.

Saturday, August 31, 2019

African American Gay Rights Essay

I cannot begin to argue about African American/Hispanic LGBT, living in New York City and their civil rights without remembering the public outcry against black civil rights. Although the focus of this paper is on African American/Hispanic LGBT living in New York City and Their Rights to Marriage I have decided to start my paper of by discussing the civil rights movement of the 1960’s. The civil rights movement of the 1960’s and the continuing struggle against race-based discrimination were rooted in the struggle against slavery. As early as the eighteen hundreds the United States legislative had laws known as segregation laws that limited certain freedom to them. They had to live in separate neighborhood, attend separate schools, drive in the back of public buses verses in the front where Whites were; African American would not dare go against these laws back then because if and when they did, they were unjustly imprisoned, beaten lynched and more for just trying to exercise human rights. In the 1960s African Americans led a fight to remove the legally codified vestiges of slavery from our constitution and from state and local laws. Most repulsive among these, were Jim Crow laws that required racial segregation; African Americans had to endure all these things until The Civil Rights Movement. The modern concept of civil rights was pioneered by African Americans in their long struggle to become full citizens of the United States. From the Civil Rights Movement to the Stonewall Riots of 1969 to May 17, 2004, the LGBTQ movement has made some tremendous gains into mainstream society, a reality that has not been afforded to African Americans. The African American Civil Rights Movement gave birth to many other civil rights movements in the 1960s. African Americans not only made new law, their success gave new hope. Among the many efforts sparked by the African American Civil Rights Movements were the efforts to end discrimination against women, Hispanic Americans, Native Americans, and Asian Americans, people with disabilities and lesbians and gays. Some African American still has one more river to cross because now African American LGBT are fighting a new civil war, the fight for same sex marriage; the right to be legally married. Currently, marriage has two distinct components: civil marriage and the religious ritual of marriage. Mixed-gender couples can have a civil marriage without the religious ceremony/ritual. Couples can have a religious ceremony/ritual, without a civil marriage. Some couples can choose both. However, to receive the legal protections of marriage, a couple must have a civil marriage, which is the only marriage that can be addressed by courts or legislatures. The LBGT believe that the rights and legal protections of civil marriage that are given to mixed-gender couples and families should also be extended to couples and families who are headed by same-gender couples. These include the rights of survivorship, inheritance, insurance, joint income tax filing, and a myriad of rights that many mixed-gender couples take for granted. For African American LGBT, state regulation has been particularly harsh. State sodomy law has had a way of preventing LGBT from acquiring some of the rights they are entitle to. Today, fewer than half the state has sodomy laws. LGBT recognizes New York City for being the birth place for many modern gay movements; however, New York has not yet passed any law giving LGBT legal protection and political support, (right to marriage being on of them). New York State gay rights bill, first introduced in 1971, still has not become law. While other states, like Vermont has established civil unions for LGBT, New York has not. Andy Humm writes that the biggest gay-related debate throughout the country right now is over government sanction of same-sex elationships. Vermont has gone the furthest, establishing â€Å"civil unions† for gay couples that confer almost all of the rights to which a married man and woman are entitled, though stopping short of full legal marriage. New Yorkers may travel to Vermont for the civil ceremony as of July 1, but there is some question as to what legal weight it will carry back home. The federal government enacted the â€Å"Defense of Marriage Act† (DOMA) in 1996 when it looked as if Hawaii might give same-sex couples marriage licenses. It barred federal recognition of legal same-sex marriages performed in any state and gave the other states the right not to honor such a contract. Thirty-two states have passed laws barring recognition of same-sex marriages performed in other states, even though no state or nation allows gay couples to obtain a marriage license. (Holland will likely be the first in 2001. ) A New York version of the Defense of Marriage Act is pending in Albany, but has not had a vote in either chamber. Bibliography Diane Silver et al. , The New Civil War: The Lesbian and Gay Struggle For Civil Rights (New York; New York:1997), 25-26 Andy Humm, â€Å"The State of gay rights in New York,† Available http://www. gothamgazette. com/iotw/gayrights/ (Accessed May 16, 2005).

A Study on Enterprise Network Role of Brac Bank

A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics & Telecommunication Engineering INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant Professor School of Engineering & Computer Science Independent University, Bangladesh ABSTRACTThis internship report is an exclusive study of Enterprise Network role at BRAC Bank Ltd. The main Objective of this report is to get the practical experience through observing all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc. through LAN & WAN and also ensure utilization of internet and intranet effectively. iii ACKNOWLEDGEMENTSFirst of all I wish to convey our heartfelt thanks and gratitude to Almighty Allah to complete the internship successfully and also those who all rendered their cooperation in making this report. Without their assistance I could not have completed my internship. I like to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the opportunity to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr.Mohammad Morshed, (Analyst, Technology User Infrastructure, BRAC Bank Limited). Discussions with him about various topics have enriched my conception and knowledge about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior Manager of Network Service) and Md. Mahbubul Alam (Network Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would not have been possible without the help of the people who provided tremendous amount of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my honorable supervisor.My internship achieved its desired success. This internship gives me the opportunity to practically work on the overall technology based banking systems, focusing on the various aspects & analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to maintain or support of a Banking System. iv TABLE OF CONTENTS Page LIST OF TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. LIST OF FIGURES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. CHAPTER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1. 1 1. 2 1. 3 1. 4 1. 2 Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Origin of the Report †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Objective of the internship†¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ About BRAC BANK†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 1 2. 2 Enterprise Network Role at BRAC BANK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Daily, Weekly, Monthly & Other regular duties †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. 2. 1 Daily Activates†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Monitoring Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN & WAN Support for Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v 2. 2. 1. 3 LAN / WAN security†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 4 Internet connectivity†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 5 Western Union and Other Remittance Program †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 6 SWIFT server administration †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦ 2. 2. 1. 7 APN connectivity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. 2. 1. 9 Network devices health check †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. 2. 2. 2 Weekly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 2. 1 Configuration Back†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. . 3 Monthly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 3. 1 SWIFT archive and backup†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 NETWORK ARCHITECTURE DESIGN 3. 1 3. 2 3. 3 3. 4 3. 5 Data Center Architecture †¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Omnibus Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Eldorado Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of Branches †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of a sample Branch†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦ vi 3. 6 4 ATM Architecture†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 LINK ESTABLISHMENT, CONF IGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 New link deployment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link vendor selection †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Network maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 4. 1 4. 4. 2 4. 5 Branch Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ATM link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Link troubleshoot checklist†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 5. 1 4. 5. 2 Radio Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Fiber Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4. 6 5 Remote access policy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Wi-Fi AND INTERNET CONNECTIVITY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. 1 Wi-Fi activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ BANDWIDTH MANAGEMENT AND MONITORIN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 1 6. 2 Overview of Bandwidth management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Bandwidth Management at BRAC Bank†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ vii 6. 3 OpUtils†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 3. 1 Switch Port Mapper†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. 3. 2 IP Address Manager†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1 Maintenance of GP Access point Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 1 GP Huawei Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7. 1. 2 ZTE Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 3 ADN Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 1 Western Union†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 1. 1 Installation process†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8. 2 SWIFT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 1 BRAC Bank Swift Network Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 2 SWIFT Infrastructure Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3 Maintaining the SWIFT environment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3. 1 Daily activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦. 8. 2. 3. 3 Monthly activities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 2. 3. 4 Yearly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. MAINTENANCE, MONITORING & SUPPORT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. 1 9. 2 Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. What's Up Gold†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦ 9. 2. 1 Create a New Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9. 2. 2 What’sUpGold Web Server†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 CONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. REFFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues related link vendor selection 8. 1 Support Level 8. 2 User format for Western union 8. 3 Terms and description of SWIFT Page 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank Omnibus Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring & maintenance flowchart ATM Link monitoring & maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7Wi-Fi Activation Process OpUtils Login Page OpUtils Home Page (Summary Report) Switch Port Mapper portion List of Switches List of Routers Switch information summary Finding a MAC address IP Address Manager Modem Installation Profile Creation Profile Change Western Union Installation Swift Network Diagram Swift Infrastructure Creat New Map in What's Up Gold Select device for mapping 23 31 31 32 32 33 33 34 6 . 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 xii 9. 4 9. 5 9. 6 Configure device properties Polling device What’sUpGold Web Server Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is not enough to enable students to compete with self-assurance and reach his/her ambition without having experience with the real world related applications. Internship is highly needed to expand idea, familiarity and experience. Computer networking is one of the most essential terns in order to run a modern organization. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit course as Internship for the undergraduate students in her course curriculum.The curriculum requires every student to do an internship in an alleged firm for hands on experience about the proficient works. It is a realistic exposure of theoretic ally gained knowledge and can be considered as an opening tryout to be acquainted with any organization and to make oneself confident enough to move toward into service life and start building career. As the outside world is very much competitive for anyone after graduation, IUB provides such an opportunity to build up the capability with most appropriate opportunities.This gives the student great opportunity in the service world and also to get exposure to various diversifications of the service world. Intern students are supervised under a particular faculty member throughout their Internship stage. Here the student gets the chance to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are responsible to report weekly or fortnightly to his/her respective Supervisor to get his/her assistance. And the project gets advancement by following the Supervisor’s instruction.The internship period is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main purpose of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about enterprise network. ? Get the clear view about network monitoring and maintenance. ? Relate theory with practice of networking. ? This is the beginning of a student’s professional career. The student’s competency and efficiency in the working environment can be accessed from this course. ? Teaches the student to take up the responsibility and pressure of work. ? Teaches the student to learn from work. ? To help students enhance their creativity and efficiency in dealing with projects related to their field of study. ? Helping students to express dependability, initiative, resource fullness and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work after graduation. 3 1. Scope I’ve done my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, Western Union Installation. My task was configuring router and switches; configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and Western Union Installation.In the later portion of my internship I was also involved support team of Technology User Infrastructure. The task of Support team is to provide instant pc related support to the users as they call for help. The support may be of two kinds, remote – which is given by using VNC, sometimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. Now I’m confident that I could efficiently work in Networking Industry with my full dedication. . 6 About BRAC Bank BRAC Bank Limited (BBL) is a scheduled commercial bank in Bangladesh. It established in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank will be a unique organization in Bangladesh. The primary objective of the Bank 4 is to provide all kinds of banking business. At the very beginning the Bank faced some legal obligation because the High Court of Bangladesh suspended activity of the Bank and it could fail to start its operations till 03 June 2001.Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the Supreme Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank will be a unique organization in Bangladesh. It will be a knowledge-based organization where the BRAC Bank professionals will learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and break barriers to serve customers and create customer loyalty through a value chain of responsive and professional service delivery.Continuous improvement, problem solution, excellence in service, business prudence, efficiency and adding value will be the operative words of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service culture throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believ e in the Bank’s vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and internationally acceptable banking and accounting standards. Sustained Growth in Small and Medium sector, continuous low cost deposit growth with controlled growth in retained Assets. †¢ Achieve efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks other products and services 5 †¢ Manage various lines of business in fully controlled environment with no compromise on service quality †¢ Keep a diverse, far-flung team fully motivated and driven towards materializing the bank’s vision into reality. BRAC Bank will be the absolute market leader in the number of loans given to small and medium sized enterprises throughout Bangladesh.It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop an d grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in accordance with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network maintain all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN & WAN and also ensure utilization of internet and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design: Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, configuration and troubleshooting: By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipment’s to new distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity: Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide secure internet connectivity through proxy server. 7 2. 1. Bandwidth Management: Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing Perimeter firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network: Maintenance of GP Access Point Net work by establishing IPsec tunnel between BBL and GP network to provide intranet facility to SME Unit offices, also use this secure channel for POS transactions. 2. 1. 6 Connectivity and administration of all payment network Software: Ensure connectivity for all payment network software like Western Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring & Support: Maintain all network device, manage network monitoring application and Provide All LAN & WAN related support. Enterprise network also give solution to BRAC Bank subsidiary institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly & Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant basis. BRAC Bank has redundant links for every branch.And mechanism has been applied so that if one link goes down, the backup link is activated automatically. Apart from this Primary link is being used for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN & WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths.Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the daily operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Connection to internet is required for 24Ãâ€"7. Ensuring the interrupt free internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for Web Servers, Internet banking, Eldorado Pr ojects, etc. 9 2. 2. 1. Western Union and Other Remittance Program Support Computer terminals used for Western Union service face various type of problem including connection error, password lock, Western Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivity Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone.Day to day basis we need to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble free and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwi dth utilization, process, and memory usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup Taking weekly backup of critical hardware applications including Core Router, Core Firewall and Core Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup Archive SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture: Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls and security devices. Fig- 3. 1 BRAC Bank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are connected with the Core router.In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are connected with Core Router. In Left side the remo te Branches are connected via Radio or Fiber or VSAT link provided by the some ISP named BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISP’s which provide Internet those are also connected with Core Router via Firewall.The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture: Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the first neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the name of the independent association of member banks and institutions t hat will operate and manage the central switch.As a first step, OMNIBUS integrates the ATM & POS networks of BRAC Bank and Q-Cash, enabling cardholders of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers significant convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking.This instant increase in the number of ATMs & POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet & Link3 with Omnibus and Omnibus server is also connected via Metronet & Link3. 1 5 3. 3 Eldorado Architecture: Eldorado – a web based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank.BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a common electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances more accurately. This will help the member banks to serve their remittance customers even better and faster. 16To popularize the formal banking channels among the non-resident Bangladeshis for sending their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittanc es electronically in the most expeditious and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet & Link3. . 4 Network Architecture of Branches: Fig- 3. 5: Network Architecture of Branches The Branch is connected with Cisco 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for security issue. One Native VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6: Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All De sktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with Phoenix soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is correct or not. If HSM send green signal for PIN then Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all information is saved on Finacle. Last of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment: The process of new link deployment is as followed.Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection: The issue consideration and their descriptions are pointed below. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in same radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have different backbone for intercity connectivity.This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from higher down time and require more maintenance. Licensed Radio Frequency Tower Height for Radio Links This will ensure better service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation charge increases as tower height increases. Longer tower needs more maintenance cost. Service QualityVendors with poor service quality should not be considered even though they have met all other requireme nts. Support Personnel Select vendors that have dedicated support personnel for remote locations. Also count response time for all previous downtime. Balance of Distribution In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance: Following process follows for the network maintenance for link troubleshoot.Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring & maintenance: Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring & maintenance Fig- 4. 3 Branch Link monitoring & maintenance flowchart 4. 4. 2 ATM link monitoring & maintenance Fig- 4. 4 ATM Link monitoring & maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fi g- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac filtering and MAC binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? MAC entry to the Wireless LAN controller’s MAC filter table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional: depends on user’s requirements) MAC entry to the Wireless LAN controller’s MAC filter table For MAC entry need to log in to the below link https://10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 Then login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing)Then go to Security>MAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 Then Select NEW†¦ from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Acti vation Process (Continuing) 26 Put the MAC Address and select SSID (like BBL) as Profile name, Preferred Interface as Interface Name and give user details and select IP address from the existing Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https://10. 00. 83. 251:10000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User Name=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continuing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description box give the user description, in Host name box give the LAN ID of the user in Hardware Address box put the MAC address and put the IP in to the Fixed IP Address box and then select create to make the user. Fig- 5. 1 Wi-Fi A ctivation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management: Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank: BRAC Bank uses some tools for bandwidth management and monitoring.One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to observe the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port rel ated MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http://10. 0. 0. 236:7080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home page shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its IP address information. In Switch Port Mapper portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of RoutersSummary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ff:ff:ff:ff:ff:ff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types: i. ii. Used IP: Currently using IP addresses.Transient IP: was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP: free IP’s are known as Available IP Address. 35 In the left side of the window we can see the group’s name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Mana ger (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network: 7. 1. 1 GP Huawei Modem Installation: Fig- 7. 1 Modem Installation Click the Next > Button for Starting Installation Fig- 7. 2 Modem Installation (Continuous) 38 Click I Agree for Next Step. Fig- 7. 3 Modem Installation (Continuous) Click Next > for Next Step Fig- 7. 4 Modem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Continuous) Click Finish to Complete the Installation. 0 Fig- 7. 7 Profile Creation Click Profile Management. Then Click New for creating New Profile Write â€Å"BRACBANK† in Profile Name. Click Static and write â€Å"BRACBANK† in APN and write *99# in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation: All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile ChangeClick on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write â€Å"BRACBANK† in Configure Filename and *99# in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click Set default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation: APN settings : AT+CGDCONT=1,†IP†,†BRACBANK† Phone number : *99***1# or *99# Need to copy ewusbmdm file from d drive IT Use to Windows system32CHAPTER EIGHT CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union: To install the western union Translink and activate a client Terminal these steps are followed: 8. 1. 1 Installation process: 1. Download file from ftp://10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. Unzip that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped folder Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps: Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Installation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (C ontinuing) 52 6. Install the software like other conventional software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers> properties>Advanced>Performance>Settings>Turn on DEP>Add Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at C:>program files>Western Union Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Start>all programs>Western Union>Agent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation (Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continu ing) 13. Go to Tools (Ctrl-L) And select sign on screen password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select: Printer Model: LaserJet Printer Name/Port: Canon LBP3460 PCL6 Paper Feed: Front SingleFig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to Start>Control Panel> Network Connections>Network Tasks>Create a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select> Next Select Connect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select Virtual Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select > Write company Name Company Name: Link1 Fig-8. 30 Western Union Installation (Continuing) Se lect Next 61 19. If public network page initiated Select Do not dial the initial connection Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select> Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installation (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyone’s Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22.Then Select> Add a Shortcut to this Connection to my Desktop Then Select> Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select> Save this user name and password for the following users; Select > Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the command prompt GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW –p Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW –p Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW –p 25. Then go t o agent config> Communication And ping the connection points IP; From Start>Run 26.Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1: Support Level: Error Type Mom. config Invalid Request Type Out of Memory Error 800 Object error Log Sheet Have To Do Reinstall the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service Reinstall the software Printing C:WINDOWSsystem32drivers Extract the attached file (if it is not present) in C:WINDOWSsystem32 [attachment MSHFLXGD. OCX] go on START -> RUN, Type in: regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The Society for Worldwide Interbank Financial Telecommunication (â€Å"SWIFT†) operates a worldwide financial messaging network which exchanges messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as â€Å"SWIFT codes†.The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which must be settled via correspondent accounts that the institutions have with each other.Each financial institution, to exchange banking transactions, must have a b anking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview: A typical SWIFT customer environment consists of a combination of individual components that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3: Terms and description of SWIFT Terms FIN CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKIDescription Software product that processes and that exchanges FIN messages, by using the FIN application through the SWIFT network. Alliance Access and Alliance Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote A PI. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator.Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices: HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is supported on the same SWIFTNet Link. Secure Hypertext Transport Protocol. A protocol that is used in order to access web servers that are hosted on SWIFTNet.The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an embedded SWIFTNet L ink, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public Key Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment: 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Arrangements have been made for continuous operation Export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is a pplicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the Web station or Web platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI certificates after you have opened them. Use the SNL_BackUp. l command. (Note: This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? Reboot all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING & SUPPO RT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is â€Å"What's Up Gold†. 9. 2 What's Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options:Discover and Map network devices creates a map using the information sources that you select, such as: SNMP information on your network, information you enter about IP addresses; information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in What's Up Gold F ig-9. 2 Creat New Map in What's Up Gold (Continuing) 72 Now as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1: After creating a Blank Map, drag your desired device from Device Type Panel as directed in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements.You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the details. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 What’sUpGold Web Server What’sUpGold provide s a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties.Set up the web server: Click on the links below Configure > Web Server > General > Enable Web Server > Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any What’sUpGold settings; they will have only the view capabilities. Fig-9. 6 What’sUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Bank Limited but also a chance to learn from the good experts.This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. Beginning from the opportunity to tak e the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a somehow protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day.Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES [1] http:// www. bracbank. com [2] http:// www. eldorado-bd. com/MDMessage3. aspx [3] http:// www. bankinfobd. com/banks/3/BRAC_Bank [4] http:// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html [5] http:// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf

Friday, August 30, 2019

Intel Branding Strategy Case

The University of IOWA Tipple School of Management IMBA Program – Intake 6 Prepared By Group 2: Kimmy Wong Diana Hung Mike Yeh Ken Wan Date: 18/07/2009 1. Was the Intel Inside campaign worth it ? What were its strengths and weaknesses? The unfavorable judgment against Intel â€Å"386† trademark in 1991 indicated that any competitor could market its product using the same marks, numerical sequencing, used by Intel. To differentiate from competitors and solve the problem of market confusion among the product offerings, Intel developed an alternative branding strategy by focusing on building the company’s brand image instead of product-based brand strategy. Under the new branding strategy, Intel was established as a brand, a reliable and premium brand, ably transferring the equity of â€Å"386† and â€Å"486† microprocessor to Intel, the company and to distinguish Intel products and to communicate the depth of Intel as a corporation with respect to its competitors as well. To boost the awareness of Intel’s brand name and strong differentiation, the company employed a series promotion campaigns to reinforce the main message of â€Å"Intel Side† aggressively after loss of trademark. Detail of their promotion campaigns are as under: [pic] Intel campaign has successfully introduced the microprocessor to the market and consumers can identify its microprocessor technology. Its success laid the groundwork for moving into next generation. Through repeat impressed promotional message be certain that consumer have Intel technology on the inside. As Intel is the leader and the best microprocessor supplier. In Intel Inside campaign, the company applied â€Å"push† strategy to seek support of the OEMs by encouraging them using Intel microprocessor in manufacturing their product and including the Intel Inside logo in their print ads. Under this strategy, Intel found much infusive reaction from OEMs, created a great awareness of â€Å"Intel Inside† logo and driven positive perception and favorable association towards Intel brand simultaneously. With the help of the program, Intel cut the utter confusion clones bring to the marketplace. In turn, strong brand image and premium status has been built successfully. Moreover, the campaign powerfully in reinforcing on two key associations: â€Å"safety† and â€Å"technology†- whenever and wherever consumers saw the Intel logo and also created a brand image for products that fall under the Intel Side umbrella. At the same time, a â€Å"pull† effect was generated on the consumer and presented a very persuasive argument for OEM to use its product. In turn, it built a remarkable brand value to Intel, the company and its stakeholders as well. This campaign had demolished the negative perception of Intel and well-reposition Intel as a premium brand with promising of â€Å"Safety† and â€Å"Technology†. The new established brand successfully differentiate its product from competitors and help Intel move the market forward into new generations of microprocessor and to leverage its advantage and equity to its new generation of technologies. Frankly, the campaign is worth it since Intel got more than 700 OEMs to signed for the program and induce the first and second tier big OEMs to join co-operation program as well via the â€Å"pull† effect successfully. Consumer research indicated that most viewers of the TV ad remembered the Intel name instead of the product. The Intel, on the other hand, proved much more successful in educating the consumer on the specific product attributes associated with the Intel processor and created a favorable association and positive perception for consumers that they look for Intel inside their PC when making selection. In turn, a synergy effect has been well created for its brand Intel, the company and their customers till today. With the help of the program, Intel’s brand image is indeed associated with power, reliable, affordability, compatibility, technology and experience globally till today. Again, it is an effective campaign which generated lot of awareness for Intel and made the company and its chip program newsworthy in the eyes of the general and business press, and it helps build some creditability and enhancement to the OEMs’ message in the ad as well. Intel is being recognized as the technology leader which has the strongest image on quality, compatibility attributes and became more familiar, popular and delivered a quality message in the world. OEMs benefited from the campaign that their products become a quality product because of Intel chip inside. The Intel brand is one of the top ten known-brands in the world. You can credit these to the Intel Inside program. However, not all the OEMs, especially the first and second tier, were agreed and appreciated with such cooperation program would be greatly affect the penetration of Intel in the market and affect their market share. Moreover, rebate program which offered 30% -50% of rebate to the OEMs customer, incurred heavy cost to execute, caused huge marketing expenses and lower the profit in turn if program fail. Since brand equity can be eroded over time but can be enhanced by marketing actions. We concern huge of expenses has to be spent in marketing on continuous and regular basis for reinforcement of the brand and repeat reminding the customers of the brand. If success, it will create synergies in the brand and return to the company. If fail, on the other hand, it will create a burden to the company. 2. Evaluate the Pentium family of processors. Did Intel make the right decision by extending the name through the Pentium 4 processor? Should the company consider changing the name of the next processor in the Pentium line? Intel planned to introduce the next generation processor, code name â€Å"P5† sometime after the fall of 1992. Given the success of the Intel Inside campaign, it signals any branding strategy developed for the next generation, e. g. P5, would link with the Intel Inside program. In the meanwhile, Intel had leant an experience from Cyrix’s case in March 1992 which had caused a negative influence on its branding strategy. This painful lesson significantly influence Intel management concern the name strategy and as a force driven to review the possibility of altering the chip’s name instead of using 586. Recognized naming process as a major strategic move, Carter took great care by appointed Karen to manage it prudently. Intel conducted extensive search and employee contest for having the right name which is trademarkable and linguistically correct for its 5th generation of microprocessor. Intel developed a series of presentations to keep customers informed of the naming process and product introduction as way of asking for help and understanding before launching but without disclosing the actual name. Intel announced, in October 1992, its fifth generation microprocessor was named â€Å"Pentium† and would begin shipping production version in early 1993. Intel did great job in the naming strategy since â€Å"the name suggest an ingredient and the â€Å"Pent† of Pentium from Greek meaning five, imply the new chip is fifth generation of the family. The â€Å"ium† was added to make the chip sound like a fundamental element. † Absolutely, the name closely linked to Intel in which completely new with some generational concept has been rooted and have a positive association can be worked on global basis. It fully supports Intel’s brand equity till today as well. In addition, Intel conducted a profitable investment in advertising by spending a huge promotion campaign to achieve name recognition as well as acquire high level of awareness and favorable association for the Pentium processor. Intel had rewarded from what it did. In the meantime, the marketing launched a full scale effort to ensure the Pentium name quickly adopted into everyday industry vernacular. Intel’s PR department also phoned all the leading individuals who wrote about the industry to let them know the new name. They sent the author letter correcting the error if they found anyone using â€Å"586† or â€Å"P5†. In return, it was over 90% of press mentions used Pentium instead of â€Å"586†. Moreover, the Pentium processor had been recognized by PC users as a valuable ingredient since then. Intel management understood â€Å"solid position cannot be built on empty promise†. Thus, the company delivery its promise through its strongest product attributes, as under, which highly appeal to the targeted customers and the public as well: i) More than twice as fast as the Intel486 processor; i) With over three million transitors and high MHz offer high speed; iii) Support graphical user interface; iv) Support PC, workstation manufacturers to server and workstation lines; v) Offer power and technology to allow PC manufacturer to head-on address the traditional mini and mainframe market; vi) Made it easier to build the Pentium processor into multi-processor machines vii) The chip would the key to multi-platform, client-server architecture In support of the â€Å"Pentium†, Intel skillfully introduced aggressive â€Å"Technology briefing† campaign to build its brand equity and reinforce its technology leader position, a consumer-styling advertising before available for sale, in the print ad with 4 pages to educate and create demand as well as position the Pentium at the elitist of the market and further reinforce the brand awareness and its powerful features associated with the brand as well. In fact, Intel had made the right decision by extending the name through the Pentium processor. Through this extending, Intel can leverage and transfer its advantages in the valuable brand, in terms of positive perception, favorable association and strong brand equity, to this generation of â€Å"Pentium†. Clearly, it is a main ladder laid for the success of the Pentium. By the way, it created an excellent opportunity for the company moving the Pentium to achieve another climax in the new age. With the experience of i386, Intel also concern the name â€Å"Pentium† and made it protectable legally and by a set of internal and external guidelines from Intel on usage of the name as well. Through skillful extending together with the support of extensive well planned promotion efforts, cautious branding strategy and the huge advertising investment, the premium brand image and position of Intel Pentium has been successfully created and conveyed the positive attributes and preference as well as the favorable association with quality, state-of-art technology, software compatibility and performance which is the OEMs customers wanted to be associated with as well. Obviously, consumer looked for the Intel symbol in making their personal computer selection as a pull effect that adds both intangible (brand equity) and tangible (sales) value to Intel. Furthermore, following the announcement of the Pentium, Intel stopped all the speculation that had surrounded the name since trademark ruling in 1991. Regardless of the numerous debates over Intel’s branding strategy, Intel really did a great job by extending the name and applying the â€Å"branding ingredient† strategy to its new generation of technology. In 1993, Intel had been rated as the third most valuable brand, behind Marlboro and Coco-Cola, with an estimated worth of $17. 8 billion. It signals Intel is being recognized as an undisputed technology leader in which the brand had strongest image on quality and compatibility attributes. Moreover, what they had paid on the promotion now yielding the return through its huge sales of the Pentium chip, which was rising to 640,000 in 1994 from 80,000 in 1993 and further more to 2 million in 1995 and had continuously increased in 1996. It brings a sound return to the company and its stakeholders as well. Given the efforts in building and gaining the brand equity for Pentium, we don’t think it is the right time for Intel to change the name of the next processor in the Pentium line again. Since the customers had just familiar with the name and a favorable perception and association have been well connected the Pentium. Further change will cause confusion to the public within a short period of time. On the other hand, the company might use the number following the name Pentium. For example, Intel may use Pentium I, Pentium II, Pentium III†¦ as a clear indication for the new generation of technology instead of change the name frequently. Beside, staying in Pentium may also take this excellent opportunity to make use of its brand awareness, favorable association and valued brand equity inherent in the name â€Å"Pentium† leverage and transfer to its next generation as well. However, we understand that the innovation and change are necessary and crucial especially in this fast changing high technology and highly competitive world. We have reserved the right to leave the room for that change may happen sometime after few generations so as to better cope with actual changing market arena since there is still room for continue to improve on its branding strategy given surviving in such ever changing world.. 3. Should Intel adopt its Intel Inside campaign for use with its non-PC processor products? What other marketing strategies might the company employ? The Intel Inside program was widely regarded as a success and Intel became a lightning rod for this electronics revolution and paving the way for the computer to become more commonplace in the home and in business. While the Intel Inside Program continues to evolve, it will remain true to its heritage of promoting: â€Å"technology leadership,† â€Å"quality† and â€Å"reliability. † These features will be as important to online users and high-end server buyers today. The brand with an estimated worth of $17. 8 billion and expect to increase in the years to come. Intel recognized that they are in the ever changing global environment and planned to broaden its focus on other non-PC processor products, e. g. fax modems, LAN administration software etc. This is Intel to broaden its product profolio into different categories from its traditional processors and it is a new challenge for the company as well. In fact, the â€Å"Intel Inside† campaign focused solely on the company's microprocessors, such as its popular Pentium line of chips. When Intel broadens its focus to other platforms–not just the microprocessor, the new campaign and new logo is need for better reflecting this change. This will help aligning the brand strategy with its platform strategy. As they evolve as a company, it makes sense to evolve the brand supporting with the new compaign. Thus, retiring the â€Å"Intel Inside† campaign by redesigning a unique marketing program to launch its extension, which may better reflecting its product attributes, might be a wise decision and a drive for the company to leap forward into a new technological age. In the meanwhile, the company can take the leverage advantages heritage from the success of the previous program transferring to these non-pc processor products through the branding extension. Since successful brand extension occurs when the parent brand is seen as having favorable association and there is the perception of fit between parent brand and extension product. Given the favorable, positive and unique associations of the Intel brand to the mind of consumers, we believe the Intel brand name may offer many potential benefits in this extension and it would continue to receive its success as previous as well. This is also an excellent opportunity for the company to identify new and completed different way to use the brand at full potential. However, the success of the new program is highly depending on the marketing efforts, a unique and innovative marketing program as well as with huge investment projected in long term view in the new campaign in order to differentiate from its competitor. Instead of only focusing in microprocessor computer industry, we highly recommend the company should broaden its product range into other potential industry, such as, communication, household appliance industry and entertainment communication etc. and to widen its products in the existing profolio for capturing the potential heritage in the brand for consumer’s choice. Given its leading position in the world, we believe Intel can negotiate with big communication corporations, household appliance companies like Samsung, Sharp, Philips, Panasonic for different profitable co-operation or membership programs. It will be interesting to see if Intel’s strength in the traditional chip sector can translate to the increasing imp ortant mobile field. Intel may partner with first tier of the communication companies, this collaboration could lead to more innovation from the two companies and building products that the two companies can get out ahead of the competition on the emerging segment of mobile and entertainment devices or others etc. The growing importance of the Internet and webpage, E co-operation strategy with the main search engines can be considered to promote its product and its new technology as support to its new campaign to raise its awareness of the new product line. 4. What do you think of Intel’s aggressive expansion away from its core microprocessor business? What recommendations would you make for the future? It is a global trend which creates a pull and push effect for Intel to broaden its focus to entire platforms not just the microprocessor in such highly competitive arena. To continue build up its brand equity, maintaining its leading position and fully utilization of its technological potential and advantages, it is a must for Intel to act in this way respond quickly and deliver a product portfolio that meets the needs of the changing market. It is a long term planning for bring Intel move to other potential business and in more globalize way and stabilize its leader position in this diversification path. In fact, instead of only focusing in microprocessor computer industry, the company now broadens its product range into other industry, such as, communication, household appliance industry and entertainment communication etc. Given its leading position in the world, we believe Intel can negotiate with big communication corporations, household appliance companies like Samsung, Sharp, Philips, Panasonic for different profitable co-operation or membership programs. It will be interesting to see if Intel’s strength in the traditional chip sector can translate to the increasing important broaden field. Intel should boarder its brand name and create sub-brand to allow widen product category development. It should emphasize information about the extension rather than reminder about the Intel Inside brand. To be a house of brand, collecting different high technology product brand name, even if one of the product was not doing well, this would not affect their successful brand image. Most of the improvements come from Asia, such as the increasing present of technology from China corporate present threat to Intel’s global business in certain extent. However, the company reducing its threat and increasing its opportunity by vertical or horizontal integration or acquisition of its competitors or channel members etc. For decades, Intel has developed products, technologies and initiatives for the advancement and betterment of its customers. It has invented groundbreaking creations that truly define the word ‘technology’, and the proof is the Intel logo. Intel’s broadening strategy is also an indication of the company’s mission to ‘drive the next leap ahead – in technology, education, social responsibility, manufacturing and more – to continuously challenge the status quo’. ———————– CONFIDENTIAL . . . . . .. . . . †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Intel ® Corporation Brand Management . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . .

Thursday, August 29, 2019

Foundations Of Alternative Media Development Case Study

Foundations Of Alternative Media Development - Case Study Example Alternative media can take one of many forms – radical media, ethnic or racial media, student media, subcultural media, and indigenous media among other forms. Viewed from either perspective, the underpinnings of alternative media are significantly influenced by the Frankfurt School’s critical social theory. In terms of organization of the paper, the author first provides background information on the Frankfurt School and their critical social theory. In the second section, alternative media as a form of anti-capitalism is discussed. Next is an examination of alternative media as a representation of subcultures. Finally, the author concludes the paper by recapitulating the main ideas in the paper. â€Å"The Frankfurt School† of Critical Social Theory started out in Germany at the Frankfurt Institute of Social Research in 1923. The Institute was founded and initially funded by Felix Weil, a young wealthy Marxist thinker. The goal of the Institute was to consolidate different orientations of Marxist thinking into one research center. The Institute's philosophy was guided by three major historical events: (1) the failed take off of a revolution by Europes working class as predicted by Marx, (2) the emergence and rise of Nazism and (3) the emergence of mass production and consumption, often referred to as "Fordism", after Henry Ford’s mass production of automobiles at his factory(Geuss, 1981). Marx had not anticipated these or similar events. Thus, Frankfurt School thinkers found it necessary to redevelop Marxist thinking in a bid to make sense of the new social conditions. Max Horkheimer first outlined the critical social theory, or simply the critical theory, in his 1937 book Traditional and Critical Theory.

Wednesday, August 28, 2019

Issues Essay Example | Topics and Well Written Essays - 1000 words

Issues - Essay Example Shared decision-making (SDM) which is a collaboration between patients and caregivers in the treatment process, is gaining recognition as the basic necessity of a patient-centric model of care. It is considered to be especially ideal for the treatment of chronic illnesses (Zoffmann et al., 2008). SDM is essentially based on a mutual selection of care goals arrived at by the patient and his physician, but is not well understood or appreciated by many health professionals. Following is a case scenario in point. The trustees of the Snowdon Fund Medical School and Hospital were keen that the organization should revitalize itself and become more productive to keep abreast of competition. A committee comprising of a nominated trustee, experienced administrators, clinicians, and senior nursing staff was formed to draw up a competitive strategy for the same. During a meeting of the committee, Prof. Jones, a senior professor and clinician made a strong case for adopting shared decision-making (SDM) to make the treatment more patient-centric and the hospital patient-friendly. Prof. Jones with more than two decades of experience in treating chronically ill cases was convinced that SDM was the way to go especially where the treatment of chronic diseases was concerned. A perusal of published medical literature (Legare et al., 2008) and her own discussions with her patients had persuaded her to believe that patients want to be involved in their own treatment. Thi s was good, Prof. Jones opined, because with the ever-increasing number of patients taking medicines, allowing them to make informed choices would definitely reduce waste and unnecessary cost associated with non-compliance with the prescribed medication regimen, yet help the patients derive the full benefit of the treatment. In chronic illness, â€Å"adherence to physician designed programs is usually moderate to poor.† (www.amga.org). The

Tuesday, August 27, 2019

Political Science - Globalization and Democracy Critical Review Essay

Political Science - Globalization and Democracy Critical Review - Essay Example However, different approaches are used in each article in order to highlight the potential involvement of globalisation in the governance of countries in the international community: in the article of Cerny (1999) globalisation is considered as influencing mostly the democratic regimes. More specifically, in the above article it is made clear that the increase of the power of globalisation in terms of the governance of states has been achieved through the erosion of democracy, as a key political concept. At the same time, the current and the future role of democracy – as a political concept valuable in nation-states worldwide – are clearly explained. On the other hand, in the article of Hirst and Thompson (2002), globalisation is presented as a set of rules which can lead to the establishment of a global governance and a global economic system without necessarily use as a vehicle an existing political or economic framework; i.e. in the above article, no direct link is e stablished between globalisation and existing political systems. The strengths and the weaknesses of the above articles are presented and evaluated below using appropriate literature. Analysis of the strength and weaknesses of the literature Both articles are based on studies related to the issues under discussion; the literature employed in each article should be critically evaluated aiming to identify the relevant strengths and the weaknesses of these articles. Reference should be made primarily to the role of literature review and the tools used for its incorporation within a particular study – as the above issues are highlighted in studies published in the particular field. In accordance with Hall (2008) the literature can have different aims, including ‘the reference to the views and initiatives of others on specific issues and the identification of the key issues in a specific field’ (Hall 2008, p.34); moreover, the above researcher noted that the tradition al literature review is often inadequate to cover the issues discussed in a particular study – in such cases, it is proposed that meta-analysis should be used, exclusively or in combination with the literature review (Hall 2008, p.35) aiming to increase the credibility of a particular study. On the other hand, Fink (2009) notes that the literature review needs to be based on explicit research questions and search strategies (Fink 2009, p.3) – referring probably to the criteria on which the literature review will be based; otherwise, as Fink (2009) explains, the findings of the literature review could lack of credibility or accuracy. From the same point of view, Birley et al. (1998) explain that the word ‘review’ – as part of the term ‘literature review’ – incorporates certain capabilities, such as ‘exploration, analysis, discussion and summary’ (Birley et al. 1998, p.84). Moreover, Henn et al. (2009) note that the us e of a study in the literature part of a paper needs to be fully justified (p.319) – i.e. the relevance and the necessity of this study as part of the literature used in a paper have to be clearly explained by the researcher. In accordance with Hart (2006) it would be important for a researcher to be aware of the elements and the role of positivism and phenomenology –

Monday, August 26, 2019

Health Care Profession of Physical Therapy Research Paper

Health Care Profession of Physical Therapy - Research Paper Example Moreover, providing information to the readers and encouraging a more positive feedback and recognition towards the field of Physical Therapy is another aim of the author. Physical Therapy is one of the significant professions in the health care field, though may be unpopular compared to the Medical and Nursing profession, this career plays an important role in the aforementioned field. It is possible that most individuals are unaware of the vital contributions of Physical Therapy to the society. Moreover, the whereabouts of Physical Therapy may still be a mystery or probably be vague to many people. Hence, this paper endeavors to discuss and explore the variety of concepts associated with the Physical Therapy profession. Physical Therapy is considered a profession. Profession as defined by Curtis (2002, p. 3) is a special type of occupation, unique from other occupations for the reason that it highlights autonomy, wherein it possesses the right to control its own work, its members and the rules that govern it. Moreover, it is apparent that Physical Therapy encompasses prolonged and specialized training guided by a body of knowledge, which is another characteristic of profession (Curtis, 2002, p. 3). In addition, it is also evident that people involve in physical therapy is oriented towards service and lastly, physical therapist are guided by specific laws, policies and guidelines that shed light to the efficient, proper and effective practice of their profession. Physical Therapy is simply defined as the provision of care and services under the direction and supervision of a physical therapist (Curtis, 2002, p. 4). Conversely, Nordqvist (2009) described physical therapy as â€Å"a branch of rehabilitative medicine with the objective of helping patients maintain, recover or enhance their physical abilities†. Nordqvist (2009) further added that physical therapy is the management and treatment of any pain, disease or injury

Sunday, August 25, 2019

Electronic Art Inc. Analyst Report Assignment Example | Topics and Well Written Essays - 2500 words

Electronic Art Inc. Analyst Report - Assignment Example Today, the company is one of the largest interactive entertainments that deal with the software companies (Zippay, Lori 87). The company is located in CA 94063 in Redwood City. In 2001, Electronic Arts acquired pogo.com. Pogo is at the forefront in offering the services of online family games with nearly seventeen million members who are registered. Because of the company’s popularity, most leading research companies names the acquired firm as one of the stickiest web pages in 2000. But the financial details of the deal remained disclosed. In 2000, the company released The Sims, which was rated as the best-selling personal computer game of all time. In 1998, the company announced that it had signed a deal to buy all the outstanding stock of a company called the Westwood Studios. Additionally, it bought the Virgin Interactive Entertainment studio assets. Virgin Interactive Entertainment is one of the branches of Spelling Entertainment Group. The transaction cost was valued at 1 22.5 million dollars. COMPANY PROFILE Ticker symbol The video game maker company changed its NASDAQ stock exchange from â€Å"ERTS† to â€Å"EA†. The ticker symbol was made effective on Thursday 15th Dec 2011. Therefore, the current ticker symbol for Electronic Arts is â€Å"EA† Mission Statement The mission statement for Electronic Arts is â€Å"We are an association of Electronic Artists who share a common goal. We want to fulfill the potential of personal computing†. Corporate Headquarters The company is a global organization with development studios and offices that are located across the world. The company provides their employees with opportunities and avenues to leverage their talents across various locations of the world. The company makes sure that all workers in all regions are equipped with best investment, great facilities, and support to work while maintaining team spirit and creativity. The company has united locations to generate the passio n of creating great game software which fulfills the quest for entertainment ("Multimedia & Graphics Software Industry Leaders & Laggards: Industry Center - Yahoo Finance."). Electronic Arts operates its corporate headquarters in California in Redwood Shores. Its regional headquarters is in Singapore and Geneva Switzerland. Additionally, the company has worldwide studios in the following areas: United States ( Tiburon, Maxis, Mythic, Visceral Games, and All Play), Canada (All play, Bio Ware, EA Montreal, and EAC ), Europe (Galway, Criterion, Digital Illusions, Phonemic, and Bucharest), and Asia (Shanghai, Seoul, Hyderabad, Pandemic, Singapore, Melbourne) ("Multimedia & Graphics Software Overview: Industry Center - Yahoo Finance."). Date of Incorporation The company was founded and incorporated in 1982 May. The founder of the company was Trip Hawkins. Electronic Arts became the pioneer of the home computer games and was known for promoting the programmers and designers that are respo nsible for their own games. The company became the 3rd largest software companies for games after Activision Blizzard and Nintendo (Zippay, Lori 98). Electronic Arts Executive Name Position Andrew Wilson Chief Executive Officer Lucy Bradshaw Senior Vice President Maxis Frank Gibeau Executive Vice President EA mobile Blake Jorgensen Chief Financial Officer Joel Linzier Executive Vice Pr

Saturday, August 24, 2019

World Leaders Essay Example | Topics and Well Written Essays - 1500 words

World Leaders - Essay Example In this essay, Steve Jobs and Richard S Fuld will be compared for their leadership qualities and accomplishments. Learning from this study will be applied to understand own leadership qualities and key qualities that could help in becoming a better leader will be identified. Conclusions will be drawn based on learning obtained from this entire study. It is first important to understand the background of Steve Jobs and Richard S Fuld. Firstly, Steve Jobs was the co-founder of Apple Inc, the world’s most admired company. He co-founded Apple in 1976, and has ever since been innovating and revolutionising the PC technology. His contributions to this revolution came in the form of ground-breaking personal computers. Jobs’ association with Apple was initially very challenging as Jobs was very clear about how to run his business, which others did not seem to be convinced. In spite of immense growth and success, Jobs continued to face differences with his colleagues due to whic h he had to depart from Apple Inc. He later started another company, Next, which also did excellent business for almost 10 years; during this tenure, Jobs was able to successfully create another computer platform development company and created numerous computer-animated feature films that became very famous. During this time, Apple had realized its loss and asked Jobs to join back as its CEO. Jobs again created history with this return to Apple through his innovation in the form of ipod, iTunes, iMovies, Apple TV, ipad, and iphone (Lussier & Achua, 2009). Secondly, Richard S Fuld is the ex-CEO of Lehman Brothers that filed for bankruptcy during 2008 recession. Fuld is known for his competitive spirit and his traditional style of leadership. After the collapse of Lehman Brothers was announced, Fuld is known to have escaped from the press and did not want to answer their questions, which many found it unethical; he also did not accept that he had done anything wrong (Koch, 2008). His failure is also mainly due to his high risk-taking actions and risky business decisions; his arrogance and overconfidence can also be blamed. It will be interesting to study the leadership styles of these leaders. Both leaders exhibit certain leadership characteristics such as energy, intelligence, knowledge, decision-making, confidence, enthusiasm, independence and desire to lead (Daft, 2008). However, qualities such as honesty and integrity probably lacked in Fuld’s leadership based on the outcomes seen post Lehman Brother’s collapse. Some common leadership traits can be identified in Jobs and Fuld’s leadership such as, risk-taking behaviors, aggression and confidence, passion, and competitive spirit. However, Jobs also had other traits such as passion, creativity, empathy, and vision. On the other hand, Fuld is less courageous, more authoritative and demanding. According to theory, these traits are that of an autocratic leader (Daft, 2008). Steve Jobs also s howed some traits of democratic leadership, such as encouraging others, participation, and dependence on subordinates’ knowledge and abilities. Jobs continuously encouraged his team members to create something new and he was immediately drawn to something different that his team made in terms of technology or products. However, he always looked for perfection and high quality. It was very difficult for the team to match up with Jobs’ expectations. In spite of these findings, Jobs’ leadership can be said to be autocratic and not democratic. Daft (2008) explains that team members tend to

Friday, August 23, 2019

Investigate the employees attitudes and perceptions in an organisation Essay

Investigate the employees attitudes and perceptions in an organisation to discover how these were related to employees job satisfaction and performance - Essay Example These two have been found effective indicators of job satisfaction in past studies. By using a survey questionnaire, the author would like to measure and understand how perception and employee attitude affect job satisfaction and ultimately job performance. In the past, a massive amount of attention has been given to studies involving job satisfaction and employee-related topics. Since the beginning of the industrial revolution, employees and employers alike have both explored opportunities to improve working conditions and productivity that could lead to higher profitability. The changing times and needs of employers have been subjected to criticism and attention. What employers found motivating years ago may be different from what motivates them today? Their attitudes and perception could also be different from recent years. Such is why companies find it crucial to update knowledge and information on subject matter that could improve employee productivity. Happy employees are said to more efficient and productive at work (Durkalski, 2001). They exude a certain aura that also influences others and therefore produces an environment conducive for accomplishing work efficiently. This happiness may be related to job satisfaction and could affect job performance. For this paper, employees attitudes and perception, specifically organizational commitment would be examined and related to job satisfaction. Since job satisfaction is an abstract concept, the author found it beneficial to measure it through absenteeism and turnover ratio of companies. These two have been found effective indicators of job satisfaction in past studies. According to Saari and Judge (2004) different employees have different attitudes. Different people have varying perspectives on their jobs or careers. Even how one may view his or her organization may be different from