices t(at it s(ouldn@t carry too great a cost premium. As for your mot(erboards, t(e odds are good t(at t(ey already (a*e gigabit functionality built in, w(et(er you know it or not. Before we go any furt(er, " s(ould note t(at t(is guide does not apply to wireless networks9 t(e factors t(at constrain speeds on wireless networks are entirely different from t(ose t(at limit speeds on wired networks. "ES !anagement &ollege and 'esearc( &entre, !umbai +. -us Topolo$! About' A bus network uses a multi#drop transmission medium, all node on t(e network s(are a common bus and t(us s(are communication. )(is allows only one de*ice to transmit at a time. A distributed access protocol determines w(ic( station is to transmit. 3ata frames contain source and destination addresses, w(ere eac( station monitors t(e bus and copies frames addressed to itself. A bus topology connects eac( computer >nodes? to a single segment trunk >a communication line, typically coa4 cable t(at is referred to as t(e @bus@. )(e signal tra*els from one end of t(e bus to t(e ot(er. A terminator is required at eac( to absorb t(e signal so as it does not reflect back across t(e bus. A media access met(od called &S!A0!A is used to (andle t(e collisions t(at occur w(en two signals placed on t(e wire at t(e same time. )(e bus topology is passi*e. "n ot(er words, t(e computers on t(e bus simply @listen@ for a signal9 t(ey are not responsible for mo*ing t(e signal along. Purpose' )(e bus topology is one of t(e four main topology types for networking. "t allows systems to be connected in a straig(t line wit(out any ot(er network connecti*ity de*ices. As a result, it is easy to construct and needs *ery little in t(e way of configuration, and is ine4pensi*e compared to ot(er topologies. )(e main result of any topology is to connect clients toget(er in order to s(are resources. )(e bus is t(e data link in a bus network. )(e bus can only transmit data in one direction, and if any network segment is se*ered, all network transmission ceases. A (ost on a bus network is called a station or workstation. "n a bus network, e*ery station recei*es all network traffic, and t(e traffic generated by eac( station (as equal transmission priority. Eac( network segment is, t(erefore, a collision domain. "n order for nodes to transmit on t(e same cable simultaneously, t(ey use a media access control tec(nology suc( as carrier sense multiple access >&S!A? or a bus master. "ES !anagement &ollege and 'esearc( &entre, !umbai Implementation & Setup' All workstations connect to t(e same cable segment commonly used for implementing Et(ernet at 1%mbps t(e cable is terminated at eac( end wiring is normally done point to point a faulty cable or workstation will take t(e entire +AN down two wire, generally implemented using coa4ial cable during t(e 1FG%@s. )(e bus cable carries t(e transmitted message along t(e cable. As t(e message arri*es at eac( workstation, t(e workstation computer c(ecks t(e destination address contained in t(e message to see if it matc(es its own. "f t(e address does not matc(, t(e workstation does not(ing more. "f t(e workstations address matc(es t(at contained in t(e message, t(e workstation processes t(e message. )(e message is transmitted along t(e cable and is *isible to all computers connected to t(at cable. )(ere are )H'EE common wiring implementations for bus networks 1%Base$ >t(in#net, &(eaperNet? 6%#o(m cable using BN& ) connectors, cards pro*ide transcei*er. 1%Base6 >)(ickNet? 6%#o(m cable using 16#pin A-" 3#type connectors and e4ternal transcei*ers. 1%Base) >-).? -). cable using 'N/6 connectors and a wiring centre. Maintenance #Re$ular & %mer$enc!&' A bus topology in more tec(nical terms means t(at it is a met(od of transmission on networks t(at uses a common *e(icle for transmissions and t(us it is categori8ed as s(ared communication. "magine a bus picking up *arious people from one stop and dropping of people as it tra*els and t(en picking a few more. )(at is w(at (appens in a bus network e4actly. A bus topology in more tec(nical terms means t(at it is a met(od of transmission on networks t(at uses a common *e(icle for transmissions and t(us it is categori8ed as "ES !anagement &ollege and 'esearc( &entre, !umbai s(ared communication. "magine a bus picking up *arious people from one stop and dropping of people as it tra*els and t(en picking a few more. )(at is w(at (appens in a bus network e4actly. 3ifficult to administer0troubles(oot. +imited cable lengt( and number of stations. "f t(ere is a problem wit( t(e cable, t(e entire network goes down. !aintenance costs may be (ig(er in t(e long run. .erformance degrades as additional computers are added or on (ea*y traffic. .roper termination is required.>loop must be in closed pat(?. "f many computers are attac(ed, t(e amount of data flowing causes t(e network to slow down. Significant &apaciti*e +oad >eac( bus transaction must be able to stretc( to most distant link?. Ris Mana$ement & Contin$enc!' )(e t(ree#tier network (as dominated t(e data centre since t(e late 1FF%s, but recent mo*es toward a *irtuali8ed, ser*ice#oriented, con*erged infrastructure (as spawned demand for a flat network topology t(at (ad been abandoned years ago. 7lat network belie*ers say t(at reducing t(e number of switc(ing tiers enables t(e kind of any#to#any connecti*ity between ser*ers and nodes on t(e network t(at allows for rapid and automated ;! migration. )(ey also say it will diminis( latency and could ultimately reduce management o*er(ead. "n t(is guide, we e4plore t(e considerations t(at network arc(itects took before mo*ing into flat networks, as well as related tec(nologies suc( as network fabrics and *irtual cluster switc(ing t(at enable deeper manageability in a flat network topology. R(I & )uration' )(e +inear Bus is a multi#access topology w(ere all de*ices connect to or tap into a single common backbone. )(is results in a contention based en*ironment w(ere all de*ices broadcast t(eir messages on t(e backbone and all frames are *isible to all de*ices on t(e bus backbone. )(is multi#access s(ared medium requires protocols to manage transmissions in an effort to ma4imi8e t(roug(put. )(e &arrier Sense, !ultiple Access "ES !anagement &ollege and 'esearc( &entre, !umbai wit( &ollision 3etect >&S!A0&3? protocol is a good e4ample of t(e requisite management protocols and will be discussed in Et(ernet and &S!A0&3. )(e ability for e*ery de*ice to read all frames ob*iously introduces security concerns. )(e bus is also susceptible to a single point of failure and t(erefore suffers from a*ailability concerns. )(e bus is a relati*ely simple and ine4pensi*e implementation requiring minimal administration if designed and implemented according to best practices >e.g. ad(ering to ma4imum cable lengt( constraints, limiting t(e number of users based on t(eir transmission requirements, etc.?. )(e ends of t(e backbone cable must be properly terminated to ensure t(e signal is absorbed rat(er t(an being reflected back as t(is will seriously (amper communications. Network designers can e4tend t(e bus topology t(roug( t(e use of layer one (ubs also known as multiport repeaters. Hubs can en(ance a network2s resiliency as a centrali8ed de*ice and dedicated cable can o*ercome single points of failure. "t must be noted t(at layer one de*ices do not parse or process frames and t(erefore do not logically segment collision domains. *p$ra)e or Chan$e' Aou are asked to upgrade a bus topology +AN at a friend2s (ouse to a star topology +AN. Aour friend wants to connect t(ree computers and a printer and use t(e Et(ernet access met(od. His computers do not contain wireless N"&@s. At minimum, w(ic( of t(e following de*ices must you add to (is current networking (ardwareR )(e type of network topology in w(ic( all of t(e nodes of t(e network are connected to a common transmission medium w(ic( (as more t(an two endpoints t(at are created by adding branc(es to t(e main section of t(e transmission medium P t(e p(ysical distributed bus topology functions in e4actly t(e same fas(ion as t(e p(ysical linear bus topology >i.e., all nodes s(are a common transmission medium?. "ES !anagement &ollege and 'esearc( &entre, !umbai %2uipments 1. Scanner About' A scanner is a de*ice t(at captures images from p(otograp(ic prints, posters, maga8ine pages, and similar sources for computer editing and display. Scanners come in (and#(eld, feed#in, and flatbed types and for scanning black#and#w(ite only, or color. ;ery (ig( resolution scanners are used for scanning for (ig(#resolution printing, but lower resolution scanners are adequate for capturing images for computer display. Scanners usually come wit( software, suc( as Adobe@s .(otos(op product, t(at lets you resi8e and ot(erwise modify a captured image. Scanners usually attac( to your personal computer wit( a Small &omputer System "nterface > S&S" ?. An application suc( as .(otos(op uses t(e ),A"N program to read in t(e image. Some ma=or manufacturers of scanners include Epson, Hewlett#.ackard, !icrotek, and 'elisys. Purpose' :ne of t(e most useful and underutili8ed tools in t(e modern office is t(e scanner. !odern scanners are easy to use and as *ersatile as your imagination. Since many (ome# use printers come wit( built#in scanners, many people (a*e scanners in t(eir (omes t(at t(ey (a*e ne*er used. )(e main purpose of Scanner Equipment# 1. .aper 7ile 'eduction $. .(otos 5. :ptical &(aracter 'ecognition /. 7a4 'eplacement "ES !anagement &ollege and 'esearc( &entre, !umbai Implementation & Setup' )(e Scanner can be installed on t(e computer t(roug( scanner dri*er. :nce t(e particular scanner dri*er (as been installed t(en we can use t(e scanner on t(at computer. Maintenance #Re$ular & %mer$enc!&' !aintenance "ncludes $ 7eed !odules $ Separation 'ollers 1% 'eplacement Strips 6% 'eplacement Strips Nominal tire life is appro4imately $6%,%%% documents, depending on paper types, en*ironment and scanner cleanliness. 'isk !anagement J &ontingency plan# )(e scanned image quality s(ould be in proper format. 'isk factor of t(is is manage properly by different scanner. R(I & )uration' )(e ':" of t(e scanner is more t(an t(e in*estment because it manage t(e company important documents. *p$ra)e or Chan$e' Scanning is a new system in !ass Effect $ t(at replaces dri*ing wit( t(e !ako and searc(ing for t(e minerals inland, from t(e first game. Scanning becomes a*ailable w(en t(e Normandy S'#$ enters t(e orbit of any planet not in*ol*ed in a main storyline mission, at w(ic( point you@ll be prompted to start t(e scan. :nce begun t(e planet will "ES !anagement &ollege and 'esearc( &entre, !umbai be o*erlaid wit( a rectangular grid. Aou may t(en press and (old anot(er button to begin a mineral scanner w(ic( is slower t(an t(e main scanner, t(oug( its speed can be upgraded slig(tly. A data column will appear on t(e side of t(e screen and you t(en mo*e t(e scanner around until t(e data column spikes, indicating t(e presence of minerals at t(e scanner@s current location. Aou may t(en fire a probe at t(e deposit w(ic( will in turn add t(e minerals to your stores. +. /ebcam About' A webcam is a *ideo camera t(at feeds its image in real time to a computer or computer network. -nlike an ". camera >w(ic( uses a direct connection using et(ernet or ,i#7i?, a webcam is generally connected by a -SB cable, 7ire,ire cable, or similar cable. )(eir most popular use is t(e establis(ment of *ideo links, permitting computers to act as *ideop(ones or *ideoconference stations. )(e common use as a *ideo camera for t(e ,orld ,ide ,eb ga*e t(e webcam its name. :t(er popular uses include security sur*eillance, computer *ision, *ideo broadcasting, and for recording social *ideos. )(e first web cam was de*eloped in 1FF1 and was used by scientists at &ambridge -ni*ersity to determine if t(ere was coffee a*ailable in anot(er location. Purpose' so t(e ot(er person on anot(er computer can see you w(en t(ey are talking to you and capturing t(e images. "ES !anagement &ollege and 'esearc( &entre, !umbai Implementation & Setup' )(e implementation is *ery of webcam, we only (a*e connected to t(e -SB port and camera will be started. )(ere is not any specific setup is required for t(is. :nly plug and play equipment. Maintenance #Re$ular & %mer$enc!&' )(e Skyline ,ebcams are constantly monitored by a ser*er able to sol*e any ordinary problem, w(en t(is is not possible an operator will be immediately informed. )(e webcams need electric current and A3S+ connection, sometimes it occurs t(at t(is is momentarily not supplied due to maintenance works or lack of A3S+. !oreo*er, ordinary and special maintenance works may occur, so t(at some webcams could be momentarily not a*ailable, usually for a brief period sometimes for a longer period of time. "t is not necessary to report it9 our ser*er will immediately inform our tec(nical staff. Ris Mana$ement & Contin$enc! plan' ,ebcams are low#cost computer perip(erals t(at feed *ideo images to a computer or network in real time. )(ey may connect *ia -SB, wireless connection or E(ernet. ,ebcams enable *ideo conferencing, allow users to monitor a space for security or entertainment purposes, and can record still pictures and *ideo clips. )(ey come in se*eral ma=or types. R(I & )uration' ,ebsite designers can add a cost effecti*e webcam feature for t(eir clients using our ser*ice and in addition, we can e4c(ange website links, if you wis(, to increase our mutual link popularity wit( Coogle. ,e will e*en pro*ide a custom &am secure camera page for your webcam wit( 7'EE ad*ertising for your website at no e4tra cost. "ES !anagement &ollege and 'esearc( &entre, !umbai *p$ra)e or chan$e' )(e webcam can be upgraded timely. )(e recent *ersion is a*ailable on t(e net. "f you are tired of t(e =agged looking image you are getting from your Skype calls or ot(er ;ideo &onferencing, t(e H3 webcam is a*ailable in t(e today2s market. "ES !anagement &ollege and 'esearc( &entre, !umbai