Tuesday, December 31, 2019

- Compare and contrast the pros and cons of public and private sector security convergence efforts Free Essay Example, 3000 words

This has become an increasingly positive phenomenon as they are able to combat various criminal situations using their well equipped and trained facilities. Being one of the forces legally enabled to use firearms in the public, they are therefore better placed in controlling rowdy crowds, criminals and other incidences, which affect the stability as well as compromise the security of the nation. On the other hand, Private investigators perform the same duties conducted by public police such as investigations for instance locating people who go missing after leading high profile crimes, obtain information for civil and legal litigation cases. They are also in place to provide consultations to risk management, and implementing measures under security to curb crime and emergencies such as fire, and investigating corporate fraud. Owing to the nature of Private investigators, they have made it easy to deal with high profile gangs and other criminals who escape unidentified. Security guards as police officers maintain order and enforce regulations; they are invited to public events to provide protection on properties against theft and vandalism thus ensuring law and order is maintained during the session. We will write a custom essay sample on - Compare and contrast the pros and cons of public and private sector security convergence efforts or any topic specifically for you Only $17.96 $11.86/pageorder now The Private Security firms are entrusted in transporting of valuables such as money or transportation of confidential parcels. The private firms have the same rights as the public police in arresting the trespassers i. e. According to Trespass acts are "†¦ the workhorse of private security services in their patrol of the shopping malls, airports, sports stadiums and other private spaces where the public tends to congregate". There is greater difference between public and private security officers which all under training where police officer get training and education in depth thus paid highly compared to a private security officer. Thus Large private security firm are trying to put in depth to training and education thus increasing their level of professionalism. The public officers are shielded by strong union as their remunerations are from taxpayers thus being said they are not held accountable to their actions as individual, moreover the private security officer are held accountable to any mistake thus putting their job at risk to a lay off thus they perform their duties under the policies and procedures of the company (Private Security Industry Regulatory Authority, 2007). Through this regulation, private security officers have learnt the importance of handling each and every individual professionally as well as all the situations and tasks they are assigned to perform.

Monday, December 23, 2019

Internal Control Weakness (Auditing) Example

Essays on Internal Control Weakness (Auditing) Research Paper Running Heading: Internal Control Weakness Internal Control Weakness Foot Locker INC. [Address] November 6, 2011 To: M. I. Supavizah From: [Your Name] Subject: To Report Internal Control Weakness in the Organization I am currently employed by your company, Foot Locker. And I am performing all my responsibilities effectively and efficiently. I am aware that the management of the organization is considerate about the internal control and internal audit. Apart from this, organizations is using Committee of Sponsoring Organizations of the Treadway Commission (COSO) framework, in order to check and monitor the overall effectiveness of the internal control. However, I would like to inform you about a serious internal control weakness in the organization. The information technology system used by the organization for the inventory management is not appropriate and efficient enough to control integrated process of inventory management in various outlets. In order to be able to generate accurate financial reports and results, it is important for the organization to manage the level of inventory all over the retail outlets in an efficient manner. This weakness in the information technology system will result in exposing it to different types of frauds and illegal activities. Design of the information technology system is inadequate and hence the system is not able to provide complete, precise, and correct information about integrated inventory management which is required for the purpose of financial reporting. There are different financial and operational implications of this internal control weakness. Because of this inadequate and inefficient technology system, employees associated with the process of inventory management can manipulate the information and data for their own benefits. This will result in damaging the overall reputation and profits of the organization. Apart from this organization will have to face several other issues because of the lack of proper inventory management. Organization places huge emphasis on the inventory management and it is essential to have an appropriate management information system which allows the organization to implement integrated inventory management. Along with this, inefficiency on part of the technology system will result in the generation of huge implications and costs associated with different issues of frauds and external audit. Internal control is of high importance for the success and growth of any company. Internal audit and internal control is essential in order to control overall practices of the organization and avoid any possibility of fraud. There have been several cases of frauds due to lack of appropriate internal control system. Management should be able to identify important elements and factors, which should be controlled in order to ensure that the company is performing in acceptable manner and is reporting all relevant information and data in the financial statements. Organizations which come up with well planned and well thought internal control and auditing strategies are able to improve the overall performance and lead the organization towards the path of success and growth (Moffett Grant, 2011). At the same time it is important to acknowledge that almost all internal control strategies and systems are vulnerable and exposed to different risks. There are always some loopholes in the internal control system of every other organization. For this reason, it is required that organizations monitor and check their internal control process on routine basis and identify any changes which should be made (Soh Martinov-Bennie, 2011). In regard to the identified problem and increased importance of the appropriate internal control system, I will like to recommend to redesign and rebuild the management information system of the organization. New management information system should be able to provide information and data on the basis of integrated inventory management. Along with this the new management information system should be designed in such a way that only concerned and authorized persons are able to access and change the data and information. This will result in decreasing the chances of any manipulation and fraud and in turn will strengthen the internal control system of the organization. REFERENCES Moffett, R., Grant, G. (2011). Internal Controls and Fraud Prevention. Internal Auditing, 26(2), 3. Soh, D., Martinov-Bennie, N. (2011). The internal audit function. Managerial Auditing Journal, 26(7), 605-622.

Sunday, December 15, 2019

A Study on Enterprise Network Role of Brac Bank Free Essays

string(355) " Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring maintenance flowchart ATM Link monitoring maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5\." A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics Telecommunication Engineering INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant Professor School of Engineering Computer Science Independent University, Bangladesh ABSTRACT This internship report is an exclusive study of Enterprise Network role at BRAC Bank Ltd. The main Objective of this report is to get the practical experience through observing all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc. We will write a custom essay sample on A Study on Enterprise Network Role of Brac Bank or any similar topic only for you Order Now through LAN WAN and also ensure utilization of internet and intranet effectively. iii ACKNOWLEDGEMENTS First of all I wish to convey our heartfelt thanks and gratitude to Almighty Allah to complete the internship successfully and also those who all rendered their cooperation in making this report. Without their assistance I could not have completed my internship. I like to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the opportunity to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr. Mohammad Morshed, (Analyst, Technology User Infrastructure, BRAC Bank Limited). Discussions with him about various topics have enriched my conception and knowledge about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior Manager of Network Service) and Md. Mahbubul Alam (Network Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would not have been possible without the help of the people who provided tremendous amount of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my honorable supervisor. My internship achieved its desired success. This internship gives me the opportunity to practically work on the overall technology based banking systems, focusing on the various aspects analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to maintain or support of a Banking System. iv TABLE OF CONTENTS Page LIST OF TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. LIST OF FIGURES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. CHAPTER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1. 1 1. 2 1. 3 1. 4 1. 2 Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Origin of the Report †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Objective of the internship†¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ About BRAC BANK†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 1 2. 2 Enterprise Network Role at BRAC BANK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Daily, Weekly, Monthly Other regular duties †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. 2. 1 Daily Activates†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Monitoring Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN WAN Support for Total N etwork†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v 2. 2. 1. 3 LAN / WAN security†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 4 Internet connectivity†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 5 Western Union and Other Remittance Program †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 6 SWIFT server administration †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦ 2. 2. 1. 7 APN connectivity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. 2. 1. 9 Network devices health check †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. 2. 2. 2 Weekl y Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 2. 1 Configuration Back†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. . 3 Monthly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 3. 1 SWIFT archive and backup†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 NETWORK ARCHITECTURE DESIGN 3. 1 3. 2 3. 3 3. 4 3. 5 Data Center Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Omnibus Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Eldorado Architecture à ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of Branches †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of a sample Branch†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦ vi 3. 6 4 ATM Architecture†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 New link deployment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link vendor selection †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Network maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link monitoring maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 4. 1 4. 4. 2 4. 5 Branch Link monitoring maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ATM link monitoring maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Link troubleshoot checklist†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 5. 1 4. 5. 2 Radio Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Fiber Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4. 6 5 Remote access policy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Wi-Fi AND INTERNET CONNECTIVITY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. 1 Wi-Fi activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ BANDWIDTH MANAGEMENT AND MONITORIN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 1 6. 2 Overview of Bandwidth management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Bandwidth Management at BRAC Bank†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ vii 6. 3 OpUtils†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 3. 1 Switch Port Mapper†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. 3. 2 IP Address Manager†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1 Maintenance of GP Access point Network†¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 1 GP Huawei Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7. 1. 2 ZTE Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 3 ADN Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 1 Western Union†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 1. 1 Installation process†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8. 2 SWIFT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 1 BRAC Bank Swift Network Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 2 SWIFT Infrastructure Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3 Maintaining the SWIFT environment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3. 1 Daily activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦. 8. 2. 3. 3 Monthly activities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 2. 3. 4 Yearly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. MAINTENANCE, MONITORING SUPPORT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. 1 9. 2 Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. What’s Up Gold†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. 2. 1 Create a New Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9. 2. 2 What’sUpGold Web Server†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 C ONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. REFFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues related link vendor selection 8. 1 Support Level 8. 2 User format for Western union 8. 3 Terms and description of SWIFT Page 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank Omnibus Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring maintenance flowchart ATM Link monitoring maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. You read "A Study on Enterprise Network Role of Brac Bank" in category "Essay examples" 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7 Wi-Fi Activation Process OpUtils Login Page OpUtils Home Page (Summary Report) Switch Port Mapper portion List of Switches List of Routers Switch information summary Finding a MAC address IP Address Manager Modem Installation Profile Creation Profile Change Western Union Installation Swift Network Diagram Swift Infrastructure Creat New Map in What’s Up Gold Select device for mapping 23 31 31 32 32 33 33 34 6. 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 xii 9. 4 9. 5 9. 6 Configure device properties Polling device What’sUpGold Web Server Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is not enough to enable students to compete with self-assurance and reach his/her ambition without having experience with the real world related applications. Internship is highly needed to expand idea, familiarity and experience. Computer networking is one of the most essential terns in order to run a moder n organization. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit course as Internship for the undergraduate students in her course curriculum. The curriculum requires every student to do an internship in an alleged firm for hands on experience about the proficient works. It is a realistic exposure of theoretically gained knowledge and can be considered as an opening tryout to be acquainted with any organization and to make oneself confident enough to move toward into service life and start building career. As the outside world is very much competitive for anyone after graduation, IUB provides such an opportunity to build up the capability with most appropriate opportunities. This gives the student great opportunity in the service world and also to get exposure to various diversifications of the service world. Intern students are supervised under a particular faculty member throughout their Internship stage. Here the student gets the chance to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are responsible to report weekly or fortnightly to his/her respective Supervisor to get his/her assistance. And the project gets advancement by following the Supervisor’s instruction. The internship period is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main purpose of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about enterprise network. ? Get the clear view about network monitoring and maintenance. ? Relate theory with practice of networking. ? This is the beginning of a student’s professional career. The student’s competency and efficiency in the working environment can be accessed from this course. ? Teaches the student to take up the responsibility and pressure of work. ? Teaches the student to learn from work. ? To help students enhance their creativity and efficiency in dealing with projects related to their field of study. ? Helping students to express dependability, initiative, resource fullness and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work after graduation. 3 1. Scope I’ve done my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, Western Union Installation. My task was configuring router and switches; configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and Western Union Installation. In the later portion of my internship I was also involved support team of Technology User Infrastructure. The task of Support team is to provide instant pc related support to the users as they call for help. The support may be of two kinds, remote – which is given by using VNC, sometimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. Now I’m confident that I could efficiently work in Networking Industry with my full dedication. . 6 About BRAC Bank BRAC Bank Limited (BBL) is a scheduled commercial bank in Bangladesh. It established in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank will be a unique organization in Bangladesh. The primary objective of the Bank 4 is to provide al l kinds of banking business. At the very beginning the Bank faced some legal obligation because the High Court of Bangladesh suspended activity of the Bank and it could fail to start its operations till 03 June 2001. Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the Supreme Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank will be a unique organization in Bangladesh. It will be a knowledge-based organization where the BRAC Bank professionals will learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and break barriers to serve customers and create customer loyalty through a value chain of responsive and professional service delivery. Continuous improvement, problem solution, excellence in service, business prudence, efficiency and adding value will be the operative words of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service culture throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believe in the Bank’s vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and internationally acceptable banking and accounting standards. Sustained Growth in Small and Medium sector, continuous low cost deposit growth with controlled growth in retained Assets. †¢ Achieve efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks other products and services 5 †¢ Manage various lines of business in fully controlled environment with n o compromise on service quality †¢ Keep a diverse, far-flung team fully motivated and driven towards materializing the bank’s vision into reality. BRAC Bank will be the absolute market leader in the number of loans given to small and medium sized enterprises throughout Bangladesh. It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop and grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in accordance with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network maintain all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data co mmunication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN WAN and also ensure utilization of internet and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design: Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, configuration and troubleshooting: By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipment’s to new distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity: Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide secure internet connectivity through proxy server. 7 2. 1. Bandwidth Management: Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing Perimeter firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network: Maintenance of GP Access Point Network by establishing IPsec tunnel between BBL and GP network to provide intranet facility to SME Unit offices, also use this secure channel for POS transactions. 2. 1. 6 Connectivity and administration of all payment network Software: Ensure connectivity for all payment network software like Western Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring Support: Maintain all network device, manage network monitoring application and Provide All LAN WAN related support. Enterprise network also give solution to BRAC Bank subsidiary institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant ba sis. BRAC Bank has redundant links for every branch. And mechanism has been applied so that if one link goes down, the backup link is activated automatically. Apart from this Primary link is being used for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths. Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the daily operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Connection to internet is required for 24Ãâ€"7. Ensuring the interrupt free internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for Web Servers, Internet banking, Eldorado Projects, etc. 9 2. 2. 1. Western Union and Other Remittance Program Support Computer terminals used for Western Union service face various type of problem including connection error, password lock, Western Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivi ty Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone. Day to day basis we need to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble free and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwidth utilization, process, and memory usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup Taking weekly backup of critical hardware applications including Core Router, Core Firewall and Core Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup Archive SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture: Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redu ndant data communications connections, environmental controls and security devices. Fig- 3. 1 BRAC Bank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are connected with the Core router. In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are connected with Core Router. In Left side the remote Branches are connected via Radio or Fiber or VSAT link provided by the some ISP named BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISP’s which provide Internet those are also connected with Core Router via Firewall. The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture: Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the first neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the name of the independent association of member banks and institutions that will operate and manage the central switch. As a first step, OMNIBUS integrates the ATM POS networks of BRAC Bank and Q-Cash, enabling cardholders of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers significant convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking. This instant increase in the number of ATMs POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet Link3 with Omnibus and Omnibus server is also connected via Metronet Link3. 15 3. 3 Eldorado Architecture: Eldorado – a web based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank. BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a common electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances more accurately. This will help the member banks to serve their remittance customers even better and faster. 16 To popularize the formal banking channels among the non-resident Bangladeshis for sending their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittances electronically in the most expeditious and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet Link3. . 4 Network Architecture of Branches: Fig- 3. 5: Network Architecture of Branches The Branch is connected with Cisco 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for security issue. One Native VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6: Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All Desktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with Phoenix soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is correct or not. If HSM send green signal for PIN then Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all information is saved on Finacle. Last of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment: The process of new link deployment is as followed. Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection: The issue consideration and their descriptions are pointed below. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in same radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have different backbone for intercity connectivity. This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from higher down time and require more maintenance. Licensed Radio Frequency Tower Height for Radio Links This will ensure better service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation charge increases as tower height increases. Longer tower needs more maintenance cost. Service Quality Vendors with poor service quality should not be considered even though they have met all other requirements. Support Personnel Select vendors that have dedicated support personnel for remote locations. Also count response time for all previous downtime. Balance of Distribution In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance: Following process follows for the network maintenance for link troubleshoot. Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring maintenance: Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring maintenance Fig- 4. 3 Branch Link monitoring maintenance flowchart 4. 4. 2 ATM link monitoring maintenance Fig- 4. 4 ATM Link monitoring maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fig- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac filtering and MAC binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? MAC entry to the Wireless LAN controller’s MAC filter table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional: depends on user’s requirements) MAC entry to the Wi reless LAN controller’s MAC filter table For MAC entry need to log in to the below link https://10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 Then login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing) Then go to SecurityMAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 Then Select NEW†¦ from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Activation Process (Continuing) 26 Put the MAC Address and select SSID (like BBL) as Profile name, Preferred Interface as Interface Name and give user details and select IP address from the existing Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https://10. 00. 83. 251:10000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User Name=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continuing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description box give the user descript ion, in Host name box give the LAN ID of the user in Hardware Address box put the MAC address and put the IP in to the Fixed IP Address box and then select create to make the user. Fig- 5. 1 Wi-Fi Activation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management: Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank: BRAC Bank uses some tools for bandwidth management and monitoring. One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to observe the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port related MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http://10. 0. 0. 236:7080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home page shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its IP address information. In Switch Port Mapp er portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of Routers Summary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ff:ff:ff:ff:ff:ff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types: i. ii. Used IP: Currently using IP addresses. Transient IP: was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP: free IP’s are known as Available IP Address. 35 In the left side of the window we can see the group’s name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Manager (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network: 7. 1. 1 GP Huawei Modem Installation: Fig- 7. 1 Modem Installation Click the Next Button for Starting Installation Fig- 7. 2 Modem Installation (Continuous) 38 Click I Agree for Next Step. Fig- 7. 3 Modem Installation (Continuous) Click Next for Next Step Fig- 7. 4 Mo dem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Continuous) Click Finish to Complete the Installation. 0 Fig- 7. 7 Profile Creation Click Profile Management. Then Click New for creating New Profile Write â€Å"BRACBANK† in Profile Name. Click Static and write â€Å"BRACBANK† in APN and write *99# in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation: All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile Change Click on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write â€Å"BRACBANK† in Configure Filename and *99# in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click Set default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation: APN settings : AT+CGDCONT=1,†IP†,†BRACBANK† Phone number : *99***1# or *99# Need to copy ewusbmdm file from d drive IT Use to Windows system32 CHAPTER EIGHT CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union: To install the western union Translink and activate a client Terminal these steps are followed: 8. 1. 1 Installation process: 1. Download file from ftp://10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. Unzip that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped folder Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps: Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Install ation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (Continuing) 52 6. Install the software like other conventional software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers propertiesAdvancedPerformanceSettingsTurn on DEPAdd Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at C:program filesWestern Union Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Startall programsWestern UnionAgent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation ( Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continuing) 13. Go to Tools (Ctrl-L) And select sign on screen password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select: Printer Model: LaserJet Printer Name/Port: Canon LBP3460 PCL6 Paper Feed: Front Single Fig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to StartControl Panel Network ConnectionsNetwork TasksCreate a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select Next Select Connect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select Virtual Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select Write company Name Company Name: Link1 Fig-8. 30 Western Union Installation (Continuing) Select Next 61 19. If public network page initiated Select Do not dial the initial connection Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installatio n (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyone’s Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22. Then Select Add a Shortcut to this Connection to my Desktop Then Select Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select Save this user name and password for the following users; Select Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the command prompt GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW –p Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW –p Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW –p 25. Then go to agent config Communication And ping the connection points IP; From StartRun 26. Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1: Support Level: Error Type Mom. config Invalid Request Type Out of Memory Error 800 Object error Log Sheet Have To Do Reinstall the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service Reinstall the software Printing C:WINDOWSsystem32drivers Extract the attached file (if it is not present) in C:WINDOWSsystem32 [attachment MSHFLXGD. OCX] go on START - RUN, Type in: regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The Society for Worldwide Interbank Financial Telecommunication (â€Å"SWIFT†) operates a worldwide financial messaging network which exchange s messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as â€Å"SWIFT codes†. The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which must be settled via correspondent accounts that the institutions have with each other. Each financial institution, to exchange banking transactions, must have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview: A typical SWIFT customer environment consists of a combination of individual components that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3: Terms and description of SWIFT Terms FIN CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKI Description Software product that processes and that exchanges FIN messages, by using the FIN application through the SWIFT network. Alliance Access and Alliance Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote API. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator. Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices: HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is supported on the same SWIFTNet Link. Secure Hypertext Transport Protocol. A protocol that is used in order to access web servers that are hosted on SWIFTNet. The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an embedded SWIFTNet Link, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public Key Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment: 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Arrangements have been made for continuous operation Export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is applicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the Web station or Web platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI certificates after you have opened them. Use the SNL_BackUp. l command. (Note: This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? Reboot all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING SUPPORT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is â€Å"What’s Up Gold†. 9. 2 What’s Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options: Discover and Map network devices creates a map using the information sources that you select, such as: SNMP information on your network, information you enter about IP addresses; information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in What’s Up Gold Fig-9. 2 Creat New Map in What’s Up Gold (Continuing) 72 Now as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1: After creating a Blank Map, drag your desired device from Device Type Panel as directed in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements. You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the details. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 What’sUpGold Web Server What’sUpGold provides a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties. Set up the web server: Click on the links below Configure Web Server General Enable Web Server Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any What’sUpGold settings; they will have only the view capabilities. Fig-9. 6 What’sUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Bank Limited but also a chance to learn from the good experts. This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. Beginning from the opportunity to take the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a somehow protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day. Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES [1] http:// www. bracbank. com [2] http:// www. eldorado-bd. com/MDMessage3. aspx [3] http:// www. bankinfobd. com/banks/3/BRAC_Bank [4] http:// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html [5] http:// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf How to cite A Study on Enterprise Network Role of Brac Bank, Essay examples

Saturday, December 7, 2019

Circulation of Gifts for the Establishment plus Maintenance

Question: Discuss about the Circulation of Gifts for the Establishment plus Maintenance of Social Relations in Trobriand Island. Answer: Introduction Circulation of gifts plus commodity exchange is an essential part of the political, social as well as business life of the people of Trobriand Islands. By exchanging and giving of goods and gifts, relations are established and made stronger, needs are met, plus circulation of gifts ensures that the people of Trobriand Islands in Papua Guinea can indeed depend on one another. This essay will discuss the importance of reciprocity as well as the circulation of gifts for the establishment plus maintenance of social relations in Trobriand Island with reference to Wieners (1988) ethnography plus other sources that mention the community of the residents of Trobriand Islands. The Body Weiner describes caring as well as the generosity of reciprocity of gifts as an effort to control other people through establishing the debt (1988). Such an act of giving presents not only expresses the sense of caring but also shows the intention sweetening or turning the mind of the receiver. For example, yams are highly valued among the Trobriand Islands and are seen not only as food but also as a source of power, wealth and sometimes as gifts (Malinowski, 2002). However, when a villager presents another a yam, he/she cannot ask for something in return but wait to receive more. Eriksen (2001) addresses the debate regarding the difference between the circulation of gifts plus commodity exchange. He argues that the need is that gift distribution is the gift provided by an individual or group of people to another person or group of individuals who are seen as friends or relatives and have an obligation to reciprocate the gift of the same value or even of greater value. Presenting a gift entails imparting the giver's personality onto the recipient. Also, the recipient of the gift holds a debt of friendship as well as social connection. Gift circulation is when the goods exchanged are of lesser personal nature, as well as where theres no debt attached such as the social debt. Gift circulation is more of a business transaction of essential goods. Residents of Trobriand Islands give similar produce. Also, males and females do crafted products that are delivered as gifts or even traded as goods for the social, personal, and political as well as survival needs. Wome n have very significant roles in the Trobriand Islands matrilineal society. The residents of Trobriand Islands acknowledge kinship via a maternal lineage of decent. On the other hand, Trobriand Island males work tirelessly to become powerful, as well as hold good positions in respect to the social power and their wealth. Through marriage, men could grow and store their yams whilst the womans male relatives work to grow as well as supply yams. This is because stocks of yams represent their wealthy. However, females wealth comprises of piles of banana leaves plus skirts made from banana leaves fiber. According to Weiner (1988) women make plus control the distribution of their wealth. Weiner also wrote about the distribution of womens wealth immediately a man dies in the society. Some people of the mans family, as well as kinship, were laborers in the mourning process whereas closer relatives were the mourners. Besides, a woman wealth is expressed in the amount allotted for the supply of a pile of banana leaves as well as a skirt as payments to the people mourn ing plus payment to everyone who had been connected to the deceased socially. The act of mourning as well as circulation of gifts is also of high paramount, especially when showing to other people that they were not connected to the cause of death of the deceased. This is because they believe that the death is as a result of sorcery works by a person with evil intentions. Other gifts plus produce are exchanged for different reasons. Weiner (1988) holds betel nuts are presented to a would be lover so as to seduce their partner. Such gift has an expectation of return in favor. However, mens who move from their native island to another do so in search of women who they can influence by presenting the gifts of their produce or even their crafting such as pandanus mats, woven baskets, and stone axes to do Kula with. Performing Kula has in-depth traditional roots as well continues through time plus diverse phase of transformation. According to the Trobriand island people, Kula exchange makes a man more powerful even among people who do not know him. Presenting a necklace or an adorned shell to a trusted partner bears the trust for the partner to pass the gift, in a timely manner as well to a more trusted partner. This is done until the Kula gift is returned to the original owner, and then goes around again and again However, Trobriand Island men compete with one another so as to win individual partners living on different islands, who engage in series of relationships with each other as well ensure a path of travel of the shell gift. Ideally, an experienced Kula person has an understanding in the ways of ascertaining the right track by which their special treasures will be moved to generate popularity and honor which raises the mans political ambitions in the community. The shell product bears the original owner's name alongside the names of people who have held it temporarily. As the shell necklace passes from one person to another, it becomes more famous and valuable. Kula necklace exchange operates on the principle of equivalence where the practice is to match the value and size one shell product to the other. The Kula arm bands each cut from the cross section of a corn shell plus decorated with the egg cowry shells,' pass from one partner to the other in a counterclockwise movement, and are perceived to be a woman. These necklaces are made from red disk beads from Chama shells travel clockwise and are seen to be males. However, the necklaces and wristbands are categorized on color, polish, size, and the particular histories. According to Lee (2011), the rule of 'opposite flow' ascertains that continuing relations are complimentary. The giving as well as receiving of shell produce is linked with magic practices, myths, and rituals. On the same note, sea traveling Trobriander males also go with items for exchange that are different from the Kula work. Item circulation might entail taking items that are in excess in one region to another locality w here they do not exist at all. The circulation can be for something that is unavailable plus helps bring different as well as necessary items into the people of Trobriand Islands. Lees (2011) argues that a gift is a primary component used to invest in the social relations. However, kinship relationships in the Trobriand Islands appear to be a bit pronounced by their unique products. For instance, cooked 'taro' is presented between brother plus sister, skirts and banana leaves presented to women of diverse matrilines and uncooked small yams presented between the wifes brother and her sisters husband. According to Weiner (1988) bundles of dried banana leaves, long yams, plus strings of polished red shell discs all hold a deep plus meaningful place in the life of Trobriand Islands people. Food, pigs plus trade store items can be exchanged for dried banana leaves despite the fact that women make wealth out of them (Weiner, 1988). The presentation of yams occurs on a different avenue of great significance among the Trobriander residents, yet they should be eaten before they go bad. According to Weiner (1988), persons social enhancement starts at the early childhood by gifts that their father bestows upon them and is continued in the entire fathers lineage. However, through growth in associates not from the same matrilineal line, political and social potential grows. In the Trobrianders quest for power as well as personal recognition, there are multiple forces which thwart his efforts. Since social linkage and kinship bind people together, theres also the ability to create alienation, rejection and even death. Besides, their life is a long quest for greater effort to establish as well as circulate gifts and items for social standing plus necessities (Weiner, 1998). To sum it up, the social structure of the Trobriand Islands is hierarchical. This implies that chiefs have total authority, wealth, power and privilege and are served and made rich by the commoners. As its known, a person is born in the area of opportunity, can either obtain goods or lose all of them. Although the community of Trobriand Islands is free of commerce that the western communities have, their ancestry as well as social ties plus laws make a complicated society basing on the exchange of gifts plus commodities. However, theres pressure to be given in respect to whats expected, as well as to match in value in return for whatever might be given. References Eriksen, T. H. (2001). Small Places, Large Issues-: An Introduction to Social and Cultural Anthropolog. Pluto Press. Goode, S., Shailer, G., Wilson, M., Jankowski, J. (2014). Gifting and status in virtual worlds. Journal of Management Information Systems, 31(2), 171-210. Gregory, C. A. (1997). Savage money: the anthropology and politics of commodity exchange (Vol. 21). Taylor Francis. Hann, C. (2006). The gift and reciprocity: perspectives from economic anthropology. Handbook of the economics of giving, altruism and reciprocity, 1, 207-223. Leach, J. W., Leach, E. (1983). The Kula: new perspectives on Massim exchange. CUP Archive. Lee, J. (2011). Kula and relation capital: Rational reinterpretation of primitive gift institution. Rationality and Society, 23(4), 475-512. Malinowski, B. I922. Argonauts of the western Pacific. An account of Native Enterprise and. Mittone, L., Danese, G. (2008). Reciprocity, Exchange and Redistribution: An Experimental Investigation Inspired by Karl Polanyi's' The Economy as Instituted Process'. Munn, N. D. (1992). The fame of Gawa: A symbolic study of value transformation in a Massim (Papua New Guinea) society. Duke University Press. Rus, A. (2008). 'Gift vs. commodity'debate revisited. Anthropological Notebooks, 14(1). Weiner, A. B. (1994). Cultural difference and the density of objects. American Ethnologist, 21(2), 391-403. Weiner, A. B. (1980). Reproduction: a replacement for reciprocity. American Ethnologist, 7(1), 71-85. Weiner, A. B. (1988). The Trobrianders of Papua New Guinea. Wadsworth Publishing Company.

Friday, November 29, 2019

Dispersal of Organisms

Introduction Distribution patterns of organisms vary from organism to organism and they are dependent on various factors such as competition for resources. In this project, we will investigate the spatial distribution patterns of dandelions across an area of 1m2. Dandelions are considered as weeds when they appear on lawns and are reported to grow in almost all parts of the world.Advertising We will write a custom report sample on Dispersal of Organisms specifically for you for only $16.05 $11/page Learn More Some people however, do not mind their growth as they consider them a welcome addition to their plates as a vegetable especially in Asia. There are claims that their leaves and stems have medicinal value and are known to contain a high level of potassium (Himmelman, 2008, p. 25). The scientific name of the dandelion is Taraxacum officinale. Dandelion plants produce asexually; each plant produces seeds with no pollination and they eventually grow int o an identical plant as the parent plant. They are tap rooted weeds that grow in areas with temperate climate all over the world. It produces yellow flowers that stay open during the day and close down at night. The flower sprouts from a stem that is 2-15cm elevated from the main plant. Each plant may produce several flowers at a time. A full grown flower turns into a clock that holds numerous numbers of the fruits referred to as achenes. Each fruit (achene) has ‘hairs’ attached to it. This is to enable wind to carry each achene to far locations where it grows into a new dandelion. In this project, we will look at two types of dandelions, the tall dandelions and the short dandelions. The tall dandelions have flowers with a stem as long as 17 inches and their leaves are 14 inches. The short dandelions have 8 inch flowers and 5 inch leaves. The tall dandelions grow in places with tall vegetation. They grow longer to enable them to access adequate sunlight (Himmelman, 2008 , p. 13). Dandelions grow almost anywhere as long as there is good soil which is frequently wet. They however are known to grow more amongst grass, tall or short. In well maintained lawns, they are considered as weeds. In this project, i chose a grass lawn that had been neglected for a couple of months. The grass as expected had overgrown but the growth was irregular. Some patches had long grass while some had short grass. There were also other types of weeds that had grown. I chose dandelions because they were more than any other weeds present on the lawn and they were easy to spot due to their yellow flowers (Himmelman, 2008, p. 18).Advertising Looking for report on biology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Method First, I divided the 1m2 lawn into four equal portions, each having an area of a quarter square meters (Thomas Robert, 2008, p. 188). Measuring was required to ensure that the four portions were equal in size. This was accomplished by the help of a tape measure. First, the outline of the lawn was measured to ensure that it is exactly 1m2. The boundaries marking the outline of the 1m2 lawn were marked. A half a meter was measured on each side and the half meter mark was noted. The lawn was then divided using the half meter markings on each side to produce 4 portions, a quarter meter squared each. The distinction between the four portions was done using thin poles that were erected around each portion. For easier identification of the boundaries, a white coloured strip of cloth was tied at the top of each pole. This was to ensure that the boundaries can be clearly seen even from a distance. This whole process of dividing the lawn was done carefully so as not to step or bend any dandelions on the lawn as this could change the results. The distribution of dandelions on each potion of the lawn was then observed. The observation process was not difficult as the dandelions were easily spotted by the ir bright yellow flowers and the distribution was easily notable. The exact number of dandelions on each portion was not obtained due to the large numbers of dandelions on the lawn. While at the lawn, the wind direction was noted since dandelion seeds are dispersed by wind, the direction could be a factor in the distribution pattern of the dandelions (Thomas Robert, 2008, p. 188). Results The dandelions, as mentioned above were easily spotted. A diagram showing their patterns of spatial distribution was drawn. In the diagram, the position of the dots represents the position of the dandelions. Since this project is investigating two types of dandelions, red dots will indicate the location of the tall dandelions and black dots will indicate the position of the short dandelions. As shown above, the dandelions were scattered randomly across the four portions of the lawn. The tall dandelions, represented by the red dots are seen to grow clustered around one point unlike the short dande lions. The short dandelions are the majority on this lawn. The arrow on the compass represents the general wind direction in the area where the lawn is located. The winds in this are is generally not strong wind, just a gentle breeze.Advertising We will write a custom report sample on Dispersal of Organisms specifically for you for only $16.05 $11/page Learn More Discussion From the results above, the distribution pattern of dandelions on this lawn is random. This conclusion is drawn because the dandelions are irregularly distributed all over the lawn. It is seem that the bottom left portion of the lawn had the lowest number of dandelions. This can be explained by the general wind direction in this area. Since the wind blows in the North East direction, when the seeds of the dandelions are dispersed, most of them land on the portions further into the direction of the wind. It is seen that the top right portion of the lawn has the most dandelions plants; since it is further into the direction of the wind, a larger share of the seeds are dispersed to this portion (Thomas Robert, 2008, p. 186). As discussed earlier, the long dandelions grow taller in response to competition for sunlight with other plants. The long grass on this lawn had grown irregularly. This explains why the long dandelion plants only grew in certain places and not others. The places where the long dandelions were found are the places where the grass had grown longer and there was need for the dandelion plants to grow taller so as to access adequate sunlight (Thomas Robert, 2008, p. 188). 1m2 was the most adequate size of lawn for this project and dandelions were the most appropriate plant. Dandelions grow very fast and within a short period, they can fill an entire location. They are easy to spot due to their bright yellow flowers. Investigation on a larger lawn size (larger than 1m2) would have been difficult especially in the partitioning of the land into port ions. However, the results obtained would have not been altered no matter what size of lawn was used. The pattern of distribution of dandelions is dependent on the wind direction for the dispersal of seeds and the kind of vegetation around the dandelion determines the size of the dandelion, either short or tall. References Himmelman, J., (2008).  A Dandelion’s Life: Nature Upclose. New York, NY: Children’s Press. Thomas, M. S., Robert, L. S. (2008).  Elements of Ecology. San Francisco, CA: Pearson Benjamin Cummings.Advertising Looking for report on biology? Let's see if we can help you! Get your first paper with 15% OFF Learn More This report on Dispersal of Organisms was written and submitted by user Chaya Webster to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Covert intervention as a moral problem Essays

Covert intervention as a moral problem Essays Covert intervention as a moral problem Essay Covert intervention as a moral problem Essay The CIA has been greatly involved in the aggregation of intelligence every bit good as being engaged in covert action for the benefit of the United States. Harmonizing to the 1991 Intelligence Authorization Act covert action is merely described as a peculiar activity of the authorities of the United provinces that is meant to act upon. economical. political. or military state of affairss in the universe. in that the function of the United States will non be acknowledged by many or publically. Under covert action. the exact purposes or the grounds behind the actions are non known by the foreign states therefore secretiveness is the chief constituent of covert actions. Covert actions and the function of the CIA Covert actions merely involves activities that include back uping political parties. covert propaganda. private groups. economic operations and even persons through advice or subsidisation with an purpose of back uping or subverting the bing government in a foreign state. There is a difference between covert actions and cloak-and-dagger aggregation attempts whereby the covert actions are chiefly designed for act uponing conditions in foreign states while the clandestine attempts are aimed at supplying the intelligence community of the United States with information that can be used in planing the covert actions. The CIA is the organic structure that is responsible for the intent of obtaining intelligence and supplying policymakers with relevant information for the intent of planing covert actions on foreign states. Apart from being the supplier of the intelligence information to policymakers. the CIA is besides the same organic structure that is engaged in transporting out the covert actions every bit good as reding policymakers with respect to the intelligence they have gathered. The CIA as an intelligence organic structure that is besides involved in transporting out the covert action in foreign states ever strives to construct and keep its repute both in the eyes of the United States citizens and foreign states. To be able to keep its repute and set itself as an bureau that is committed to functioning the state and its citizens while at the same clip advancing international dealingss. the CIA has to make a via media. The protecting the American citizens and the state at big every bit good as supplying information for other foreign states requires transparence. Under the covert actions and operations. there is a batch of secretiveness and the lone clip information gets to make the populace is when operations have gone rancid. This means that the CIA has an involvement of protecting itself from critics within the populace and avoids incrimination by the populace while at the same clip transporting out its operations. The CIA is besides closely involved with disposal functionaries and policymakers whereby the intelligence from the CIA is questioned and analyzed by the policymakers when doing determinations. However. over the old ages. the CIA has been faced with the challenge of deficiency of committedness on the portion of the policymakers to take clip and read the intelligence provided by the bureau. Alternatively. most policymakers have been keen on intelligence that is related to current hazards. The involuntariness or the inability of policymakers to pass a batch of clip in analysing longer-range issues has been a beginning of defeat. The CIA have the responsibility to supply intelligence as they receive it and besides take portion in covert actions as they are assigned therefore the demand to hold a balance between the two. The CIA has to guarantee that it provides relevant information to policymakers because in the long tally. it is the bureau that is ever blamed when covert actions to non travel as planned. Therefore. the CIA has great involvement in the intelligence and the covert actions that they take portion in since the bureau has to turn out its worth and demonstrate that it performs its responsibilities. Bing the supplier of intelligence and at the same clip the user of the intelligence requires a batch of unity to guarantee that there is no biasness whereby the CIA provide information that it is cognizant will work in its favour. As a manner of guaranting that the covert actions that the carry out and acquire involved in are successful to construct their image in the eyes of the populace. the CIA may be given to pull strings the information and intelligence they provide to policymakers. It is rather hard to be certain with the sort of intelligence that the CIA provides to the policymakers as non being biased due to the ground that they are the same users of the information that they have gathered. The CIA as an intelligence bureau and one that is held in high repute would non desire the public image that they have built get ruined by the sort of intelligence and covert actions they undertake. Therefore. based on the ground that the CIA is the supplier and user of the intelligence they gather every bit good as the purpose of protecting the bureau from bad public image and repute. it can be said that there is a struggle of involvement. Furthermore. based on the issue that the intelligence the CIA gathers is provided to policy shapers and in most occasions the policymakers do non take their clip in reading and analysing intelligence that is set for longer-use. the CIA has to guarantee that the information they provide to the policymakers would non compromise the bureau. Therefore. it can besides be said that there is struggle of involvement whereby the CIA. the supplier and user of intelligence. has to guarantee that policymakers to non do incorrect determinations that will compromise the bureau. The CIA besides has the authorization of advancing democracy both locally and internationally but this is non the instance with the intelligence gathered every bit good as the covert actions they undertake. There is a batch of secretiveness whereby the populace is left out on covert actions issues and intelligence hence it can be said that the CIA is practising dual criterions. Democracy requires people to be good informed. something that is non the instance with respect to the covert actions and intelligence gathered by CIA. Decision The CIA has greater responsibility of protecting the populace. the United States authorities and its involvement while at the same clip keeping a reputable public image both locally and internationally. There are times when the CIA has to supply some intelligence in certain state of affairss while at times it has to avoid allowing the populace know of what is traveling on based on the ground that the image of the bureau may be destroyed in instance the covert actions do non travel as planned and no positive consequences achieved. Therefore. the CIA. apart from being an intelligence bureau that provides intelligence and gets involved in covert actions. has the responsibility of protecting itself from the populace. both locally and internationally. This could ensue in biasness in the sort of intelligence that it provides to policymakers every bit good as how it carries out the covert actions. hence struggle of involvement. Mentions Beitz. Charles R. Covert intercession as a moral job. Ethics A ; International Affairs 3. no. 1 ( 1989 ) : 45-60. Berger III. Joseph B. Covert Action: Title 10. Entitle 50. and the Chain of Command. JFQ: Joint Force Quarterly no. 67 ( 2012 4th Quarter 2012 ) : 32-39. By Bill Gertz. The Washington Times. Military. CIA shun 9/11 panel on covert operations. Washington Times. The ( DC ) ( September 9. 2011 ) : 1. Regional Business News Jeffreys-Jones. Rhodri. Covert Action in the Cold War: United states Policy. Intelligence. and CIA Operations. Journal of American History 97. no. 4 ( 2011 ) : 1173-1174. Little. Douglas. Mission Impossible: The CIA and the Cult of Covert Action in the Middle East. Diplomatic History 28. no. 5 ( November 2004 ) : 663-701 Meyer. Joel T. Supervising The Pentagon: Covert Action And Traditional Military Activities In The War On Terror. Administrative Law Review 59. no. 2 ( Spring2007 2007 ) : 463-478. Prouty. L. Fletcher. The secret squad: the CIA and its Alliess in control of the United States and the universe. Skyhorse Publishing Inc. . 2011. Beginning papers

Thursday, November 21, 2019

E COMMERCE LAW Coursework Example | Topics and Well Written Essays - 2250 words

E COMMERCE LAW - Coursework Example Pp. 194) Section 5 of the English Civil Evidence Act of 1995 stipulates instances when electronic evidence is admissible. It states â€Å"in a civil suit, a statement, which is obtained from a document generated by a computer, shall be considered as evidence of any facts contained therein of which direct oral evidence would carry much weight, if it was shown that some conditions are met in relation to the statement and computer under consideration†. Subsection 2 gives the conditions that are to be satisfied (Friedman, 2005. Pp. 63). One of the conditions to be satisfied is that the document having the statement has had to be produced during times over which the computer was used to store the information for the purposes of the tasks that are frequently carried on over that time by an individual or a corporate body. Another condition is that, over time, there was regular supply to the computer, information that is similar of the kind found in the statement or of the type from which the content is derived. Additionally, and throughout the material time, the computer must have been in proper operation, or if not, that its in-operation at the time was incapable of affecting the production of the article or the accuracy of what is contained in the document. The last condition stipulates that the information that is contained in the statement is derived from the data supplied to the pc in the ordinary cause of those activities (Hedley, 2006. Pp. 22). The best evidence rule provides that he who wants to produce evidence in a court of law must Endeavour to give the court the original evidence or the best evidence to assist the court to come up with the best legal conclusion. In Garton vs. Hunter (1969) and Springsteen vs. Masquerade Music Limited (2001) EWCA Civil case number 563, both Lord Denning and Parker LJ agree that the best evidence rule of admissibility has been overtaken by time. Parker LJ in his judgment points out that the

Wednesday, November 20, 2019

Entrepreneurship Assignment Example | Topics and Well Written Essays - 2000 words - 1

Entrepreneurship - Assignment Example Though they constitute a major element of the countries growth, very little was done for their growth and development in the past. It is a common misconception that unemployed people call themselves entrepreneurs. But, in reality they provide several basic services necessary for huge corporate companies as well as the local public. The government has started to realize their importance only in the recent days. Government encourages the small and medium level entrepreneurs to get rated because they believe the sole aim of encouraging entrepreneurship is job creation and economic growth. Several steps to improve them are taken from offering them easy loans to giving them subsidies to improve their infrastructure. The major obstacle faced by the SMEs are their inability to garner funds when they are in dire need. Getting a good credit rating will help them demand the finance they require from various agencies with confidence. But, there is little awareness regarding the process and its importance among the entrepreneurs. Credit rating is basically a system which statistically determines a person or businesses ability to pay back the money borrowed. The credit ratings are offered by three financial bureaus Equifax, TransUnion and Experian in the U.S. Their rating for each business might differ slightly. An American citizen is entitled to get a free credit report once in every 12 month from these bureaus. But, they should pay a minimal fee of $7.95 to get a detailed credit rating. An alternate way is to use software like FICO to get the credit rating. People applying for the report will usually get it within 30 to 45 days of application. They bureau takes into account certain features like credit repayment history, current debts and time taken to pay back the previous credits, the frequency of getting credits and the credit type to create the credit

Monday, November 18, 2019

Involvement and Young Adults Sexual Health Knowledge Article

Involvement and Young Adults Sexual Health Knowledge - Article Example Particular emphasis has been placed on social media artifacts because they are so heavily used by adolescents and young adults. In addition, individuals within this age group receive a large amount of their information from such sources. Prior to this study, researchers viewed the social media as negatively impacting the sexual decisions of young adults. Although there is the valid support for this supposition, the authors of this article suggest there may also be some positive effects of social media artifacts on this population. These effects include educating young adults about sexually transmitted diseases and offering the possible outcomes of premarital sex. Pointedly, the authors state that the majority of earlier research concentrated solely on the television as the primary source of information—there was no focus on magazines. Due to the broad range of sexual topics discussed in modern day magazines that are read by young adults, researchers postulate that these magazines may assist young adults with making decisions about sex such as discussing contraception options with a partner or choosing to refrain from sexual activity until marriage. Consequently, it can be correlated that an increase in magazi ne reading may lead to an increase in condom/contraceptive and more positive decisions concerning sexual health. Therefore, this article aims at understanding how magazines serve as constructive sources of information and enable young adults to make informed decisions about their sexual health. Throughout Studies 1 and 2, the authors hypothesized that â€Å"because of the coverage of sexual health issues in magazines †¦ reading certain genres of magazines (women’s lifestyle, teen, and men’s lifestyle) would be positively correlated with sexual health knowledge, safe-sex self-efficacy, safe-sex intentions, and contraceptive use† (p. 287).

Saturday, November 16, 2019

Operations Strategy with focus on Growth

Operations Strategy with focus on Growth Briefly describe your understanding of the concept of Operations Strategy, its importance and its min constructs. Huge number of companies asserted that operations strategy is one of the best approaches to differentiate themselves from their competitors. Waller [5] asserted that the strategic which should relate to operations performance object is important of its operations and supply chain. Hill [4] also suggested that strategy include the perspective of both direction and implementation. Operation strategy is a long term plan which is designed to achieve its desired objectives [5]. Chase et al. [3] claimed that operations strategy is to plan a wide and complete guidelines or approaches which is the best support for companies long term goal. Chase et al. [3] also mention four levels of perspective in operations strategy including learning and growth, internal, customer and financial perspective. Slack et al. [2] addressed that operations strategy is the pattern of decisions and actions that shapes the long term vision, objective and capabilities of the operation and its contribution to overall strategy. Slack et al. [6] also point out that operations strategy should concerns four perspectives as following: (1) Top down Operation strategy is a top down reflection of what the business wants to do. (2) Bottom up Operation strategy is a bottom up activity where operations improvements cumulatively build strategy. (3) Market requirements Operations strategy involves translating market requirement into operations decisions. (4) Capabilities of operations resources Operation strategy involves exploiting the capabilities of operations resources in chosen markets. According to above, it can be concluded that operations strategy which is the way in which operations resources are developed over the long term to create sustainable competitive advantage for the business concerns investments and developments to support the order winners and qualifiers (such as on time delivery, quality conformance and price) for which it has both individual and cooperative responsibility. 2. What do you consider to be the main operations performance objectives in the context of Yo!Sushi? How these objectives reflect the structure and expectations of the companys market? How do you assess the relative importance of these objectives? Answer: An operations strategy should define operations performance objectives which will adds value for customers and contributes to competitiveness by being able to satisfy the requirements of its customers. Slack et al. [2] suggested that there are five aspects of operations performance, all of which to a greater or lesser extent will affect customer satisfaction and business competitiveness. (1) Quality: doing things right. (2) Speed: doing things fast. (3) Dependability: doing things on time. (4) Flexibility: changing what you do or how you do it. (5) Cost: doing things cheaply. Chase et al. [3] also claimed that the major competitive dimensions that form the competitive position of a company include the following: (1) Cost: make it cheap. (2) Product quality and Reliability: make it good. (3) Delivery speed: make it fast. (4) Delivery reliability: deliver it when promised. (5) Coping with changes in demand: change its volume. (6) Flexibility and new product introduction speed: change it. (7) Other product specific criteria: support it. According to above, the main operations performance objectives in the context of Yo!Sushi are quality( food and service), speed, flexibility and cost. (1) Quality Quality is very important index or part in the restaurant industry. According to the article, firstly, the quality of food must manage and control vey carefully including food standards and hygiene. Secondly, the quality of service also is a vital fact which not only relates to the person to person interaction, but also to the general cleanliness of the restaurant. In addition, in order to improve service quality, Yo!Sushi use questionnaires to make some communication and feedback from their customers. It not only let them understand their drawbacks but also found a way to make the customer a repeat visitor in the future. (2) Speed With regard to speed, food stock management is a very important part which is related to it. On one hand, if the food has sold off the belt, the same item of food will to be filled in shortly. On the other hand, if the food has not been sold off the belt in two hours, it must be discarded. To achieve the performance objective of speed not only ensure fresh of food, but also improve the restaurants service quality. (3) Flexibility Customers who want to see a variety of dishes displayed need some different and special menus to make them returning. Variety dishes include seasonal menus and meal promotions which can encourage customers expecting. (4) Cost How to make a reasonable rang of price for their food is also a critical object in Yo!Sushi. According to the article, the author mentioned that there are three different level customer groups including symbols of success, urban intelligence and welfare borderline have been eaten in the restaurant. Because of this, how to set price of meals are a vital issue in their business. There are four structure and expectations of companys market. First of all, to achieve the object of quality can create a chance of customers returning. Secondly, to achieve the object of speed not only ensure fresh of food, but also improve the restaurants service quality. Thirdly, to achieve the object of flexibility could encourage customers motivation to taste special and also make them returning. Lastly, to achieve the object of cost could create much business in many different level customers. It can be concluded from above, different operations will have different views of what each of the performance objectives actually means. In other words, the relative importance of four performance objectives above which can provide competitive advantages depends on how the business competes in its market. 3. What do you see to be the most important challenge for the company and its director? Answer: According to the article, the most important challenge for the company is how to motivate the virgin category customers and how to create the best chances of this customer returning. Virgin customers who mean the people who have not been to the restaurant before will not know how the conveyer belt system works and how to order different Japanese dishes. We can also see from the article that the most important challenge for the companys director is how to get right performance measures of the restaurants. In the article, Robin asserted that given the right set of metrics not only encourage managers performance but also servers performance outperform their current roles. There are also two main reasons why the companys director should to get right performance measures. Firstly, it will bring free up cash to invest in new opening. This reason is refer to CEOs objective which is to have over 100 restaurants open at 2011.Secondly, it will keep companys loyal band of lovers coming back for more. This reason is a vital strategy which make company sustainable operations. It can be concluded from above that if the company can motivate the virgin category customers and make them returning, it will bring much benefits for the company; if the companys director could to get right performance measures of the restaurants, it not only bring free up cash to invest in new opening but also keep companys loyal band of lovers coming back for more in the future. 4. How the identified performance objectives would impact the companys resources and processes (quality, capacity and planning)? And what your suggestions would be to the CEO in selecting measures of performance to improve the restaurants position? Compare your answer with what may be the current approach and solutions of the companys management. Answer: According to the figure1 above, Slack et al. [1] claimed that the market requirement and the operations resource perspectives on operations strategy represent two sides of a strategic equation that all operations managers have to reconcile. According to the figure2 above, Slack et al. [2] also asserted that building operations capabilities means understanding the existing resources and processes within the operation. Different product groups require different performance objective which might related to their position. In case of Yo!Sushi, quality and flexibility are the most important performance objective which should be measured more carefully. First of all, food quality and service quality are a vital index related to customers satisfaction which not only improve restaurants position but also create brand loyalty of their customers. In addition, the flexibility of food is also approach to attract customers successful. In order to identify my suggestion of performance measure, I will compare with another food restaurant called Burger king which is also set some performance objective to make their business excellent. (1) Quality Burger king not only proud the quality of its food but also focus more on their service quality [1]. Compare with Yo!Sushi, quality of food and service are an important points of its business. (2) Speed of service This is a main different between Burger king and Yo!Sushi. Burger king is type of fast food which is important in its speed of service, especially take away. Whereas, more customers of Yo!Sushi choose eat in which more focus on enjoy the process of meal than speed. (3) Flexibility Flexibility is another vital index in restaurant industry. Both Burger king and Yo!Sushi are attach importance to it. Variety meals can attract customers more success than unchanged meals. (4) Cost Burger king is not very cheapest in the fast food market [1]. As a result, how to make a reasonable rang of price which can bring more wide rang customer groups for their business is also a critical object in Burger king and Yo!Sushi. Whilst, using raw materials more effectively and avoid excessive wastage are also a method to decrease its operation cost. 5. How do you describe Yo!Sushis position in the market and the state of their operations and performance, and how do you relate it with the operations strategy the company has adopted and implemented? Answer: An operations strategy should identify the broad decisions that will help the operation achieve its objectives [2]. In general, Yo!Sushis position in the market and the state of their operations and performance are good. First of all, Yo!Sushi very care about their quality of food and service because they know it is a critical fact in restaurant industry and service industry. Secondly, in order to make variety dishes, Yo!Sushi create seasonal menus and meal promotions to encourage their customers returning. Thirdly, Yo!Sushi control their food stock management very well which related to services quality. Fourthly, in order to run their business well and improve their brand visibility, Yo!Sushi choose open restaurants in marketplace. Location selection of Yo!Sushi is also a very vital decision in their operation strategy. Fifthly, Yo!Sushi franchise the concept to overseas partners which makes Yo!Sushi from small company to multinational company. Sixthly, Yo!Sushi use questionnaire to measure restaurants performance and communicate with their customers. It not only acquires some advice from their customers, but also let them make a reasonable measure of performance. Lastly, Yo!Sushi create a new dining experience which include informal, edge and self-paced quick service eatery. In summary, it is clear that the operations strategy of Yo!Sushi is very successful. It not only reflects the businesss market requirements, but also achieve companys performance objective.