Wednesday, November 27, 2019

Orthopraxy In Islam Essays - Islam, Hajj, Monotheistic Religions

Orthopraxy In Islam Orthopraxy in Islam RLST 2600 Orthopraxy in Islam Islamic life is centered on the physical practice of prayer (salat). With that the religion of Islam itself is based in the methodical movement through which Muslims show their devotion to Allah. The prayer begins with the devotee standing, bending slowly into a sitting position and ending in full prostration. Bowing fully onto the ground is a practice that shows humility and represents the true devotion of members. Practice-centered religion differentiates itself from orthodox religion in that it focuses primarily on ritual practice, rather than theology or doctrine, orthodox meaning correct opinion. The most visible orthodox religion of America is Christianity. Christianity centers life around the opinions of the church with less emphasis on purity and behavior. Islamic life is distinctly based on what can be defined as orthopraxy or the importance of religious practice. The orthopraxy of Islam can be seen in at least three of the Five Pillars of Islam , salat, Ramadan and the hajj, which are also representative of Muslim faith and duties. Salat, as mentioned earlier, is the performance of prayer five times a day. The prayer, which includes full prostration, is performed facing Mecca. In the The Meaning of the Glorious Koran, (the earliest source of Islamic writing as dictated to Mohammed), it is written, Whencesoever thou comest forth (for prayer, O Mohammed) turn thy face toward the Inviolable Place of Worship. Lo! it is the Truth from thy Lord. Allah is not unaware of what ye do (Surah 2:149). Implicit directions for prayer also display the amount of emphasis on practice. Salat must be performed five times daily, at specific times of the day: early morning, noon, mid-afternoon, sunset, and evening. Each Friday a congregational service is held at the mosque and every male is required to attend. Before prayer, four ritual aspects are required: ritual purification, proper covering of the body, proper intention, and facing Mecca, o r qibla (1). The emphasis on purity is directly associated with prayer, as one must not be impure in any way when one prays. The ritual impurity associated with everyday living is known as najasa or hadath. Najasa is external impurity including but not limited to, urine, blood, pus, feces of animals and humans. Hadath is impurity of the soul from performing certain activities. Hadath is caused by activities ranging from sleeping to seminal emission. The degree of hadath varies depending on the activity. Daily impurities result in a need for cleansing or ablutions. Ablution can be performed outside of mosques, usually the mosque will maintain a small fountain in which people can wash their hands to their elbows, feet to their ankles as well as heads and faces (1). The use of ablution as a form of purification as well as the consistent call to purify oneself follows the orthopraxy within Islam. The Koran states, The month of Ramadan in which was revealed the Quran, a guidance for mank ind, and clear proofs of the guidancewhosoever of you is present, let him fast the month (2:185). The fasting during the month of Ramadan is an expression of joy; the fasting person recalls their dependence on Allah for sustenance and life. The fast lasts for thirty days, each day from sunrise to sunset. Again, the emphasis is placed on the practice of refraining from food, which challenges the body (1). The lives of Muslims change for a month as they devote themselves to concentration on the past year, and the graciousness of God. Increasing the amount of time spent focusing on religion allows members of the religion to renew their faith and their relationships with others. The journey to Mecca known as the hajj encompasses the practicing element of Islam. The holy pilgrimage to Mecca is required for all Muslims only if they have the means to afford such a trip and the physical ability to do so. Borrowing money is not proper for the trip; in fact one must have all debts settled bef ore they leave on hajj. Travel to the center of religious worship represents the distance one is willing to travel as well as the costs one is willing to endure in order to display their

Sunday, November 24, 2019

Whats Actually Tested on the ACT Science Section Skills and Topics

What's Actually Tested on the ACT Science Section Skills and Topics SAT / ACT Prep Online Guides and Tips Are you studying for the ACT? Not sure what to expect from the science section? You might be surprised to know that the science section one of the most commonly misunderstood parts of the ACT. So what exactly is tested on the ACT science section? And how much science do you need to know to do well? We'll break down this section for you with example questions so you know exactly what to expect. ACT Science Section Format The ACT science section is 35 minutes long and contains 40 questions. That means that you have about 53 seconds to spend on each question. The science section’s format is more like the reading section than the math section – which is surprising for some students! Each question on the math section has its own task or problem. But for both the ACT Reading and ACT Science, you have to read a passage and then answer a series of questions about it. There are seven passages on the science section. Each passage could contain graphs, charts, experiment summaries, or conflicting viewpoints from scientists. Every passage is followed by four to seven questions about it. So to do well on this section, you need to be able to quickly but accurately read and understand scientific data. What Does AP Science Test You On? Although the ACT Science section includes a wide range of science content, it tests your scientific skills more than your knowledge. As the ACT puts it, â€Å"the Science Test †¦ measures the interpretation, analysis, evaluation, reasoning, and problem-solving skills required in the natural sciences.† In other words, the science section tests skills, not specific facts or topics. So how exactly do you learn these science skills? From taking science classes in high school. The ACT website recommends you take at least three years of science in high school, and have taken at least one biology course and one physical or earth science course by the time you take the test. Aside from being more fun than the average class, doing science experiments helps you prepare for the ACT! By taking science courses, you’ll learn about the scientific method, how to collect and analyze data, and how to evaluate a theory or hypothesis. These skills will help you succeed on ACT Science. By taking biology and earth science, you'll get enough background on science terminology to be able to process ACT Science topics. Content you're tested on could include biology, chemistry, physics, and earth/space sciences (including geology, astronomy, and meteorology). As an example, the Preparing for the ACT official practice test science section includes passages about finch beak depth, the process of ions being precipitated from the earth’s atmosphere, cloud cover, acid-base titration, stellar evolution (how stars evolve), and the human threshold of hearing. However, the ACT does not expect students to be experts on such a wide variety of science topics. Using these kinds of topics as starting points, the science section will ask questions about data representation, the research process, and conflicting hypotheses. So if your scientific reasoning skills are strong, you will be able to answer any ACT Science question – even if it’s about an obscure topic like finch beak depth! That said, science background from biology, earth sciences, and chemistry will be helpful, because you won’t be intimidated by scientific terminology on the test. As an example, it will be easier to break down a passage about finch beak depth if you are familiar with the concept of natural selection. But remember you don’t actually need an advanced knowledge of particular science concepts to do well on this section – you just need to be able to read and interpret graphs and studies. Now let’s explore the exact question types you will see on ACT science. ACT Science Question Types There are three different question types you will see on ACT science. The majority of questions focus on having you break down data and experiments, though you will also have to compare conflicting viewpoints between scientists. Check out the three different question types below to learn more. #1: Data Representation (30-40% of Questions) These questions have you read graphs, interpret scatterplots, and explain information presented in tables. While some knowledge of the subject being tested is helpful, what is more important is your ability to read and understand data. As an example, check out this question from an ACT practice test: Source: ACT Assessment Practice Multiple Choice Test, 2004. The topic of this passage is metamorphic rock formation. However, you don't need to be an expert on that, or even know much about metamorphic rocks at all, to break down the chart. The question asks you which conditions a Facies G rock is most likely to form under. Looking at the area of the chart representing Facies G rocks, you can see they form with pressure between roughly 10 and 14 kb, and temperatures between 200 and 1,000 degrees Celsius. Looking at the answer choices, only one (choice J) lists a pressure reading that a Facies G rock could form under. Therefore J is the correct answer. In other words, the question is testing your ability to read and interpret the graph. The question is not testing your knowledge of metamorphic rocks. #2: Research Summaries (45-55% of Questions) These questions require you to interpret the design and results of experiments. Again, specific content knowledge isn't as important as knowledge of the scientific method and data collection. Check out this example question to see what we mean. The topic of this passage is elaiosomes, nutritious structures in seeds that attract ants. However, you don't need to know much about ants, seeds, or elaiosomes to break down this study and know which variable was controlled. A controlled variable is a variable that remains constant. So all you're looking for is the variable in the experiment that was kept the same. Reading the study description, we see that "Two seed dishes were placed in each site." This makes G the correct answer. (The other answer choices, number of ants, mass of elaiosome of each seed, and type of seed taken by the ants, were not described as constant in the study summary.) So to get this question right, you have to know what a controlled variable is and how it relates to scientific study structure. You do not have to be an expert on ants or seed germination. This is why taking science classes and becoming knowledgeable in the scientific method is so important to doing well on ACT science. #3: Conflicting Viewpoints (15-20% of Questions) The final question type on the ACT science section tests your ability to understand, analyze, and compare alternate viewpoints or hypotheses. These questions will center around a single situation or problem, and you will read two different viewpoints and compare the similarities and differences. Check out the example below. The question is asking you to figure out the main point of disagreement between the two scientists. In this case, the disagreement becomes clear in the first sentence of each opinion. Scientist 1 says "the object was a comet," while Scientist 2 says "the object was a stony asteroid." This makes answer choice J ("the type of object that entered Earth's atmosphere") the correct choice. The scientists do not disagree on the other three answer choices. The location of the event (choice F) and speed of the object (choice G) are given in the initial description, and the scientists don't disagree on the density of Earth's atmosphere (choice H). Once again, your familiarity with the content, in this case comets and asteroids, is not important. What is important is your ability to read two different points of view and quickly hone in on similarities and differences. Even if you knew nothing about comets or asteroids, it would be possible to get this question right by using critical reading skills. Here's a summary chart of the types of questions you'll see on ACT Science: Type of Question Skills Needed Number of Questions (Percent of Questions) Data Representation Read and understand data About 15 questions (35%) Research Summaries Interpret the design and results of experiments About 18 questions (50%) Conflicting Viewpoints Compare, contrast, and analyze opposing viewpoints About 7 questions (15%) Bottom Line If you can read and interpret graphs, charts, and tables, analyze differing opinions, and understand the scientific method and study design, you will do well on ACT Science. This section tests your scientific skills, not your knowledge of scientific facts. As you practice for this section, focus on how well you are able to quickly read and understand data and experiments. Also make sure you are able to compare different viewpoints and find similarities and differences. Doing specific ACT preparation and using practice questions will help you see if your scientific reasoning skills are strong enough to do well on this section. What’s Next? If you haven't already, check out ourUltimate Study Guide For ACT Science.It contains dozens of ACT Science guides going into every question type tested, strategies to tackle the questions, and how you should be organizing your prep to raise your score. Now that you know what the ACT science section tests, try out a full practice science section with free, official ACT practice tests online. The ACT’s science section is just one factor that sets the ACT apart from the SAT. What are the other differences between the ACT and SAT? Find out with our comparison here, and learn for sure which test you’ll do better on. Do you have advanced science skills you want to show to colleges? Learn about AP Tests and SAT Subject Tests, which both have specific science options like Biology, Chemistry, and Physics. Want to improve your ACT score by 4+ points? Download our free guide to the top 5 strategies you need in your prep to improve your ACT score dramatically.

Thursday, November 21, 2019

Panic Disorder - Psychology Essay Example | Topics and Well Written Essays - 3000 words

Panic Disorder - Psychology - Essay Example Taking into consideration the fact that functions such as consciousness, circulation, and respiration are vital for survival, it is unsurprising that particular defenseless people will be hypersensitive to any signs that they will lose consciousness, that they will lose their breath, or that their hearts will stop beating (Root, 2000). Moreover, a number of patients are predominantly terrified of symptoms that signify that they could be losing control over vicious urges directed toward others or themselves (Stein & Hollander, 2002). Likewise, a number of patients are particularly responsive to indications of behavioral or psychological ‘dyscontrol’ due to the probable effects of being hospitalized for ‘wild’ or ‘mad’ behavior, or perhaps shamed for uninhibited behavior (Stein & Hollander, 2002). The patient’s anxiety that a critical organ, such as the brain, lungs, or heart, or behavioral mechanism is about to stop working is a fundamenta l element of the cognitive mechanism of panic disorder (Taylor, 2004). Due to these concerns, patients vulnerable to panic attacks have a tendency to focus their attention on any mental or bodily encounters that are not explainable as normal. A second attribute of panic disorder that challenges clinician and offers a profitable opportunity for the psychologist is the fixation of attention on the idea of an imminent tragedy. The tragedy that they fear subsequent to the start of the attack is not just the development of the panic disorder, but the likelihood of the much serious different explanation of their symptoms; specifically, that at this point it may not be the ordinary panic, but a swiftly grave process or a severe disruption of behavioral or mental functioning (Hurley, 2007). Besides the fixation on inner consciousness, the idea of approaching disaster absorbs the core of the patient’s thoughts and is usually so realistic that the

Wednesday, November 20, 2019

Why you chose the qualitative versus quantitative approach Assignment

Why you chose the qualitative versus quantitative approach - Assignment Example Hence, qualitative researches have proven to be used widely in GI nurses field. Nursing is primarily interpretive. Nurses have an interest in the daily health experiences with their patients, and much qualitative research makes nurses think about their practice (Sandelowski et al. 2012). Patients have diverse perceptions of an issue that do not always fit into numerical quantitative research approaches. The qualitative approach allows nurses to review previous findings of an issue because the method does not have rigid formula and calculations like the quantitative approach. Qualitative analysis is better set to provide information about the meaning of a disease of patients and the way it has affected their life. It is rich in providing personal information and experiences through the interviews. Nursing is a field of practice that borrows much of its information and knowledge from other diverse fields like medicine and psychology (Leeman and Sandelowski, 2012). The research analysis method adopted thus should depend on knowing the experiences of the participants through getting their views. A qualitative approach is interpretive and inductive and can create knowledge about human health and the disease experience of a participant. Qualitative knowledge and information depend on data on the social context with the main aspect being the comprehension of human experiences. It is thus the most befitting approach for the nursing practice, as opposed to the quantitative research method. It ensures a unique perspective of the study question or issue and it always gives a deep insight into human beings when compared to quantitative analysis, which is an essential aspect of the nursing practice (Sandelowski and Leeman,

Sunday, November 17, 2019

Case study analysis Example | Topics and Well Written Essays - 500 words

Analysis - Case Study Example In the e-learning project, strong team work made it to attain its objective making the Australian Customs Service to provide excellent services. Being a body that is responsible for provision of security and integrity of Australia borders, Australian Customs Service noted the need to develop a system that would ensure effective collaboration among the 4,900 employees (David, 2006).The e-learning project was undertaken after the Customs evaluation and came to a conclusion that it will achieve the expected outcomes. One of the notable strengths of the project is that it enjoys the support of the large number of employees. In this way, it would not face resistance during implementation. Additionally, Australian Customs Service applied new technology that is positively viewed as a major solution that faces security personnel. The project also underwent extensive analysis before being implemented, implying that minimal resources were lost resulting to a higher rate of return on investment. The strong working relationship between the project managers and the working group is another strength that made the e-learning project to achieve its objectives. Based on the need by the Customs to provide a project that is effective, the process of planning e-learning took a lot of time. The costs that the Customs underwent in terms time and financial resources could have been possible reduced by outsourcing the project. Due to the modern technology that the e-learning project is adopting, the Customs have an opportunity of conducting training programs easily. On their part, people working in Australian Customs Service will get a chance of enhancing their skills thus becoming more productive. The e-learning project can also be adopted by other security agents that work in collaboration with Australian Customs Service. In this way, the Customs work will not only

Friday, November 15, 2019

Home Energy Management System

Home Energy Management System 1) INTRODUCTION Network of electricity that intelligently integrates with users actions connected to network for sustainable, economical and secure supply is called smart grid [1]. Smart grid is called smart due to fast communication and networking capabilities. Smart grid has an important role in energy structure adjustment, coping with climate changes and economic development [2]. Since 1982 energy demand during peak hour is increasing 25% approximately every year [3]. New intelligent devices must be used to fulfill energy requirements. In order to add intelligence new technologies are to be developed. Electric intelligence is only requirement for operational cost and energy consumption reduction [4]. These new technologies should be able to remove peak load and off load power difference, should be capable of making demand-supply curve smoother and should reduce environmental pollution. In smart grid user plays a vital role in reducing and optimizing energy consumption thus improving system efficiency. In smart grid emission of CO2 and household energy consumption is reduced by 9% and 10% respectively [5] In order to improve electricity consumption keeping in view of consumer’s need there should be an optimum solution. Different optimization techniques can be used for energy management. Different technologies like home area networks, home automation, advanced metering infrastructure and bidirectional communication are introduced by smart grid during past few years [6]. Now a days Zigbee and sensor networks not only monitors the quality of power but use powerful strategy for communication and distribution and sale locally generated energy back to grid [7] [8]. Demand Side Management (DSM) system is important utilization efficiency parameters which have been ignored due to complex dynamics of consumption, random behavior of consumers and lack of commutation technology. The advancement in communication technology has revolutionized the power sector and introduced a concept of new modernized electrical system called as Smart grid [9] .The concept of demand side management was first introduced in late 1970’s which reduces GHG, provides reliable energy reducing the electricity cost [10]. Traditional grids consists of DSM but do not provide such type of reliability to users due lack of sensors and inefficient automation and communication. But smart grid is more efficient due introduction of low cost sensors, smart meters and integration of ICT [11]. Challenges faced by smart grid is shown below Interoperability is said to satisfy if multiple communication network coexist in smart grid. Scalability means increasing number of hardware’s in proportion to others but due to increase in demand this become a major issue can be solved by using sensing networks. Smart grid holds different communities and societies which become an issue in order to resolve it integration of power system is required which is done with actuation, security and communication networks. Security is main issue in smart grid because a hacker can interrupt the data of smart grid and easily access to smart meters so this issue can be resolve by modernization the security and by data hiding [12]. The smart grid consists of HEMS that enable demand response and demand side management. On the basis of power supply demand response is responsible for altering and managing the energy and demand side management (DSM) controls the planning, techniques and implementation of policies [13]. There are two major schemes of HEMS one is communication and 2nd one is optimization [14]. Home energy management systems consist of three basic functional blocks [15]: HEMS software Home energy management center(HEMC) Load scheduler. HEMC provides customer’s user’s friendly graphical representation which not only provides assistance to customers but also give them control over various loads using load scheduler. HEMC software uses lab view developer tool that provides necessary information to customers using Zigbee protocol. It has two main sectors a) home tab b) data tab. The information load control, line control and on/off control is provided by home tab on/off control use in switching sequence and its major application is that it is used to detect any abnormality in hardware. The data logging of current and voltage with in time is represented by data tab. Load scheduler considers the bundle of single knapsack known as multiple knapsacks due to which customers become aware of peak load at specific time and interval of occurrence. A load scheduler not only determines the critical and non-critical loads but also time dependent loads. In emergency conditions it also controls various loads. This also stores data of electricity consumption 24/7. Energy management is an organized and systematic coordination of procurement, conversion, distribution and use of energy to meet the requirements, taking into account environmental and economic objectives [16]. Energy management systems are computer aided tools that are used by operators of utility grid for controlling, monitoring and optimizing the generation and transmission system performance. In efficient energy consumption the participation of end user is as much important as the supplier. In modern power supply systems end users’ are provided with RT-feedback (real-time feedback) via different website portals, in-home displays (IHD), or some other feedback viewer device like mobile etc. [17]. Provision of feedback to end user will motivate them to alter their energy usage to minimize the electricity bills. In present smart grid system end users’ are forced for shifting their energy usage on peak to off peak hours regardless of their comfort and life style [17]. All over the world major portion of energy is consumed by residential users, so they can play an important role for energy optimization. Research shows that energy consumption is minimized by 12% by installing energy consumption information system and displays energy consumption of whole unit [18]. Due to advancement in technology the industries has become advance due to which energy demand increases which results in load shedding and blackouts and use of fossil fuel is increases which will finish soon. Now world is going toward non-conventional energy resources like solar and photovoltaic cells but in order to provide information regarding to electricity to customers the smart hems use analogue and digital systems which is an efficient methodology. Home energy management systems play a fantastic role in distribution of energy via conventional grid and homes optimistically. With increasing demand of energy the communication in wired as well as in wireless medium is increased. Internet connection and intranet connection is makes low cost smart homes. Zigbee is one of the devices that uses for communication between smart homes and smart grid. Zigbee alliance introduced Zigbee standard protocol based on IEEE 802.15.4 standard set by IEEE and new standard committee (NESCOM) for low rates wireless personal area network [15]. Zigbee consists of four layers. Zigbee Zigbee alliance platform IEEE 802.15.4 There is a great difference between energy production and consumption, low production cause deficiency of electricity supply. World energy production pie chart is shown as There are many optimization techniques that are used for optimization one of which is knapsack. In knapsack there are many algorithms used for obtaining the best optimized result. In this paper we will make comparative study of some algorithms of knapsack and we will find the best solution obtained from these algorithms. Comparison of different home energy management schemes: Optimization based residential energy management: It is the linear programming model basic purpose of this model is minimization of electricity cost at residential areas [1]. In this scheme a day of 24 hours is divided into equal time slots having equal lengths consists of various prices of electricity like time of use (TOU) tariffs. The objective function shows that with proper scheduling we can reduce the energy expenses by division of home appliances in time slots. Objective function is defined as EI DI Ut St Where I define number of appliances, E defines energy consumption of appliance, J number of days, DI length of cycle of appliance, K number of requests, Ut unit price for slot t and T number of time slots. IN home energy management (iHEM): This scheme use smart appliances like energy management unit (EMU) and wireless sensor home area network (WSHANs) for communication purposes between appliances (IHEMS). It also uses (Zigbee) protocol, wireless sensor networks and cluster tree topology. In this scheme customer may turn on appliance at any moment without being worried about peak hours. In home energy management (iHEM) gives suitable time to customer for appliance use. How iHEM works a request package is sent by appliance to EMU at the start, on receiving the packet EMU communicates with storage system in order to know available energy. Energy management unit (EMU) than communicates with smart meter for current prices. The storage unit send available reply containing information about storage energy when EMU receives packet, it schedules the suitable start time according to iHEM algorithm. It also reduces the carbon emission and energy consumption cost. 2) KNAPSACK: The single knapsack is a problem of combinatorial optimization having objects, values and weights packed into knapsack of specific capacity such that value of object is maximized [19] .The multiple knapsack is generalization of single knapsack problem it is resource allocation problem consists of M resources and set of N objects [19]- [20]. Knapsack problem is basically an items set that have different weights and values. Our choice of item must be in such a way that it should be maximum among the weights of given items. Knapsack allows community to use energy efficiently in order to achieve their goals. It not only minimizes the customer bills but force them to use their heavy appliances other than peak hours. It is estimated that energy demands overall around the world increasing 25 percent per year so its great challenge for us to fulfill the demand [21]. In order to overcome the increasing demand of energy we need to optimize energy usage. Knapsack is one of the optimization technique used for optimizing a problem. 2.1) Types of Knapsack: There are different types of knapsack which are as 1) 0-1Knapsack problem. 2) Bounded Knapsack problem. 3) Unbounded Knapsack problem. 2.1.1) 0-1 Knapsack problem (binary Knapsack): In such case the item is either taken or not taken (accepted / rejected) there are no other possibilities. Suppose a set of ’n’ items having different weights and values say ‘wi’ and ‘vi’, xi is the number of copies of item of set ‘n’. In mathematical form: Maximize ixi Subject to i xi ≠¤ W Here Xi {0, 1} 2.1.2) Bounded Knapsack Problem: In bounded knapsack problem restriction on xi is removed i.e. xi is an integer value in BKP. In BKP restriction is applied on copies of each item of set ‘n’ to some integer value say ‘ci’. Mathematically: Maximize ixi Subject to i xi ≠¤ WHere xi {0, 1†¦ ci} 2.1.3) Unbounded Knapsack Problem: In unbounded knapsack problem no restriction is applied on xi. Mathematically: Maximize ixi Subject to i xi ≠¤ WHere xi ≠¥ 0. 2.2) Algorithms for Knapsack: There are many algorithms for solving 0-1 knapsack problems which are as [22]: 2.2.1) Brute Force: It is a straight forward approach based on statement of problem and concepts’ definition. If there are n items that can be chosen from a set of given items then there will be 2n possible combination of items for knapsack. There is a bit string of 0’s and 1’s, if the string is 1 of an item then it is chosen if 0 then not chosen. 2.2.2) Dynamic Programming: It is a technique in which a complex problem is divided into smaller sub problems. These sub-problems are then solved and are recorded in table. Thus table obtain is utilize to solve original problem. The complexity of this algorithm is O (NlogN). 2.2.3) Greedy Algorithm: This algorithm requires some common sense and problem solving experience for solving problem. It’s a decision making process which may have following steps: 1) Choosing such item that has maximum value in knapsack. 2) Choose item with less weight. 3) Choose item with high value to weight ratio. 2.2.4) Genetic Algorithm: It is an algorithm used to search best solution among different possible solution of a problem. It begins with a solution set and each set is called population. A new population is made from old population by selecting them according to certain specified fitness level. 3) Appliance Usage Control: In [23] consumption of electricity is not always rational it also depends on human psychology factors. Different people use different appliances at different time slots. Now if we consider some appliances we can classify them into following categories: 1) Must Run Appliances: Appliances whose time slot cannot be changed and they must run comes in this category. 2) Fixed Run Appliances: Appliances that run only once a day at specific time. 3) Flexible Appliances: Appliances that can be run at any time in a day they don’t have fixed time. Some of the household devices are shown below: Oven LampRefrigerator Fan Considering human psychology factor the use of appliances can be categorize as: 1) Emergency Use: Appliances that use in some sort of emergency. 2) Welfare: Appliances that use for welfare 3) Enjoyment: Appliances that use for enjoyment purpose. Taking an example of personnel computer that is used by student for his working purpose or for emergency while an adult use it for enjoyment purpose. In order to make decision on which appliance should be used during peak hour follows analytic hierarchy process. Bibliography

Tuesday, November 12, 2019

All public behavior is ultimately private behavior

Ever since Stephen Covey established himself with his phenomenal book The Seven Habits of highly Effective People, people are on the lookout for what is deemed quality reading that he had then became known for. In First Things First, it is expected that it is going to be a repeat of the success of the previous material (Covey et al. , 1994). People of today are mostly living in harried and often-times exhausted schedules.The pressure to juggle jobs, family and other jobs primarily due to financial needs is a common experience of people today and this has led to a number of complications both to the mental and physical existence of individuals, and the devastation of some of their precious relationships, that necessitate adjustments constantly. Covey refers to this as time management dilemmas and leadership problems (Covey et al. , 1994).This paper attempts to draw some important discussions and assumptions that relate to the book’s content and the authors’ understanding of how several principles are applied to address what makes a person effective ultimately in the public arena or workplace and in his personal life. Discussion It is inevitable that juggling work and family life will be one of a person’s demanding experiences. The rationale for having a job is not only to have a livelihood, achieve personal satisfaction in the expression of his abilities and trainings, and receive his remuneration and perks on the side.Preparation for family stability to be able to provide and thus create an atmosphere of care, for bachelors/maidens, is also the foremost and logical reason for having a job. However, the thin thread that separates between the two polarities becomes blurred, and there lies the tension that pulls a person in different directions (Covey et al. , 1994). The Center for Mediation and Dispute Resolution opens its website with the following quote: â€Å"Our life is one giant balancing act (http://www. cmdronline. com/workshops. htm) . † Perhaps, no person will ever disagree with that statement.The goal then is to know how to do the balancing act, to gain competencies in achieving a rewarding, flourishing kind of life that holds work in one hand, while maintaining a well-nurtured and healthy family on the other hand. The array of questions that confront couples or families with this dilemma is quite limitless. Stress is a psychological factor and a common feature of almost every kind of work (Covey et al. , 1994). Two reasons may be suggested why there is a growing recognition of the importance of stress on the job.First, there is the general awareness that stress-related diseases have reached epidemic proportions. More people die or are disabled today as a result of stress than at any other time. Because stress is so physically damaging and pervasive in people’s lives and because it is primarily psychological in nature the discipline of psychology as a whole and especially the specialty area of hea lth psychology is interested in studying and treating stress and other psychosomatic disorders (Covey et al. , 1994; Chang et al. , 2006). The second reason for the growing awareness of the importance of stress at work is practical.The effects of stress on the job are costly and are reflected in a lower productive efficiency. Stress has been known to reduce drastically employee motivation and the physical ability to perform the task well thus, increasing absenteeism, turnover, and tardiness (Covey et al. , 1994; Cahill, 2003; Chang et al. , 2006; Williams, 2003). The main assumption that this paper asserts therefore, is that given the impact of stress to people, it is expected that the average individual look for solutions to minimize its impact and certainly, Covey’s principles in time management is nothing else but timely.The importance of sorting through what is important and the urgent as illustrated in the four quadrants or time matrix is understandably logical, but dete rmining what’s what in somebody’s schedules and activities are then entirely different. People have to go through â€Å"painful† realizations of what activities should stay and what should go in accordance to established priorities. The latter, concerning priorities, the book â€Å"First things first,† took time to guide in making every reader understand.Overall, then, each person must confront and deal with a large and recurring number of stress-producing events everyday both at home and at work. Although most people experience at least some of the harmful effects of stress at one time or another, most people, fortunately, do manage to cope (Covey et al. , 1994; Landy, 1985; Williams, 2003). One effect of stress on the job resulting from overwork is called burnout. The employee becomes less energetic and less interested in the job.He or she becomes emotionally exhausted, apathetic, depressed, irritable, and bored; finds fault with everything about the wo rk (Cahill, 2003; Chang et al. , 2006; Landy, 1985; Williams, 2003). Employees with burnout become rigid about their work, following rules and procedures blindly and compulsively because they are too exhausted to be flexible or consider alternative solutions to a problem (Covey et al. , 1994; Landy, 1985; Williams, 2003). There is a price to pay for such overwork over a long period of time. Stress accumulates and leads to the psychological and physiological ailments described earlier.These people work so hard that they burn away their energy faster than the body can replace it. Such persons have been described as workaholics, or employees addicted to work (Cahill, 2003; Landy, 1985; Williams, 2003). There is no person existing who may not possibly experience inefficiency and ineffectiveness (as the book implies); by-products of this highly stressed culture as a result off wrong choices of what is really deemed important. The urgent takes control of the important matters that renders a person conducting unhealthy and often destructive lives (Covey et al., 1994). Conclusion Ultimately, people lead their lives in public as a result of personal choices or how they conducted their lives in private. The choices they make in life and work are best seen as results of private behavior; i. e. the important aspects of one’s life (the â€Å"compass† as Covey states it) (Covey et al. , 1994) takes precedence over the seemingly urgent yet unimportant activities. In general, people become satisfied and fulfilled when success comes to both important areas in his/her life.Work brings personal gratification and provision for family is secured somehow, while having a happy and contented family is considered miracle in a dog-eat-dog world. This is the aspiration of many if not all working couples and individuals. When employed in an institution that really takes care of their workers, taking into consideration the things that their employees hold dear by providing a s much as the employee needs, the worker or employee settles into a condition wherein he/she can focus on the work or be inspired of it.In addition, the worker can afford more quality time to spend with his/her family. The strategies mentioned are time-and tested approaches. These have greatly helped a lot of people or families in their search for a balanced work-family life. At the stake when a family works to achieve a balance are principles or values they uphold (Covey et al. , 1994). These are the values of family togetherness, rearing and nurturing their offspring, and providing for all aspects of each household member. References: 1. ______Centre for Mediation & Dispute Resolution, Retrieved May 2, 2008 in http://www.cmdronline. com/workshops. htm 2. Cahill, C. A. 2001. Women and stress. In Annual Review of Nursing Research, 19, 229-249. 3. Chang, E. M. , Daly, J. , Hancock, K. M. , Bidewell, J. W. , Johnson, A. , Lambert, V. A. , & Lambert, C. E. 2006. The Relationships Among Workplace Stressors, Coping Methods, Demographic Characteristics, and Health in Australian Nurses. Journal of Professional Nursing, 22(1), 30-38. 4. Covey, Stephen R, A. Roger Merrill, Rebecca R. Merrill. 1994. First things first: to live, to love, to learn, to leave a legacy.New York: Simon & Schuster. 5. Landy, F. J. 1985. Psychology of Work Behavior. 3rd Ed. Dorsey Press. 6. Sauter, Steven, et al. , â€Å"Stress at Work† NIOSH publication. Retrieved May 2, 2008 7. Spinks, Nora. 2006. Choosing the Right Metaphor to Ensure Work-Life Quality for All . Article originally published by WFC Resources, (Accessed in http://www. workfamily. com/Work- lifeClearinghouse/GuestColumns/gc0036. htm). 8. Williams, C. 2003. Stress at Work. Canadian Social Trends, Autumn, 7-13.

Sunday, November 10, 2019

A Study on Enterprise Network Role of Brac Bank

A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics & Telecommunication Engineering INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant Professor School of Engineering & Computer Science Independent University, Bangladesh ABSTRACTThis internship report is an exclusive study of Enterprise Network role at BRAC Bank Ltd. The main Objective of this report is to get the practical experience through observing all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc. through LAN & WAN and also ensure utilization of internet and intranet effectively. iii ACKNOWLEDGEMENTSFirst of all I wish to convey our heartfelt thanks and gratitude to Almighty Allah to complete the internship successfully and also those who all rendered their cooperation in making this report. Without their assistance I could not have completed my internship. I like to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the opportunity to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr.Mohammad Morshed, (Analyst, Technology User Infrastructure, BRAC Bank Limited). Discussions with him about various topics have enriched my conception and knowledge about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior Manager of Network Service) and Md. Mahbubul Alam (Network Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would not have been possible without the help of the people who provided tremendous amount of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my honorable supervisor.My internship achieved its desired success. This internship gives me the opportunity to practically work on the overall technology based banking systems, focusing on the various aspects & analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to maintain or support of a Banking System. iv TABLE OF CONTENTS Page LIST OF TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. LIST OF FIGURES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. CHAPTER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1. 1 1. 2 1. 3 1. 4 1. 2 Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Origin of the Report †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Objective of the internship†¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ About BRAC BANK†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 1 2. 2 Enterprise Network Role at BRAC BANK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Daily, Weekly, Monthly & Other regular duties †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. 2. 1 Daily Activates†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Monitoring Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN & WAN Support for Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v 2. 2. 1. 3 LAN / WAN security†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 4 Internet connectivity†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 5 Western Union and Other Remittance Program †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 6 SWIFT server administration †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦ 2. 2. 1. 7 APN connectivity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. 2. 1. 9 Network devices health check †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. 2. 2. 2 Weekly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 2. 1 Configuration Back†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. . 3 Monthly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 3. 1 SWIFT archive and backup†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 NETWORK ARCHITECTURE DESIGN 3. 1 3. 2 3. 3 3. 4 3. 5 Data Center Architecture †¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Omnibus Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Eldorado Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of Branches †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of a sample Branch†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦ vi 3. 6 4 ATM Architecture†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 LINK ESTABLISHMENT, CONF IGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 New link deployment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link vendor selection †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Network maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 4. 1 4. 4. 2 4. 5 Branch Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ATM link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Link troubleshoot checklist†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 5. 1 4. 5. 2 Radio Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Fiber Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4. 6 5 Remote access policy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Wi-Fi AND INTERNET CONNECTIVITY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. 1 Wi-Fi activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ BANDWIDTH MANAGEMENT AND MONITORIN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 1 6. 2 Overview of Bandwidth management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Bandwidth Management at BRAC Bank†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ vii 6. 3 OpUtils†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 3. 1 Switch Port Mapper†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. 3. 2 IP Address Manager†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1 Maintenance of GP Access point Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 1 GP Huawei Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7. 1. 2 ZTE Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 3 ADN Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 1 Western Union†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 1. 1 Installation process†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8. 2 SWIFT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 1 BRAC Bank Swift Network Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 2 SWIFT Infrastructure Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3 Maintaining the SWIFT environment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3. 1 Daily activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦. 8. 2. 3. 3 Monthly activities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 2. 3. 4 Yearly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. MAINTENANCE, MONITORING & SUPPORT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. 1 9. 2 Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. What's Up Gold†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦ 9. 2. 1 Create a New Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9. 2. 2 What’sUpGold Web Server†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 CONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. REFFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues related link vendor selection 8. 1 Support Level 8. 2 User format for Western union 8. 3 Terms and description of SWIFT Page 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank Omnibus Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring & maintenance flowchart ATM Link monitoring & maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7Wi-Fi Activation Process OpUtils Login Page OpUtils Home Page (Summary Report) Switch Port Mapper portion List of Switches List of Routers Switch information summary Finding a MAC address IP Address Manager Modem Installation Profile Creation Profile Change Western Union Installation Swift Network Diagram Swift Infrastructure Creat New Map in What's Up Gold Select device for mapping 23 31 31 32 32 33 33 34 6 . 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 xii 9. 4 9. 5 9. 6 Configure device properties Polling device What’sUpGold Web Server Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is not enough to enable students to compete with self-assurance and reach his/her ambition without having experience with the real world related applications. Internship is highly needed to expand idea, familiarity and experience. Computer networking is one of the most essential terns in order to run a modern organization. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit course as Internship for the undergraduate students in her course curriculum.The curriculum requires every student to do an internship in an alleged firm for hands on experience about the proficient works. It is a realistic exposure of theoretic ally gained knowledge and can be considered as an opening tryout to be acquainted with any organization and to make oneself confident enough to move toward into service life and start building career. As the outside world is very much competitive for anyone after graduation, IUB provides such an opportunity to build up the capability with most appropriate opportunities.This gives the student great opportunity in the service world and also to get exposure to various diversifications of the service world. Intern students are supervised under a particular faculty member throughout their Internship stage. Here the student gets the chance to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are responsible to report weekly or fortnightly to his/her respective Supervisor to get his/her assistance. And the project gets advancement by following the Supervisor’s instruction.The internship period is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main purpose of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about enterprise network. ? Get the clear view about network monitoring and maintenance. ? Relate theory with practice of networking. ? This is the beginning of a student’s professional career. The student’s competency and efficiency in the working environment can be accessed from this course. ? Teaches the student to take up the responsibility and pressure of work. ? Teaches the student to learn from work. ? To help students enhance their creativity and efficiency in dealing with projects related to their field of study. ? Helping students to express dependability, initiative, resource fullness and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work after graduation. 3 1. Scope I’ve done my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, Western Union Installation. My task was configuring router and switches; configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and Western Union Installation.In the later portion of my internship I was also involved support team of Technology User Infrastructure. The task of Support team is to provide instant pc related support to the users as they call for help. The support may be of two kinds, remote – which is given by using VNC, sometimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. Now I’m confident that I could efficiently work in Networking Industry with my full dedication. . 6 About BRAC Bank BRAC Bank Limited (BBL) is a scheduled commercial bank in Bangladesh. It established in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank will be a unique organization in Bangladesh. The primary objective of the Bank 4 is to provide all kinds of banking business. At the very beginning the Bank faced some legal obligation because the High Court of Bangladesh suspended activity of the Bank and it could fail to start its operations till 03 June 2001.Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the Supreme Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank will be a unique organization in Bangladesh. It will be a knowledge-based organization where the BRAC Bank professionals will learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and break barriers to serve customers and create customer loyalty through a value chain of responsive and professional service delivery.Continuous improvement, problem solution, excellence in service, business prudence, efficiency and adding value will be the operative words of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service culture throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believ e in the Bank’s vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and internationally acceptable banking and accounting standards. Sustained Growth in Small and Medium sector, continuous low cost deposit growth with controlled growth in retained Assets. †¢ Achieve efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks other products and services 5 †¢ Manage various lines of business in fully controlled environment with no compromise on service quality †¢ Keep a diverse, far-flung team fully motivated and driven towards materializing the bank’s vision into reality. BRAC Bank will be the absolute market leader in the number of loans given to small and medium sized enterprises throughout Bangladesh.It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop an d grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in accordance with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network maintain all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN & WAN and also ensure utilization of internet and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design: Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, configuration and troubleshooting: By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipment’s to new distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity: Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide secure internet connectivity through proxy server. 7 2. 1. Bandwidth Management: Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing Perimeter firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network: Maintenance of GP Access Point Net work by establishing IPsec tunnel between BBL and GP network to provide intranet facility to SME Unit offices, also use this secure channel for POS transactions. 2. 1. 6 Connectivity and administration of all payment network Software: Ensure connectivity for all payment network software like Western Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring & Support: Maintain all network device, manage network monitoring application and Provide All LAN & WAN related support. Enterprise network also give solution to BRAC Bank subsidiary institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly & Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant basis. BRAC Bank has redundant links for every branch.And mechanism has been applied so that if one link goes down, the backup link is activated automatically. Apart from this Primary link is being used for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN & WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths.Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the daily operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Connection to internet is required for 24Ãâ€"7. Ensuring the interrupt free internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for Web Servers, Internet banking, Eldorado Pr ojects, etc. 9 2. 2. 1. Western Union and Other Remittance Program Support Computer terminals used for Western Union service face various type of problem including connection error, password lock, Western Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivity Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone.Day to day basis we need to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble free and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwi dth utilization, process, and memory usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup Taking weekly backup of critical hardware applications including Core Router, Core Firewall and Core Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup Archive SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture: Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls and security devices. Fig- 3. 1 BRAC Bank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are connected with the Core router.In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are connected with Core Router. In Left side the remo te Branches are connected via Radio or Fiber or VSAT link provided by the some ISP named BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISP’s which provide Internet those are also connected with Core Router via Firewall.The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture: Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the first neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the name of the independent association of member banks and institutions t hat will operate and manage the central switch.As a first step, OMNIBUS integrates the ATM & POS networks of BRAC Bank and Q-Cash, enabling cardholders of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers significant convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking.This instant increase in the number of ATMs & POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet & Link3 with Omnibus and Omnibus server is also connected via Metronet & Link3. 1 5 3. 3 Eldorado Architecture: Eldorado – a web based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank.BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a common electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances more accurately. This will help the member banks to serve their remittance customers even better and faster. 16To popularize the formal banking channels among the non-resident Bangladeshis for sending their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittanc es electronically in the most expeditious and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet & Link3. . 4 Network Architecture of Branches: Fig- 3. 5: Network Architecture of Branches The Branch is connected with Cisco 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for security issue. One Native VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6: Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All De sktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with Phoenix soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is correct or not. If HSM send green signal for PIN then Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all information is saved on Finacle. Last of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment: The process of new link deployment is as followed.Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection: The issue consideration and their descriptions are pointed below. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in same radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have different backbone for intercity connectivity.This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from higher down time and require more maintenance. Licensed Radio Frequency Tower Height for Radio Links This will ensure better service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation charge increases as tower height increases. Longer tower needs more maintenance cost. Service QualityVendors with poor service quality should not be considered even though they have met all other requireme nts. Support Personnel Select vendors that have dedicated support personnel for remote locations. Also count response time for all previous downtime. Balance of Distribution In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance: Following process follows for the network maintenance for link troubleshoot.Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring & maintenance: Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring & maintenance Fig- 4. 3 Branch Link monitoring & maintenance flowchart 4. 4. 2 ATM link monitoring & maintenance Fig- 4. 4 ATM Link monitoring & maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fi g- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac filtering and MAC binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? MAC entry to the Wireless LAN controller’s MAC filter table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional: depends on user’s requirements) MAC entry to the Wireless LAN controller’s MAC filter table For MAC entry need to log in to the below link https://10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 Then login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing)Then go to Security>MAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 Then Select NEW†¦ from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Acti vation Process (Continuing) 26 Put the MAC Address and select SSID (like BBL) as Profile name, Preferred Interface as Interface Name and give user details and select IP address from the existing Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https://10. 00. 83. 251:10000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User Name=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continuing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description box give the user description, in Host name box give the LAN ID of the user in Hardware Address box put the MAC address and put the IP in to the Fixed IP Address box and then select create to make the user. Fig- 5. 1 Wi-Fi A ctivation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management: Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank: BRAC Bank uses some tools for bandwidth management and monitoring.One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to observe the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port rel ated MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http://10. 0. 0. 236:7080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home page shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its IP address information. In Switch Port Mapper portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of RoutersSummary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ff:ff:ff:ff:ff:ff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types: i. ii. Used IP: Currently using IP addresses.Transient IP: was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP: free IP’s are known as Available IP Address. 35 In the left side of the window we can see the group’s name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Mana ger (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network: 7. 1. 1 GP Huawei Modem Installation: Fig- 7. 1 Modem Installation Click the Next > Button for Starting Installation Fig- 7. 2 Modem Installation (Continuous) 38 Click I Agree for Next Step. Fig- 7. 3 Modem Installation (Continuous) Click Next > for Next Step Fig- 7. 4 Modem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Continuous) Click Finish to Complete the Installation. 0 Fig- 7. 7 Profile Creation Click Profile Management. Then Click New for creating New Profile Write â€Å"BRACBANK† in Profile Name. Click Static and write â€Å"BRACBANK† in APN and write *99# in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation: All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile ChangeClick on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write â€Å"BRACBANK† in Configure Filename and *99# in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click Set default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation: APN settings : AT+CGDCONT=1,†IP†,†BRACBANK† Phone number : *99***1# or *99# Need to copy ewusbmdm file from d drive IT Use to Windows system32CHAPTER EIGHT CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union: To install the western union Translink and activate a client Terminal these steps are followed: 8. 1. 1 Installation process: 1. Download file from ftp://10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. Unzip that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped folder Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps: Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Installation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (C ontinuing) 52 6. Install the software like other conventional software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers> properties>Advanced>Performance>Settings>Turn on DEP>Add Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at C:>program files>Western Union Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Start>all programs>Western Union>Agent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation (Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continu ing) 13. Go to Tools (Ctrl-L) And select sign on screen password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select: Printer Model: LaserJet Printer Name/Port: Canon LBP3460 PCL6 Paper Feed: Front SingleFig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to Start>Control Panel> Network Connections>Network Tasks>Create a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select> Next Select Connect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select Virtual Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select > Write company Name Company Name: Link1 Fig-8. 30 Western Union Installation (Continuing) Se lect Next 61 19. If public network page initiated Select Do not dial the initial connection Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select> Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installation (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyone’s Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22.Then Select> Add a Shortcut to this Connection to my Desktop Then Select> Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select> Save this user name and password for the following users; Select > Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the command prompt GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW –p Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW –p Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW –p 25. Then go t o agent config> Communication And ping the connection points IP; From Start>Run 26.Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1: Support Level: Error Type Mom. config Invalid Request Type Out of Memory Error 800 Object error Log Sheet Have To Do Reinstall the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service Reinstall the software Printing C:WINDOWSsystem32drivers Extract the attached file (if it is not present) in C:WINDOWSsystem32 [attachment MSHFLXGD. OCX] go on START -> RUN, Type in: regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The Society for Worldwide Interbank Financial Telecommunication (â€Å"SWIFT†) operates a worldwide financial messaging network which exchanges messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as â€Å"SWIFT codes†.The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which must be settled via correspondent accounts that the institutions have with each other.Each financial institution, to exchange banking transactions, must have a b anking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview: A typical SWIFT customer environment consists of a combination of individual components that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3: Terms and description of SWIFT Terms FIN CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKIDescription Software product that processes and that exchanges FIN messages, by using the FIN application through the SWIFT network. Alliance Access and Alliance Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote A PI. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator.Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices: HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is supported on the same SWIFTNet Link. Secure Hypertext Transport Protocol. A protocol that is used in order to access web servers that are hosted on SWIFTNet.The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an embedded SWIFTNet L ink, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public Key Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment: 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Arrangements have been made for continuous operation Export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is a pplicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the Web station or Web platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI certificates after you have opened them. Use the SNL_BackUp. l command. (Note: This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? Reboot all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING & SUPPO RT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is â€Å"What's Up Gold†. 9. 2 What's Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options:Discover and Map network devices creates a map using the information sources that you select, such as: SNMP information on your network, information you enter about IP addresses; information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in What's Up Gold F ig-9. 2 Creat New Map in What's Up Gold (Continuing) 72 Now as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1: After creating a Blank Map, drag your desired device from Device Type Panel as directed in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements.You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the details. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 What’sUpGold Web Server What’sUpGold provide s a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties.Set up the web server: Click on the links below Configure > Web Server > General > Enable Web Server > Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any What’sUpGold settings; they will have only the view capabilities. Fig-9. 6 What’sUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Bank Limited but also a chance to learn from the good experts.This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. Beginning from the opportunity to tak e the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a somehow protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day.Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES [1] http:// www. bracbank. com [2] http:// www. eldorado-bd. com/MDMessage3. aspx [3] http:// www. bankinfobd. com/banks/3/BRAC_Bank [4] http:// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html [5] http:// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf