Вы находитесь на странице: 1из 30

SPM & IRTM

Prof. Ramesh Koutarapu


Assignment 1
Application Software, System software, Hardware, Networking
and Equipment.
Submitted By
Roll Number Name
!"#1$#1% Sandeep !auriya
"ES !anagement &ollege and 'esearc( &entre, !umbai
Application Software
1. Claim Tracer S!stem
About "
)(e claim tracker system de*eloped by tec(process payments ser*ices limited for "&"&"
+ombard. "t was first released in t(e $%%$ under t(e name ,eb &laim tracker system.
And later different *ersion (as been released as per user requirements c(anges.
Purpose "
)(e purpose t(e of claim tracker is to track t(e policy claim status online so t(at customer
can easily comes to know about claim related information and different stages of t(e
claims processing. )(e leads to more settlement on claim *ery as compare ot(er
insurance company and satisfying customer due to unique ser*ices. The application is used
for tracking marine & non-marine claims registered and providing the status update .for the
same.
Implementation & Setup "
)(e de*elopment (as been done in t(e Asp.net $.% and back#end as sql ser*er $%%%.
)(e implementation (as been done in t(e "&"&" +ombard en*ironment on (ig(ly
configured ser*er. as it is t(e web based application so t(e publis( code (as been
deployed on ser*er and accessing t(e t(roug( specific -'+ gi*en to user.
Maintenance #Re$ular & %mer$enc!&'
)(e maintenance (as been done by "&"&" +ombard as well as tec(process payment
ser*ices limited. .rimary maintenance acti*ity is maintained by "&"&" +ombard like
Ser*er space management, ser*er maintenance etc. and all query related to application
(as been mail to tec(process on daily basis. )(ey sol*ed t(e query on daily t(roug( t(e
interacti*e communication between business analyst and de*eloper.
"n t(e cases of any emergency, tec(process always pro*ide t(e $/01 ser*ices to "&"&"
+ombard for claim tracker system.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Ris Mana$ement & Contin$enc! plan'
)(e application can be (acked by (acker to a*oid t(is risk. )(e "&"&" +ombard (as
implemented t(e different AS+& points to pre*ent from (acker. )(e (acker can2t (acked
t(e application. )(e all contingency plan (as been (andled by company like disaster
reco*ery. )(e 3' ser*er (as been maintained separately. Any problem (appened on t(e
current ser*er, t(ey directly redirect to 3' ser*er.
R(I & )uration "
)(is application makes company claim related acti*ity *ery faster and t(ey generate more
money t(an company e4pectation. So return on in*estment generates more money t(at
in*ested in t(is application. )(is duration of application is increased e*ery year due to
different c(anges in t(e application. )(e application will be continues till t(e company
e4ist.
*p$ra)e or Chan$e "
)(e application was de*eloped in .net framework $.% and now upgraded to .net frame
work 5.6 and now new *ersion of t(e .net framework (as been came in t(e market.
Now "&"&" +ombard is planning to upgrade to /.6 and t(e c(anges request of t(e
application (as t(e done e*ery year per new business c(anges in t(e company.
"ES !anagement &ollege and 'esearc( &entre, !umbai
+. ,rau) Intimation S!stem
About "
)(e fraud "ntimation system de*eloped by tec(process payments ser*ices limited for
"&"&" +ombard. "t was first released in t(e $%%% under t(e name 7raud "ntimation system.
And later different *ersion (as been released as per user requirements c(anges. )(e
application de*eloped on )(ree#tier arc(itecture tracks t(e fraud details and action taken
status.
Purpose "
)(e application is used for tracking fraud registered and pro*iding t(e status update for
t(e same. )(e purpose of t(e application is to intimate t(e fraud by any in t(e company, if
any one comes to know about t(e fraud done by (is subordinates or anyone in t(e
organi8ation, t(e intimator can directly "ntimates fraud t(roug( login to t(is online fraud
"ntimation system.
Implementation & Setup "
)(e de*elopment (as been done in t(e Asp.net $.% and back#end as sql ser*er $%%%.
)(e implementation (as been done in t(e "&"&" +ombard en*ironment on (ig(ly
configured ser*er. as it is t(e web based application so t(e publis( code (as been
deployed on ser*er and accessing t(e t(roug( specific -'+ gi*en to user.
Maintenance #Re$ular & %mer$enc!&'
)(e maintenance (as been done by "&"&" +ombard as well as tec(process payment
ser*ices limited. .rimary maintenance acti*ity is maintained by "&"&" +ombard like
Ser*er space management, ser*er maintenance etc. and all query related to application
(as been mail to tec(process on daily basis. )(ey sol*ed t(e query on daily t(roug( t(e
interacti*e communication between business analyst and de*eloper.
"n t(e cases of any emergency, tec(process always pro*ide t(e $/01 ser*ices to "&"&"
+ombard for claim tracker system.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Ris Mana$ement & Contin$enc! plan'
As t(is is t(e fraud "ntimation application, )(e information cannot be re*ealed to anyone
in t(e company so t(e application is controlled *arious risk management points.
)(e application can be (acked by (acker to a*oid t(is risk. )(e "&"&" +ombard (as
implemented t(e different AS+& points to pre*ent from (acker. )(e (acker can2t (acked
t(e application. )(e all contingency plan (as been (andled by company like disaster
reco*ery. )(e 3' ser*er (as been maintained separately. Any problem (appened on t(e
current ser*er, t(ey directly redirect to 3' ser*er.
R(I & )uration "
)(is application is used intimate fraud related case like fake policy gi*en to customer and
policy amount taken by users9 if t(is entire amount is sa*ed by company t(en ':" will be
increased. So return on in*estment generates more money t(at in*ested in t(is
application. )(is duration of application is increased e*ery year due to different c(anges
in t(e application. )(e application will be continues till t(e company e4ist.
*p$ra)e or Chan$e "
)(e application was de*eloped in .net framework $.% and now upgraded to .net frame
work 5.6 and now new *ersion of t(e .net framework (as been came in t(e market.
Now "&"&" +ombard is planning to upgrade to /.6 and t(e c(anges request of t(e
application (as t(e done e*ery year per new business c(anges in t(e company.


"ES !anagement &ollege and 'esearc( &entre, !umbai
S!stem Software
1. -I(S software
About'
B":S software is stored on a non#*olatile ':! c(ip on t(e mot(erboard. "t is
specifically designed to work wit( eac( particular model of computer, interfacing wit(
*arious de*ices t(at make up t(e complementary c(ipset of t(e system. "n modern
computer systems, t(e B":S contents are stored on a flas( memory c(ip so t(at t(e
contents can be rewritten wit(out remo*ing t(e c(ip from t(e mot(erboard. )(is allows
B":S software to be easily upgraded to add new features or fi4 bugs, but can make t(e
computer *ulnerable to B":S root kits.
Purpose "
)(e fundamental purposes of t(e B":S are to initiali8e and test t(e system (ardware
components, and to load a boot loader or an operating system from a mass memory
de*ice. )(e B":S additionally pro*ides abstraction layer for t(e (ardware, i.e. a
consistent way for application programs and operating systems to interact wit( t(e
keyboard, display, and ot(er input0output de*ices. ;ariations in t(e system (ardware are
(idden by t(e B":S from programs t(at use B":S ser*ices instead of directly accessing
t(e (ardware. !odern operating systems ignore t(e abstraction layer pro*ided by t(e
B":S and access t(e (ardware components directly.
)(e B":S of t(e original "B! .&0<) (ad no interacti*e user interface. Error messages
were displayed on t(e screen, or coded series of sounds were generated to signal errors.
:ptions on t(e .& and <) were set by switc(es and =umpers on t(e main board and on
perip(eral cards. !odern ,intel#compatible computers pro*ide a setup routine, accessed
at system power#up by a particular key sequence. )(e user can configure (ardware
options using t(e keyboard and *ideo display.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Implementation & Setup'
)(e "ntel B":S "mplementation )est Suite >B")S? pro*ides a bootable pre#:S
en*ironment for testing B":Ses and in particular t(eir initiali8ation of "ntel processors,
(ardware, and tec(nologies. B")S can *erify your B":S against many "ntel
recommendations. "n addition, B")S includes "ntel@s official reference code as pro*ided
to B":S, w(ic( you can use to o*erride your B":S@s (ardware initiali8ation wit( a
known#good configuration, and t(en boot an :S.
Aou mig(t want to use B")S if
Aou@re a system or B":S de*eloper, and you want to *alidate t(at your system meets
"ntel@s recommendations.
Aou@re an :S or application de*eloper building on tec(nologies pro*ided by "ntel
platforms, and you want to c(eck if your system >or one of your user@s systems? (as
configured t(ose tec(nologies correctly.
Aou@re an ad*anced user or de*eloper, and you want to c(eck your B":S to see if it
configures "ntel (ardware correctly and if not, to make a stronger case to your B":S
*endor to get it fi4ed.
Aou need to poke (ardware in a low#le*el way, and you need a pre#:S en*ironment to
work in to a*oid :S interference.
B")S functionality fits in t(ree broad categories
;alidate run test suites to *erify recommendations
&onfigure o*erride B":S using "ntel reference code
"ES !anagement &ollege and 'esearc( &entre, !umbai
Maintenance #Re$ular & %mer$enc!&'
B":Sis a*ailable for download9 t(is is a maintenance update for t(e production '$.%.%
release. )(is update can be manually downloaded or automatically downloaded directly
from &&S using Eclipse -pdate !anager9 see t(e B":S !&S3B -ser@s Cuide for details
on setting up automatic software updates.
)(e ma=or updates from t(e last maintenance release, B":S !&S3B $.%./, are
:ptimi8ed .++ and 33' configurations in "B+ and .latform +ibrary
Added support for !A3 prelinker bypass mode
-pdated components SAS0B":S, E3!A5 ++3, .A ++3, D!SS ++3, .&"e ++3,
Hyperlink ++3, and <3&)ools
Added programEe*m script to simplify updating E;! flas( contents
Added "B+ command#line tool to modify configuration
Added .:S) print of configuration registers
Bug fi4es >see t(e 'elease Notes for full list?
Ris Mana$ement & Contin$enc! plan'
)(e 'isk in t(e B":S software is *arying computer to computer. !any released of t(e
software (as (andled in t(e risk. )(e contingency is implemented to (andle different risk.
R(I & .uration "
)(e !icrosoft and "ntel (a*e generated more money in t(e B":S. )(e durability of t(e
B":S is more t(an ot(er system software. )(e ':" of B":S (as more income t(an t(e
in*ested income.
*p$ra)e or chan$e'
:ccasionally, a computer will need to (a*e its B":S updated. )(is is especially true of
older mac(ines. As new de*ices and standards arise, t(e B":S needs to c(ange in order to
"ES !anagement &ollege and 'esearc( &entre, !umbai
understand t(e new (ardware. Since t(e B":S is stored in some form of ':!, c(anging
it is a bit (arder t(an upgrading most ot(er types of software.
)o c(ange t(e B":S itself, you@ll probably need a special program from t(e computer or
B":S manufacturer. +ook at t(e B":S re*ision and date information displayed on system
startup or c(eck wit( your computer manufacturer to find out w(at type of B":S you
(a*e. )(en go to t(e B":S manufacturer@s ,eb site to see if an upgrade is a*ailable.
3ownload t(e upgrade and t(e utility program needed to install it. Sometimes t(e utility
and update are combined in a single file to download. &opy t(e program, along wit( t(e
B":S update, onto a floppy disk. 'estart your computer wit( t(e floppy disk in t(e dri*e,
and t(e program erases t(e old B":S and writes t(e new one. Aou can find a B":S
,i8ard t(at will c(eck your B":S at B":S -pgrades.
+. Microsoft /or) Software
About'
!icrosoft ,ord is a word processor de*eloped by !icrosoft. "t was first released in 1FG5
under t(e name !ulti#)ool ,ord for <eni4 systems.H5IH/IH6I Subsequent *ersions were
later written for se*eral ot(er platforms including "B! .&s running 3:S >1FG5?, t(e
Apple !acintos( >1FG6?, t(e A)J) -ni4 .& >1FG6?, Atari S) >1FGG?, S&: -N"<
>1FF/?, :S0$ >1FGF?, and ,indows >1FGF?. &ommercial *ersions of ,ord are licensed as
a standalone product or as a component of !icrosoft :ffice, ,indows ') or t(e
discontinued !icrosoft ,orks Suite. 7reeware editions of ,ord are !icrosoft ,ord
;iewer and ,ord ,eb App on Sky3ri*e, bot( of w(ic( (a*e limited features.
Purpose'
!icrosoft ,ord is a word processing program t(at is part of t(e !icrosoft :ffice Suite
package. )(e main purpose of ,ord is to create te4t documents t(at can be sa*ed
electronically, printed on paper or sa*ed as .37 files.
Implementation & Setup'
"ES !anagement &ollege and 'esearc( &entre, !umbai
)(is guide contains compre(ensi*e information about (ow to plan, install, configure,
customi8e, and maintain !icrosoft 3ynamics &'! $%15 and !icrosoft 3ynamics &'!
:nline. )(ere are easy steps for "mplement and setup t(e !icrosoft word.
Maintenance #Re$ular & %mer$enc!&'
)(e maintenance of word document is a*ailable wit( t(e !icrosoft, new released of t(e
software as per new business industry required to complete t(e business requirement. )(e
!icrosoft also pro*ides t(e customi8ed word software as per t(e company or new
business requirement for !icrosoft word.
Ris Mana$ement an) contin$enc! plan'
'isk is t(e possibility of an e*ent or condition t(at, if it occurred, would (a*e a negati*e
impact on a pro=ect. After a pro=ect begins, e*ents t(at are difficult to anticipate mig(t
create new risks. 7or e4ample, unseasonably rainy weat(er mig(t t(reaten t(e end date of
a construction pro=ect.
.repare a contingency plan As part of a good risk plan, you s(ould define t(e actions to
take if risk e*ents occur, so t(at you can respond to t(ose e*ents quickly and effecti*ely.
"dentify (ig(#risk tasks A critical part of risk management is identifying t(ose tasks t(at
are most likely to take longer t(an e4pected, end beyond t(eir finis( dates, delay t(e start
or finis( of ot(er tasks, or cause t(e pro=ect to finis( late.
R(I & .uration'
)(e !icrosoft (as regenerated t(e income on (is return (is in*estment in t(e !icrosoft
word. )(e duration of t(e !icrosoft is depending upon t(e license period for purc(asing
t(e !icrosoft word software.
*p$ra)e or chan$e'
)(e !icrosoft word software upgraded time to time as *ersion released by !icrosoft.
"f you@re already using !icrosoft -pdate to get updates for your computer, ,indows
-pdate in &ontrol .anel will automatically open and display your update status
"ES !anagement &ollege and 'esearc( &entre, !umbai
0ar)ware
1. Ke!boar)
About'
"n computing, a keyboard is a typewriter#style de*ice, w(ic( uses an arrangement of
buttons or keys, to act as mec(anical le*ers or electronic switc(es. 7ollowing t(e decline
of punc( cards and paper tape, interaction *ia teleprinter#style keyboards became t(e
main input de*ice for computers.
A keyboard typically (as c(aracters engra*ed or printed on t(e keys and eac( press of a
key typically corresponds to a single written symbol. Howe*er, to produce some symbols
requires pressing and (olding se*eral keys simultaneously or in sequence. ,(ile most
keyboard keys produce letters, numbers or signs >c(aracters?, ot(er keys or simultaneous
key presses can produce actions or e4ecute computer commands.
Purpose'
"n normal usage, t(e keyboard is used to type te4t and numbers into a word processor,
te4t editor or ot(er programs. "n a modern computer, t(e interpretation of key presses is
generally left to t(e software. A computer keyboard distinguis(es eac( p(ysical key from
e*ery ot(er and reports all key presses to t(e controlling software. Beyboards are also
used for computer gaming, eit(er wit( regular keyboards or by using keyboards wit(
special gaming features, w(ic( can e4pedite frequently used keystroke combinations. A
keyboard is also used to gi*e commands to t(e operating system of a computer, suc( as
,indows@ &ontrol#Alt#3elete combination, w(ic( brings up a task window or s(uts down
t(e mac(ine. A command#line interface is a type of user interface operated entirely
t(roug( a keyboard, or anot(er de*ice performing t(e function of one.
Implementation & Setup'
)(e keyboard is used by connecting to t(e computer into t(e keyboard port. Now days,
-SB keyboard is also coming so it is kind of plug and play kind of (ardware of t(e
computer. )(e setup of t(e keyboard is *ery as compare to computer internal (ardware.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Maintenance #Re$ular & emer$enc!&'
:t(er t(an t(e monitor, you will probably need to clean t(e keyboard more often t(an t(e
rest of t(e .&. 3ust and debris can collect between t(e keys can affect t(eir functioning.
)(e surface of t(e keyboard and keys can be wiped o*er wit( a clot( lig(tly dampened
wit( warm non#soapy water. Aou must a*oid getting t(e keyboard wet as it may cause
damage to t(e keyboard circuits.
)o gi*e t(e keyboard a t(oroug( clean or to do a close *isual inspection of t(e keyboard,
remo*e its co*er. By remo*ing t(e key caps of t(e # >minus?, K >plus?, and Enter keys in
t(e numeric keypad at t(e far#rig(t end of t(e keyboard, you can create a gap to remo*e
t(e debris from t(e keyboard.
Small non#static *acuum cleaners can be used to remo*e debris from t(e keyboard as
well as ot(er small parts of t(e .&. )(ese usually (a*e a small brus( (ead attac(ed wit( a
gooseneck t(at can be bent to pro*ide t(e best angle for cleaning. &ompressed#air can be
used to dislodge debris from inaccessible parts of t(e keyboard. 3islodged debris can
t(en be safely remo*ed by *acuum. +arge pieces of debris can be carefully remo*ed
using non#static brus(es, twee8ers or probes.
"f t(e keyboard (as (ad somet(ing spilled o*er it, you must act quickly to sa*e t(e
keyboard circuits from permanent damage. "f a spill occurs o*er t(e keyboard of a laptop
computer, t(e liquid may also penetrate t(roug( t(e keyboard to t(e case damaging ot(er
components of t(e computer. "t is ine4pensi*e to replace a keyboard but e4pensi*e to
repair or replace a laptop.
"n t(e e*ent of a spill, immediately disconnect t(e keyboard from t(e computer, or
disconnect t(e power from t(e laptop, and turn it upside down to pre*ent t(e liquid
penetrating any furt(er. ,ipe or swab out all areas you can reac(. A (airdryer can be used
to dry (ard#to#reac( areas, or lea*ing t(e keyboard upside down to dry o*ernig(t may
work. Ensure t(at t(e keyboard is completely dry before reconnecting it to t(e computer.
:nce you are satisfied t(at t(e keyboard is dry, reconnect and reboot t(e system,
"ES !anagement &ollege and 'esearc( &entre, !umbai
obser*ing t(e .:S) for keyboard errors, and test t(e keyboard by pressing e*ery key and
*erifying its action. "f t(ere is still malfunction of t(e keys, you may need to replace t(e
keyboard
Ris Mana$ement & Contin$enc! plan'
'egular prolonged use of t(e keyboard and mouse may result in some people de*eloping
,'-+3s suc( as carpal tunnel syndrome and tendonitis so proper ad=ustment of
keyboard is t(e 'isk !anagement.
R(I & .uration'
:ur local supplier is Coldtouc(, manufacturers of t(e popular Coldtouc( ;$ Ad=ustable
Beyboard, a split ergonomic keyboard t(at promotes a (ealt(y typing posture. )(e
Coldtouc( keyboard works wit( a .& or a !ac, and it (as (elped t(ousands of customers
wit( repetiti*e stress in=uries associated wit( prolonged computer use.
3o8ens of large enterprise organi8ations (a*e run internal assessments of t(e *alue of
Coldtouc( products. )(ese studies s(owed significant producti*ity gains and financial
benefits. :ne e4ample customer found a return of o*er L1M% per employee o*er a t(ree
year period due to workman2s compensation sa*ings and a reduction in absenteeism.
Anot(er found dramatic impro*ement in o*erall employee satisfaction.

*p$ra)e & Chan$e '
Aou must be logged on as an administrator or a member of t(e Administrators group in
order to complete t(is procedure. "f your computer is connected to a network, network
policy settings may also pre*ent you from completing t(is procedure.
1. :pen Beyboard in &ontrol .anel.
$. :n t(e Hardware tab, click .roperties.
5. :n t(e 3ri*er tab, click -pdate 3ri*er.
/. 7ollow t(e instructions t(at appear on your screen. Aou can (a*e ,indows searc( for
t(e dri*er, or point to t(e dri*er@s location yourself.
"ES !anagement &ollege and 'esearc( &entre, !umbai
+. Ran)om Access Memor! har)ware
About'
'A! is a form of computer data storage. A random#access de*ice allows stored data to
be accessed directly in any random order. "n contrast, ot(er data storage media suc( as
(ard disks, &3s, 3;3s and magnetic tape, as well as early primary memory types suc(
as drum memory, read and write data only in a predetermined order, consecuti*ely,
because of mec(anical design limitations. )(erefore, t(e time to access a gi*en data
location *aries significantly depending on its p(ysical location.
Purpose'
)(e purpose of 'A! is to store temporarily programs and data t(at are currently being
used. "n t(is way, t(e processor is able to access t(e data fast. 'A! is a*ailable in
multiples of 1M, for e4ample 1M!B, 5$!B or 1$G !B.
)(e purpose of 'A! is to pro*ide a large area of memory w(ere programs t(at are being
run can be stored. "t also allows data to be cac(ed w(ile it is waiting to be processed or
sa*ed to t(e (ard dri*e.
)(e purpose of 'A!, or 'andom Access !emory, is to gi*e t(e computer a place to
store data temporarily. ,(en computer programs run t(ey need to be able to constantly
access data. )o speed up t(e process t(e needed data is stored in t(e 'A! modules,
w(ic( will clear w(en t(e program is terminated or t(e computer is turned off.
Implementation & Setup'
'ead access memory >'A!? considers an important part in se*eral systems
Suc( as computer and communication systems9 and t(ere is se*eral applications software
t(at used for implements t(e digital circuits of 'A!. "n t(is pro=ect, multisim F
application software was used to implement and simulate se*eral logic circuits of 'A!
wit( many si8es at w(ic( implement 'A! circuit from sub 'A!. Also, it may be
prepared as apart of equipments for t(e airborne computer system.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Ris Mana$ement & Contin$enc! Plan'
)(e performance of a 'A! dri*e is in general orders of magnitude faster t(an ot(er
forms of storage media, suc( as an SS3, (ard dri*e, tape dri*e, or optical dri*e.H1I )(is
performance gain is due to multiple factors, including access time, ma4imum t(roug(put
and type of file system, as well as ot(ers.
7ile access time is greatly decreased since a 'A! dri*e is solid state >no mec(anical
parts?. A p(ysical (ard dri*e or optical media, suc( as &3#':!, 3;3, and Blu#ray must
mo*e a (ead or optical eye into position and tape dri*es must wind or rewind to a
particular position on t(e media before reading or writing can occur. 'A! dri*es can
access data wit( only t(e memory address of a gi*en file, wit( no mo*ement, alignment
or positioning necessary.
Second, t(e ma4imum t(roug(put of a 'A! dri*e is limited by t(e speed of t(e 'A!,
t(e data bus, and t(e &.- of t(e computer. :t(er forms of storage media are furt(er
limited by t(e speed of t(e storage bus, suc( as "3E >.A)A?, SA)A, -SB or 7irewire.
&ompounding t(is limitation is t(e speed of t(e actual mec(anics of t(e dri*e motors,
(eads and0or eyes.
)(ird, t(e file system in use, suc( as N)7S, H7S, -7S, e4t$, etc., uses e4tra accesses,
reads and writes to t(e dri*e, w(ic( alt(oug( small, can add up quickly, especially in t(e
e*ent of many small files *s. few larger files >temporary internet folders, web cac(es,
etc.?.
Because t(e storage is in 'A!, it is *olatile memory, w(ic( means it will be lost in t(e
e*ent of power loss, w(et(er intentional >computer reboot or s(utdown? or accidental
>power failure or system cras(?. )(is is, in general, a weakness >t(e data must
periodically be backed up to a persistent#storage medium to a*oid loss?, but is sometimes
desirable for e4ample, w(en working wit( a decrypted copy of an encrypted file.
"ES !anagement &ollege and 'esearc( &entre, !umbai
R(I & )uration "
"ntel &orporation is an American multinational semiconductor c(ip maker corporation
(eadquartered in Santa &lara, &alifornia. "ntel is t(e world@s largest and (ig(est *alued
semiconductor c(ip maker, based on re*enue.H5I "t is t(e in*entor of t(e 4GM series of
microprocessors, t(e processors found in most personal computers. "ntel &orporation,
founded on Nuly 1G, 1FMG, is a portmanteau of "ntegrated Electronics >t(e fact t(at OintelO
is t(e term for intelligence information was also quite suitable?.H/I "ntel also makes
mot(erboard c(ipsets, network interface controllers and integrated circuits, flas( memory,
grap(ic c(ips, embedded processors and ot(er de*ices related to communications and
computing. 7ounded by semiconductor pioneers 'obert Noyce and Cordon !oore and
widely associated wit( t(e e4ecuti*e leaders(ip and *ision of Andrew Cro*e, "ntel
combines ad*anced c(ip design capability wit( a leading#edge manufacturing capability.
)(oug( "ntel was originally known primarily to engineers and tec(nologists, its O"ntel
"nsideO ad*ertising campaign of t(e 1FF%s made it a (ouse(old name, along wit( its
.entium processor.
"ntel was an early de*eloper of S'A! and 3'A! memory c(ips, and t(is represented
t(e ma=ority of its business until 1FG1. Alt(oug( "ntel created t(e world@s first
commercial microprocessor c(ip in 1F11, it was not until t(e success of t(e personal
computer >.&? t(at t(is became its primary business. 3uring t(e 1FF%s, "ntel in*ested
(ea*ily in new microprocessor designs fostering t(e rapid growt( of t(e computer
industry. 3uring t(is period "ntel became t(e dominant supplier of microprocessors for
.&s, and was known for aggressi*e and sometimes illegal tactics in defense of its market
position, particularly against Ad*anced !icro 3e*ices >A!3?, as well as a struggle wit(
!icrosoft for control o*er t(e direction of t(e .& industry.H6IHMI )(e $%15 rankings of
t(e world@s 1%% most *aluable brands publis(ed by !illward Brown :ptimor s(owed t(e
company@s brand *alue at number M1.
"ES !anagement &ollege and 'esearc( &entre, !umbai
*p$ra)e or Chan$e'
Adding 'A! is often t(e most cost#effecti*e upgrade you can make to speed up a
sluggis( computer. .&s t(at (ad more t(an enoug( 'A! w(en t(ey were new often (a*e
trouble keeping up wit( t(e demands of t(e latest programs after a few years. New
operating systems almost always call for more memory, too. ,(en a computer runs s(ort
of 'A!, it@s forced to swap t(e o*erflow data on and off of t(e (ard dri*e, w(ic( can
significantly slow performance.
)(e a*erage ,indows <. user s(ould be satisfied wit( 1CB of 'A!. :ur tests, w(ic(
in*ol*e working wit( images and using Nero E4press to burn &3s, ran one#t(ird faster
w(en we upgraded from 61$!B of 'A! to 1CB. .ower users w(o simultaneously run
lots of demanding applications, or anyone regularly working wit( digital *ideo or ot(er
large grap(ics files, will want at least $CB. "f you@re planning to upgrade your .& to
,indows ;ista, you can still get away wit( 1CB, but for a more comfortable e4perience
we recommend $CB of 'A!.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Networin$
1. 1AN
About'
A local area network >+AN? is a computer network t(at interconnects computers in a
limited area suc( as a (ome, sc(ool, computer laboratory, or office building using
network media. )(e defining c(aracteristics of +ANs, in contrast to wide area networks
>,ANs?, include t(eir smaller geograp(ic area, and non#inclusion of leased
telecommunication lines.Hcitation neededI A'&NE), )oken 'ing and ot(er tec(nology
standards (a*e been used in t(e past, but Et(ernet o*er twisted pair cabling, and ,i#7i
are t(e two most common tec(nologies currently used to build +ANs.
)(e increasing demand and use of computers in uni*ersities and researc( labs in t(e late
1FM%s generated t(e need to pro*ide (ig(#speed interconnections between computer
systems. A 1F1% report from t(e +awrence 'adiation +aboratory detailing t(e growt( of
t(eir O:ctopusO network ga*e a good indication of t(e situation. &ambridge 'ing was
de*eloped at &ambridge -ni*ersity in 1F1/ but was ne*er de*eloped into a successful
commercial product.
Et(ernet was de*eloped at <ero4 .A'& in 1F15P1F16,H6I and filed as -.S. .atent
/,%M5,$$%. "n 1F1M, after t(e system was deployed at .A'&, !etcalfe and Boggs
publis(ed a seminal paper, OEt(ernet 3istributed .acket#Switc(ing for +ocal &omputer
Networks.O A'&NE) was de*eloped by 3atapoint &orporation in 1F1M and announced in
1F11. "t (ad t(e first commercial installation in 3ecember 1F11 at &(ase !an(attan Bank
in New Aork.
Purpose'
)(e purpose being to allow users to connect t(eir computers to a common ser*er or
ser*ers. Ser*ers are =ust central computers to a network. Ser*ers contain data t(at could
be of *arying types. )(ere@d data t(at are numbers for e4ample accounting data an
accounting department needs to s(are wit( ot(er people in t(e accounting department. :r
it could be p(otos t(at a marketing department s(ares wit( ot(er people in t(e marketing
"ES !anagement &ollege and 'esearc( &entre, !umbai
department w(en working on a marketing pro=ect. :r it could be sound data t(at would
also be used by t(e marketing department on a pro=ect in*ol*ing t(e use of sound. :r it
could be simply words0documents t(at people need to s(are amongst managers of t(e
company. )(e +AN allows e*eryone to work on t(e same document and wit( t(e rig(t
software0programs e*eryone can see t(e results in real time. )(at is per(aps one of t(e
most powerful aspects of a centrali8ed ser*er t(at e*eryone is accessing at t(e same time
from t(eir computers at t(eir desks or e*en from t(eir (ome. Aes accessing a +AN from
(ome is possible too. Accessing a +AN is possible t(ese days from nearly anyw(ere a
person can get a cell p(one signal since t(ere are now cards t(at you can insert into your
computer and access t(e internet w(ic( mig(t also (a*e t(e +AN connected to it. So e*en
t(oug( t(e title is +AN it isn@t necessarily all t(at +ocal. " t(ink you get t(e idea now of
t(e purpose of a +AN. )(e safety aspect is great for a +AN also as t(e Network !anager
is usually in c(arge of backing up all t(e data. )(ese assure t(at all t(e work t(at
e*eryone does won2t be lost s(ould t(e ser*er cras( or get (acked or some ot(er disasters
occur. )(at is w(y good Network !anagers store t(e company data in a safety deposit
bo4 on a daily basis.

Implementation & Setup'
,ireless communications allows us to li*e and work in ways ne*er before possible,
offering us fle4ibility, mobility and a link to our en*ironment t(at is almost magical.
Anybody t(at uses cordless or cellular p(ones, pagers, ); remote controls, keyless car
entry, or garage door openers will readily agree. ,(ile telecommunications and computer
networking (a*e *astly increased our options on (ow and w(at we communicate, t(ey
(a*e p(ysically constrained us by leas(ing us wit( a p(ysical wire to t(e network. But
wireless communications brings us back to a form of communications t(at is in(erently
natural to us. As creatures we do not like to be p(ysically constrained. Human speec(
itself, despite its limited range, is wireless.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Ris Mana$ement & Contin$enc! plan'
&onnecting computers to networks significantly increases risk. Networks connect large
numbers of users to s(are information and resources, but network security depends
(ea*ily on t(e cooperation of eac( user. Security is as strong as t(e weakest link. Studies
(a*e s(own t(at most of t(e abuses and frauds are carried out by aut(ori8ed users, not
outsiders. As t(e number of +ANs and ,ANs increase, cost#effecti*e security becomes a
muc( more significant issue to deter fraud, waste, and abuse and to a*oid embarrassment.
,(at t(eir security concerns s(ould be, and (ow to resol*e t(eir concerns. ,e will begin
by introducing t(e concept of risk management and touc( on basic requirements for
protecting +ANs. )(is will be followed by a summary of +AN components and features
t(at will ser*e as a foundation for determining security requirements. +AN security
requirements will t(en be discussed in terms of t(e risk assessment process, followed by
a detailed discussion of (ow to implement +AN security in a step#by#step approac(. )(is
s(ould pro*ide t(e necessary guidance in applying security procedures to specific
+AN0,AN security risks and e4posures.
R(I & )uration'
':" analysis for any tec(nology typically in*ol*es calculations t(at s(ow (ow a gi*en
solution sa*es money, makes money or bot(. ,ireless +AN ':" analysis is no e4ception.
Howe*er, t(e e4periences reported by t(ose w(o deploy it *ary dramatically.
"n planning your ,+AN ':", you must address a few key questions
Q Are you c(oosing between wireless and wired for a new +AN installationR :r are you
deciding simply w(et(er or not to add a ,+AN to an e4isting wired +ANR
Q Are you deploying in isolated workgroups, or are you building an enterprise solution
>w(ic( will require deploying access points not =ust for client connections but possible
also for point#to#point links?R
"ES !anagement &ollege and 'esearc( &entre, !umbai
Q How mobile are your employeesR 3o t(ey need to mo*e around frequently during t(e
workdayR 3o t(ey work in eac( ot(er@s officesR 3o t(ey (a*e working meetings w(ere
access to ser*er#based applications can be importantR
*p$ra)e or Chan$e'
)(e speed of your network affects nearly e*ery de*ice on your (ome network, w(et(er it
be a (ome#t(eater .&, an e4ternal storage de*ice, or a gaming console. 7or most
networks, t(e transfer rate of a faster Et(ernet connection >roug(ly 1$.6 megabytes per
second? is t(e typical speed limit. )(at may be okay for transferring ordinary files, but it@s
painfully slow if you@re trying to back up a .& to a network de*ice, for e4ample, or to
stream a (ig(#definition mo*ie to your li*ing room.
)(e solutionR !o*e up to a gigabit network. Switc(ing o*er to gigabit >1%%%#!bps?
speeds increases your potential t(roug(put tenfold, minimi8ing your transfer times and
greatly en(ancing your ability to stream (ig(#bandwidt( files to connected de*ices
wit(out interference. Cigabit networking is now a sufficiently common feature of modern
networking de*ices t(at it s(ouldn@t carry too great a cost premium. As for your
mot(erboards, t(e odds are good t(at t(ey already (a*e gigabit functionality built in,
w(et(er you know it or not. Before we go any furt(er, " s(ould note t(at t(is guide does
not apply to wireless networks9 t(e factors t(at constrain speeds on wireless networks are
entirely different from t(ose t(at limit speeds on wired networks.
"ES !anagement &ollege and 'esearc( &entre, !umbai
+. -us Topolo$!
About'
A bus network uses a multi#drop transmission medium, all node on t(e network s(are a
common bus and t(us s(are communication. )(is allows only one de*ice to transmit at a
time. A distributed access protocol determines w(ic( station is to transmit. 3ata frames
contain source and destination addresses, w(ere eac( station monitors t(e bus and copies
frames addressed to itself.
A bus topology connects eac( computer >nodes? to a single segment trunk >a
communication line, typically coa4 cable t(at is referred to as t(e @bus@. )(e signal tra*els
from one end of t(e bus to t(e ot(er. A terminator is required at eac( to absorb t(e signal
so as it does not reflect back across t(e bus. A media access met(od called &S!A0!A is
used to (andle t(e collisions t(at occur w(en two signals placed on t(e wire at t(e same
time. )(e bus topology is passi*e. "n ot(er words, t(e computers on t(e bus simply @listen@
for a signal9 t(ey are not responsible for mo*ing t(e signal along.
Purpose'
)(e bus topology is one of t(e four main topology types for networking. "t allows
systems to be connected in a straig(t line wit(out any ot(er network connecti*ity de*ices.
As a result, it is easy to construct and needs *ery little in t(e way of configuration, and is
ine4pensi*e compared to ot(er topologies. )(e main result of any topology is to connect
clients toget(er in order to s(are resources.
)(e bus is t(e data link in a bus network. )(e bus can only transmit data in one direction,
and if any network segment is se*ered, all network transmission ceases.
A (ost on a bus network is called a station or workstation. "n a bus network, e*ery station
recei*es all network traffic, and t(e traffic generated by eac( station (as equal
transmission priority. Eac( network segment is, t(erefore, a collision domain. "n order for
nodes to transmit on t(e same cable simultaneously, t(ey use a media access control
tec(nology suc( as carrier sense multiple access >&S!A? or a bus master.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Implementation & Setup'
All workstations connect to t(e same cable segment commonly used for implementing
Et(ernet at 1%mbps t(e cable is terminated at eac( end wiring is normally done point to
point a faulty cable or workstation will take t(e entire +AN down two wire, generally
implemented using coa4ial cable during t(e 1FG%@s.
)(e bus cable carries t(e transmitted message along t(e cable. As t(e message arri*es at
eac( workstation, t(e workstation computer c(ecks t(e destination address contained in
t(e message to see if it matc(es its own. "f t(e address does not matc(, t(e workstation
does not(ing more.
"f t(e workstations address matc(es t(at contained in t(e message, t(e workstation
processes t(e message. )(e message is transmitted along t(e cable and is *isible to all
computers connected to t(at cable.
)(ere are )H'EE common wiring implementations for bus networks
1%Base$ >t(in#net, &(eaperNet? 6%#o(m cable using BN& ) connectors, cards pro*ide
transcei*er.
1%Base6 >)(ickNet? 6%#o(m cable using 16#pin A-" 3#type connectors and e4ternal
transcei*ers.
1%Base) >-).? -). cable using 'N/6 connectors and a wiring centre.
Maintenance #Re$ular & %mer$enc!&'
A bus topology in more tec(nical terms means t(at it is a met(od of transmission on
networks t(at uses a common *e(icle for transmissions and t(us it is categori8ed as
s(ared communication. "magine a bus picking up *arious people from one stop and
dropping of people as it tra*els and t(en picking a few more. )(at is w(at (appens in a
bus network e4actly.
A bus topology in more tec(nical terms means t(at it is a met(od of transmission on
networks t(at uses a common *e(icle for transmissions and t(us it is categori8ed as
"ES !anagement &ollege and 'esearc( &entre, !umbai
s(ared communication. "magine a bus picking up *arious people from one stop and
dropping of people as it tra*els and t(en picking a few more. )(at is w(at (appens in a
bus network e4actly.
3ifficult to administer0troubles(oot. +imited cable lengt( and number of stations. "f t(ere
is a problem wit( t(e cable, t(e entire network goes down. !aintenance costs may be
(ig(er in t(e long run. .erformance degrades as additional computers are added or on
(ea*y traffic. .roper termination is required.>loop must be in closed pat(?. "f many
computers are attac(ed, t(e amount of data flowing causes t(e network to slow down.
Significant &apaciti*e +oad >eac( bus transaction must be able to stretc( to most distant
link?.
Ris Mana$ement & Contin$enc!'
)(e t(ree#tier network (as dominated t(e data centre since t(e late 1FF%s, but recent
mo*es toward a *irtuali8ed, ser*ice#oriented, con*erged infrastructure (as spawned
demand for a flat network topology t(at (ad been abandoned years ago.
7lat network belie*ers say t(at reducing t(e number of switc(ing tiers enables t(e kind of
any#to#any connecti*ity between ser*ers and nodes on t(e network t(at allows for rapid
and automated ;! migration. )(ey also say it will diminis( latency and could ultimately
reduce management o*er(ead.
"n t(is guide, we e4plore t(e considerations t(at network arc(itects took before mo*ing
into flat networks, as well as related tec(nologies suc( as network fabrics and *irtual
cluster switc(ing t(at enable deeper manageability in a flat network topology.
R(I & )uration'
)(e +inear Bus is a multi#access topology w(ere all de*ices connect to or tap into a
single common backbone. )(is results in a contention based en*ironment w(ere all
de*ices broadcast t(eir messages on t(e backbone and all frames are *isible to all de*ices
on t(e bus backbone. )(is multi#access s(ared medium requires protocols to manage
transmissions in an effort to ma4imi8e t(roug(put. )(e &arrier Sense, !ultiple Access
"ES !anagement &ollege and 'esearc( &entre, !umbai
wit( &ollision 3etect >&S!A0&3? protocol is a good e4ample of t(e requisite
management protocols and will be discussed in Et(ernet and &S!A0&3. )(e ability for
e*ery de*ice to read all frames ob*iously introduces security concerns. )(e bus is also
susceptible to a single point of failure and t(erefore suffers from a*ailability concerns.
)(e bus is a relati*ely simple and ine4pensi*e implementation requiring minimal
administration if designed and implemented according to best practices >e.g. ad(ering to
ma4imum cable lengt( constraints, limiting t(e number of users based on t(eir
transmission requirements, etc.?. )(e ends of t(e backbone cable must be properly
terminated to ensure t(e signal is absorbed rat(er t(an being reflected back as t(is will
seriously (amper communications. Network designers can e4tend t(e bus topology
t(roug( t(e use of layer one (ubs also known as multiport repeaters. Hubs can en(ance a
network2s resiliency as a centrali8ed de*ice and dedicated cable can o*ercome single
points of failure. "t must be noted t(at layer one de*ices do not parse or process frames
and t(erefore do not logically segment collision domains.
*p$ra)e or Chan$e'
Aou are asked to upgrade a bus topology +AN at a friend2s (ouse to a star topology +AN.
Aour friend wants to connect t(ree computers and a printer and use t(e Et(ernet access
met(od. His computers do not contain wireless N"&@s. At minimum, w(ic( of t(e
following de*ices must you add to (is current networking (ardwareR
)(e type of network topology in w(ic( all of t(e nodes of t(e network are connected to a
common transmission medium w(ic( (as more t(an two endpoints t(at are created by
adding branc(es to t(e main section of t(e transmission medium P t(e p(ysical
distributed bus topology functions in e4actly t(e same fas(ion as t(e p(ysical linear bus
topology >i.e., all nodes s(are a common transmission medium?.
"ES !anagement &ollege and 'esearc( &entre, !umbai
%2uipments
1. Scanner
About'
A scanner is a de*ice t(at captures images from p(otograp(ic prints, posters, maga8ine
pages, and similar sources for computer editing and display. Scanners come in (and#(eld,
feed#in, and flatbed types and for scanning black#and#w(ite only, or color. ;ery (ig(
resolution scanners are used for scanning for (ig(#resolution printing, but lower
resolution scanners are adequate for capturing images for computer display. Scanners
usually come wit( software, suc( as Adobe@s .(otos(op product, t(at lets you resi8e and
ot(erwise modify a captured image.
Scanners usually attac( to your personal computer wit( a Small &omputer System
"nterface > S&S" ?. An application suc( as .(otos(op uses t(e ),A"N program to read in
t(e image.
Some ma=or manufacturers of scanners include Epson, Hewlett#.ackard, !icrotek, and
'elisys.
Purpose'
:ne of t(e most useful and underutili8ed tools in t(e modern office is t(e scanner.
!odern scanners are easy to use and as *ersatile as your imagination. Since many (ome#
use printers come wit( built#in scanners, many people (a*e scanners in t(eir (omes t(at
t(ey (a*e ne*er used.
)(e main purpose of Scanner Equipment#
1. .aper 7ile 'eduction
$. .(otos
5. :ptical &(aracter 'ecognition
/. 7a4 'eplacement
"ES !anagement &ollege and 'esearc( &entre, !umbai
Implementation & Setup'
)(e Scanner can be installed on t(e computer t(roug( scanner dri*er. :nce t(e particular
scanner dri*er (as been installed t(en we can use t(e scanner on t(at computer.
Maintenance #Re$ular & %mer$enc!&'
!aintenance "ncludes
$ 7eed !odules
$ Separation 'ollers
1% 'eplacement Strips
6% 'eplacement Strips
Nominal tire life is appro4imately $6%,%%% documents, depending on paper types,
en*ironment and scanner cleanliness.
'isk !anagement J &ontingency plan#
)(e scanned image quality s(ould be in proper format. 'isk factor of t(is is manage
properly by different scanner.
R(I & )uration'
)(e ':" of t(e scanner is more t(an t(e in*estment because it manage t(e company
important documents.
*p$ra)e or Chan$e'
Scanning is a new system in !ass Effect $ t(at replaces dri*ing wit( t(e !ako and
searc(ing for t(e minerals inland, from t(e first game. Scanning becomes a*ailable w(en
t(e Normandy S'#$ enters t(e orbit of any planet not in*ol*ed in a main storyline
mission, at w(ic( point you@ll be prompted to start t(e scan. :nce begun t(e planet will
"ES !anagement &ollege and 'esearc( &entre, !umbai
be o*erlaid wit( a rectangular grid. Aou may t(en press and (old anot(er button to begin
a mineral scanner w(ic( is slower t(an t(e main scanner, t(oug( its speed can be
upgraded slig(tly. A data column will appear on t(e side of t(e screen and you t(en mo*e
t(e scanner around until t(e data column spikes, indicating t(e presence of minerals at t(e
scanner@s current location. Aou may t(en fire a probe at t(e deposit w(ic( will in turn add
t(e minerals to your stores.
+. /ebcam
About'
A webcam is a *ideo camera t(at feeds its image in real time to a computer or computer
network. -nlike an ". camera >w(ic( uses a direct connection using et(ernet or ,i#7i?, a
webcam is generally connected by a -SB cable, 7ire,ire cable, or similar cable.
)(eir most popular use is t(e establis(ment of *ideo links, permitting computers to act as
*ideop(ones or *ideoconference stations. )(e common use as a *ideo camera for t(e
,orld ,ide ,eb ga*e t(e webcam its name. :t(er popular uses include security
sur*eillance, computer *ision, *ideo broadcasting, and for recording social *ideos.
)(e first web cam was de*eloped in 1FF1 and was used by scientists at &ambridge
-ni*ersity to determine if t(ere was coffee a*ailable in anot(er location.
Purpose'
so t(e ot(er person on anot(er computer can see you w(en t(ey are talking to you and
capturing t(e images.
"ES !anagement &ollege and 'esearc( &entre, !umbai
Implementation & Setup'
)(e implementation is *ery of webcam, we only (a*e connected to t(e -SB port and
camera will be started. )(ere is not any specific setup is required for t(is. :nly plug and
play equipment.
Maintenance #Re$ular & %mer$enc!&'
)(e Skyline ,ebcams are constantly monitored by a ser*er able to sol*e any ordinary
problem, w(en t(is is not possible an operator will be immediately informed.
)(e webcams need electric current and A3S+ connection, sometimes it occurs t(at t(is is
momentarily not supplied due to maintenance works or lack of A3S+. !oreo*er,
ordinary and special maintenance works may occur, so t(at some webcams could be
momentarily not a*ailable, usually for a brief period sometimes for a longer period of
time. "t is not necessary to report it9 our ser*er will immediately inform our tec(nical
staff.
Ris Mana$ement & Contin$enc! plan'
,ebcams are low#cost computer perip(erals t(at feed *ideo images to a computer or
network in real time. )(ey may connect *ia -SB, wireless connection or E(ernet.
,ebcams enable *ideo conferencing, allow users to monitor a space for security or
entertainment purposes, and can record still pictures and *ideo clips. )(ey come in
se*eral ma=or types.
R(I & )uration'
,ebsite designers can add a cost effecti*e webcam feature for t(eir clients using our
ser*ice and in addition, we can e4c(ange website links, if you wis(, to increase our
mutual link popularity wit( Coogle. ,e will e*en pro*ide a custom &am secure camera
page for your webcam wit( 7'EE ad*ertising for your website at no e4tra cost.
"ES !anagement &ollege and 'esearc( &entre, !umbai
*p$ra)e or chan$e'
)(e webcam can be upgraded timely. )(e recent *ersion is a*ailable on t(e net.
"f you are tired of t(e =agged looking image you are getting from your Skype calls or
ot(er ;ideo &onferencing, t(e H3 webcam is a*ailable in t(e today2s market.
"ES !anagement &ollege and 'esearc( &entre, !umbai

Вам также может понравиться