Wednesday, October 30, 2019

Construction Technology and Innovation Assignment - 1

Construction Technology and Innovation - Assignment Example Among the key aspects are; the rising cost of materials, increased focus in environment protection and the drive to divert waste from land fill. The palpable upshots consist of reduced construction time, high quality in terms of construction, cost savings and promoted sustainable development, reduced environmental impacts in addition to improved resource efficiency. The paper presents and analyses at least five current special methods of constructions in use in UK, building forms and innovative products that can be embraced by the university. It specifically looks into the following methods of construction; smart roofs, precast flat panel systems, structural glazing, and curtain walling and thin join masonry (Watts, 2013). Precast flat panel system is one of the most popular offsite construction innovations being utilized across the UK. Precast concrete manufactured offsite for ornamental and structural elements have been extremely used for a myriad projects ranging from bridge elements to railway sleeper, stadia and housing. Precast concrete solutions provide construction elements that are made from recycled materials. The innovation exist indifferent forms such as floor elements, railway sleepers, portal frames for industrial buildings, roof elements, stairs and structural elements for stadia. As weighed against traditional approaches, precast concrete has been reported to potentially reduce waste on the site of construction by close to 50 percent given that the elements are manufactured from recycled materials. The form of fabrication methods and the concrete enables the manufacturers to construct homogeneous elements through the use of predetermined shutters and forms which are incessantly reused. Some of the benefits associated with precast flat panel systems include durability, high aesthetic value, security and low maintenance. Moreover, the manufacturing process and the design do not

Monday, October 28, 2019

Monopoly for the Potato chip industry Essay Example for Free

Monopoly for the Potato chip industry Essay A monopoly is a company that provides a product or service for which there are no close replacements and in which significant barriers of entry can either prevent or hinder a new company from providing competition (Case, et al. , 2009). Take into consideration the potato chip industry in the Northwest are not only competitively structured but are in long-run equilibriums. The firms were earning a normal rate of returns and were competing in a monopolistically competitive market structure. In 2008, two lawyers quietly bought up all the firms and then began operations a monopoly called â€Å"Wonks†. For them to operate efficiently they had to hire a management consulting firm, which will estimate the different long-run competitive equilibrium. With this change comes several important things to consider that will be effected one being the stakeholders involved, price changes and the market structure to be most beneficial to the new corporation. By consolidating the oligopoly members of the Northwest potato chip industry, located in the United States, the legal professionals created a monopoly (Lindblom, 1948, p. 671). By taking away competition in the region, Wonks would now control their position on the market demand curve, where they can go from the produced quantity, to price point, even to where the product can be sold. Monopoly by definition is, â€Å"exclusive control of a commodity or service in a particular market, or a control that makes possible the manipulation of prices,† (Monopoly, 2012). In all actuality a package product like a potato chip could not hold market domination for long. Other manufacturers will transport their product into this region like paying slotting allowances, in order to obtain products for placement on the supermarket shelves. An industry that that comprises just one firm producing a product for which there are no close substitutes are called monopolies (Case, et al. , 2009). Although a monopoly has no other firms to compete with it still constrained by market demand (Case, et al. , 2009). With that said a monopoly must choose both price and quantity of outpost simultaneously because the amount that it will be able to see depends on the prices is sets. However if the price is too high, it won’t sell anything. Thus a monopolist will set prices to maximize profit (Case, et al. , 2009). Stakeholders will both benefit and be hurt by the assembly of the new market domination. The Government will receive more revenues for taxes as the prices are raised and new income is earned for Wonks Industry. In the even that the business looks suspicious they may be forced to respond to a demand from other potato chip producers or consumers, to protect them from inappropriate or unfair trading practices (Lindblom, 1948, p. 671). Some cooperating enterpises like supermarkets or corner stores, are more than likely to see an ability to sell Wonks products at higher prices to consumers, perhaps motivated by higher prices being charged to them by Wonks. Since Wonks are assumed to be the only potato chip industry in town the stores can agree to higher prices. They do this because the demand will be higher if the competition is lower (Lindblom, 1948, p. 671). Consumers on the other hand won’t see any advantage, since the only difference in the market is not having any competition (Case, et al. , 2009). Inevitable price increases will come until a consumer refuses to pay the price. Because of that the company will have to reach a point on the demand curve where they will charge only what the customer will pay for the product (Case, et al. , 2009). Many technological and strategic forces shape market structure, including economies of scale, cost of differences among firms, entrants’ expectations and entry barriers (Bresnahan, 2012, 531). The empirical models of market structure from qualitative chose models of firms’ entry decisions. The models are presumed that we do not observe entrants’ revenues or costs (Bresnahan, 2012, 531). Economic models are used to study market concentration in retail markets for new automobiles. One entry summarizes the competitive cost of entry. The second statistic measures the presence of entry barriers or differences in entrants’ fixed costs (Bresnahan, 2012, 531). Monopolistically competitive firms realize that the decisions they make will be reacted to by other members of the club (Case, et al. , 2009). Pricing will be profitable and comparable, product will be widely available, and vendors will try to attract certain segments with pricing or product offerings (Case, et al. , 2009). It is likely the pro-monopoly potato chip companies made similar margins, their products are found next to each other on super market shelves, and the companies were similarly profitable (Bresnahan, 2012, 531). Enterprises derived from Monopoly ran industries, will stay to look for ways to maximize their profits (Case, et al. , 2009). This will allow products to remain the same, therefore nothing will change in how their were offered. The delivery will be consolidated, but plants not having cost advantage will be left behind in favor of lower cost facilities (Case, et al. , 2009). When a monopoly becomes empowered the product mixes will be reviewed and the low production/less profit generating product will be eliminated (Case, et al. , 2009). In doing so a consumer could find one type of chip when there were actually three different types of chips available. The size of the products being offered, as well as the prices and the volume of the products will be tampered with as a result of market forces not influencing these decisions. (Case, et al. , 2009). Between monopoly and perfect competition are a number of other imperfectly competitive market structures (Case, et al. , 2009). Oligopolistic industries are made of a small number of firms where each has a degree of price setting power. A Monopolistically competitive industries are made up of a large number of firms that acquire price setting power by differentiating their products or by establishing a name (Case, et al. , 2009). The sort term life of a monopoly market forces and consumer demand will all act to make the monopolistically competitive firm the best for both Wonks and for consumers. This can be assessed through the Sherman Anti Trust Act to agencies like the Federal Trade Commission and the Department of Justice. A monopolistic competitive firm enjoys some of the advantages of both monopoly and free enterprise (Case, et al. , 2009). The Chip market has barriers that will act to keep all the players in the chip market safe, and margins will be protected while business are happy with their market share. They can also produce and sell with the knowledge that they will not have to manage production volumes or pricing in their marketplace. Some members of the oligopoly will enjoy harmonious business times (Case, et al. , 2009). Consumers can benefit from limited competition and have product provided at prices the free market will set. product shortages, elimination of marginal products, price spikes will not affect their marketplace (Case, et al. , 2009). The chips will be available where the consumer expects and at price points they expect. The price will decrease or increase which will be industry wide this will keep from the producer from being singled out for price increases (Case, et al. , 2009). A monopoly is an industry with a single firm in which the entry of new firms is blocked. An oligopoly is an industry in which there is a small number of firms, each large enough to have an impact on the market price of its outputs. Firms that differentiate their products in industries with many producers and free entry are called monopolistic competitors. A monopoly is a company that provides a product or service for which there are no close replacements and in which significant barriers of entry can either prevent or hinder a new company from providing competition (Case, et al. , 2009). With this change comes several important things to consider that will be effected one being the stakeholders involved, price changes and the market structure to be most beneficial to the new corporation (Case, et al., 2009). By taking away competition in the region, Wonks would now control their position on the market demand curve, where they can go from the produced quantity, to price point, even to where the product can be sold. Stakeholders will both benefit and be hurt by the assembly of the new market domination. Monopolistically competitive firms realize that the decisions they make will be reacted to by other members of the club (Case, et al. , 2009). Bibliography Bresnahan ,Timothy F. Reiss, Peter C. Entry in Monopoly Markets. The Review of Economic Studies. Vol. 57, No. 4 (Oct. , 1990), pp. 531-553. Case, K. E. , Fair, R. C. , and Oster, S. E. (2009). Principles of Microeconomics. (9th ed). Upper Saddle River, New Jersey: Pearson Prentice Hall. Lindblom, Charles E. The Union as a Monopoly. The Quarterly Journal of Economics , Oxford University Press Vol. 62, No. 5 (Nov. , 1948), pp. 671-697 Monopoly. (n. d. ). Collins English Dictionary Complete Unabridged 10th Edition. Retrieved October 08, 2012, from Dictionary. com website: http://dictionary. reference. com/browse/monopoly.

Saturday, October 26, 2019

Though magazines and newspapers belong to the same category (printed

Though magazines and newspapers belong to the same category (printed media), they can still fulfill totally different goals when it comes to advertising. The most Analysis of newspapers & magazines Introduction The intention of this assignment is to state the advantages and disadvantages of magazines and newspapers (printed media). As the advantages and disadvantages of both differ, we decided to separate the different media in order to get a clear overview of both types regarding marketing communications. Printed media is a good medium for using cross-media communication, but it is also a good way of getting local recognition. Newspapers Newspapers permit an advertiser to reach a large number of people in a city, town, and region or within a specified geographic area. Newspapers are one of the major advertising media for the smaller retailers and some larger corporations. Newspapers are normally created and bought daily. A few examples of newspapers are: - The Irish times - The Irish independent - The Letterkenny post The newspapers stated above all have a different geographic distribution and this also affects the ads that are in these newspapers. Social groups, demographic characteristics and other identifiable segmentations are also usually linked to certain newspapers, which make it more appealing to advertise a product or service that corresponds mostly with the newspaperÂ’s Ââ€Å"personality†. Advantages of newspapers - High...

Thursday, October 24, 2019

Nike’s CSR Challenge Case Study

In 2005 after reporting on its widespread abusive treatment in factory plans Nike’s came back to report on its social and environmental practices. Some of the Challenges that Nike and other apparel industries face in its supply chains around the World are many. Companies like Nike needs to consider people, planet and profit from now on. Nike understood as well as other competitors that seeking good societal relations should be seen as both good to society and good for profitability. The company understands now that the strategic shift for Nike’s Management can not only been seen as a close system. Its future depends on the reshaping the signals that are being sent to customers, suppliers, investors, so that the company can also operate in a sustainable way, which is also financially viable. Just changing rules and regulation at the factory’s plants is not enough, companies also have to engage in Leadership and by this I don’t mean the traditional Leadership which involved leading people towards goal of the employer. Employees should engage in transcending leadership and get in a dialogue, action to address systemic problems and resolved them, or engage people on collective goals. The only sad thing is that without changes to the financial markets, Nike may find its efforts in vain. The Statement by a Nike representative that â€Å"consumers are not rewarding us for investments in improved social performance in supply chain†. It meant that although Nike improved conditions and outcomes for its employees and sub contractor and that they slightly better working conditions to their third world employees and banned the hiring of children, they thought people in general would buy more stuff from them, just because Nike decided to be a bit nicer to employees and cost them money. Apparently Nike is saying it wasn’t worth investing money into being more humane because at the end it did not resulted in more shoe sales. A stakeholder must be distinguished from a stockholder. They own a share of the corporation. A stakeholder is any group or individual that has a vital interest in the doings of the corporation. There are several other stakeholders of the corporation. These may include employees, customers, suppliers, local community to name a few. Managers need to understand the open systems approach in order to construct support Systems. Examples of changes in practices of abroad factory plants like in this case Nike made some changes and are examples of the adaptation that organizations have to exercise to respond to the demands of the open system. This means that firms need to watch their customer needs, their employee’s needs, and the needs of the community. In international ventures, understanding the local culture and relying on the network of relationships created in that subsystem will be keys to increase their success. What they mean by â€Å"Leaders beyond borders†. All it is is people who can see across borders created by others, take action and address systemic problems within an organization in this case. The social and environmental challenges are known and numerous. But by rethinking they also represent some of the best opportunities for business. I don’t think there is a perfect science to achieve a compatibility of profits with people and planet, but I think it is the responsibility of all, as a business, as a consumer to try to meet a middle ground in which all three people, profit and planet gain a decent benefit from one another.

Wednesday, October 23, 2019

A Study on Enterprise Network Role of Brac Bank

A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics & Telecommunication Engineering INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant Professor School of Engineering & Computer Science Independent University, Bangladesh ABSTRACTThis internship report is an exclusive study of Enterprise Network role at BRAC Bank Ltd. The main Objective of this report is to get the practical experience through observing all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc. through LAN & WAN and also ensure utilization of internet and intranet effectively. iii ACKNOWLEDGEMENTSFirst of all I wish to convey our heartfelt thanks and gratitude to Almighty Allah to complete the internship successfully and also those who all rendered their cooperation in making this report. Without their assistance I could not have completed my internship. I like to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the opportunity to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr.Mohammad Morshed, (Analyst, Technology User Infrastructure, BRAC Bank Limited). Discussions with him about various topics have enriched my conception and knowledge about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior Manager of Network Service) and Md. Mahbubul Alam (Network Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would not have been possible without the help of the people who provided tremendous amount of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my honorable supervisor.My internship achieved its desired success. This internship gives me the opportunity to practically work on the overall technology based banking systems, focusing on the various aspects & analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to maintain or support of a Banking System. iv TABLE OF CONTENTS Page LIST OF TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. LIST OF FIGURES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. CHAPTER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1. 1 1. 2 1. 3 1. 4 1. 2 Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Origin of the Report †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Objective of the internship†¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ About BRAC BANK†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 1 2. 2 Enterprise Network Role at BRAC BANK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Daily, Weekly, Monthly & Other regular duties †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. 2. 1 Daily Activates†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Monitoring Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN & WAN Support for Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v 2. 2. 1. 3 LAN / WAN security†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 4 Internet connectivity†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 5 Western Union and Other Remittance Program †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 6 SWIFT server administration †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦ 2. 2. 1. 7 APN connectivity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. 2. 1. 9 Network devices health check †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. 2. 2. 2 Weekly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 2. 1 Configuration Back†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. . 3 Monthly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 3. 1 SWIFT archive and backup†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 NETWORK ARCHITECTURE DESIGN 3. 1 3. 2 3. 3 3. 4 3. 5 Data Center Architecture †¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Omnibus Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Eldorado Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of Branches †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of a sample Branch†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦ vi 3. 6 4 ATM Architecture†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 LINK ESTABLISHMENT, CONF IGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 New link deployment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link vendor selection †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Network maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 4. 1 4. 4. 2 4. 5 Branch Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ATM link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Link troubleshoot checklist†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 5. 1 4. 5. 2 Radio Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Fiber Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4. 6 5 Remote access policy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Wi-Fi AND INTERNET CONNECTIVITY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. 1 Wi-Fi activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ BANDWIDTH MANAGEMENT AND MONITORIN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 1 6. 2 Overview of Bandwidth management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Bandwidth Management at BRAC Bank†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ vii 6. 3 OpUtils†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 3. 1 Switch Port Mapper†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. 3. 2 IP Address Manager†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1 Maintenance of GP Access point Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 1 GP Huawei Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7. 1. 2 ZTE Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 3 ADN Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 1 Western Union†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 1. 1 Installation process†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8. 2 SWIFT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 1 BRAC Bank Swift Network Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 2 SWIFT Infrastructure Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3 Maintaining the SWIFT environment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3. 1 Daily activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦. 8. 2. 3. 3 Monthly activities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 2. 3. 4 Yearly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. MAINTENANCE, MONITORING & SUPPORT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. 1 9. 2 Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. What's Up Gold†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦ 9. 2. 1 Create a New Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9. 2. 2 What’sUpGold Web Server†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 CONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. REFFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues related link vendor selection 8. 1 Support Level 8. 2 User format for Western union 8. 3 Terms and description of SWIFT Page 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank Omnibus Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring & maintenance flowchart ATM Link monitoring & maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7Wi-Fi Activation Process OpUtils Login Page OpUtils Home Page (Summary Report) Switch Port Mapper portion List of Switches List of Routers Switch information summary Finding a MAC address IP Address Manager Modem Installation Profile Creation Profile Change Western Union Installation Swift Network Diagram Swift Infrastructure Creat New Map in What's Up Gold Select device for mapping 23 31 31 32 32 33 33 34 6 . 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 xii 9. 4 9. 5 9. 6 Configure device properties Polling device What’sUpGold Web Server Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is not enough to enable students to compete with self-assurance and reach his/her ambition without having experience with the real world related applications. Internship is highly needed to expand idea, familiarity and experience. Computer networking is one of the most essential terns in order to run a modern organization. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit course as Internship for the undergraduate students in her course curriculum.The curriculum requires every student to do an internship in an alleged firm for hands on experience about the proficient works. It is a realistic exposure of theoretic ally gained knowledge and can be considered as an opening tryout to be acquainted with any organization and to make oneself confident enough to move toward into service life and start building career. As the outside world is very much competitive for anyone after graduation, IUB provides such an opportunity to build up the capability with most appropriate opportunities.This gives the student great opportunity in the service world and also to get exposure to various diversifications of the service world. Intern students are supervised under a particular faculty member throughout their Internship stage. Here the student gets the chance to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are responsible to report weekly or fortnightly to his/her respective Supervisor to get his/her assistance. And the project gets advancement by following the Supervisor’s instruction.The internship period is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main purpose of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about enterprise network. ? Get the clear view about network monitoring and maintenance. ? Relate theory with practice of networking. ? This is the beginning of a student’s professional career. The student’s competency and efficiency in the working environment can be accessed from this course. ? Teaches the student to take up the responsibility and pressure of work. ? Teaches the student to learn from work. ? To help students enhance their creativity and efficiency in dealing with projects related to their field of study. ? Helping students to express dependability, initiative, resource fullness and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work after graduation. 3 1. Scope I’ve done my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, Western Union Installation. My task was configuring router and switches; configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and Western Union Installation.In the later portion of my internship I was also involved support team of Technology User Infrastructure. The task of Support team is to provide instant pc related support to the users as they call for help. The support may be of two kinds, remote – which is given by using VNC, sometimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. Now I’m confident that I could efficiently work in Networking Industry with my full dedication. . 6 About BRAC Bank BRAC Bank Limited (BBL) is a scheduled commercial bank in Bangladesh. It established in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank will be a unique organization in Bangladesh. The primary objective of the Bank 4 is to provide all kinds of banking business. At the very beginning the Bank faced some legal obligation because the High Court of Bangladesh suspended activity of the Bank and it could fail to start its operations till 03 June 2001.Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the Supreme Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank will be a unique organization in Bangladesh. It will be a knowledge-based organization where the BRAC Bank professionals will learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and break barriers to serve customers and create customer loyalty through a value chain of responsive and professional service delivery.Continuous improvement, problem solution, excellence in service, business prudence, efficiency and adding value will be the operative words of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service culture throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believ e in the Bank’s vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and internationally acceptable banking and accounting standards. Sustained Growth in Small and Medium sector, continuous low cost deposit growth with controlled growth in retained Assets. †¢ Achieve efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks other products and services 5 †¢ Manage various lines of business in fully controlled environment with no compromise on service quality †¢ Keep a diverse, far-flung team fully motivated and driven towards materializing the bank’s vision into reality. BRAC Bank will be the absolute market leader in the number of loans given to small and medium sized enterprises throughout Bangladesh.It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop an d grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in accordance with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network maintain all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN & WAN and also ensure utilization of internet and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design: Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, configuration and troubleshooting: By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipment’s to new distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity: Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide secure internet connectivity through proxy server. 7 2. 1. Bandwidth Management: Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing Perimeter firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network: Maintenance of GP Access Point Net work by establishing IPsec tunnel between BBL and GP network to provide intranet facility to SME Unit offices, also use this secure channel for POS transactions. 2. 1. 6 Connectivity and administration of all payment network Software: Ensure connectivity for all payment network software like Western Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring & Support: Maintain all network device, manage network monitoring application and Provide All LAN & WAN related support. Enterprise network also give solution to BRAC Bank subsidiary institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly & Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant basis. BRAC Bank has redundant links for every branch.And mechanism has been applied so that if one link goes down, the backup link is activated automatically. Apart from this Primary link is being used for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN & WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths.Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the daily operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Connection to internet is required for 24Ãâ€"7. Ensuring the interrupt free internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for Web Servers, Internet banking, Eldorado Pr ojects, etc. 9 2. 2. 1. Western Union and Other Remittance Program Support Computer terminals used for Western Union service face various type of problem including connection error, password lock, Western Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivity Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone.Day to day basis we need to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble free and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwi dth utilization, process, and memory usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup Taking weekly backup of critical hardware applications including Core Router, Core Firewall and Core Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup Archive SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture: Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls and security devices. Fig- 3. 1 BRAC Bank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are connected with the Core router.In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are connected with Core Router. In Left side the remo te Branches are connected via Radio or Fiber or VSAT link provided by the some ISP named BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISP’s which provide Internet those are also connected with Core Router via Firewall.The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture: Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the first neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the name of the independent association of member banks and institutions t hat will operate and manage the central switch.As a first step, OMNIBUS integrates the ATM & POS networks of BRAC Bank and Q-Cash, enabling cardholders of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers significant convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking.This instant increase in the number of ATMs & POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet & Link3 with Omnibus and Omnibus server is also connected via Metronet & Link3. 1 5 3. 3 Eldorado Architecture: Eldorado – a web based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank.BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a common electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances more accurately. This will help the member banks to serve their remittance customers even better and faster. 16To popularize the formal banking channels among the non-resident Bangladeshis for sending their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittanc es electronically in the most expeditious and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet & Link3. . 4 Network Architecture of Branches: Fig- 3. 5: Network Architecture of Branches The Branch is connected with Cisco 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for security issue. One Native VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6: Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All De sktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with Phoenix soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is correct or not. If HSM send green signal for PIN then Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all information is saved on Finacle. Last of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment: The process of new link deployment is as followed.Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection: The issue consideration and their descriptions are pointed below. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in same radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have different backbone for intercity connectivity.This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from higher down time and require more maintenance. Licensed Radio Frequency Tower Height for Radio Links This will ensure better service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation charge increases as tower height increases. Longer tower needs more maintenance cost. Service QualityVendors with poor service quality should not be considered even though they have met all other requireme nts. Support Personnel Select vendors that have dedicated support personnel for remote locations. Also count response time for all previous downtime. Balance of Distribution In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance: Following process follows for the network maintenance for link troubleshoot.Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring & maintenance: Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring & maintenance Fig- 4. 3 Branch Link monitoring & maintenance flowchart 4. 4. 2 ATM link monitoring & maintenance Fig- 4. 4 ATM Link monitoring & maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fi g- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac filtering and MAC binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? MAC entry to the Wireless LAN controller’s MAC filter table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional: depends on user’s requirements) MAC entry to the Wireless LAN controller’s MAC filter table For MAC entry need to log in to the below link https://10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 Then login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing)Then go to Security>MAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 Then Select NEW†¦ from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Acti vation Process (Continuing) 26 Put the MAC Address and select SSID (like BBL) as Profile name, Preferred Interface as Interface Name and give user details and select IP address from the existing Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https://10. 00. 83. 251:10000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User Name=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continuing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description box give the user description, in Host name box give the LAN ID of the user in Hardware Address box put the MAC address and put the IP in to the Fixed IP Address box and then select create to make the user. Fig- 5. 1 Wi-Fi A ctivation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management: Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank: BRAC Bank uses some tools for bandwidth management and monitoring.One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to observe the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port rel ated MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http://10. 0. 0. 236:7080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home page shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its IP address information. In Switch Port Mapper portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of RoutersSummary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ff:ff:ff:ff:ff:ff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types: i. ii. Used IP: Currently using IP addresses.Transient IP: was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP: free IP’s are known as Available IP Address. 35 In the left side of the window we can see the group’s name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Mana ger (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network: 7. 1. 1 GP Huawei Modem Installation: Fig- 7. 1 Modem Installation Click the Next > Button for Starting Installation Fig- 7. 2 Modem Installation (Continuous) 38 Click I Agree for Next Step. Fig- 7. 3 Modem Installation (Continuous) Click Next > for Next Step Fig- 7. 4 Modem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Continuous) Click Finish to Complete the Installation. 0 Fig- 7. 7 Profile Creation Click Profile Management. Then Click New for creating New Profile Write â€Å"BRACBANK† in Profile Name. Click Static and write â€Å"BRACBANK† in APN and write *99# in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation: All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile ChangeClick on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write â€Å"BRACBANK† in Configure Filename and *99# in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click Set default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation: APN settings : AT+CGDCONT=1,†IP†,†BRACBANK† Phone number : *99***1# or *99# Need to copy ewusbmdm file from d drive IT Use to Windows system32CHAPTER EIGHT CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union: To install the western union Translink and activate a client Terminal these steps are followed: 8. 1. 1 Installation process: 1. Download file from ftp://10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. Unzip that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped folder Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps: Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Installation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (C ontinuing) 52 6. Install the software like other conventional software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers> properties>Advanced>Performance>Settings>Turn on DEP>Add Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at C:>program files>Western Union Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Start>all programs>Western Union>Agent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation (Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continu ing) 13. Go to Tools (Ctrl-L) And select sign on screen password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select: Printer Model: LaserJet Printer Name/Port: Canon LBP3460 PCL6 Paper Feed: Front SingleFig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to Start>Control Panel> Network Connections>Network Tasks>Create a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select> Next Select Connect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select Virtual Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select > Write company Name Company Name: Link1 Fig-8. 30 Western Union Installation (Continuing) Se lect Next 61 19. If public network page initiated Select Do not dial the initial connection Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select> Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installation (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyone’s Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22.Then Select> Add a Shortcut to this Connection to my Desktop Then Select> Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select> Save this user name and password for the following users; Select > Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the command prompt GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW –p Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW –p Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW –p 25. Then go t o agent config> Communication And ping the connection points IP; From Start>Run 26.Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1: Support Level: Error Type Mom. config Invalid Request Type Out of Memory Error 800 Object error Log Sheet Have To Do Reinstall the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service Reinstall the software Printing C:WINDOWSsystem32drivers Extract the attached file (if it is not present) in C:WINDOWSsystem32 [attachment MSHFLXGD. OCX] go on START -> RUN, Type in: regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The Society for Worldwide Interbank Financial Telecommunication (â€Å"SWIFT†) operates a worldwide financial messaging network which exchanges messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as â€Å"SWIFT codes†.The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which must be settled via correspondent accounts that the institutions have with each other.Each financial institution, to exchange banking transactions, must have a b anking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview: A typical SWIFT customer environment consists of a combination of individual components that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3: Terms and description of SWIFT Terms FIN CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKIDescription Software product that processes and that exchanges FIN messages, by using the FIN application through the SWIFT network. Alliance Access and Alliance Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote A PI. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator.Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices: HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is supported on the same SWIFTNet Link. Secure Hypertext Transport Protocol. A protocol that is used in order to access web servers that are hosted on SWIFTNet.The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an embedded SWIFTNet L ink, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public Key Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment: 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Arrangements have been made for continuous operation Export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is a pplicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the Web station or Web platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI certificates after you have opened them. Use the SNL_BackUp. l command. (Note: This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? Reboot all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING & SUPPO RT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is â€Å"What's Up Gold†. 9. 2 What's Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options:Discover and Map network devices creates a map using the information sources that you select, such as: SNMP information on your network, information you enter about IP addresses; information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in What's Up Gold F ig-9. 2 Creat New Map in What's Up Gold (Continuing) 72 Now as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1: After creating a Blank Map, drag your desired device from Device Type Panel as directed in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements.You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the details. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 What’sUpGold Web Server What’sUpGold provide s a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties.Set up the web server: Click on the links below Configure > Web Server > General > Enable Web Server > Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any What’sUpGold settings; they will have only the view capabilities. Fig-9. 6 What’sUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Bank Limited but also a chance to learn from the good experts.This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. Beginning from the opportunity to tak e the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a somehow protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day.Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES [1] http:// www. bracbank. com [2] http:// www. eldorado-bd. com/MDMessage3. aspx [3] http:// www. bankinfobd. com/banks/3/BRAC_Bank [4] http:// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html [5] http:// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf

Tuesday, October 22, 2019

The Trials of the Scarlett Letter

The Trials of the Scarlett Letter Trial 1 In trial number 1 the jury found the defendant John proctor guilty to the charge of statutory rape, and innocent to the assault charges, innocent to child neglect charges. When finding a verdict on the statutory rape charge the jury looked at the defenses reasoning that was John Proctor was not in his right state of mind when admitting to having a sexual relation with Abigail Williams who is a minor. The defense stated that Mr. Proctor was so troubled over the witchcraft accusations against his wife that he was not in his right mind to make rational decisions when admitting to the rape. The jury concluded that although Mr. Proctor was a very stressed man his stress is not enough to cause him to admit to such a crime. Along with the honest, heartfelt testimonies of Abigail Williams, saying "she was taken advantage of ". we found John Procter guilty of Statutory Rape.John Proctor

Monday, October 21, 2019

Social Issues The Effect of the Divorce on Children

Social Issues The Effect of the Divorce on Children Introduction The divorce is the issue, which goes beyond the boundaries of the problem of a single family. It is the issue, which touches upon the whole society and the future of the young generation. Undoubtedly, divorce makes an impact on children.Advertising We will write a custom research paper sample on Social Issues: The Effect of the Divorce on Children specifically for you for only $16.05 $11/page Learn More However, it is arguable whether it is better for them to live in the family, in which parents always conflict with each other, or to live with one parent but in the calm atmosphere. The aim of this essay is to analyze the effect of divorce on children. The Opinions of Psychologists The problem of the effect of divorce on children is the sphere of interest of many scholars. The results of the recent research show that the boys are much more vulnerable to divorce than the girls. The scholars pay attention to the relationship between the age of the child and their perception of the parents’ divorce. It has been found that the girls in the age of 6 to 13 tend to perceive it most acutely (Palosaari Aro n.pag.). The research indicates to the depression as the consequence of parental divorce, which the children of this age group suffer most often. Also, this age group is prone to undertaking suicide attempts (Palosaari Aro, n.pag.). The scholars say that the boys tend to perceive the divorce much more acutely than the girls. They feel unhappy and despairing. At the same time, the scholars argue that the timing of the divorce is not the primary determinant of the children’s psychological problems. All of them experience moral trauma, regardless of age. However, the continuous conflict situations in the family also influence the children negatively. Many psychologists stress that divorce can be the way to make the life of both the parents and the children more harmonious and stable. That is why it may be much better for the children to live in a single parent family and do not experience the continuous emotional pressure. It is argued that the â€Å"children of parents who engage in overt, unresolved conflict are at risk for a variety of developmental and emotional problems† (Yu et al. n.pag.). Some other scholars argue that the reasons for the divorce of parents are also important for the future of the children.Advertising Looking for research paper on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More â€Å"The most startling finding was that children of low-conflict divorces are four times more likely to divorce than children who have seen their parents separate after a hostile and very possibly abusive or violent relationship† (Amato Taylor n.pag.). It is emotionally difficult and painful for children to realize that their parents have fallen out of love. It is this reason for the divorce, which makes the hardest mor al pressure on them and their future romantic relationships. Besides, quarrels between the parents and the negative expressions of one of them about another one undermine the family values. If one of the parents tries to incite the child against another parent, they facilitate the development of the cynical attitude of the child towards the relationships between the man and the woman. As a result, the children are often unwilling to create their own families when they grow up. The divorce of parents is the hard emotional burden for the children because they are used to see their mother and father together. They need them both. The world of the child is built with the support of their parents, and when they announce the divorce, the small world of the child ruins. The separation of family changes the life perception of children. It makes them rethink life and ethical values. Unfortunately, not all of them can find the right way and make the right choices in their lives. The relations hips between the children and their parents after the divorce are a distinct topic for the discussion. If it has been decided to leave the children with the mother, all their feelings are addressed to her. Sometimes, their relationships become even warmer and sometimes they worsen, because the children may feel themselves hurt by her. The results of the research show that the children of divorce have worse results at school, behave themselves aggressively towards their coevals, and are inclinable to run away from home.Advertising We will write a custom research paper sample on Social Issues: The Effect of the Divorce on Children specifically for you for only $16.05 $11/page Learn More The psychologists and medical specialists have undertaken a series of research projects to find out whether the divorce of parents affects the infants. According to the results of their research, the infants are vulnerable to divorce as the elder children are. Even the infants in arms experience the psychological trauma caused by the separation of parents. At this period, they are very close to their mother and tend to be affected by her emotional stance. The infant in arms continues to be, so to say, the part of the body of their mother. If she suffers from the depression, the infant suffers it too. Such kind of psychological and emotional stance may lead even to the death of the infant. Also, the stressful situation may cause the loss of breast milk, which is so important for the children’s health and development. The psychologists claim that the divorce of parents is the sharp change in the way of life of both the adults and the children. The interruption of the ordinary family routine is, essentially, the reason for a shock in children (â€Å"Why Divorce Is So Hard† n.pag.). Furthermore, the decrease in economic welfare after the divorce is one of its consequences, which not only represents the budget constraints but also creates a diff icult moral environment. It should be noted that the divorce worsens the economic situation of the separated families very often. This means that the children get fewer opportunities to gain good education, to attend the lobby groups, and, ultimately, to realize themselves and to become successful. The scholars argue that parental quarrels, distress, and the stressful environment in the family increase the risk of the antisocial actions of children. In particular, they claim that the children of divorce are more inclined to drug taking, smoking, and alcohol drinking (Butler et al. 19). The Ways to Overcome the Consequences of the Divorce The divorce is the frequent social phenomenon nowadays. Undoubtedly, the Institute of divorce is important for people’s well-being. It gives them the opportunity to be the architects of their fortune. I guess the opportunity to get the divorce strengthens the institute of marriage. People have freedom in their choices and try to build strong relationships. However, sometimes, divorce is the way to solve the continuous conflict. Taking into account that it makes a significant influence on children, it is vital to know how to overcome its consequences. To make the â€Å"life journey† of children of divorce easier and happier, the society, the court, and the parents should take the responsibilities for mitigating its effects (â€Å"Divorce. American Style† n.pag.).Advertising Looking for research paper on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More There are plenty of examples of the divorced couples, which have managed to reorganize their relationships in such a way that allows both parents to become involved in the process of their children upbringing, to remain friends to them, and to provide them the necessary parental support (Isaacs, Montalvo, Abelson 265). The divorce is the conscious step of the adults, and they should think about not only themselves but about their children as well. The parents must help them to cope with the consequences of their separation. The adults should talk to their children and to find the words to say, which will make them perceive this situation adequately. If the parents avoid the quarrels in the presence of their children, they already make a substantial contribution to the children’s emotional stability and help them to perceive the separation more easily. Also, the adults can find a lot of books developed for children of divorce. The reading of these stories to them will help the m comprehend the situation and to realize that their parents still love them and take care of them. The additional difficulties arise when one of the parents starts new relationships or gets married once again. It is very hard for children to understand that their mother and father have the right to create a new family and to become happy in their personal life. Many feels deprived of their love and care. The feelings of jealousy and soreness create conflict situations. That is why the parents must remain attentive to their children and to show that nothing can interfere with their relationships. Besides, the child may think that it is their fault that their parents are separated. In that case, the adults should show that the divorce has not made them enemies and that they will always be close to their child. The biggest mistake, which the parents make, is that they do not talk to their children. They mistakenly think that they are small enough to comprehend the situation. However, it is not so. In spite of the small age and insufficient life experience, they comprehend the situation intuitively and tend to make their judgments. The parents must be friends to them and try to discuss the problem, to ask their opinion, and to explain theirs. Conclusion To sum up, all the above mentioned, it should be said that divorce affects the children substantially. It puts the emotional and moral pressure on them, making them rethink the family values, to which they adhered before. The children tend to be prone to depression, apathy, or aggression. The children of divorce tend to run away from home. The attempts at committing suicide may also become the consequences of family separation. The boys are more vulnerable to divorce than girls. The most critical period is between 6 and 13 years old, but the divorce affects even the infants in arms. However, the separation of parents may be the only way to provide a calm environment for children. The divorced couples must be consc ientious and help their children to perceive the divorce easily. There are several ways to overcome the consequences of separation. Amato, Paul and Susanna Taylor. Mummy, Daddy, Please Stop Being So Nice to Each Other ; How Do You Minimise the Effect of Divorce on Children? by Letting Rip in Front of Them. Angela Neustatter on Why Its Better to Have Rows. The Independent. (2001):n.pag. Questia. Web.. Butler, Ian, Lesley Scanlan, Margaret Robinson, Gillian Douglas and Mervyn Murch. Divorcing Children: Childrens Experience of Their Parents Divorce. London: Jessica Kingsley, 2003. Print. â€Å"Divorce. American Style†. The Nation 271.18 (2000): n.pag. Questia. Web.. Isaacs, Marla Beth, Braulio Montalvo and D. Abelson. The Difficult Divorce: Therapy for Children and Families, New York: Basic Books, 1986. Print. Palosaari, Ulla and Hillevi Aro. Effect of Timing of Parental Divorce on the Vulnerability of Children to Depression in Young Adulthood. Adolescence 29.115 (1994): n.pa g. Questia. Web.. â€Å"Why Divorce Is So Hard on the Children.† Daily Mail. (1996):n.pag. Questia. Web.. Yu, Tianyi, Pettit, Greggory S., Lansford, Jennifer E., Dedge, Kenneth A. and John E. Bates. â€Å"The Interactive Effects of Marital Conflict and Divorce on Parent Adult Childrens Relationships. Journal of Marriage and Family 72.2 (2010): n.pag. Questia. Web.-11-19.

Sunday, October 20, 2019

Concentrated Animal Feeding Operation (CAFO)

Concentrated Animal Feeding Operation (CAFO) Although the term is sometimes used loosely to refer to any factory farm, Concentrated Animal Feeding Operation (CAFO) is a designation by the United States Environmental Protection Agency meaning any operation in which animals are fed in confined spaces, but specifically those which store a large number of animals and produce a large amount of water and manure waste as well as contributing pollutants to the surrounding environment. The disambiguation of the term CAFO from AFO can be a bit confusing, but the main focus of the distinction lies in the size and impact of the operation, with CAFO being worse all around - which is why it is often associated with all factory farms, even if they dont meet EPA standards to qualify as a CAFO. The Legal Definition According to the EPA, an Animal Feeding Operation (AFO) is an operation in which animals are kept and raised in confined situations. AFOs congregate animals, feed, manure and urine, dead animals, and production operations on a small land area. Feed is brought to the animals rather than the animals grazing or otherwise seeking feed in pastures, fields, or on rangeland. CAFOs are AFOs that fall under one of the EPAs definitions of Large, Medium or Small CAFOs, depending on the number of animals involved, how wastewater and manure are managed, and whether the operation is a significant contributor of pollutants. Although nationally accepted as a federal mandate, state governments can choose whether or not to enforce punishments and restrictions the EPA sets on these facilities. However, a repeated lack of compliance  with EPA regulations or repeat excessive pollution from factory farms could result in a federal case against the company in question. The Problem with CAFO Animal rights activists and environmentalists alike argue against the continued use of factory farms, especially those that qualify under the EPA as Concentrated Animal Feeding Operations. These farms produce an inordinate amount of pollution and animal waste as well as consuming large amounts of crops, manpower, and energy to maintain.   Furthermore, the harsh conditions animals kept in these CAFO are often seen as violating the basic rights U.S. citizens believe animals are entitled to - although the Animal Welfare Act  excludes farms from classification and investigation from their agencies.   Another issue with commercial animal farming is that the population of cattle, chickens, and pigs cannot be maintained at the current rate of global consumption. Either the food used to nourish cows to edible health will disappear or the cattle themselves will be overeaten and eventually go the way of the Wooly Mammoth - extinct.

Saturday, October 19, 2019

The Changes in American Foreign Policy at the Turn of the 20th Century Essay

The Changes in American Foreign Policy at the Turn of the 20th Century - Essay Example In addition to US political, social and economic influence on other countries, foreign policy also covers humanitarian, military, and ideological concerns. This paper seeks to discuss the changes in American foreign policy at the turn of the 20th century. Controlling territories and political alliances During the initial years of the 20th century, United States had less imperial powers as compared to European countries. In order to gain control over other territories including Philippines, Cuba, and Spain, US resulted into war. However, the occurrence of great depression in 1930s weakened the US military strength. This made the country to lack ability to retaliate when Pearl Harbor was struck by Japan in 1941. One of the major initiatives that made US to be involved in European affairs was the World War 1. A major change in US foreign policy was experienced after World War II. After the war, US led in establishing United Nations that was focused at restoring peace in the world and av oiding occurrence of another World War (James 36). Even though US emulated the aspect of isolationist after World War 1, the country was again involved in European affairs when it initiated Marshall Plan that aimed at restoring the political strength of European countries. In addition to the creation of UN, US also established other political alliances such as the North Atlantic Treaty Organization (NATO). One of the major implications on the alliances was creation of strong relationship between US and foreign countries resulting to political and economic growth in many countries. Containment of the Soviet Union The economic, ideological and military competition that existed between Soviet Union and US, led to the creation of massive nuclear weapons. Even though the two countries did not go to war, the strategy of containing the communism and the Soviet Union resulted to the involvement of US in the Vietnam and Korean (James 17). US leadership In order to ensure democracy in US and other countries, United States emulated effective leadership styles. The responsibility of Theodore Roosevelt in building US and controlling other countries cannot be ignored. For example, during the establishment of Panama Canal, Colombian government resisted the US move to make the canal enter the Republic of Colombia. However, even though Roosevelt who was then US president had the power to fight Colombia government, he did not directly go to war with Colombia but supported Panama to fight Colombia as the former sought for independence. The diplomacy depicted by Roosevelt is evident when he led in the negotiation between Russia and Japan in 1905 that resulted to the end of war between the two countries. The leadership style adopted by Roosevelt had a positive implication on the US and other countries culture in that it portrayed the importance of recognizing the importance of emulating negotiation to solve cultural conflicts that are experienced in many countries especially third world nations. Gulf invasion The invasion of Iraq by US in 1990 was not only based on the annexation of Kuwait by Iraq but also it was due to other political and economic reasons (Hiro 23). Due to the high amount of oil in Saudi Arabia, US wanted to support Saudi Arabia in order to benefit from the oil supplies from Saudi Arabia. In addition, the abuse of human rights by President Saddam propelled the invasion of Iraq by US. As a result of the Gulf conflict, the economy of many countries was affected regardless

Friday, October 18, 2019

Working in teams and creating successful team dynamics Essay

Working in teams and creating successful team dynamics - Essay Example The aim of the paper is to examine the role of team dynamics in organizational effectiveness and analyze the factors which help the companies to create food working environment for their teams. Today, managers recognize the importance of teams dynamic in influencing behaviour at work. The concept of the organisation as a socio-technical system is concerned with the interactions between the psychological and social factors, as well as structural and technical requirements. Again, it may be remembered that technological change in the coal-mining industry had brought about changes in the social teamings of the miners (Campbell, 1997). Another important aspect if successful team dynamics is that team members in an organization will have one or more goals in common, such as to produce or market a product. Communication is essential within each team and members of a team have roles to play in order to achieve the team task. Expected behaviour patterns are developed within each team and these are referred to as norms. Any deviation from norms will bring team pressure to force a return to the 'norm'. Too low or too high an output as compared with the 'norm' may mean admonishment by team members. For instance, Apple Computer Corporation is a goof example of successful team dynamics: "Apple's management style was relatively in1ormal for a Fortune 100 company. As one employee in Finance said, "Things are done by committees, meetings, consensus. We have very few policies, systems, or controls. What we do is get a team of experts together and make a decision." (Gibbs, Beer, 1991) Distinctions have been made between formal and informal teamings. A teams team consists of carefully selected members who have skills and attributes that can assist the reaching of a desired goal. It will have a leader, subordinates, a location and a task to accomplish - for example, a planning committee. New methods of working disrupted the integration of small self-selecting teams of assembly line worker in Ford Motor Company who worked together as independent teams. The change had undesirable social effects and as a result the new method did not prove as economically beneficial as it should have done with the new technology. The result was a 'composite' method of working with more responsibility taken by the team as a whole. The composite method proved to be not only more rewarding socially to the workers but also more efficient economically than the previous new method of working (Sterman, 2000). To be able to create a good working environment, managers must be aware of certain aspects of team dynamics. Norms can be very influential in encouraging high or low productivity of members of the team. One method of increasing the dynamic in a team is to give members more say in the selection of persons they will be working with. Interview questions for employees: 1. Do like teamwork or prefer to work independently 2. Can you quickly see advantages and new opportunities 3. Is it easy for you to work in a diverse team 4. Is it important for you to be a leader of a team 5. Do you often influencing people without pressuring them 6. Can you work under pressure 7. What is your role in a team (now, previously) 8. What is you characteristic approach to teamwork 9. What is the best method of conflict resolution for you Explain. 10. When do you gain work satisfaction Explain. 11.

IFRS Essay Example | Topics and Well Written Essays - 1000 words

IFRS - Essay Example The reason for opting for gradual convergence instead of adoption is that the local accounting body may want to become involved in the standard setting process. If IFRS is adopted fully then we will just have to accept what a few people have decided for us. I think we should be involved in decisions that affect us, and other countries have taken a similar approach. In fact, Ramanna and Sletten (2009) indicates that there is evidence to suggests that the more powerful countries like the US are not willing to surrender their authority to set accounting standards to an international body. However, Ramanna and Sletten (2009) found that counties are more likely to adopt IFRS when trade partners or countries within the geographical area in which they operate adopt IFRSs. This is one of the reasons for the importance of the transition to IFRS. Hoogervorst (2013) indicates that 75% of the countries in the G20 group of which Indonesia is apart use IFRS. I found out that the reactions in relat ion to the adoption of IFRS are mixed. There are ongoing changes to IFRS and so the gap between Indonesian Standards will widen as new changes are set for this year. In expressing their views to the Vice President of Indonesia some people indicated that at least a level of convergence with IFRS will help to reduce the level of corruption that prevents change from taking place in the country (Shying 2012). Additionally, at an IFRS Regional Policy Forum which was held in Bali in 2011, participants from 21 countries including Indonesia reaffirmed their commitment to ultimate adoption and to achieve accounting standards of the highest quality (CFO Innovation 2011). One of the concerns expressed at the forum in Bali was the requirement of investors for financial statements prepared in accordance with IFRS. This is particularly crucial for companies that need foreign investors. In fact, Hoogervorst (2013) in a speech indicated that full adoption would assist Indonesia sustain economic dev elopment. Hoogervorst further stated that IFRS is close to becoming the global language of financial reporting. Approximately ten years ago only a few countries were using IFRSs. Now over 100 countries have it as a requirement or permit the use of it. The move to accept IFRS has been made for many reasons including the fact that the creation of a common economic market requires a common financial reporting language. With globalisation the world is now one village and so use of the same financial reporting standards make sense for comparative purposes. I agree with Istiningrum (2011) point that the benefits that companies can derive from transition to IFRS outweigh all costs that are incurred during the conversion process. Giri (2008 cited in Istiningrum 2011) makes a compelling case for adoption with an example of a case where translation of Daimler Benz net profit reported of DM 602 million based on a German Accounting Standards changed to a net loss of DM1,839 million when it was translated to US Accounting Standards. With Indonesia adopting this standard more opportunities are provided for investment in Indonesian companies. However, some stakeholders still see a problem since IFRS takes a principle based approach and so Standards can be applied differently by companies (Elena et al 2009). The adoption of IFRS would therefore provide Indonesian compan

Thursday, October 17, 2019

RESPONSE PAPER for Comparative Politics class Essay

RESPONSE PAPER for Comparative Politics class - Essay Example the concept of comparative politics that asserts â€Å"politics in different countries works in much a similar manner and differently in others† is brought out. In this story, the concept of political similarity and differences in countries is brought out when it is asserted that the political stability of the UK is on the line. Specifically, political similarity is the most prevalent concept of comparative politics that is seen in this text. According to this concept, it is evident that like several other countries in the world that are experiencing political disunity, the UK is also on the verge of joining the same route. There is more than can be seen in the future of the unified nation because the disunity in the political arena is worrying. The entire political system in country is on the verge of entering into the unknown after enjoying political stability for several decades, and with some excellent prime ministers such as Margaret Thatcher and Tony Blair.1 The current trend is seeing the strengths of biggest political parties in the country, the conservatives and the labor, being tested by the introduction of the smaller parties into the political arena. Much the same way as in some other countries where most political parties are based on regional or ethnical backgrounds, the smaller parties in the UK have also emerged the same grounds. The smaller parties are based on regional links and their political agenda is to drift away from the current culture of two-part dominance.2 The story by CNN on the politics best brings out the concept of comparative politics. The story confirms that indeed the way politics is conducted in various countries is much similar. Much the same way like most countries in the world, UK is also facing the likelihood of mushrooming of smaller political parties. Many political scientists hold that partisanship and voting behavior are such a complex phenomenon that cannot be explained by a single model. Nevertheless, the current