Monday, August 24, 2020
Portfolio Analysis Essay Example | Topics and Well Written Essays - 1250 words - 1
Portfolio Analysis - Essay Example The medical clinic is perceived for a few administrations including Geriatrics, ladies administrations, crisis administrations, plastic medical procedure, substance misuse, vascular medical procedure, wandering medical procedure and Oncology (Sultz, 2008). This paper is going to do a portfolio examination of a portion of the items and administrations in Johns Hopkins Hospital with an end goal to measure the market position of the emergency clinic according to its offer market and furthermore decide the administration and items rate development. Productive worries in the clinic show that portfolio examinations are better appropriate when portfolio frameworks are utilized as they put into thought benefit measurements. Such beneficial measurements are estimated as far as low or high gainfulness according to either negative or positive progression of money or contributed capital returns (Sultz, 2008). Portfolio Analysis Portfolio Analysis arrange items and administrations of an associati on into a few classifications with the assistance of realistic network in order to draw out the distinctions among administrations and results of specific association comparable to their development rate in the market and the piece of the overall industry relativity. The classifications incorporate; stars, issue youngsters and kids and money dairy animals. Piece of the overall industry relativity in this examination is seen similar to the piece of the overall industry involved by the greatest adversary of an association in correlation with the piece of the pie of different associations that fall under a similar classification of administrations and items. To decide the development rate, the adjustments in net patient administrations levels of income are estimated or on occasion the administration or populace development. The characterization is as far as low, high and medium and this is reached at by looking at the figures of such administrations and items to those of the national m edicinal services development, elective ventures and prime rates (McMillan, 2011). Stars The administrations and items offered by the Hospital which fall under this class incorporate; Geriatrics, oncology and ladies' administrations. These administrations are under this class since they have demonstrated to have a market development that is high just as high pieces of the pie. The benefits acknowledged from such administrations are additionally high. These are items and administrations that Johns Hopkins Hospital takes advantage of and increases a great deal from by and large. Be that as it may, because of the administrations and items being exceptionally gainful, most contending emergency clinics have made due with similar administrations. Such rivalries put the emergency clinic in a circumstance where it needs to rehearse forceful improvement on these administrations and create them now and again (McMillan, 2011). This now and again represents a test because of the troubles in adv ertise advancement considering the previously existing piece of the overall industry which is exceptionally high. This places the medical clinic in another circumstance where it needs to look for extra systems, for example, related expansion and vertical mix. Consequently Geriatrics, oncology and ladies' administrations happen to be the most beneficial help and items offered by the clinic yet at the same time offer various difficulties. These items stand apart as speaking to the hospitalââ¬â¢s best open doors over the long haul for picking up benefits and development (Emge, 1982). Issue Children Serves offered by these clinic and fall under this classification incorporate Ambulatory Surgery, crisis administrations and neurosurgery. These administrations fit the bill to be in this classification as they possess piece of the pie places that are moderately low yet at the same time figure out how to contend in business sectors whose developments are high. Such administrations put the emergency clinic
Saturday, August 22, 2020
The Controversy of college students use Ritalin and Adderal Research Paper
The Controversy of understudies use Ritalin and Adderal - Research Paper Example The examination builds up the dangers of utilizing Ritalin and Adderall illicitly and prescribes the foundation of severe laws to restrict the unlawful procurement and utilization of physician endorsed tranquilizes in schools. Proposition: The Ritalin and Adderall are the physician recommended drugs with the prescript. Despite the fact that it can assist understudy with concentrating on considering and get a passing mark, it brings the dangers of utilizing that illicitly. The approach creator should pass new rigid gauges to restrain getting those ADHD medicates in grounds and forestall utilizing those medications unlawfully. In the ongoing past, the pace of utilizing Ritalin and Adderall sedates inside universities has expanded impressively causing a wide research about the potential impacts of these medications. Despite the fact that there are some secondary school understudies utilize the Ritalin and Adderall for their scholarly, the nonmedical utilization of those remedy energizers is progressively widespread in school. As per the aftereffect of the examination ââ¬Å"Non-clinical utilization of solution energizers among US school studentâ⬠, 4.1% to 10.8% of undergrads were accounted for that utilizing remedy energizer restlessly during 2012. Despite the fact that the medications might be valuable while used to improve the evaluations of students inside the learning condition, particularly for understudies with the consideration shortage hyperactivity issue (ADHD), unmistakably these medications can be mishandled inside the open space consequently have negative outcomes (Partridge, Bell, Lucke and Hall, 2013). The way that these medications are presently accessible outside the wellbeing offices makes it a major test to control their maltreatment inside the general population. The Ritalin and Adderall are professionally prescribed medications with the prescript. Despite the fact that it can assist understudy with concentrating on concentrating to show signs of improvement grade, there is the danger of utilizing the medications unlawfully. Ritalin and Adderall are psycho-energizer sedates that are usually managed to individuals with the
Saturday, July 18, 2020
Book Riots Deals of the Day for October 23rd, 2019
Book Riotâs Deals of the Day for October 23rd, 2019 Sponsored by Twice in a Blue Moon by Christina Lauren, perfect for fans of Jennifer Weiner and Emily Giffin. These deals were active as of this writing, but may expire soon, so get them while theyâre hot! Todays Featured Deals Spinning Silver by Naomi Novik for $2.99. Get it here, or just click on the cover image below. Intercepted by Alexa Martin for $2.99. Get it here, or just click on the cover image below. The Ladys Guide to Celestial Mechanics by Olivia Waite for $3.99. Get it here, or just click on the cover image below. Mrs. Martins Incomparable Adventure by Courtney Milan for $2.99. Get it here, or just click on the cover image below. In Case You Missed Yesterdays Most Popular Deals Toil and Trouble: 15 Tales of Women and Witchcraft edited by Tess Sharpe and Jessica Spotswood for $1.99. Get it here, or just click on the cover image below. Complete Stories of Clarice Lispector by Clarice Lispector, translated by Benjamin Moser and Katrina Dodson for $2.99. Get it here, or just click on the cover image below. Previous Daily Deals That Are Still Active As Of This Writing (Get em While Theyre hot!): Hearts Unbroken by Cynthia Leitich Smith for $2.99 Devotion by Dani Shapiro for $1.99 Ruhlmans Twenty by Michael Ruhlman for $2.99 Ten by Gretchen McNeil for $1.99 Revenge by Yoko Ogawa, translated by Stephen Snyder for $2.99 White Rabbit by Caleb Roehrig for $2.99 Coraline Graphic Novel by Neil Gaiman and adapted by P. Craig Russell for $1.99 The Bone Houses by Emily Lloyd-Jones for $2.99 Cross Her Heart by Sarah Pinborough for $1.99 Deerskin by Robin McKinleye for $1.99 Inspector Singh Investigates: A Curious Indian Cadaver by Shamini Flints for $3.99 Meddling and Murder: An Aunty Lee Mystery by Ovidia Yu for $2.99 Halloween Party: A Hercule Poirot Mystery by Agatha Christie for $1.99 Whatever Happened to Interracial Love? by Kathleen Collins for $3.99 The Angels Game (The Cemetery of Forgotten Book 2) by Carlos Ruiz Zafon, translated by Lucia Graves for $2.99 The Once and Future King by T. H. White for $1.99 Destinys Captive by Beverly Jenkins for $1.99 A Brief History of Seven Killings by Marlon James for $1.99 The Four Agreements: A Practical Guide to Personal Freedom by Don Miguel Ruiz for $1.68 The Devilâs Star by Jo Nesbø for $1.99 The Collectorâs Apprentice by B. A. Shapiro for $1.99 The Friend by Sigrid Nunez for $1.99 Dare to Love a Duke by Eva Leigh for $1.99 Prime Meridian by Silvia Moreno-Garcia for $3.99 The Science of Discworld by Terry Pratchett, Ian Stewart and Jack Cohen for $2.99 The Walls Around Us by Nova Red Suma for $1.99 Foe: A Novel by Iain Reid for $1.99 Quiet: The Power of Introverts in a World That Cant Stop Talking by Susan Cain for $2.99 Silver Phoenix by Cindy Pon for $2.99 City of Bones by Martha Wells for $2.99 Dr. Strange Beard by Penny Reid for $1.99 Under the Knife by Tess Gerritsen for $2.99 Antelope Woman by Louise Erdrich for $1.99 Borne by Jeff VanderMeer for $2.99 The Betel Nut Tree Mystery by Ovidia Yu for $3.99 Plenty by Yotam Ottolenghi for $2.99 Confessions of a Funeral Director by Caleb Wilde for $1.99 The Secrets Between Us by Thrity Umrigar for $1.99 The Iron King by Julie Kagawa for $3.99 A Dead Djinn in Cairo by P. Djèlà Clark for $0.99 The Star-Touched Queen by Roshani Chokshi for $2.99 Odd One Out by Nic Stone for $1.99 The Dark Descent of Elizabeth Frankenstein by Kiersten White for $1.99 The Ascent to Godhood (The Tensorate Series Book 4) by JY Yang for $3.99 Dear Martin by Nic Stone for $1.99 Glutton for Pleasure by Alisha Rai for $3.99 The Frangipani Tree Mystery by Ovidia Yu for $3.99 The Female Persuasion by Meg Wolitzer for $1.99 Labyrinth Lost by Zoraida Cordova for $3.82 The Gurkha and the Lord of Tuesday by Saad Z. Hossain for $3.99 The Black Tides of Heaven (The Tensorate Series Book 1) by JY Yang for $3.99 Let it Shine by Alyssa Cole for $2.99 The Banished of Muirwood for $3.99 Let Us Dream by Alyssa Cole for $2.99 A Curious Beginning (A Veronica Speedwell Mystery Book 1) by Deanna Raybourn for $2.99 Romancing the Duke: Castles Ever After by Tessa Dare for $2.99 The Murders of Molly Southbourne by Tade Thompson for $3.99 Feel Free by Zadie Smith for $3.99 Mapping the Interior by Stephen Graham Jones for $3.99 Shuri (2018 #1) by Nnedi Okorafor for $1.99 The Only Harmless Great Thing by Brooke Bolander for $1.99 The Black Gods Drums by P. Djèlà Clark for $1.99 Gods, Monsters, and the Lucky Peach by Kelly Robson for $1.99 My Soul to Keep by Tananarive Due for $0.99 All Systems Red: The Murderbot Diaries by Martha Wells for $3.99 Jade City by Fonda Lee for $2.99 Silver in the Wood by Emily Tesh for $3.99 Storm Front by Jim Butcher (Book One of the Dresden Files) for $2.99 Guapa by Saleem Haddad for $1.99 Sign up for our Book Deals newsletter and get up to 80% off books you actually want to read.
Thursday, May 21, 2020
Should there be more or less government regulation - Free Essay Example
Sample details Pages: 7 Words: 2162 Downloads: 6 Date added: 2017/06/26 Category Law Essay Type Analytical essay Tags: Government Essay Did you like this example? Topic à ¢Ã¢â ¬Ã¢â¬Å" Corporate Responsibility: Should there be more or less government regulation? With over 1 million businesses operating in Canada, corporate responsibility is a major issue that should be recognized by citizens within society. In simple terms, corporate responsibility is the ethics and morals of a business. Many corporations in Canada have a tremendous amount of wealth and power. Regulation is essential in order for good government. Corporate responsibility occurs when initiatives taken by these corporations benefit all the stakeholders. These stakeholders vary from the employees, to the customer, and to the community. Corporate responsibility is necessary in Canada in order to secure its democracy, protection of consumers, and sustainability of our society. Therefore, it is important that Canada has a tight leash on corporations and effective regulations are in place. Lobbying is just one aspect citizens must be aware of. Also, more and more Canadians suffer from precarious employment which implies they have fewer labour protections than others who have stable employment. Additionally, through various acts of parliament pertaining to the environment, corporations are less constrained by regulations. It is important for Canadian citizens to know how these corporate giants are using their power and how they can still fight for their democratic rights. No citizen should be being more outweighed than corporations, because they are just à ¢Ã¢â ¬Ã
âcorporate citizensà ¢Ã¢â ¬Ã themselves. Lobbyists have a very powerful influence on government policies. Canada is still allowing Corporations to send lobbyist to influence government decisions and polices which endanger the democratic status Canada has. Canadian citizens should be having the most influential impact on our government. Teeple stated that, Lobbying politicians may well be an accepted apart of our democracy, but to describe it as à ¢Ã¢â ¬ÃÅ" necessaryà ¢Ã¢â ¬Ã¢â ¢ stretches the point. Endorsing the role of professional lobby firms implies acceptance of the notion that those with money and insider knowledge are entitled to superior access to government and policy decisions (Teeple). If citizens need an intermediary of a lobbyist to get the attention of Ottawa, then we have no real democracy. Governments are following lobbyistsà ¢Ã¢â ¬Ã¢â ¢ impulses rather than pursing the common good, which larger democracies are unable to allow a sufficient number of their citizens to have his or her voices heard. This is antidemocratic and causing only an individualsà ¢Ã¢â ¬Ã¢â ¢ pursuit of their own desires which leads to self-centredness and conflict. The people with money and connections with parliament should not be the ones having the most say to implement new polices. Arguments may be made that lobbying is acceptable to Canadaà ¢Ã¢â ¬Ã¢â ¢s democracy because pressuring politicians is sometimes crucial in or der to get their attention. However, corporations lobbying in order to only benefit their company and profits and not the citizens and society are not democratically correct. Distorting the truth is a huge problem with corporations and lobbyists. Lobbyist are there to get many important decisions made by officials, rather than elected representatives. Teeple summarized that, à ¢Ã¢â ¬Ã
âLobbyist run any number of efforts, from simply mapping the bureaucracy to assist clients make their own way to the right door, to obtaining access to politicians, to running campaigns to distort the truth in mediaà ¢Ã¢â ¬Ã (Teeple). Citizens have the right to know the truth and how these corporations will be affecting their society. Lobbyists have an overwhelming amount of power. Majority of citizens do not have access to parliament like these lobbyist do. Giving these lobbyist a front-of-the-line pass in unjust. Everyone should have equal power to communicate with parliament and jus t like the rule of law, nobody should be more powerful than another. If majority of citizens do not have this power, corporations should not either. There seems virtually no limit to Stephen Harperà ¢Ã¢â ¬Ã¢â ¢s efforts to diminish the government and democracy in Canada. There seems to be an excessive amount of so-called trade deals, which are really just Corporate Right Deals. Not only is harper busy negotiating them, but corporations like Walmart are in on the action too. However, what about the majority and common good of the people, like jobs? Murray Dobbin is one of Canadaà ¢Ã¢â ¬Ã¢â ¢s most popular progressive political commentators and analysts who explained that, They influence politicians and political parties with huge amounts of cash; they threaten government that dare to consider any laws that lessen their power or privilege; they withdraw capital to punish governments that donà ¢Ã¢â ¬Ã¢â ¢t take them seriously; they spend millions on lobbyist to persua de legislators (Dobbin). Officials are not required to keep formal records of their contracts with lobbyists, and there is some scope for lobbyists to avoid registration by claiming that they are merely responding to requests for information from officials. The government has set up regulations relating to lobbying, but these regulations are not restricting lobbying, it is making it even more legal. Teeple outlined that, The process of registering lobbyists began under the Mulroney government in 1989. The Lobbyists Registration Act essentially puts the onus on lobbyists to register, pay a fee, and list their areas of interest. By its very principles, the Act legitimizes the role of the lobbying industry (Teeple). It has to be emphasized that à ¢Ã¢â ¬Ã
âregistrationà ¢Ã¢â ¬Ã is not à ¢Ã¢â ¬Ã
âregulationà ¢Ã¢â ¬Ã . Allowing lobbyist to enter parliament legitimately eats away at Canadaà ¢Ã¢â ¬Ã¢â ¢s democracy even more. It is a form of corruption, because really it is money that is buying these policies corporations want. If the Rogers Corporation want the liberals to win the next election, why should they be allowed to give them millions of dollars for their political campaign? The government is going in the wrong direction and making lobbying too easy. One successful example of lobbying is Enbridge lobbying the Harper government. It had to deal with the proposal for a 1700 kilometre pipeline that would deliver bitumen. There were many vocal public campaigns going against this proposition as it affected the environment, First Nations, and three levels of government. Harris, a former Liberal member, noted that, I cant imagine a project thats more complex, yet it (Enbridge) was able to convince the federal government, the Conservatives, of its value to the point that the federal government, who puts in place the regulatory process by which projects are independently evaluated (Enbridge) had themshamelessly out theresupp orting the project before their own process was even completed(Harris). The Conservatives even changed the environmental regulations that affect the project. Enbridge was able to take something that is not well liked and actually get a government too literally shamelessly support it as the federal level, all because of lobbyist. There are 16 people registered as working for Enbridge on the lobby registry of British Columbia. Due to changes in the economy and business practices, many citizens have precarious employment. This causes fewer labour protections and even with the Employment Standards Act and labour laws, some citizens within Canada are still being treated unjustly. Barnes noted that, à ¢Ã¢â ¬Ã
âPrecarious employment encompasses forms of work involving limited social benefits and statutory entitlements, job security, low wages, and high risk of ill-healthà ¢Ã¢â ¬Ã (Barnes). The Canadian government should be taking more action in order to protect these at-ri sk workers. Most employees usually do not have the option to be in precarious employment. An example is the Canada Action Plan. This has created many jobs, but majority of them were precarious employment. Construction jobs are becoming a big issue as construction does not last forever. The government is doing the right thing to create jobs, but should be creating stable jobs. Canada is a democratic country and therefore, nobody should truly have an advantage over another. Vosko outlined that, à ¢Ã¢â ¬Ã
âEmployees in these more precarious forms are less likely to receive extended health, dental, pension, and life and/or disability benefits than full-time permanent employeesà ¢Ã¢â ¬Ã (Vosko). The government should be ensuring that all citizens are being treated equally regardless of job type. Some people have to enter precarious employment because it is the only type of jobs available in the economy. Economic efficiency is an issue too. Precarious employment already make less than full-time permanent employees. Then they have added living costs, like dental plans, which are not covered. This lowers their disposable income which causes less money circulating in the economy. Therefore, social costs, like welfare, will increase causing the government to spend even more money which is not efficient. Vosko uses statistics to explain that, An increasing share of jobs are less secure, temporary and contract jobs. Half of the new jobs created since October 2008 have been temporary, and 90 per cent of those are term or contract positions that have increased at ten times the rate of permanent jobs. This direction will continue if governments lay off public servants, contract out services, and increasingly rely on temporary, term and contract employees themselves.à ¢Ã¢â ¬Ã (Vosko) The government is doing the opposite of what they should by doing in order to secure citizens work life. The government should be setting regulations on corporations on how much they can contract out services so majority of the Canadian citizens can benefit. Precarious employees should have access to a community union in order to have a say in their employment rights. The focus of à ¢Ã¢â ¬ÃÅ"Community Unionism: Organising for Fair Employment in Canadaà ¢Ã¢â ¬Ã¢â ¢ is the limited rights and access to traditional vehicles of representation such as unions, due partly to the prohibitive costs and obstacles associated with organising, confronted by workers in precarious employment (Barnes). Having access to a community union will establish a much needed intermediary in order for citizens to be heard. Precarious do not have access to unions because of the cost and organization of one. Governments should be assisting precarious employment in order to achieve long-term stability. Through various acts of parliament pertaining to the environment, corporations are less constrained by regulations. Corporations have lots of power, while som e companies even make more money that provincial governments. Anderson mentioned that, According to Hawken, not only was business and industry the principal instrument of global destruction, it was the only institution large enough, wealthy enough, and pervasive enough to lead humankind out of the mess we were making (Anderson). Many corporations have the wealth and power to be environmentally friendly, but tend not to care. Corporations are going to keep going about their ways if they are not forced to change. An article from CBC News stated that, à ¢Ã¢â ¬Ã
âThe federal environmental directorate à ¢Ã¢â ¬ÃÅ"does not have adequate information on whom it is regulating and who is not complying [with the act]à ¢Ã¢â ¬Ã (Unit). The government regulation in Canada needs to be more specific. There should be penalties on corporations who are not following the regulations. Officials should be looking over these companies to make sure they are not slipping by. Economic efficiency is argued by some and that it would cost millions of dollars to set higher environmental standards. However, if these regulations are not passed onto corporations, the Canadian government is going to be spending even more to repair the damaged environment. Anderson outlined that, Today, an extremely effective shield is in place against vendors sending us things we do not want. We have used this approach to screen out lead, mercury, perfluoronated alkyl substances, and other persistent bioaccumulating toxic substances and chemicals. What has this cost us? Nothing (Anderson). If Canada is able to easily restrict environmental hazards from other countries, Canada should be setting the same restrictions on corporations within Canada. These regulations will not cost the government money, but rather save money. Global warming and environmental damage will have to be fixed by the government if corporations are not forced to act upon the issues. Corporations have the profit s to make the economy and environment sustainable. Governments do not just have to set regulations and restrictions against corporations, but rather help motivate them. Anderson summaries that, Government never seems to lead; it always seems to follow. Not religious institutions, either. Until very recently many churches helped perpetuate the myth that the earth was ours to conquer and subdue, to abuse as we pleased. And sadly, not colleges and universities; they could train the next generation, but we needed action here and now. Who then? (Anderson). If governments are not going to step their foot out and lead, corporations are not going to do anything. The government should not wait until the environmental effects start hurting the Canadian society, because it may be too late to fix, and not to mention, too expensive. A proper democracy, protection of consumers, and sustainability of Canadaà ¢Ã¢â ¬Ã¢â ¢s environment is very important and must be achieved by making sure corporations are following effective regulations in order to demonstrate positive corporate responsibility. Lobbying is something that happens every day within the government walls which is allowing corporations to have a more influential impact on the government then citizens. Additionally, rising precarious employment must be put to an end and citizens should feel secure with useful labour protections. Also, it is important Canada is environmentally friendly by regulating corporations in order to obtain sustainability and efficiency. Money talks in Canada and citizens should be aware of this because it is eating away their democratic rights. Donââ¬â¢t waste time! Our writers will create an original "Should there be more or less government regulation?" essay for you Create order
Wednesday, May 6, 2020
Discuss accounting principles and applications for business and Coursework
Essays on Generally Accepted Accounting Principles and Their Development Coursework The paper "Generally Accepted Accounting Principles and Their Development" is a worthy example of coursework on finance and accounting. Financial accounting information is crucial to everyone interested in maintaining healthy surroundings when it concerns capital. Financial information, therefore, needs guidance. This guidance comes in the form of principles that aid in ensuring this information is legitimate, and up to standards. In this case, Generally Accepted Accounting Principles are preferred. These principles are developed and applied by accountants in everyday dealings to ensure financial information is credited. As a set of widely accepted rules, the GAAP is responsible for overseeing the correct response toward financial information in countless organizations and companies (Bragg, 2011). This paper will examine the GAAP and how they are developed. Also, it will discuss the business entities while comparing and contrasting their characteristics.à à Definition of GAAP and their developmentà à à à à à à à à à à The Generally Accepted Accounting Principles are a set of guidelines that govern the reporting of financial information. This is in many organizations and companies as they offer investors consistency in the reporting and compiling of financial statements (Price, Haddock Farina, 2012). The principles aid in covering revenue recognition, and measures outstanding shares. Through this set of principles, it is easier for financiers and users of financial information, to make recommendations and conclusions based on the information provided.à à à à à à à à à à à During the development of the principle, some stages are involved. In the first stage, the Financial Accounting Standards Board issues a discussion memorandum. FASB is responsible for giving authority to this set of principles. In the next stage, respondents give their sense on the discussion memorandum to the FASB. These respondents include th e SEC, Public Accounting Firms, and the AICPA.à In the third development stage, the governing body issues an exposure draft (Price, Haddock Farina, 2012).à à à à à à à à à à à This draft gives the respondents an avenue to voice their concerns over the proposed guidelines. It is in this stage the respondents offer suggestions to make the principles better, and more efficient. In the next stage, the FASB gets responses from the respondents and other interested parties on the exposure draft. In the last development stage, the governing body offers a statement on the principle (Price, Haddock Farina, 2012). The development of these principles must include discussions to allow for proposals and advice to take place. This is to allow for transparency.Characteristics of the three main business entitiesà à à à à à à à à à à There are three main business entities present today. These are the sole proprietorship, partnership, and corporations . In a sole proprietorship, the trade is owned by a single person. They are bound legally by the entity and are responsible for the debt and tax issues that come with the business. In a partnership, the trade is maintained by two or more individuals bound together by a partnership agreement. They are, thus; responsible for the debt and tax issues that arise from the business. These are shared equally depending on the share each of them brings into the partnership. Corporations are privately or publicly owned businesses. They are separate from their owners and possess the freedom to carry out operations as a single entity (Price, Haddock Farina, 2012).à à à à à à à à à à à In terms of liability, sole proprietors take responsibility for all the risks involved. In a partnership, the partners share the risks jointly as the agreement dictates. Incorporations, stakeholders only face the risk of loss depending on the amount of capital they invest. Ending the busines s may be the death of the sole proprietor of the business, or as a personal decision. In a partnership, the demise of a partner may lead to the closing of the business, or the end of the partnership agreement. However, for corporations, it may continue indefinitely because of the high number of people involved. If it goes bankrupt or stakeholders choose to liquidate, the business may end (Price, Haddock Farina, 2012).à à à à à à à à à à à In conclusion, the implementation of accounting principles should be for global use. Accounting information should protect investors and the choices they make about firms and businesses. This may ensure everyone is content with the use of accounting information, as they benefit from the implementation of acceptable accounting guidelines (Lee, 2007).
Break Free Product Life Cycle Free Essays
Most firms build their marketing strategies around the concept of the product life cycleââ¬âthe idea that after introduction, products inevitably follow a course of growth, maturity, and decline. It doesnââ¬â¢t have to be that way, says Harvard Business School marketing professor Youngme Moon. By positioning their products in unexpected ways, companies can change how customers mentally categorize them. We will write a custom essay sample on Break Free Product Life Cycle or any similar topic only for you Order Now In doing so, they can shift products lodged in the maturity phase backââ¬âand catapult new products forwardââ¬âinto the growth phase. The author describes three positioning strategies that marketers use to shift consumersââ¬â¢ thinking. Reverse positioning strips away ââ¬Å"sacredâ⬠product attributes while adding new ones (JetBlue, for example, withheld the expected first-class seating and in-flight meals on its planes while offering surprising perks like leather seats and extra legroom). Breakaway positioning associates the product with a radically different category (Swatch chose not to associate itself with fine jewelry and instead entered the fashion accessory category). And stealth positioning acclimates leery consumers to a new offering by cloaking the productââ¬â¢s true nature (Sony positioned its less-than-perfect household robot as a quirky pet). Clayton Christensen described how new, simple technologies can upend a market. In an analogous way, these positioning strategies can exploit the vulnerability of established categories to new positioning. A company can use these techniques to go on the offensive and transform a category by demolishing its traditional boundaries. Companies that disrupt a category through positioning create a lucrative place to ply their waresââ¬âand can leave category incumbents scrambling. How to cite Break Free Product Life Cycle, Essays
Sunday, April 26, 2020
Rock And Roll Essays - Music, Heavy Metal, American Music
Rock And Roll It is common belief that ?rock? music fosters bad behavior. This statement has no basis; there are no facts whatsoever to support such an accusation. The word ?rock? is a very general term, a wide variety bands fall under the label of ?rock?, bands that range from The Beatles and Fleetwood Mac to Nine Inch Nails and Marilyn Manson. To really make an accusation you must first specify the one you are accusing. And I am not just speaking blindly; I spent a whole year rooming with a Satan worshiper. I listened to Marilyn Manson literally every day and my behavior did not change one bit. When listening to him I felt no sudden urges to go get into a fight or go vandalize the school. I have experienced first hand the affects of rock and roll, none. ?Rock? does not foster bad behavior; it is the people who have tendencies to break the rules who are attracted to it. And since we never like to blame ourselves it is ?rock? that gets the bad rap. Rock'n'roll (rok'en r?l'), n., a kind of popular music with a simple repetitious melody. 90% of the music listened to by adolescents throughout the world would fall under the term ?rock? as defined in the World Book Dictionary. With this in mind, how could you accuse ?rock? of causing bad behavior? ?Rock? has been broken down into many sub categories as it music has progressed from its roots in the Goldie Oldies in the 1950s. Some of the most well known are Classic Rock, Eighties Rock, Pop, Heavy Metal, Grunge Rock, Rap Rock, etc.... So accusing ?rock? as a whole of anything would be ridiculous and stereotypical. Personal experiences have developed this theory in my head. Last year I was at boarding school, and my roommate, Nick House, was a self proclaimed ?Demonolotrist? but by all Christian standards he was a Satan worshiper. He listened to extremist bands such as Nine Inch Nails and Marilyn Manson. I listened to this music all year, every day. And at first it worried me, I was afraid that the music would somehow effect me, but not so much to my surprise, it didn't. While listening to it I felt no strange desire to go commit a crime or kill someone. In fact my being exposed to this music only broadened my horizons and expanded my knowledge. Accusing rock of causing bad behavior is the equivalent of me accusing Christian music of causing Christianity. Christianity existed long before Christian music. In the same way, bad behavior existed long before ?rock?. Christians are attracted to Christian music because it is Christian. In just the same way people with tendencies toward bad behavior are attracted to rock because it is revolutionary. Speech and Communications
Wednesday, March 18, 2020
prayer in school essays
prayer in school essays IS IT LEGAL TO PRAY IN PUBLIC SCHOOLS? Is it legal to pray in public schools?This is the question. The answer of course is, It depends. Both on what kind of prayer we are talking about, and more importantly, who is doing the praying. Because people are usually talking about organized classroom prayer, we will begin our there. The Supreme Court has made clear that prayers organized by a public school violate the First Amendment, whether in the classroom, over the p-a system or even at graduation. The same rule applies whether the activity is prayer or reading the bible. Even moments of silence, if used to promote prayer, arent allowed by the courts. A neutral moment of silence that does not encourage prayer over any other quiet, activity is allowed, even though many students choose to use the time for prayer. The bottom line is, the Court has said that it is none of its business to promote or sponsor religious exercises, especially among young students who are at school as a result of their parents, or being made to be there by the govt. Public schools have the responsibility to protect the thoughts of every student. This includes children of various religious faiths, as well as those of no religious faith. Only by being neutral can the school be fair to all. This doesnt mean schools dont allow st udents to be religious, theyre just not going to force it. Generally, individual students are free to pray, read their Bibles and even invite others to join their particular religious group as long as they are not disruptive of the school or disrespectful of the rights of other students. A student should not be allowed to pressure others in a public school. For example, a student may wish to pray before meals, read her Bible during study hall, create an art project with a religious theme or invite other students to attend church. In addition, students have t...
Monday, March 2, 2020
The First Jobs of the 2016 Presidential Candidates
The First Jobs of the 2016 Presidential Candidates The 2016 presidential race is underway and things are getting heated. Whether or not your favorite candidate is winning, we thought it would be interesting to explore the humble beginnings of each candidate. Here are the first jobs of each of the 2016 Presidential Candidates held before they got their start in politics.Ã Source: [payscale.com/]
Friday, February 14, 2020
Chemistry in Daily Life Essay Example | Topics and Well Written Essays - 1250 words
Chemistry in Daily Life - Essay Example This world is made up of matter. We human beings are part of matter as we live in this world. Our body is made up of matter of different kinds. Matter is embedded in everything that contributes to protect our life - right from the food we have to the environment we live in. And, from what we eat to where we live, it is all related to chemistry. The human body thrives on organic compounds like proteins, nucleic acids, carbohydrates, vitamins, etc., and defends itself with enzymes such as catalase, reducing agents such as glutathione and cysteine, and we eat antioxidants such as vitamin C, E and polyphenol, etc.,) as our food to survive. Men in pre-historic age lived by using natural things / materials to a large extent. By the passage of time, man has now learnt to use natural resources to develop things for us as per his needs. Today, there is hardly any area in which Chemistry does not play a critical role in a man's daily life. Toiletries, cosmetic and beautifying products are some other items which are of use in our daily life. There are products like carbolic acids, toothpaste, mouth-fresheners, moisturizers, skin creams, face powders, deodorants, shampoos and soaps which sets off a day in our life. In all these products, lots of chemical ingredients are used. Carbolic acids are used as disinfectants to protect the bathroom and toilets from causing infections and keeping them clean. We start our day early morning by brushing our teeth. We use tooth paste to keep our teeth fresh, shiny and to protect them from decaying. We also use mouth fresheners (liquid) to keep bad breath - Halitosis in scientific term - at bay. Toothpaste includes water (H2O), Glycerol (CH2OH), Dibasic calcium phosphate (CaHPO4), Sodium N-lauroyl sarcosinate, Carrageenan, Fluorides, etc., and some toothpastes even contain salt in their ingredients. Isn't it amazing that there are so many chemical ingredients involved in a small tube of toothpaste! Cosmetic items like moisturizers, skin creams, face powders, deodorants, lipsticks, shampoos and soaps include numerous ingredients like water, emulsifiers, preservatives, thickener, color and fragrance components. A bathing soap may contain chemical additives like caustic soda, citric acid, sodium chloride, mineral oil, scent, etc. Similarly, a detergent soap and powder and dishwasher soap or powder may contain many chemical compositions. Chemistry and food As we enter the kitchen, the main object that stands out is the stove. Most of the kitchen in this modern world is furnished with gas stoves. A gas stove mainly runs on cooking gas containing butane, ethane and propane and may also include methyl or ethyl mercaptans. Though not substantially used of late, stoves running on fuel like kerosene and gasoline had been of much use in the yesteryears and are still in use in remote places where there is scarcity of cooking gas. What is essential to lead a healthy life is food. Every food that is cooked includes chemicals which further multiply into more chemicals due to the reaction while cooking. For instance, rice contains carbohydrates and when it is cooked, it undergoes many chemical reactions, multiplying the available chemical elements into numerous other chemical
Sunday, February 2, 2020
The Juvenile Justice System Should Focus on Rehabilitation Research Paper
The Juvenile Justice System Should Focus on Rehabilitation - Research Paper Example The aim is fundamentally to control violent juvenile and put them in reformatory institution as effective rehabilitative measures before they will be reintegrated back into the society as responsible citizens or human resource of a state (Office of the Juvenile Justice and Delinquency Prevention, 2012). Under the law, juveniles are those young residents of the America aging between 15-17 years old that have committed a criminal act against the state, person or to property (OJJDP, 2012). Some states made some statutory exceptions on age as requisite in the acquisition of jurisdiction on these cases. Others have put concurrent jurisdiction to juvenile and criminal courts while leaving to prosecutors the discretion to decide which of these judicial body should handle the preliminary investigation of each case (OJJDP, 2012). Juvenile justice system is a policy inspired by the doctrine of parens patriae which accord authority to the state to assume the parental role of enforcing legislati ons that promote, protect, and provide child-friendly custodial terms under its jurisdiction (True Crime & Justice, 2012). It is deemed as the best resolve to dilemma posed by children who have committed heinous crimes with corresponding life sentence as penalty without possibility of parole (True Crime & Justice, 2012, p. 1). ... 1). Legal advocates assert that juvenile justice system should opt for rehabilitation instead of punishment. The latter is considered as unpleasant and may impact on the psychosocial make-up of a child, thus, causing stigma or isolation as they are left alone to handle their emotional setbacks while meting out punishment following a court decision declaring their guilt. Psychologists infer that punishment does not support rational processes that could address their delinquency nor those necessities to achieve desired behavioral reform. Advocates concern on child rights and welfares wanted the juvenile justice system to delve on mental health assessment of the young offenders by providing necessary services to change them into better persons and to help them conform to social norms (OJJDP, 2012; True Crime & Justice, 2012). They contend that as young offenders are also child undergoing developmental stages and constant adjustments to social norms, the intervention with the participati on of family members could help assuage traumatic impacts as consequence of committing offense. The family has been the most influential agent in shaping a childââ¬â¢s behavioral reform to discourage them to become recidivists whilst motivating them to responsibly care for themselves or their future. Moreover, the family also help provide advises and inspirations to the child, along with social experts within rehabilitation centers, as they knew best the historical causes and factors that led a child to commit socially unacceptable acts. Experts empirically posit that 95% of the juveniles that went to the rehabilitation program reformed and avoided re-arrest (OJJDP, 2012; True Crime & Justice, 2012). Such
Friday, January 24, 2020
The Ebola Virus :: Ebola Hemorrhagic Fever
The Ebola Virus A virus is an ultramicroscopic infectious organism that, having no independent metabolic activity, can replicate only within a cell of another host organism. A virus consists of a core of nucleic acid, either RNA or DNA, surrounded by a coating of antigenic protein and sometimes a lipid layer surrounds it as well. The virus provides the genetic code for replication, and the host cell provides the necessary energy and raw materials. There are more than 200 viruses that are know to cause disease in humans. The Ebola virus, which dates back to 1976, has four strains each from a different geographic area, but all give their victims the same painful, often lethal symptoms. The Ebola virus is a member of a family of RNA viruses known as ââ¬ËFiloviriade' and falling under one genus, ââ¬ËFilovirus'. "The Ebola virus and Marburg virus are the two known members of the Filovirus family" (Journal of the American Medical Association 273: 1748). Marburg is a relative of the Ebola virus. The four strains of Ebola are Ebola Zaire, Ebola Sudan, Ebola Reston, and Ebola Tai. Each is named after the geographical location in which it was discovered. These filoviruses cause hemorrhagic fever, which is actually what kill victims of the Ebola virus. Hemorrhagic fever as defined in Mosby's Medical, Nursing, and Allied Health Dictionary as, a group of viral aerosol infections, characterized by fever, chills, headache, malaise, and respiratory or GI symptoms, followed by capillary hemorrhages, and, in severe infection, oliguria, kidney failure, hypotension, and, possibly, death. The incubation period for Ebola Hemorrhagic Fever ranges from 2-21 days (JAMA 273: 1748). The blood fails to clot and patients may bleed from injections sites and into the gastrointestinal tract, skin and internal organs (Ebola Info. from the CDC 2). The Ebola virus has a tropism for liver cells and macrophages, macrophages are cells that engulf bacteria and help the body defend against disease. Massive destruction of the liver is a hallmark feature of Ebola virus infection. This virus does in ten days what it takes AIDS ten years to do. It also requires biosaftey level four containment, the highest and most dangerous level. HIV the virus that causes AIDS requires only a biosaftey level of two. In reported outbreaks, 50%-90% of cases have been fatal (JAMA 273: 1748). Ebola can be spread in a number of ways, and replication of the virus occurs at an alarming rate.
Thursday, January 16, 2020
John and Mable Ringling Review
China Now; De Voss Banners; Expressive Bodies: Works from the Ringing Permanent Collection; and Appalachia LISA. Some of the artwork displayed here are created by major artists like Diego Veil;squeeze, II Greece, Anthony van Deck, Paolo Everyone, Giovanni Battista Topple, Thomas Johannesburg, and Peter Paul Rueben. The collections that this museum illustrates provide particular themes and highlight particular time periods. The most celebrated items fall under the collection of European and American Art.However, according to the museum, the collections are ever changing and not all pieces are available for viewing at all times. The Ringing museum is built around the styles of classical, medieval, renaissance, and baroque, and features rare antiquities as well as creations from various old and modern artists. Because museum collections and exhibitions display a variety of ethnic heritages and integrate multicultural media, they allow society to understand history and how art has change d as well as learn about culture diversity.It is important to study the creativeness of different periods because the rough time, man's view of the world and human existence has changed. Obtaining information on the artistic legacy of he past gives knowledge and value about the complexity of art and its relationship with history, religion, philosophy, and sociology. Furthermore, preserving creative works of art in museums also display the connections of different cultures and how they influence one another, changing, and shaping art into what it is today. Particularly, an artist known by the name Rueben was a master of Renaissance, Flemish, and Baroque style.His art became famous in a time period known as the ââ¬Å"Baroque Periodâ⬠which occurred through the sass and sass. In one of his paintings, The Triumph of Divine Love, the baroque heartsickness are obvious with the use of vivid color, physicality, and overlapping figures. This painting is one of many, found in the premie r collection Of European and American Art featured in the Ringing museum. Currently of Rueben, there is The Triumph of the Eucharist Series, which is a set of cartoons for tapestries that was commissioned by Isabella Clara Eugenia in 1625.Isabella was a member of the royal Spanish family and wanted Rueben to paint 21 tapestries for her, 1 1 consisting of oil paintings on canvas so she could hang them in her palace. This series relates to the elaboration of the Eucharist, explores scenes from the lives of the saints, and promotes the beliefs held by the Counter-Reformation throughout Europe. Providing that, Martin Luther set off a movement called the Protestant Reformation because of his criticisms of the Catholic Church.As a result of this, the church attempted to clean up the corruption and clarify its teachings and beliefs. By doing so, the Counter-Reformation was established which then led to the Council of Trend. According to Brett and Kate McKay, ââ¬Å"The Council of Trend dec lared that art should be used to explain principles by Ewing direct, emotionally persuasive, and powerfully designed to fire the spiritual imagination and inspire the viewer to greater piety' (n. P. ). Moving on, this section of the paper will discuss two particular pieces in The Triumph of the Eucharist series.The first work of art is The Four Evangelists. Related to the painting discussed in the following paragraph, this painting represents figures in motion. Furthermore, to gain an understanding of this painting and the time period around it, it is imperative to understand that the Catholic Church believed bread and wine represented Christi body and blood. In the painting to the far left is Saint Luke with his symbol, the ox. This beast symbolizes sacrifice because in the beginning of his Gospel, is the sacrifice of Zachary.Next to Luke is Saint Mark, featured holding his Gospel under his arm and next to him, the lion that represents the resurrection of Christ. Saint Matthew in t he green cloth and the angel are in the center of the piece where the angel points towards heaven, like Saint Thomas Aquinas in The Defenders of the Eucharist. To the far right is Saint John who appears to be the youngest of the group, and is looking up towards the eagle. His mannerism is supposed to capture his vision of the apocalypse. The cup he is holding in his hand with the snake refers to poison that John drank, in order to prove his faith.While in the bottom of the painting are various symbolic objects that relate to the Gospels such as the cockleshell, cornucopia of fruit, and the dolphin. The second painting is The Defenders of the Eucharist made in 1625 by Rueben was done with oil on canvas. In this companion piece to The Four Evangelists, Rueben incorporated six doctors and a woman, all figures from early church history. On the far right is Saint Jerome dressed in a red robe, eating his translation of the Bible into Latin because that is what he is famous for.In front of Jerome is a great, German philosophical figure named Norte, dressed in a cream colored robe. Then, in the center stands the Dominican monk, Saint Thomas Aquinas, holding a book of his writings and pointing towards heaven; this gesture can be compared to Saint Matthews' in The Four Evangelists. While next to Saint Thomas, is Saint Clare who is seen holding a great monstrance. It is important to understand that women were not allowed to touch the monstrance. Furthermore, the features of Saint Clare are actually those of Isabella, the woman paying for the painting.
Wednesday, January 8, 2020
Relationship Between Parents and Children in Chinese Family
Relationship between Parents and Children in Chinese Family Guangyao Zhai Teddy Chocos Seminar-126G Apr 1, 2013 In general, parents from different cultures differ in the methods to deal with the relationship between their children. Comparing with the Western cultures, Eastern culture places greater emphases on stability, collectivism and peace. These values are believed to promote a kind of general restraint or control of emotions in the interest of maintaining group harmony. Thus,â⬠¦show more contentâ⬠¦Family is the place where people spend most time in daily life. Thus, if the family relationship is conflicting, it usually leads to the lack of family education because of no normal communication. Jing-Mei and her mother is an example of no normal communication but full quarrels. Definitely, family education plays a significant role in the growth of adolescent, and without family education, children are more likely to form bad habits like smoking, alcohol drinking and drug use. According to Sai-Yin Hoââ¬â¢s academic journal, Family structure, parent-child conversation time and subst ance use among Chinese adolescents, the author finds out the result that ââ¬Å"Adolescent substance use progressively increased from intact to maternal, paternal and no-parent families consistently for current smoking (7.9% to 18.9%), weekly drinking (6.1% to 21.6%) and even drug use (6.0% to 17.8%) alike.â⬠(10) Obviously, this study about non-intact family shows that incompletion of family, almost meaning the lack or negligence of family education, increases the probability of being involved in these unhealthy behaviors. Similarly, there are some common points between traditional Chinese family and non-intact family. Both of them pay less attention to psychological education of children. For the importance of Chinese college entrance examination, Chinese parents normally focus on the grades of the examinations rather than childrenââ¬â¢s daily behaviors. Particularly in family with conflictingShow MoreRelatedParenting and culture Essay1595 Words à |à 7 Pagesdifferent p arenting practices vary from culture to culture, and that culture ultimately determines the outcomes of child development. Each culture has specific styles of parenting that instill values on children particular to that culture. Each individual has characteristics of what their parents taught them, which gives every individual their own personality. Both sides present logical information on the cultural impacts of parenting on child development outcomes. Universality in parenting isRead MoreReticence To Directly Express Care And Love Verbally Such1105 Words à |à 5 Pageslove you] has long been observed in Chinese culture, while quantitative comparisons with indirect expression between Chinese parents and their children are few. The present study adopts variety data collection including WeChat conversation records, audio/video-recorded Mandarin conversation in face-to-face, and telephone call questionnaires, to interpret the abounds of indirect expression among Chinese family and analyze how Chinese parents and their children use such expressions demonstrate theirRead MoreEssay on Cultural Universals Between United States and China1074 Words à |à 5 Pagesspecific culture and there are some obvious cultural universals between China and America. One example of such cultural universal is the directness of American versus the humbleness of the Chinese people. Another example would be the self independence of the young Americans ver sus the young Chinese who tend to depend on their parents. What I would like to cover are the holidays observed by United States and China, roles played in the family by husband and wife, parenting styles and conflict managementRead MoreNew Changes Of Chinese Interpersonal Relationship From A Modern Chinese Nation State? Essay1492 Words à |à 6 Pagesbrought dramatic social, economic, political and cultural impact on every aspects of Chinese society. However, does this mean thereââ¬â¢s a totally new way for Chinese people to relate to one another in modern Chinese nation-state? To answer this question, a rethinking of Feiââ¬â¢s theory in his book from the soil the foundations of Chinese society is needed. As a key word to understand the traditional Chinese relationship, the ââ¬Å"mode of differential associationâ⬠summarizes three characters of this kind ofRead MoreModern Day Chinatown Essays1627 Words à |à 7 PagesModern day Chinatown is a vibrant and bustling comm unity full of bright colors and Chinese characters adorning buildings as far as the eye can see. Chinese elders roam around the narrow and unkempt streets while children frolic around from store to store with wide smiles, riffling through toy stores as store owners look on. Mothers scurry from store to store searching for the most tender meats to buy for the nights dinner or for the next days lunch. Tourists from nearby downtown drift into theRead More20th Century American Family Trends1539 Words à |à 7 PagesThe 20th century observed extraordinary changes in the structure and dynamics of American families. The remarkable shift began with the Progressive Era, which spearheaded the emerging concept of marital happiness, an idea that marriage should be composed of emotional ties between the husband and wife. The Industrial Revolution further reinforced these rising ideals with economic and technological transformations that encouraged people to choose partners based on emotional attraction than financialRead MoreLearning Difficulties from Chinese and American Culture1170 Words à |à 5 Pagesdifficulties from Chinese and American culture Question 1 Different culture of East and West can cause problems in each other. American culture trends to individualism. They need for more privacy and personal space. They do not independent of other people. On the contrary, Chinese culture trends to collectivism. They need to more close physical contact and close personal relationship or friendship. They concern about other people live for building up a close relationship. Therefore, close proximityRead MoreBattle Hymn of the Tiger Mother Essay1004 Words à |à 5 PagesAmerican mothers and 48 Chinese immigrant mothers, almost 70% of the Western mothers said either that ââ¬Ëstressing academic success is not good for childrenââ¬â¢ or that ââ¬Ëparents need to foster the idea that learning is fun.ââ¬â¢ By contrast, roughly 0% of the Chinese mothers felt the same way. Instead, the vast majority of the Chinese mothers said that they believe their children can be ââ¬Ëthe bestââ¬â¢ students, that ââ¬Ëacademic achievement reflec ts successful parenting,ââ¬â¢ and that if children did not excel at schoolRead MoreCultural Differences Between Chinese and American Born Chinese1172 Words à |à 5 Pageshave different characteristics with the original countrys. According to ââ¬Å"pair of ticketsâ⬠, the author Amy Tan uses the personal experience to reveal difference of two culture, which shows on language expression, Ethnic identity and development of relationship. From the largest reports, these words show a increasing trend of emigration, there are some different reasons to make this decision. Living level is the most important reason to affect emigration increasing. After emigrating, people can gainRead MoreThe Conflicts Between Mother and Daughter in ââ¬Å"Two Kindsâ⬠1557 Words à |à 7 PagesWang ENC 1102 RXB3 Final draft The Conflicts between Mother and Daughter in ââ¬Å"Two Kindsâ⬠In the story ââ¬Å"Two Kindsâ⬠, author Amy Tan, who is a Chinese-American, describes the conflicts in the relationship of a mother and daughter living in California. The protagonist in this story Jing-mei Wooââ¬â¢s mother is born and raised in China, and immigrates to the United States to escape from the Chinese Civil War. For many years she maintained complete Chinese traditional values, and has been abided by it deliberately
Tuesday, December 31, 2019
- Compare and contrast the pros and cons of public and private sector security convergence efforts Free Essay Example, 3000 words
This has become an increasingly positive phenomenon as they are able to combat various criminal situations using their well equipped and trained facilities. Being one of the forces legally enabled to use firearms in the public, they are therefore better placed in controlling rowdy crowds, criminals and other incidences, which affect the stability as well as compromise the security of the nation. On the other hand, Private investigators perform the same duties conducted by public police such as investigations for instance locating people who go missing after leading high profile crimes, obtain information for civil and legal litigation cases. They are also in place to provide consultations to risk management, and implementing measures under security to curb crime and emergencies such as fire, and investigating corporate fraud. Owing to the nature of Private investigators, they have made it easy to deal with high profile gangs and other criminals who escape unidentified. Security guards as police officers maintain order and enforce regulations; they are invited to public events to provide protection on properties against theft and vandalism thus ensuring law and order is maintained during the session. We will write a custom essay sample on - Compare and contrast the pros and cons of public and private sector security convergence efforts or any topic specifically for you Only $17.96 $11.86/pageorder now The Private Security firms are entrusted in transporting of valuables such as money or transportation of confidential parcels. The private firms have the same rights as the public police in arresting the trespassers i. e. According to Trespass acts are "â⬠¦ the workhorse of private security services in their patrol of the shopping malls, airports, sports stadiums and other private spaces where the public tends to congregate". There is greater difference between public and private security officers which all under training where police officer get training and education in depth thus paid highly compared to a private security officer. Thus Large private security firm are trying to put in depth to training and education thus increasing their level of professionalism. The public officers are shielded by strong union as their remunerations are from taxpayers thus being said they are not held accountable to their actions as individual, moreover the private security officer are held accountable to any mistake thus putting their job at risk to a lay off thus they perform their duties under the policies and procedures of the company (Private Security Industry Regulatory Authority, 2007). Through this regulation, private security officers have learnt the importance of handling each and every individual professionally as well as all the situations and tasks they are assigned to perform.
Monday, December 23, 2019
Internal Control Weakness (Auditing) Example
Essays on Internal Control Weakness (Auditing) Research Paper Running Heading: Internal Control Weakness Internal Control Weakness Foot Locker INC. [Address] November 6, 2011 To: M. I. Supavizah From: [Your Name] Subject: To Report Internal Control Weakness in the Organization I am currently employed by your company, Foot Locker. And I am performing all my responsibilities effectively and efficiently. I am aware that the management of the organization is considerate about the internal control and internal audit. Apart from this, organizations is using Committee of Sponsoring Organizations of the Treadway Commission (COSO) framework, in order to check and monitor the overall effectiveness of the internal control. However, I would like to inform you about a serious internal control weakness in the organization. The information technology system used by the organization for the inventory management is not appropriate and efficient enough to control integrated process of inventory management in various outlets. In order to be able to generate accurate financial reports and results, it is important for the organization to manage the level of inventory all over the retail outlets in an efficient manner. This weakness in the information technology system will result in exposing it to different types of frauds and illegal activities. Design of the information technology system is inadequate and hence the system is not able to provide complete, precise, and correct information about integrated inventory management which is required for the purpose of financial reporting. There are different financial and operational implications of this internal control weakness. Because of this inadequate and inefficient technology system, employees associated with the process of inventory management can manipulate the information and data for their own benefits. This will result in damaging the overall reputation and profits of the organization. Apart from this organization will have to face several other issues because of the lack of proper inventory management. Organization places huge emphasis on the inventory management and it is essential to have an appropriate management information system which allows the organization to implement integrated inventory management. Along with this, inefficiency on part of the technology system will result in the generation of huge implications and costs associated with different issues of frauds and external audit. Internal control is of high importance for the success and growth of any company. Internal audit and internal control is essential in order to control overall practices of the organization and avoid any possibility of fraud. There have been several cases of frauds due to lack of appropriate internal control system. Management should be able to identify important elements and factors, which should be controlled in order to ensure that the company is performing in acceptable manner and is reporting all relevant information and data in the financial statements. Organizations which come up with well planned and well thought internal control and auditing strategies are able to improve the overall performance and lead the organization towards the path of success and growth (Moffett Grant, 2011). At the same time it is important to acknowledge that almost all internal control strategies and systems are vulnerable and exposed to different risks. There are always some loopholes in the internal control system of every other organization. For this reason, it is required that organizations monitor and check their internal control process on routine basis and identify any changes which should be made (Soh Martinov-Bennie, 2011). In regard to the identified problem and increased importance of the appropriate internal control system, I will like to recommend to redesign and rebuild the management information system of the organization. New management information system should be able to provide information and data on the basis of integrated inventory management. Along with this the new management information system should be designed in such a way that only concerned and authorized persons are able to access and change the data and information. This will result in decreasing the chances of any manipulation and fraud and in turn will strengthen the internal control system of the organization. REFERENCES Moffett, R., Grant, G. (2011). Internal Controls and Fraud Prevention. Internal Auditing, 26(2), 3. Soh, D., Martinov-Bennie, N. (2011). The internal audit function. Managerial Auditing Journal, 26(7), 605-622.
Sunday, December 15, 2019
A Study on Enterprise Network Role of Brac Bank Free Essays
string(355) " Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring maintenance flowchart ATM Link monitoring maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5\." A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics Telecommunication Engineering INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant Professor School of Engineering Computer Science Independent University, Bangladesh ABSTRACT This internship report is an exclusive study of Enterprise Network role at BRAC Bank Ltd. The main Objective of this report is to get the practical experience through observing all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc. We will write a custom essay sample on A Study on Enterprise Network Role of Brac Bank or any similar topic only for you Order Now through LAN WAN and also ensure utilization of internet and intranet effectively. iii ACKNOWLEDGEMENTS First of all I wish to convey our heartfelt thanks and gratitude to Almighty Allah to complete the internship successfully and also those who all rendered their cooperation in making this report. Without their assistance I could not have completed my internship. I like to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the opportunity to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr. Mohammad Morshed, (Analyst, Technology User Infrastructure, BRAC Bank Limited). Discussions with him about various topics have enriched my conception and knowledge about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior Manager of Network Service) and Md. Mahbubul Alam (Network Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would not have been possible without the help of the people who provided tremendous amount of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my honorable supervisor. My internship achieved its desired success. This internship gives me the opportunity to practically work on the overall technology based banking systems, focusing on the various aspects analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to maintain or support of a Banking System. iv TABLE OF CONTENTS Page LIST OF TABLES â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. LIST OF FIGURES â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. CHAPTER â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢ ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 1 INTRODUCTION â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 1. 1 1. 2 1. 3 1. 4 1. 2 Introduction â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Origin of the Report â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Objective of the internshipâ⬠¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Scopeâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ About BRAC BANKâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLEâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 2. 1 2. 2 Enterprise Network Role at BRAC BANK â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Daily, Weekly, Monthly Other regular duties â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 2. 2. 1 Daily Activatesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Monitoring Total Networkâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN WAN Support for Total N etworkâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. v 2. 2. 1. 3 LAN / WAN securityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 2. 2. 1. 4 Internet connectivityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 2. 2. 1. 5 Western Union and Other Remittance Program â⬠¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦ 2. 2. 1. 6 SWIFT server administration â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦ 2. 2. 1. 7 APN connectivity â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦ 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IPâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 2. 2. 1. 9 Network devices health check â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦.. 2. 2. 2 Weekl y Activitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 2. 2. 2. 1 Configuration Backâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 2. . 3 Monthly Activitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 2. 2. 3. 1 SWIFT archive and backupâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 3 NETWORK ARCHITECTURE DESIGN 3. 1 3. 2 3. 3 3. 4 3. 5 Data Center Architecture â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Omnibus Architecture â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Eldorado Architecture à ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Network Architecture of Branches â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Network Architecture of a sample Branchâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦ vi 3. 6 4 ATM Architectureâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 New link deploymentâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Link vendor selection â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Network maintenanceâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Link monitoring maintenanceâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 4. 4. 1 4. 4. 2 4. 5 Branch Link monitoring maintenanceâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. ATM link monitoring maintenanceâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Link troubleshoot checklistâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 4. 5. 1 4. 5. 2 Radio Linkâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. Fiber Linkâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 4. 6 5 Remote access policyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Wi-Fi AND INTERNET CONNECTIVITYâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 5. 1 Wi-Fi activationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ BANDWIDTH MANAGEMENT AND MONITORINâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 6. 1 6. 2 Overview of Bandwidth managementâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. Bandwidth Management at BRAC Bankâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢ ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ vii 6. 3 OpUtilsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 6. 3. 1 Switch Port Mapperâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 6. 3. 2 IP Address Managerâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APNâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 7. 1 Maintenance of GP Access point Networkâ⬠¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 7. 1. 1 GP Huawei Modem Installationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7. 1. 2 ZTE Modem Installationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 7. 1. 3 ADN Modem Installationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8 CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWAREâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 8. 1 Western Unionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8. 1. 1 Installation processâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 8. 2 SWIFTâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8. 2. 1 BRAC Bank Swift Network Diagramâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8. 2. 2 SWIFT Infrastructure Overviewâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8. 2. 3 Maintaining the SWIFT environmentâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 8. 2. 3. 1 Daily activitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦. 8. 2. 3. 3 Monthly activities â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 8. 2. 3. 4 Yearly activitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. MAINTENANCE, MONITORING SUPPORTâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 9. 1 9. 2 Overviewâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Whatââ¬â¢s Up Goldâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 9. 2. 1 Create a New Mapâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 9. 2. 2 Whatââ¬â¢sUpGold Web Serverâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 10 C ONCLUSIONâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. REFFERENCESâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues related link vendor selection 8. 1 Support Level 8. 2 User format for Western union 8. 3 Terms and description of SWIFT Page 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank Omnibus Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring maintenance flowchart ATM Link monitoring maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. You read "A Study on Enterprise Network Role of Brac Bank" in category "Essay examples" 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7 Wi-Fi Activation Process OpUtils Login Page OpUtils Home Page (Summary Report) Switch Port Mapper portion List of Switches List of Routers Switch information summary Finding a MAC address IP Address Manager Modem Installation Profile Creation Profile Change Western Union Installation Swift Network Diagram Swift Infrastructure Creat New Map in Whatââ¬â¢s Up Gold Select device for mapping 23 31 31 32 32 33 33 34 6. 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 xii 9. 4 9. 5 9. 6 Configure device properties Polling device Whatââ¬â¢sUpGold Web Server Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is not enough to enable students to compete with self-assurance and reach his/her ambition without having experience with the real world related applications. Internship is highly needed to expand idea, familiarity and experience. Computer networking is one of the most essential terns in order to run a moder n organization. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit course as Internship for the undergraduate students in her course curriculum. The curriculum requires every student to do an internship in an alleged firm for hands on experience about the proficient works. It is a realistic exposure of theoretically gained knowledge and can be considered as an opening tryout to be acquainted with any organization and to make oneself confident enough to move toward into service life and start building career. As the outside world is very much competitive for anyone after graduation, IUB provides such an opportunity to build up the capability with most appropriate opportunities. This gives the student great opportunity in the service world and also to get exposure to various diversifications of the service world. Intern students are supervised under a particular faculty member throughout their Internship stage. Here the student gets the chance to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are responsible to report weekly or fortnightly to his/her respective Supervisor to get his/her assistance. And the project gets advancement by following the Supervisorââ¬â¢s instruction. The internship period is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main purpose of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about enterprise network. ? Get the clear view about network monitoring and maintenance. ? Relate theory with practice of networking. ? This is the beginning of a studentââ¬â¢s professional career. The studentââ¬â¢s competency and efficiency in the working environment can be accessed from this course. ? Teaches the student to take up the responsibility and pressure of work. ? Teaches the student to learn from work. ? To help students enhance their creativity and efficiency in dealing with projects related to their field of study. ? Helping students to express dependability, initiative, resource fullness and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work after graduation. 3 1. Scope Iââ¬â¢ve done my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, Western Union Installation. My task was configuring router and switches; configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and Western Union Installation. In the later portion of my internship I was also involved support team of Technology User Infrastructure. The task of Support team is to provide instant pc related support to the users as they call for help. The support may be of two kinds, remote ââ¬â which is given by using VNC, sometimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. Now Iââ¬â¢m confident that I could efficiently work in Networking Industry with my full dedication. . 6 About BRAC Bank BRAC Bank Limited (BBL) is a scheduled commercial bank in Bangladesh. It established in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank will be a unique organization in Bangladesh. The primary objective of the Bank 4 is to provide al l kinds of banking business. At the very beginning the Bank faced some legal obligation because the High Court of Bangladesh suspended activity of the Bank and it could fail to start its operations till 03 June 2001. Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the Supreme Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank will be a unique organization in Bangladesh. It will be a knowledge-based organization where the BRAC Bank professionals will learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and break barriers to serve customers and create customer loyalty through a value chain of responsive and professional service delivery. Continuous improvement, problem solution, excellence in service, business prudence, efficiency and adding value will be the operative words of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service culture throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believe in the Bankââ¬â¢s vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and internationally acceptable banking and accounting standards. Sustained Growth in Small and Medium sector, continuous low cost deposit growth with controlled growth in retained Assets. â⬠¢ Achieve efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks other products and services 5 â⬠¢ Manage various lines of business in fully controlled environment with n o compromise on service quality â⬠¢ Keep a diverse, far-flung team fully motivated and driven towards materializing the bankââ¬â¢s vision into reality. BRAC Bank will be the absolute market leader in the number of loans given to small and medium sized enterprises throughout Bangladesh. It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop and grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in accordance with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network maintain all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data co mmunication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN WAN and also ensure utilization of internet and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design: Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, configuration and troubleshooting: By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipmentââ¬â¢s to new distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity: Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide secure internet connectivity through proxy server. 7 2. 1. Bandwidth Management: Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing Perimeter firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network: Maintenance of GP Access Point Network by establishing IPsec tunnel between BBL and GP network to provide intranet facility to SME Unit offices, also use this secure channel for POS transactions. 2. 1. 6 Connectivity and administration of all payment network Software: Ensure connectivity for all payment network software like Western Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring Support: Maintain all network device, manage network monitoring application and Provide All LAN WAN related support. Enterprise network also give solution to BRAC Bank subsidiary institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant ba sis. BRAC Bank has redundant links for every branch. And mechanism has been applied so that if one link goes down, the backup link is activated automatically. Apart from this Primary link is being used for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths. Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the daily operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Connection to internet is required for 24Ãâ"7. Ensuring the interrupt free internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for Web Servers, Internet banking, Eldorado Projects, etc. 9 2. 2. 1. Western Union and Other Remittance Program Support Computer terminals used for Western Union service face various type of problem including connection error, password lock, Western Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivi ty Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone. Day to day basis we need to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble free and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwidth utilization, process, and memory usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup Taking weekly backup of critical hardware applications including Core Router, Core Firewall and Core Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup Archive SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture: Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redu ndant data communications connections, environmental controls and security devices. Fig- 3. 1 BRAC Bank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are connected with the Core router. In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are connected with Core Router. In Left side the remote Branches are connected via Radio or Fiber or VSAT link provided by the some ISP named BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISPââ¬â¢s which provide Internet those are also connected with Core Router via Firewall. The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture: Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the first neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the name of the independent association of member banks and institutions that will operate and manage the central switch. As a first step, OMNIBUS integrates the ATM POS networks of BRAC Bank and Q-Cash, enabling cardholders of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers significant convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking. This instant increase in the number of ATMs POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet Link3 with Omnibus and Omnibus server is also connected via Metronet Link3. 15 3. 3 Eldorado Architecture: Eldorado ââ¬â a web based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank. BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a common electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances more accurately. This will help the member banks to serve their remittance customers even better and faster. 16 To popularize the formal banking channels among the non-resident Bangladeshis for sending their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittances electronically in the most expeditious and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet Link3. . 4 Network Architecture of Branches: Fig- 3. 5: Network Architecture of Branches The Branch is connected with Cisco 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for security issue. One Native VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6: Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All Desktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with Phoenix soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is correct or not. If HSM send green signal for PIN then Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all information is saved on Finacle. Last of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment: The process of new link deployment is as followed. Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection: The issue consideration and their descriptions are pointed below. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in same radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have different backbone for intercity connectivity. This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from higher down time and require more maintenance. Licensed Radio Frequency Tower Height for Radio Links This will ensure better service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation charge increases as tower height increases. Longer tower needs more maintenance cost. Service Quality Vendors with poor service quality should not be considered even though they have met all other requirements. Support Personnel Select vendors that have dedicated support personnel for remote locations. Also count response time for all previous downtime. Balance of Distribution In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance: Following process follows for the network maintenance for link troubleshoot. Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring maintenance: Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring maintenance Fig- 4. 3 Branch Link monitoring maintenance flowchart 4. 4. 2 ATM link monitoring maintenance Fig- 4. 4 ATM Link monitoring maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fig- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac filtering and MAC binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? MAC entry to the Wireless LAN controllerââ¬â¢s MAC filter table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional: depends on userââ¬â¢s requirements) MAC entry to the Wi reless LAN controllerââ¬â¢s MAC filter table For MAC entry need to log in to the below link https://10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 Then login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing) Then go to SecurityMAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 Then Select NEWâ⬠¦ from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Activation Process (Continuing) 26 Put the MAC Address and select SSID (like BBL) as Profile name, Preferred Interface as Interface Name and give user details and select IP address from the existing Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https://10. 00. 83. 251:10000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User Name=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continuing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description box give the user descript ion, in Host name box give the LAN ID of the user in Hardware Address box put the MAC address and put the IP in to the Fixed IP Address box and then select create to make the user. Fig- 5. 1 Wi-Fi Activation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management: Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank: BRAC Bank uses some tools for bandwidth management and monitoring. One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to observe the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port related MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http://10. 0. 0. 236:7080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home page shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its IP address information. In Switch Port Mapp er portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of Routers Summary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ff:ff:ff:ff:ff:ff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types: i. ii. Used IP: Currently using IP addresses. Transient IP: was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP: free IPââ¬â¢s are known as Available IP Address. 35 In the left side of the window we can see the groupââ¬â¢s name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Manager (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network: 7. 1. 1 GP Huawei Modem Installation: Fig- 7. 1 Modem Installation Click the Next Button for Starting Installation Fig- 7. 2 Modem Installation (Continuous) 38 Click I Agree for Next Step. Fig- 7. 3 Modem Installation (Continuous) Click Next for Next Step Fig- 7. 4 Mo dem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Continuous) Click Finish to Complete the Installation. 0 Fig- 7. 7 Profile Creation Click Profile Management. Then Click New for creating New Profile Write ââ¬Å"BRACBANKâ⬠in Profile Name. Click Static and write ââ¬Å"BRACBANKâ⬠in APN and write *99# in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation: All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile Change Click on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write ââ¬Å"BRACBANKâ⬠in Configure Filename and *99# in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click Set default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation: APN settings : AT+CGDCONT=1,â⬠IPâ⬠,â⬠BRACBANKâ⬠Phone number : *99***1# or *99# Need to copy ewusbmdm file from d drive IT Use to Windows system32 CHAPTER EIGHT CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union: To install the western union Translink and activate a client Terminal these steps are followed: 8. 1. 1 Installation process: 1. Download file from ftp://10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. Unzip that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped folder Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps: Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Install ation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (Continuing) 52 6. Install the software like other conventional software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers propertiesAdvancedPerformanceSettingsTurn on DEPAdd Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at C:program filesWestern Union Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Startall programsWestern UnionAgent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation ( Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continuing) 13. Go to Tools (Ctrl-L) And select sign on screen password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select: Printer Model: LaserJet Printer Name/Port: Canon LBP3460 PCL6 Paper Feed: Front Single Fig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to StartControl Panel Network ConnectionsNetwork TasksCreate a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select Next Select Connect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select Virtual Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select Write company Name Company Name: Link1 Fig-8. 30 Western Union Installation (Continuing) Select Next 61 19. If public network page initiated Select Do not dial the initial connection Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installatio n (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyoneââ¬â¢s Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22. Then Select Add a Shortcut to this Connection to my Desktop Then Select Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select Save this user name and password for the following users; Select Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the command prompt GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW ââ¬âp Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW ââ¬âp Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW ââ¬âp 25. Then go to agent config Communication And ping the connection points IP; From StartRun 26. Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1: Support Level: Error Type Mom. config Invalid Request Type Out of Memory Error 800 Object error Log Sheet Have To Do Reinstall the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service Reinstall the software Printing C:WINDOWSsystem32drivers Extract the attached file (if it is not present) in C:WINDOWSsystem32 [attachment MSHFLXGD. OCX] go on START - RUN, Type in: regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The Society for Worldwide Interbank Financial Telecommunication (ââ¬Å"SWIFTâ⬠) operates a worldwide financial messaging network which exchange s messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as ââ¬Å"SWIFT codesâ⬠. The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which must be settled via correspondent accounts that the institutions have with each other. Each financial institution, to exchange banking transactions, must have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview: A typical SWIFT customer environment consists of a combination of individual components that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3: Terms and description of SWIFT Terms FIN CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKI Description Software product that processes and that exchanges FIN messages, by using the FIN application through the SWIFT network. Alliance Access and Alliance Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote API. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator. Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices: HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is supported on the same SWIFTNet Link. Secure Hypertext Transport Protocol. A protocol that is used in order to access web servers that are hosted on SWIFTNet. The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an embedded SWIFTNet Link, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public Key Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment: 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Arrangements have been made for continuous operation Export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is applicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the Web station or Web platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI certificates after you have opened them. Use the SNL_BackUp. l command. (Note: This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? Reboot all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING SUPPORT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is ââ¬Å"Whatââ¬â¢s Up Goldâ⬠. 9. 2 Whatââ¬â¢s Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options: Discover and Map network devices creates a map using the information sources that you select, such as: SNMP information on your network, information you enter about IP addresses; information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in Whatââ¬â¢s Up Gold Fig-9. 2 Creat New Map in Whatââ¬â¢s Up Gold (Continuing) 72 Now as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1: After creating a Blank Map, drag your desired device from Device Type Panel as directed in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements. You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the details. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 Whatââ¬â¢sUpGold Web Server Whatââ¬â¢sUpGold provides a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties. Set up the web server: Click on the links below Configure Web Server General Enable Web Server Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any Whatââ¬â¢sUpGold settings; they will have only the view capabilities. Fig-9. 6 Whatââ¬â¢sUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Bank Limited but also a chance to learn from the good experts. This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. Beginning from the opportunity to take the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a somehow protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day. Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES [1] http:// www. bracbank. com [2] http:// www. eldorado-bd. com/MDMessage3. aspx [3] http:// www. bankinfobd. com/banks/3/BRAC_Bank [4] http:// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html [5] http:// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf How to cite A Study on Enterprise Network Role of Brac Bank, Essay examples
Subscribe to:
Posts (Atom)