enterprise networking(en) march2009 ncceducation

31
Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN) Introduction This assignment will allow me to demonstrate understanding of installing networks including the available equipment, access mechanisms, security issue and shearing data between different sites. I shall plan the implementation of a computer network in municipal libraries department including the estimated coast of installing the network. The department is responsible for ten separate branch libraries throughout the town. Mainly this library loan books to the general public. We have ten separate branch libraries throughout the town. Every branch has a same name but place deferent and it has a central head office. Each branch library has a standalone system. The department will be fully automate the library Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009 Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 1

Upload: ibamin

Post on 27-Apr-2015

199 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Introduction

This assignment will allow me to demonstrate understanding of installing networks

including the available equipment, access mechanisms, security issue and

shearing data between different sites. I shall plan the implementation of a

computer network in municipal libraries department including the estimated coast

of installing the network. The department is responsible for ten separate branch

libraries throughout the town.

Mainly this library loan books to the general public. We have ten separate branch

libraries throughout the town. Every branch has a same name but place deferent

and it has a central head office. Each branch library has a standalone system.

The department will be fully automate the library system each branch so that

loans and returns can be recorded without the need for staff. To manually enter

details such us Book, CD and DVD title, lender, date of issue and date of return,

etc. all libraries are connected in single system for customer facilities. No need for

visited every branch.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 1

Page 2: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 1

Investigate Method that can be used for automatic recording of library item loaned or

returned by customer. Pay particular attention to:

a) The Method of recording the item being loaned or returned.

b) The Method of recording the customer making the loan or returned the item.

C) The due date of return will be generated for items on loan

d) How data may be required manually edited if required.

e) The Equipment required implementing this.

f) The cost to install the equipment in the ten branch libraries.

Provide a recommendation for which equipment to purchase including reason for this

recommendation.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 2

Page 3: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

a)

Method of recording the library item loaned or returned are below.

Open library management application to computer for check customer

information.

Checking out / Returning checked out item to customer

After finding Item, scan the Barcode / Search to find a Barcode for an item or

type the barcode of item.

item information will be displayed on the screen and save to database on central

server, including Item name, Item title, Item type, Call no, Copy, Publication and

all information of item on loan or reserve and any fine.

when transaction successful, the scanner and computer will beep, and the

receipt printer will print a record of the transaction

b)

Method of recording the customer making the loan or returned the item are below.

Open library management application to computer for check customer / item

information.

Scan the library/membership card with the Barcode Scanner.

Customer information Store to database on central server and display including,

User ID, user name, expiration of membership, Phone Number, date of issue

etc.

After complete transaction, tear out the receipt and give it to the customer.

C) The due date of return will be generated for items on loan

Customer with regular cards can have up to 6 loans at a time

Customer with Family cards can have up to 10.

The loan period/due date of return is one weeks.

If Overdue the item, then for each time $0.50 per customer set of fine.Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 3

Page 4: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Once a fine is created, it must be paid to clear the Customer's record

d) If required to entry data manually then I can use library Entry Book, for example:

S/L no Customer name

Customer ID Address Item type Item title ISBN no Date of issue

Signature

1 Jhon U08861 E1 CD Mission Y12-80 26/05/2008

2 Smith D08065 E14 DVD KARZ UC14-1 26/05/2008

3 Gayem S05665 T41/5 BOOK SADU U963-47 20/05/2008

4 Patron A00168 GF7 BOOK H.O.G T 78568 15/05/2008

5 Bond S18744 Bichdown CD IELTS-2 W85214 16/05/2008

6 Myckl N85700 T99/2 CD IELTS-4 Y 2-45-1 12/05/2008

7 Hussy S04767 43Y DVD Superman Y12-694 06/05/2008

e) Equipment required to implementing computerized system.

PC: pc with Intel Pentium 4 processor, 1 GB RAM, 2x*GB/1.5 TB hard disk,

10/100/1000 base-TX Network Interface Card (NIC Card)

Server: server with Intel Core Duo 3GHz processor, redundant dual power,

4(four) SCSI hot plug hard drive with RAID controller and other features.

Network application: windows 2003 server , Linux

Barcode redder (Pen type readers): use for check item and customer

Inter connecting cable: Fiber optic cable, twisted pair cable.

NIC card: A Network Interface Card (NIC Card) will be use to interface between

a computer and network cable.

MAC Bridge: A bridge might be used to connect two different networks.

Repeater: repeater will be use to connects two segment of library network

cable. It retimes and regenerates the signals to proper amplitudes and sends

them to the other segments

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 4

details, The Pen type readers consist of a light source and a photo diode that

are placed next to each other in the tip of a pen or wand. The photo diode

measures the intensity of the light reflected back from the light source and

generates a waveform that is used to measure the widths of the bars and

Page 5: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Router: A router is used to route data packets between the deffrent branch

networks.

Connector: RJ 45 connector with RJ 45 Jack and fiber optic connector.

UPS : (for servers ) uninterrupted power supply of 12 KVA capacity with backup

time of 180 minuet at full load.

f) The cost to install the equipment in the ten branch library

NAME Type NUMBER OF EQUIPMENT

PRICE COST

Unhitch MD210-1 Bar coda redder

Bar coda redder 15 57.96$ 869.40$

Sony VAIO JS All-in-One Desktop

Pc 25 430$ 10750$

HP rp5700 Business Desktop PC

Pc 5 850$ 4250$

Omron E32-DC-200

(50 mm)

Fiber Optic Cable 850 mm 58.45 $ 993.65$

Extreme Networks Networks Summit X150-

48t

Bridge 12 149$ 1788$

Nexans UTP category 5e

solid cable (Box,305m)

UTP cable 3 box 69.50$ 208$

HP 161105-001 CPQ NC3134

NIC Card 30 30$ 900$

APC American Power Conversion Back-UPS RS

1300 VA 120 V UPS System

UPS 30 175$ 5100$

MT-RJ Multimode Fiber Optic Connector

Connector 20 5.10$ 102$

Netgear FVS318 10/100 Mbps 8-Port VPN/Firewall

Router:

Firewall Router 20 146$ 2920$

TOTAL COST 27881.05$

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 5

Page 6: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Recommendation:-

I have used network equipment to install the network in 10 branch library for

computerized system.

At first computer used, without computer we can not think computerized system, to

insure computerized system I have used to each branch of server computer Windows

2003 server data center addition application.

Windows Server 2003, Datacenter Edition is designed for infrastructures demanding

high security and reliability. Windows Server 2003 is available for x86, Itanium, and

x86_64 processors. It supports a maximum of up to 32 processors on 32-bit or 64

processors on 64-bit hardware. 32-bit architecture also limits memory addressability to

128 GB, while the 64-bit versions support up to 2 TB. Windows Server 2003,

Datacenter Edition, also allows limiting processor and memory usage on a per-

application basis.

Windows Server 2003, Datacenter Edition, also supports 8-node clustering. Clustering

increases availability and fault tolerance of server installations, by distributing and

replicating the service among many servers

And for central server I have used Linux operating system, it is designed for general

purpose use on desktops and servers, distributions may be specialized for different

purposes including: computer architecture support, embedded systems, stability,

security, localization to a specific region or language, targeting of specific user groups,

support for real-time applications, or commitment to a given desktop environment.

Furthermore, some distributions deliberately include only free software. Currently, over

three hundred distributions are actively developed, with about a dozen distributions

being most popular for general-purpose use

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 6

Page 7: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Barcode redder used for recording library item and customer detail, when a customer

want to loan or return item to library, librarian will be check item Barcode and customer

ID Barcode use an array of hundreds of tiny light sensors lined up in a row in the head

of the reader, Item and customer detail will store to database in server. Its help to

librarian for find item and customer detail quickly, I think that barcode redder will be

help to record correct information.

Interconnecting link used to establish network connection within different branch.

Without interconnecting link con not establish computerized network.

NIC Card used to connect computer with network, the purpose of the network card is to

prepare, send, and control data on the library network. A network card is the physical

interface between the computer and cable.

Bridge A bridge would allow these segments to see each other and use the same

network resources.

Firewall Modular hardware firewall system having Gigabyte Ethernet port, VPN access

port supporting DMZ configuration

Repeater used to interconnect tow part of network cable. By use repeater signal will be

proper amplitudes to send other part in long distance.

Connector used to connect cable with NIC card and other device

I have used router to routing date packet. It reads the information in each packet to tell

where it is going.

UPS: (uninterruptible power supply) USED for back up electricity, by use UPS I can be

protect data from loss when eclectic are unavailable.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 7

Page 8: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 2

Investigate the methods by which customer could fine details of item

for loan the whole department. As a minimum include the flowing

information:

a) How and where the data from all branches would be stored.

b) The detail supplied to the customer, e.g. item name, location, etc.

c) Security and data protection issue.

Provide a recommendation for how this search facility would be set

up.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 8

Page 9: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

a)

Way and location of store Data from all branches.

From any branch data would be stored to the database by library management

application using the network.

When input data from any branch, data would be store/update to a central

server.

To each branch will be a server (request server).

All branch will be maintain by Central server(database server)

There are will be uses Hewlett-Packard 300GB universal hot-plug Ultra320 SCSI

hard drive. (The Compaq 146GB factory integrated hard drive is a storage

solution that has a FC-AL interface Type. Fiber Channel Arbitrated Loop or FC-

AL allows many servers and storage devices to be connected into a storage

network. This configuration offers flexibility, performance and reliability

advantages to high-end systems. This drive is an upgrade and has a data

transfer rate of 200MB per second and offers the flexibility and expandability to

meet any end-users growing storage capacity requirements.)

Any one / members can fiend information of library item to any branch.

b)

The detail supplied to the customer.

After processing loan or return item, to the customer supplied detailes including the…

1. Membership ID

2. Item name

3. Item Serial No

4. Date of issue/Return

5. Due (if any)

6. Member Address

7. Phone number

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 9

Page 10: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

c)

Security and data protection issue for municipal library

There is no definitive blueprint for designing a secure network; network security has to

be custom tailored to fit the needs of your network, not anyone else's. Consider, for

example, a midsize law firm network. The firm may have a special case information

system that provides access to the firm's cases to lawyers while they are on the road.

While in the office, they no doubt provide all staff with a connection to the Internet.

Network security for such a firm would need to allow access to the case information

system for authorized users on the outside of the network, while simultaneously

ensuring that full access to the Internet is always available to staff on the inside of the

network.

Contrast such a firm to a standard public library with a bibliographic database that

needs to be made available to all users on the Internet and in the library. Good network

security protects your network in a manner that is consistent with its purpose. That

being said, it is important to look at network security from as many angles as possible.

Over view of Security and data protection issue of my library:

The Internet is will be available for public use during library hours for the

purpose of study, reference and research,

Patrons/Brower is required to sign an Internet Registration Form and accept this

online Internet Usage Policy.

Patrons/ Brower are can NOT to be installing their own software programs on

the Library’s computers.

Anti-virus is used to identify and remove computer viruses, as well as many

other types of harmful computer software, collectively referred to as malware.

While the first antivirus software was designed exclusively to combat computer

viruses. Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 10

Page 11: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Database can access with a limited number of licenses needs to have regulated

access.

I will be provide unfiltered Internet access to staff but only filtered Internet

access to patrons.

The Library has implemented software filtering on all of its public Internet

computers. The software protects against access to visual depictions of

obscenity and materials that are "harmful to minors"

Filtering software will block many specific sites that may be offensive to some

users, but may not block all materials that may be offensive to all users.

Users should be aware that the Internet is not a secure medium and that third

parties May be able to obtain information regarding users' activities. However,

Ash field library will not release information on the use of specific Internet

resources by Members of the public except as required by law or necessary for

the proper operation Of the Library.

Recommendation:-

In this task I have define the way of store Data and .Where I will be store all data to

central device via branch server there are have a storage area network (NAS) for store

all information of municipal library The primary purpose of NAS is the transfer of data

between computer systems and storage elements and among multiple storage

elements, and to each branch have a 16 GB hard disk for store branch personal

information.

When any one search for any library item to any branch of library, if found this item in

this library then Ok, otherwise he / she can find this item to other branch of this library

by network via accessing library database on to central server. If found this item then

he or she can go physically to this library branch for collection this item.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 11

Page 12: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 3Investigate the possible network topologies that could be create the

network (LAN) within each branch library and the network arose the

whole Municipal Library Department. Explain how the topology

operates.

Provide a recommendation for which topology to use for each branch

and for the whole department including reasons for this

recommendation.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 12

Page 13: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Network topology is used to municipal library

The possible network topology is used to municipal library are STAR topology. That

could be used to create the network (LAN) within each breach library and the network

across the whole municipal library department.

Figure: A star network for Municipal Library

Advantages of Star Network/Centralize Network

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 13

Local Branch Central server

Switch

The star LAN topology, each station is directly connected to a common central

node. Typically, each station attaches to a central node, referred to as the star

coupler, via two point-to-point links, one for transmission and one for reception. In

general, there are two alternatives for the operation of the central node. One

approach is for the central node to operate in a broadcast fashion. A transmission

of a frame from one station to the node is retransmitted on all of the outgoing

links. In this case, although the arrangement is physically a star, it is logically a

bus; a transmission from any station is received by all other stations, and only one

station at a time may successfully transmit. Another approach is for the central

node to act as a frame switching device. An incoming frame is buffered in the

node and then retransmitted on an outgoing link to the destination station.

Page 14: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Recommendation:-

I have used star topology to create network (LAN) within each branch library and the

across the whole Municipal Library Department, Because Star networks are relatively

easy to install and manage, Easy to detect faults and to remove parts, No disruptions to

the network then connecting or removing devices, Reduces risk of failure, Expanding

the network is simple and Managing the network is centralized.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 14

Better performance: Passing of Data Packet through unnecessary nodes

is prevented by this topology. At most 3 devices and 2 links are involved in

any communication between any two devices which are part of this

topology. This topology induces a huge overhead on the central hub,

however if the central hub has adequate capacity, then very high network

utilization by one device in the network does not affect the other devices in

the network.

Isolation of devices: Each device is inherently isolated by the link that

connects it to the hub. This makes the isolation of the individual devices

fairly straightforward, and amounts to disconnecting the device from the

hub. This isolated nature also prevents any non-centralized failure to affect

the network.

Centralization: As the central hub is the bottleneck, increasing capacity of

the central hub or adding additional devices to the star, can help scale the

network very easily. The central nature also allows the inspection traffic

through the network. This can help analyze all the traffic in the network and

determine suspicious behavior.

Simplicity: The topology is easy to understand, establish, and navigate.

The simple topology obviates the need for complex routing or message

passing protocols. As noted earlier, the isolation and centralization

simplifies fault detection, as each link or device can be probed individually.

Page 15: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 4

Investigate the network media that could be used within each branch

library and to connect between deferent sites in the whole Municipal

Library Department. You will need to investigate data transfer rate,

the packages available from supplier in your location and the cost of

these.

Provide a recommendation for which topology to use for each

branch and for the whole department including reasons for this

recommendation.

The network media that could be used within each branch library: Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 15

Page 16: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

To ensure the network media that could be used within each branch library and to

connect between different sites in the whole Municipal Library Department. I will to

need to ensure data transfer rates.

The Network media that I will be use within each Branch Library.

Fiber optic cable (for branch to central server connection)

Twisted cable(UTP) (for branch network connection)

Omron E32-DC-200 Fiber Optic Cable

Fiber Optic Cable Standard Detection Distance 50 Millimeters With 30 x 30 Millimeter

Opaque Object Temperature -40 to 158 Degrees Fahrenheit Minimum Object Diameter

0.003 Inch Fiber Material Core Plastic Cable Length 6 Feet Black Polyethylene General

Purpose Diffuse Type

Figure: Omron E32-DC-200fiber optic cable

Max. Sensing Distance…………50mm

Type………...General Purpose Diffuse

Weight…………………………….0.10

Price…………………………… $58.45

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 16

Page 17: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Nexans UTP category 5e solid cable

Nexans are one of the world’s largest manufacturers of network and commas cabling

and comes with a 20 year guarantee. This type of network cable is used for permanent

installations and there is metro marking on the cable to show how much cable is left in

a part used box.

Figure: UTP cable

Max. Sensing Distance ( Box) ……………… 305m

Speed and throughput…………….10 to 1000 Mbps

Price:……………………….……………….. £69.99

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 17

Page 18: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Recommendation:

I will be use to install municipal library network as a network media Fiber optic cable

(for connect branch with central server), UTP cable (for interconnect branch network)

Reason of choice this medium:

Fiber optic cable

fiber optic cable is a glass or plastic fiber that carries light along its length

transmission over longer distances and at higher bandwidths (data rates) than

other forms of communications

Fibers are used instead of metal wires because signals travel along them with

less loss, and they are also immune to electromagnetic interference.

Fibers are also used for illumination, and are wrapped in bun

Specially designed fibers are used for a variety of other applications, including

sensors and fiber lasers.

UTP cable

UTP cable is used in a variety of networks

Changes in configuration are simple

making it easy to accommodate moves

UTP wiring is more economical than twisted

It is less expensive to re-configure as user locations change

It is less expensive to install

UTP cabling offers migration to LAN without re-cabling, since the same cable is

used for both LAN and AS400.

Speed and throughput—10 to 1000 Mbps.

Excellent cost/quality ratio.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 18

Page 19: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Task – 5Create a plan for Municipal Library Department network to deal

with major disasters and also to deal with the store term failure of

the system (e.g. a power cut in one branch library). It is impotent

that the system can be update after temporary failure and that

data is accessible in the event of a major disaster.

Plan for disaster overcome in library:

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 19

Page 20: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

Disasters in libraries have many causes, from the dramatic: arson, lightning, tornadoes,

hurricanes and earthquakes to the mundane: electrical faults, Hardware or software

failure, virus attack and burst pipes. A disaster control plan is the written documentation

that records the countermeasures taken against an event which is wholly unexpected

and damages the collections of an institution. It is a document which all organizations,

not just libraries, should have.

Disaster Plans

Generally, a disaster plan describes activities for preventative, responsive and recovery

initiatives. Typically, a disaster plan consists of the following sections:

Storage backup

I will be Keep important financial and database records organized and safe ” Make

backup copies of all critical files such as customer detail, item detail, accounting and

employee payroll data, as well as customer lists, and inventory and store these records

in a safe off-site location and ISP server. By using virtual backup method, these

methods are….

The Virtual Full Backup method was pioneered by R1Soft and overcomes limitations of

the other known backup methods. Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 20

Building Maintenance

A regime of planned and documented building maintenance will go a long way

towards minimizing the risk of floods, fire, theft, vandalism and invasion by

pests. Routines should include regular temperature and humidity checks in

areas designated as vulnerable to damp.

Equipment Maintenance

Equipment maintenance is essential both to ensure that equipment failure does

not cause a disaster and to assure the reliability of equipment in a disaster

situation. Ensure that equipment stored to deal with a disaster is included in

maintenance routines

Page 21: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

The chief drawbacks to all of the other backup methods that Virtual Full Backups

overcome are:

The need for a periodic Full Backup to be done e.g. every week. The weekly

Full Backup that other methods require is extremely time consuming and

intensive on critical server Disk I/O resources.

Incremental Backup methods make restoring very complex as each incremental

must be replayed to return files to a particular point in time.

Incremental and Differential Backup methods provide no long term archiving or

convenient rotation of old backups. For example you can not point and click

Delete an Incremental backup without breaking other backup sets and loosing

data.

The other backup methods are based on tape and do not properly take

advantage of disk based storage. For example a Deltas or unchanged file is

stored in every Incremental backup set multiple times. This makes sense when I

storage media am tape and it needs to be duplicate in each tape. Much Disk

Based backup use Virtual Tape Library (VTL) software to make a file appear like

a large tape. If the storage medium is Disk Based there is no need to store a

Delta or unchanged file more than once! Virtual Full Backups overcome this

limitation.

Hard copy

I will be Keep all information to hard copy in a safe off site.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 21

Page 22: EnterPrise Networking(EN) March2009 NccEducation

Inter national Advances Diploma in Computer Study (IADCS) Enterprise Network (EN)

ReferenceSerial No URL Date Type of

reference

1 http://www.m25lib.ac.uk/m25dcp/prevent.html 18/01/2009 Text

2 http://wiki.r1soft.com/display/TP/Backup+Method+-+Virtual+Full+Backup75

19/012009 Text

3 http://en.wikipedia.org/wiki/Star_network 18/012009 Text

4 http://www.system3x.com/as400_cabling/ 09/022009 PDF

5 http://ops.fhwa.dot.gov/publications/telecomm_handbook/chapter2_01.htm

29/012009 Text

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Municipal library department Module name: Enterprise Network (EN) Page no: 22