.

Thursday, February 28, 2019

Assignment Unit 303 Support Learning Activities Essay

Mrs S the class t from each oneer, the children and I sit down on the carpet and Mrs S asked the children to identify different value coins by sight. I was then asked by Mrs S to help year 1 yellow put over with counting coins and recognising the value of coin. Mrs C gave each table various sum totals of 1 pence, 2 pence, 5 pence and 10 pence coins.I asked all of my table to sit down properly. One child was kneeling on her chair so I explained that she needed to sit down so that she didnt slip and so that everybody could see. The children initially kept grabbing at the m integrityy so I stated that they would all get a numeral individually and to leave the coins alone for the moment. Each child was then asked in turn from left to right to work out how numerous 1 pence pieces were in 2 pence, 5 pence and 10 pence. I referred to the number groove on the wall opposite to demonstrate adding and counting.I recognised that one of the children on my table was very quiet and timid, h e was reluctant to core in at first as a lot of the new(prenominal) children were talking over him. I asked the table to be quiet so that he could concentrate. I then asked him to count all the 1 pence pieces on the table, he responded well and showed mature counting skills, after he had entire I asked if he to the full understood all of the task and he replied with a smile.I then worked with the table as a root word and we discussed what sort of job involved counting coin. Some of the table gave good examples such as working in a shop or bank.A couple of the children appeared to have a greater knowledge of silver and addition so whilst the rest of the table continued to discuss money I asked the remaining dickens to work out bigger sums i.e how many 1 pence pieces were in two 10 pence pieces and how many 2 pence pieces make up 10 pence.Also how many 5 pence pieces were in 20 pence. I monitored their ability to count up in twos and fives they both answered apace and correc tly and seemed to enjoy the task.We then counted the coins again individually, as the children were responding I praised each one stating well done. Unfortunately one child didnt get a turn at the final task because we had flirt out of time. I asked her if she understood all that we had done and she replied yesMrs S verbalise it was nearly break time so I asked all of the children to comprehend to me and tidy away quickly and quietly and explained that if they did this our table would be rewarded with a plunder. Mrs S tied a yellow ribbon around the trophy and awarded our table with it. The children were elated.She then asked me how each child had responded. I explained that they all fully understood the task in hand and although one child did non get time for the final task, she did fully understand. I explained to Mrs S that two of the children I monitored showed a better understanding of Mathematics and money so I decided to progress further with them to maintain their inter est and non distract the others. The table all enjoyed the discussion which was carried out without the need to waul out or jump about on their seats.For future credit I will pay close attention to the time require to complete the task to ensure that each child gets the same amount of turns.

John Locke V Thomas Hobbes Essay

Locke and Hobbes both had detailed accounts as to what the state of personality is. I testament start with Hobbes and what he felt the state of nature is made up of. Hobbes believed in defining the state of nature as what it is instead of what it ought to be. So he focused in on the nature of people and came to a very descriptive conclusion as to how survive in this particular proposition state of nature. He stated that man was equal in ambition, cruelty, and tr apieceery, which in turn assumes humans equal in the ability to kill each other.This is important because he believes that people burn down non live in peace in the state of nature because of those reasons. Also because of this he states that on that point are three principals of quarrels competition, diffidence, and glory. Hobbes feels that because of human nature these three reasons to fight would down over and make the state of nature a state of war. Locke in any case has an opinion to the state of nature. He feels that men would respond to involvements and people more(prenominal) or less them with reason and rationality.Therefore he feels that a state of nature for the well-nigh part peaceful and pleasant. He in addition states that the natural law would channelise humans in a state of nature. He thinks that people spang ripe(p) on from wrong and are capable of doing both yet it is upon the soulfulness to carry out these values. In order to deal with the state of nature each of the twain suggests a social remove. Whatever the take in charge is should be the obligations placed upon the people. They both believe in this particular agreement they fair differ as to who it should be between.Hobbes speaks of the Leviathan and believes that the contract should be between the control and the ruler. He states that a strong ruler is the only way to go for the social contract. He vocalizes that all me are born with three rights the right to property, familiarity, and life. He believ es that the only important right is the right to life because without that right you fire non have a chance to enjoy the other two. So his contract consists of the subjects giving up the other two to the leviathan so that he can ensure the right to life. Lockes social contract differs in many another(prenominal) ways.One of them is Locke does not believe that individuals should not give up liberty, only when instead give up the right to punish people who come out wrongdoings and leave that up to a overwhelming crowd, in this case the hot autonomous thatterflyty. His belief of the state of nature which is that man would use their reasoning and be rational when dealing with other people. So his contract is between the take and the people. Locke and Hobbes social contract may be different but in ways they are similar. They both believe in snub if the contract is broken, but they state it differently.Hobbes believes in the monarch so the confusion against him would be dif ferent then Lockes society of hot sovereignty, but in short it both of them called for persecution in such case. Still the case that called for persecution would course be different because of the different types of governing bodys these men called for. For example Locke says it is time to revolt when a ruler tries to get absolute baron of the people but Hobbes states that the leviathan needs to have absolute power and the only time to revolt is if the monarch is not able to protect the people he rules over.Hobbes explains the descent between the subjects and ruler as do what you told and you will not be killed. This means that these people could not say anything about the way the sovereign is running the kingdom or you are subject to death. This is so in the way Hobbes looked at it because the only way to control the people is a state strong decent to persecute someone for this particular reason. The monarch that Hobbes feels is the only way to govern should not be questioned by anyone as so long he is able to protect the people of the land.Lockes view of the relationship is really different. Based on the innovation of popular sovereignty the sovereign are the people so the relationship is more give and take or democratic. This is a very important c formerlypt to Lockes ideas because this is what differs him the most from Hobbes. His democracy is broken down into three branches executive, legislative, and federal. The elect officials in these positions are an extension of the people so the people who make up the state serves the people until the people are tired of them.What Hobbes and Locke say about people moving into a semi governmental society from a state of nature is pretty similar and all most the same. some(prenominal) say that contracts between people were necessary, but the dilemma in that is that in a state of nature there is no one to enforce the contracts between people. Both of them thought about this concept and figured that in order to move in to a political society someone was needed to enforce these contracts. Hobbes believes that the only one strong enough to force contracts is the monarch.Locke believes the same thing about someone being strong enough to force the contracts but he thinks it should be the elected doing so. Lockes two treatises limited sovereignty more so than it has before. Locke called for a separation of powers. He broke it down into three sections and combined it with the popular sovereignty therefrom the many limitations were in place. I believe Locke included this idea into is initiatory and second treatise because he wanted to not allow the abuse of power that is so evident in a monarchy. This is important because this is what our American frame of democracy is based upon. Hobbes system of government there is very myopic limitation.The only limitation I can see is when the monarch does not provide for the security of the people and they revolt. Though that limitation is called upon by Hobbes the detain of the terms of the monarch have no limitations. The monarch is the ruler and no one can go against him because he is the divine and firing against him is going against god. So the limitations of a monarch are pretty much is inexistent in Hobbess the Leviathan. The rights of the subjects according to Hobbes are the right to live and that is it. The other rights instantly belong to the Leviathan this is needed according to Hobbes to ensure security.A monarch that gives withal many rights to the people is too weak to defend them. This is so because if the monarch is questioned a lot it takes away the fear of the ruler. Hobbes says that fear is needed to handle the people in check. Therefore a sovereign must reading a policy known as shock and awe. Without this strategy someone would feel that they might be able to challenge the monarch. So rights that the subjects travelling bag on the sovereign are limited to the right to revolt if the monarch fails to pr otect them. Locke thinks that people should hold more rights to the elected.The subjects have the right to invest people in the state and take them out. Locke gives people the right to liberty and property. This is different from Hobbes because Hobbes said to give those rights up. Locke says that you can have rights that Hobbes said would not work in transforming into a political society. Hobbes says that subjects cannot ensure that the sovereign roles for the greater good. Because if they are alive it is the greater good according to Hobbes so what can they do to ensure that the ruler is operating for the greater good? gibe to Hobbes nothing because you can not go against the Leviathan on how he is ruling, and to do so can result in you getting killed. So once again the subject has very little to say in the Hobbes ideology. Locke also has a conflicting view with Hobbes on this ability to check the sovereign to make sure he is operating for the good of the people. The main thing th at allows them to ensure what the government doing is right is the ability bring charges against any wrongdoings. This is effective because it does not only kick those people out of office but also brings persecution to them.Another powerful way to make sure government is doing the right thing is the ability to choose or not to vote for people who make up the state. Both Locke and Hobbes are modern political philosophers with different ways of reaching the same objective. Their objective is to transform a state of nature into a political society. Though they disagree on what a state of nature is and they disagree on which is the better political society, but both were apparently right. This is so because both of the philosophies can be applied to life today, which is in a whole different scene of their time.

Wednesday, February 27, 2019

A Study on Enterprise Network Role of Brac Bank

A STUDY ON endeavor mesh topo put downy ROLE OF BRAC BANK by Sabina Kamal ID 0631038 An Internship Report Presented in partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics & Telecommunication engineer INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant professor School of Engineering & estimator Science Independent University, Bangladesh ABSTRACTThis internship discipline is an easy lay study of Enterprise electronic net maneuver percentage at BRAC marge Ltd. The main Objective of this breed is to generate the applicatory bring forth by dint of detect each(a) clear of communicate solution to business systems and lotions of banking concern done flexible info communication pathl, Moreover the strategic direction of enterprisingness engagement places high respec t on data communication systems which poop support several(a) distribution channel ilk break, SMESC, CRM, ATM etcetera finishinged LAN & sicken and in either case ensure utilization of meshwork and intranet effectively. iii ACKNOWLEDGEMENTSFirst of both I wish to convey our heartfelt thank and gratitude to Almighty Allah to complete the internship victor richly and likewise those who all rendered their cooperation in reservation this report. Without their assistance I could non guard completed my internship. I interchangeable to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the fortune to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr.Mohammad Morshed, (Analyst, engineering substance ab substance ab habituater radix, BRAC Bank Limited). Discussions with him about various topics get enriched my conception and familiarity about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior passenger car of interlocking Service) and Md. Mahbubul Alam ( net income Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would non have been possible without the help of the people who admitd tremendous numerate of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my estimable supervisor.My internship achieved its desired success. This internship transcends me the opportunity to practi mention outy work on the overall engine room base cussing systems, focvictimization on the various aspects & analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to retain or support of a Banking System. iv TABLE OF CONTENTS rogue adjoin up OF TABLES .. LIST OF FIGURES . CHAPTER 1 presentment . 1. 1 1. 2 1. 3 1. 4 1 . 2 Introduction .. Origin of the Report . .. Objective of the internship.. scene.. About BRAC BANK.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLE 2. 1 2. 2 Enterprise mesh spot at BRAC BANK everyday, Weekly, Monthly & Other mending duties .. 2. 2. 1 Daily Activates monitor Total Ne 2rk.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN & WAN frequent for Total profit.. v 2. 2. 1. 3 LAN / WAN gage 2. 2. 1. 4 Internet connectivity. 2. 2. 1. 5 westbound concretion and Other Remittance Program .. 2. 2. 1. 6 spry innkeeper nerve . 2. 2. 1. 7 APN connectivity . . .. 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IP. 2. 2. 1. 9 Network gismos wellness check . . .. 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Back.. 2. . 3 Monthly Activities. 2. 2. 3. 1 nimble archive and secondup 3 NETWORK ARCHITECTURE envision 3. 1 3. 2 3. 3 3. 4 3. 5 Data total com sticker architecture .. carriage computer architecture . .. eldorado architecture .. Network compu ter architecture of Branches .. .. Network architecture of a standard Branch vi 3. 6 4 ATM Architecture. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 relate ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 unfermented fall in positionment conjoin vendor withdrawion Network sustentation assort monitoring & guardianship.. 4. 4. 1 4. 4. 2 4. 5 Branch touch base monitoring & nourishment. ATM unite monitoring & keep .. pertain troubleshoot checklist.. 4. 5. 1 4. 5. 2 Radio colligate. . eccentric middleman 4. 6 5 outdoor(a) opening policy. .. Wi-Fi AND INTERNET CONNECTIVITY.. 5. 1 Wi-Fi activation BANDWIDTH focusing AND MONITORIN. 6. 1 6. 2 Overview of Bandwidth management. Bandwidth Management at BRAC Bank vii 6. 3 OpUtils. 6. 3. 1 beat Port partper.. 6. 3. 2 IP predict Manager 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APN 7. 1 forethought of GP Access foreland Network 7. 1. 1 GP Huawei Modem installation. 7. 1. 2 ZTE Modem knowledgeability 7. 1. 3 ADN Modem trigger.. 8 CONNECTIVITY AND ADMINISTRATION OF all PAYMENT NETWORK SOFTWARE.. 8. 1 westerly coupling 8. 1. 1 effectation answer. 8. 2 quick 8. 2. 1 BRAC Bank active Network plat 8. 2. 2 speedy stand Overview 8. 2. 3 Maintaining the swift environs 8. 2. 3. 1 Daily activities 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activities . 8. 2. 3. 3 Monthly activities .. 8. 2. 3. 4 Yearly activities.. MAINTENANCE, observe & SUPPORT 9. 1 9. 2 Overview.. Whats Up Gold 9. 2. 1 Create a New Map. 9. 2. 2 WhatsUpGold mesh server 10 completion.. REFFERENCES 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues tie in yoke vendor selection 8. 1 Support Level 8. 2 user formatting for horse opera union 8. 3 Terms and comment of fast rogue 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank passenger vehicle Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process f pitiable diagram Network Maintenance flowchart Branch Link monitoring & attention flowchart ATM Link monitoring & maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process contrasted Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7Wi-Fi Activation Process OpUtils Login Page OpUtils al-Qaeda Page (Summary Report) belabor Port coconspirator portion inclination of an orbit of Switches List of high mannerrs Switch cultivation summary Finding a mac speak IP oral communication Manager Modem barge ination write Creation indite Change westbound coalescency origination Swift Network Diagram Swift Infrastructure Creat New Map in Whats Up Gold Select machination for useping 23 31 31 32 32 33 33 34 6. 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 dozen 9. 4 9. 5 9. 6 Con interpret device properties Polling device WhatsUpGold wind vane boniface Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is non adequate to modify students to compete with self-assurance and reach his/her ambition without having experience with the real world tie in applications. Internship is highly claimed to put out idea, familiarity and experience. Computer meshinging is one of the most essential terns in order to run a modern governing body. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit bod as Internship for the cumulusstairsgraduate students in her course political program.The curriculum requires e genuinely student to do an internship in an alleged firm for manpower on experience about the pr oficient whole caboodle. It is a realistic icon of theoretically gained knowledge and roll in the hay be con expressionred as an opening auditory sense to be acquainted with any organic law and to get ahead oneself confident enough to move toward into service life and start building c atomic number 18er. As the away world is very much competitive for anyone aft(prenominal) graduation, IUB leave alones such(prenominal) an opportunity to build up the capability with most appropriate opportunities.This gives the student peachy opportunity in the service world and also to give out picture show to various diversifications of the service world. Intern students are supervised under a token faculty member throughout their Internship stage. here the student gets the incur to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are trusty to report weekly or fortnightly to his/her respective Supervisor to g et his/her assistance. And the project gets advancement by come outing the Supervisors instruction.The internship arrest is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main tendency of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about go-ahead net. ? Get the clear view about internet monitoring and maintenance. ? bear on theory with practice of lucreing. ? This is the beginning of a students schoolmaster career. The students competency and efficiency in the working environment give the sack be accessed from this course. ? Teaches the student to take up the responsibility and pressure level of work. ? Teaches the student to learn from work. ? To help students sharpen their creativity and efficiency in dealing with projects r elated to their field of study. ? Helping students to express dependability, initiative, resource fertility and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work aft(prenominal) graduation. 3 1. Scope Ive do my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, western totality generalization. My task was configuring router and switches configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and westerly Union foundation.In the later portion of my internship I was also knotty support group of Technology User I nfrastructure. The task of Support team is to set up instant pc related support to the users as they call for help. The support may be of two kinds, irrelevant which is granted by using VNC, approximatelytimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. instantaneously Im confident that I could efficiently work in Networking attention with my full dedication. . 6 About BRAC Bank BRAC Bank Limited ( bbl) is a scheduled commercial border in Bangladesh. It reali interpretd in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank depart be a extraordinary organization in Bangladesh. The primary objective of the Bank 4 is to provide all kinds of avering business. At the very beginning the Bank faced somewhat legal obligation because the High royal court of Bangladesh suspended activity of the Bank and it could miscarry to start its operations till 03 June 2001.Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the imperative Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank go away be a unique organization in Bangladesh. It get out be a knowledge-based organization where the BRAC Bank professionals allow for learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and jailbreak barriers to serve customers and induce customer loyalty through a value chain of responsive and professional service delivery.Continuous improvement, problem solution, worth in service, business prudence, efficiency and adding value will be the operative row of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service conclusion throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believe in the Banks vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and externally acceptable banking and story standards. Sustained Growth in Small and Medium sector, continuous low cost deposit stupefyth with controlled growth in retained Assets. arrive at efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks some some other products and services 5 Manage various lines of business in fully controlled environment with no compromise on service quality redeem a diverse, far-flung team fully motivated and driven towards materializing the banks vision into reality. BRAC Bank will be the absolute foodstuff leader in the number of loans given to small and medium surface attempts throughout Bangladesh.It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop and grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in amity with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network husband all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, More over the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN & WAN and also ensure utilization of net income and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, anatomy and troubleshooting By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipments to tonicfound distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide pander net profit connectivity through proxy server. 7 2. 1. Bandwidth Management Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing gross profit margin firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network Maintenance of GP Access Point Network by establishing IPsec tunnel between BBL and GP network to provide intranet preparation to SME unit of measurement offices, also use this secure channel for POS minutes. 2. 1. 6 Connectivity and tribunal of all compensation network Software Ensure connectivity for all payment network software like westward Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring & Support Maintain all network device, manage network monitoring application and Provide All LAN & WAN related support. Enterprise network also give solution to BRAC Bank hyponym institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly & Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant basis. BRAC Bank has redundant links for every branch.And utensil has been applied so that if one link goes down, the indorseup link is touch off automatically. Apart from this Primary link is being apply for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN & WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths.Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the effortless operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Con nection to internet is required for 247. Ensuring the interrupt destitute internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for vane Servers, Internet banking, Eldorado Projects, etc. 9 2. 2. 1. occidental Union and Other Remittance Program Support Computer terminals used for western Union service face various type of problem including club erroneousness, battle cry lock, western sandwich Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivity Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone.Day to day basis we enquire to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble throw overboard and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwidth utilization, process, and warehousing usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup pickings weekly backup of critical ironware applications including hollow Router, core Firewall and mall Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup memorandum SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture Data center is a zeal used to house computer systems and associated fragments, such as telecommunications and shop systems. It principally includes redundant or backup power supplies, redundant data communications participations, environmental controls and security devices. Fig- 3. 1 BRAC B ank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are affiliated with the aggregate router.In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are committed with hollow out Router. In Left side the remote Branches are connected via Radio or Fiber or VSAT link provided by the some ISP touch ond BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISPs which provide Internet those are also connected with Core Router via Firewall.The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the depression neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the find out of the independent connective of member banks and institutions that will operate and manage the central switch.As a first tempo, OMNIBUS integrates the ATM & POS networks of BRAC Bank and Q-Cash, enabling card carriers of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers satisfying convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking.This instant increase in the number of ATMs & POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet & Link3 with Omnibus and Omnibus server is also connected via Metronet & Link3. 15 3. 3 Eldorado Architecture Eldorado a vane based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank.BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a earthy electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances much accurately. This will help th e member banks to serve their remittance customers even remediate and faster. 16To popularize the formal banking channels among the non-resident Bangladeshis for perpetrateing their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittances electronically in the most bustling and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet & Link3. . 4 Network Architecture of Branches Fig- 3. 5 Network Architecture of Branches The Branch is connected with lake herring 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for se curity issue. peerless immanent VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6 Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All Desktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with capital of Arizona soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is fabricate or not. If HSM send green signal for PIN thereforece Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all teaching is saved on Finacle. dwell of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment The process of new link deployment is as followed.Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection The issue consideration and their descriptions are pointed under. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in homogeneous radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have diametric backbone for intercity connectivity.This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from high down time and require more(prenominal) than maintenance. Licensed Radio oftenness Tower Height for Radio Links This will ensure kick downstairs service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation incriminate increases as tower height increases. Longer tower needs more maintenance cost. Service QualityVendors with woeful service quality should not be considered even though they have met all other requirements. Support military group Select vendors that have dedicated support personnel for remote locations. overly count response time for all previous downtime. Balance of dispersion In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance Following process follows for the network maintenance for link troubleshoot.Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring & maintenance Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring & maintenance Fig- 4. 3 Branch Link monitoring & maintenance flowchart 4. 4. 2 ATM link monitoring & maintenance Fig- 4. 4 ATM Link monitoring & maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fig- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac gain vigoring and mac binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? mac entry to the Wireless LAN controllers mac slaver table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional depends on users requirements) MAC entry to the Wireless LAN controllers MAC filte r table For MAC entry need to log in to the below link https//10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 indeed login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing) then(prenominal) go to SecurityMAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 and so Select juvenile from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Activation Process (Continuing) 26 Put the MAC prognosticate and select SSID (like BBL) as visibility name, Preferred Interface as Interface boot and give user details and select IP address from the be Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https//10. 00. 83. 25110000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User address=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continu ing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description disaster give the user description, in Host name box give the LAN ID of the user in Hardware language box put the MAC address and put the IP in to the Fixed IP maneuver box and then select create to make the user. Fig- 5. 1 Wi-Fi Activation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management Bandwidth management is the process of measuring and unconditional the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank BRAC Bank uses some woodpeckers for bandwidth management and monitoring.One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to watch the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port related MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http//10. 0. 0. 2367080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home rapscallion shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its I P address information. In Switch Port Mapper portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of RoutersSummary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ffffffffffff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types i. ii. Used IP before long using IP addresses.Transient IP was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP free IPs are known as Available IP Address. 35 In the left side of the window we can see the groups name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Manager (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network 7. 1. 1 GP Huawei Modem founding Fig- 7. 1 Modem foundation jail the neighboring Button for Starting creation Fig- 7. 2 Modem Installation (Continuous) 38 pervade I Agree for succeeding(a) Step. Fig- 7. 3 Modem Installation (Continuous) Click adjoining for Next Step Fig- 7. 4 Modem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Conti nuous) Click Finish to get by the Installation. 0 Fig- 7. 7 compose Creation Click Profile Management. Then Click New for creating New Profile Write BRACBANK in Profile ca-ca. Click Static and write BRACBANK in APN and write *99 in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile ChangeClick on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write BRACBANK in Configure Filename and *99 in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click come out default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation APN settings AT+CGDCONT=1,IP,BRACBANK Phone number *99***1 or *99 bring to copy ewusbmdm file from d drive IT Use to Windows system32CHAPTER eight-spot CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union To install the western union Translink and activate a leaf node Terminal these steps are followed 8. 1. 1 Installation process 1. download file from ftp//10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. unfasten that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped brochure Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Installation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (Continuing) 52 6. Install the software like other formulaic software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers propertiesAdvancedPerformanceSettingsTurn on DEPAdd Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at Cprogram filesWestern U nion Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Startall programsWestern UnionAgent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation (Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continuing) 13. Go to Tools (Ctrl-L) And select sign on sift password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select Printer Model LaserJet Printer Name/Port Canon LBP3460 PCL6 Paper Feed Front SingleFig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to StartControl Panel Network ConnectionsNetwork TasksCreate a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select Next Select Conn ect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select virtual(prenominal) Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select Write company Name Company Name Link1 Fig-8. 30 Western Union Installation (Continuing) Select Next 61 19. If public network page initiated Select Do not control the initial connectedness Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installation (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyones Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22.Then Select Add a Shortcut to this Connection to my Desktop Then Select Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select Save this user name and password for the following users Select Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the control condition run GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW p Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW p Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW p 25. Then go to agent config Communication And ping the connection points IP From StartRun 26.Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1 Support Level misconduct Type Mom. config In sensible Request Type Out of Memory demerit 800 Object error Log Sheet Have To Do set up the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service put in the software Printing CWINDOWSsystem32drivers Extract the attached file (if it is not present) in CWINDOWSsystem32 attachment MSHFLXGD. OCX go on START - RUN, Type in regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The partnership for Worldwide Interbank Financial Telecommunication (SWIFT) operates a worldwide financial communicate network which exchanges messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as SWIFT codes.The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which mustiness be settled via correspondent accounts that the institutions have with each other.Each financial institution, to exchange banking transactions, must have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview A typical SWIFT customer environment consists of a combining of individual roles that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3 Terms and description of SWIFT Terms quintet CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKIDescription Software product that processes and that exchanges FIN messages, by using the FIN application through the SW IFT network. alinement Access and coalescence Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote API. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator.Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is support on the same SWIFTNet Link. Secure Hypertex t Transport Protocol. A protocol that is used in order to access network servers that are hosted on SWIFTNet.The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an introduce SWIFTNet Link, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public report Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Ar rangements have been made for continuous operation export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is applicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the entanglement station or blade platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI cert ificates after you have opened them. Use the SNL_BackUp. l command. (Note This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? get up all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING & SUPPORT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is Whats Up Gold. 9. 2 Whats Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options advert and Map network devices creates a map using the information sources that you select, such as SNMP information on your network, information you enter about IP addresses information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in Whats Up Gold Fig-9. 2 Creat New Map in Whats Up Gold (Continuing) 72 this instant as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1 After creating a Blank Map, hale your desired device from Device Type Panel as order in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements.You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the detai ls. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 WhatsUpGold Web Server WhatsUpGold provides a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties.Set up the web server Click on the links below Configure Web Server General Enable Web Server Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any WhatsUpGold settings they will have only the view capabilities. Fig-9. 6 WhatsUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Ba nk Limited but also a chance to learn from the skilful experts.This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. showtime from the opportunity to take the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a in some way protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day.Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES 1 http// www. bracbank. com 2 http// www. eldorado-bd. com/MDMessage3. aspx 3 http// www. bankinfobd. com/banks/3/BRAC_Bank 4 http// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html 5 http// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf

Eco-Final Paper

plan and Operating Currently, we are In the middle of moving her photography studio from our home to a forward-looking d acceptt testify location. The new dummy Is all over 1,500 square feet of studio space with a full basement for transshipment center of props. With such a large space, she has decided to liberal a dress shop store along with her new studio. She Is going to Incorporate the merchandise end-to-end her space so It still feels Like a studio, but items pull up s crawfishs be for sale throughout the store,studio. She is going to be selling whatever of her most popular items that she uses for props.Instead of subverting props, outfits and boutique items for implies to use during the sessions, she is going stand a miniscule boutique line that go forth be open during the week to the public. The boutique exit be open Monday, Wednesday and Friday for shopping, and then she go away be holding photo sessions on the weekends. The move bequeath take her vocation to the next step. This new location go away benefit her and it leave behind benefit her pictures. Space is a must when you are working with children and larger groups in photography and this building has plenty of open space to fancy all of those fun smiles.This also gives back to the customers, It gives hem a to a greater extent passe-partout feeling when they show up for pictures. It go out be a win for both the customers and the photographer. Market Structure The market structure for photographers would learn be a pure competition as any unrivalled can buy a camera and take photographs, but if you are looking for headmaster pictures or investment prints then you need to look for a professional photographer. If you ask around I am sure you allow be able-bodied to find a handful of photographers. Many do this as a hobby, others do it for special income without jumping all the way in.You aim the local department stores or grocery stores who offer photos for a thin exp enditure ad then you start out the professional photographers who involve their own space and style. Once you get to this direct I feel that they blood into the oligopoly. There are a throttle number of quality photographers who aim a price that is comparable to each other. To get to this level in that location are obstacles to overcome which lines the barriers to entry a little more complicated, reckon and Non Pricing Strategies The main marketing tool for her photography business has been intelligence information of mouth. I Nils NAS Eden very positive Ana seen NAS a strong wipe AT clientsWalt ten new location, she is going to be introducing a new referral program. With each order, she pull up stakes provide eight referral cards to be pass out. For each referral that books a session and follows through with the session, the client who referred them provide fulfil a $50 credit for future sessions/orders. She has also spent a lot of time researching print prices. Eac h photographer has there own strategy and style, but she has kept with an a-la-cart style with reasonable prices. Staying away from packages of prints or sheets of prints, this go away allow each client to specifically order hat they want.With a downtown presence, this will open the door for new prospects away of word of mouth. While having unremitting hours, this will allow customers to come in and see her studio, see her photos that she has displayed and meet the photographer. This should ca-ca a more ad hominem relationship with customers, the community and other downtown businesses. In conscionable the fewer days that we have been in painting two neighboring business have requested company photo sessions. Visibility of the store front end is already paying off. Appropriate Course and Credit Market photography is a prodigality for individuals and families.It is an art to be able to create a photograph that someone wants to purchase and frame in their home. Not every fam ily wants to have a professional photo of their newborn mollycoddle, but the families who do will receive an assortment of pictures that they will cherish forever. This quality of process that a photographer provides has a price tag though. This profession has legion(predicate) antithetic categories. If you want photos done by J Pennies or groyne Mart, you will be able to receive numerous photos for a small price. These photos re very generic and no time on change is spent to make sure each photo is special.As a in the flesh(predicate) photographers experience increases, their prices increase as well. They are selling an investment, a luxury item at a particular price. Her research on boutique items has brought another branch to her business. Her main focus will be cocker boutique and she will offer mostly items for babies and small children. The boutique will offer wooden baby teething toys, diaper bags, baby clothing, baby leggings, specialized tote bags and specialized ha ir clips. Each of these items are airily inexpensive to make or buy so there will be a small outlay of inventory costs.As a boutique shop with specialized products, prices will result in a flourishing net profit per item sold. This will be extra income as she plans to be in the studio during the week already. She will also have space to offer more of her products related to photography. She currently offers many contrastive products for prints such as, mount photos, canvases, stand out photos and a wooden mounted photo. She also offers baby announcement cards, holiday cards and Jewelry with photos. With the additional space in the studio, she will be able to showcase these products that will have the potential for increased sales.Showcasing products to customers is a great way to have them visualize what they would want in their homes. Profit Maximizing Revenue will increase with any level of sales from the boutique as this will be an entirely new market for the business. Dependi ng on how the items marketed sell, will determine what other item will be offered. As the seasons change, the clothing choices will follow suite. New items will exsert to be introduced and marketed as e believe this is a great way to have customers continue to go through the store.Changing merchandise wall create tramcar on a regular Oasis. A Tee ways to reduce ten price AT merchandise would be to develop and produce our own inventory or be able to purchase large quantities of inventory at one time. Since a boutique store is more known for having limited items, organism able to purchase wisely or developing and producing boutique items will be the best alternative to reducing merchandise costs. Revenue out-of-pocket to the fact that the boutique portion of the business is extra, any revenue hat is made on boutique products is a plus.Her main focus is to continue to keep the photographer studio busy because taking pictures is what is going to pay the rent. On the boutique side, sh e is going to focus on developing different products and merchandise during the weekdays and will continue with her photography work on the weekends and weekday nights. With the limited hours during the weekday, she feels that she will be able to keep up with the local demand. When/if it reaches the level where an additional employee would be needed, we will look at the numbers to make sure it is Justified.The longer we can keep the business within the family, the divulge and more profitable we will be. With the boutique items being made and bought from wholesalers, this will create a specialty market which will be gruelling for another business to copy. Also with the specialty merchandise, this will warrant a higher price as creativity has a higher price tag. This along with her photography skills, these two businesses will go hand in hand. Each photographer has there own style, and with the creativity that she has will guard over into the boutique business.Conclusion Overall, t he photography business will be able to Justify the new space by itself the boutique portion of the space will allow her creativity to be available to customers that are Just browsing or customers who have a scheduled photo session. No matter how you look at it, the exposure that the business will create by being downtown will be positive and will hopefully create a broader customer base. Reference McConnell, C. R. , Bruce, S. L. & Flynn, S. M (2009). political economy Principle, problems, and policies (18th deed. ). New York McGraw Hill/Larkin.

Tuesday, February 26, 2019

Barclays Scandal: Libor

From Amanda Chua, Financial Manager To Sir David Walker, Chairman of Barclays Plc. Date twenty-fourth February 2013 Subject Implication of The Recent Libor-Fixing Scandal for Barclays Bank 1. Executive abridgment * The London Interbank Offered rank (Libor) is the average interest tread charged to banks for alter specie in the interbank market (Investopedia n. d. ). * The UK Treasury report that Libor is responsible for an estimated $ three hundred trillion worth of pecuniary transaction (BBC 2012). Barclays traders hold oerted inappropriate rank upon differential coefficient traders request (FSA 2012). * Barclays submitted inappropriate identify to prevent negative media attention (FSA 2012). * Barclays was fined ? 290 meg for Libor poop (Wilson 2012). * Former Chairman, CEO and COO re attributeed in July 2012 (BBC (B) 2013). * Barclays shargon prices fluctuated out-of-pocket to Libor Scandal (Fletcher 2012). * Pursuing profit maximization, Barclays necessarily exploi ted its stakeholders (MBA Knowledge alkali n. d. ). Financial managers think solely for the purpose of profit maximization for the shareowners as it lose focus, carrying out unhonorable behaviors to gain short-term gratification. * Barclays is suggested to create shareholder value by combining a swell up-thought-of terminal with focused fiscal grooming that pass on deliver returns to shareholders but in an ethical manner that is grateful by the society (Barclays Boss Lays Out revitalisation Plans, 2013). * Installation of more(prenominal) modern surveillance devices further enforces plan as employees are observeed closely in efforts to control the wellbeing of the workers (Roland 2013). Barclays is suggested to form a neutral ring-fenced rate-setting unit to monitor the rates submission (Daniels 2013). 2. Libor Explained The London Interbank Offered tempo (Libor) is the average interest rate charged to banks for lending cash in the interbank market (Investopedia n. d. ). Major banks in London who are under BBA submit the rate they presume they will have to pay for borrowing funds from an other(a) bank to Thomson Reuters, who will then discard the four lowest and highest rates and use the emainders to calculate the average, resulting with the Libor rate (Kiff 2012). The importance of Libor It is used as the benchmark for interest rates around the world (Surowiecki 2012). The UK Treasury reported that Libor is responsible for an estimated $ three hundred trillion worth of financial transaction (BBC 2012) much(prenominal) as mortgages, corporate loans and derivatives (Surowiecki 2012). Also, Libor acts as a barometer for the welfare of the volatile global financial market (BBA n. d. ). 3. Barclays mistakesEmployees at Barclays submitted lower than actual predicted rates to Thomson Reuters (Murray-West 2012). why it was d atomic number 53 Derivative transactions made use of the Libor rate. Hence, the fluctuation of the rates would influence the p rofit gained for the traders (Surowiecki 2012). Both the traders and rate submitters cooperated through frequent interaction (Surowiecki 2012) as traders requested for lower rates because they would benefit by gainful less for the interest charged on the derivatives.Barclays submitted lower rates to wait the trouble state it faced during the 2008 credit crunch (Murray-West 2012) when initially their submitted rates were high than other banks (Bischoff & McGagh 2013). Lower rates prove that banks intending to lend funds to Barclays were assertive of their financial health, because the less assurance a bank had for another, the higher the rate charges will be (Bischoff & McGagh 2013), and Barclays expressed the contrary to conceal their financial instability.It was said that bobsleigh Diamond, then chief executive officer of Barclays, was contacted by Paul Tucker, the deputy governor of the bank, concerning the recurrent greater rates amongst other banks, which worried Diamond wh o conveyed the intelligence agency to Jerry del Missier, then chief operating officer, who misinterpreted the currents as a command to rig the rate (Bischoff & McGagh 2013). How it was done. It was effortless to master the rates because they are derived from estimates rather than calculated values (Eavis & Popper 2012).Also, interbank borrowings were reduced during the financial crisis ca using difficulty in evaluating whether submitted rates were realistic (Wheatley 2012). 4. Consequences for Barclays scandal Manipulating the Libor rate is intolerable and investigation involving the FBI is a themeal toll in itself (R. D. 2012), not and towards Barclays but in the banking sector as a whole where regulators are still speculating which other banks were involved (Bischoff & McGagh 2013). Barclays received a total of ? 290 billion penalty from FSA, CFTC and DoJ (R. D. 012) for manipulating the Libor rate. Furthermore, former Barclays chairman, Marcus Agius resigned on July 2nd 20 12, followed by Bob Diamond and Jerry Del Missier on July 3rd 2012 as a result for their elaborateness in the LIBOR scandal (BBC (B) 2013). Similarly, 3700 employees were discharged to reorganize the Barclays banking regime (McGee 2013). As Libor accounts for $300 trillion worth of financial transaction, this affects many because lenders lose out as the borrowers benefit from the low interest rate charges and people are very disappointed at the extend to where Barclays has went to.Due to the scandal, Barclays share prices fluctuated because the market expected charges for lawsuits against Barclays and it reflected the reputational damage Barclays has encountered for its involvement in the scandal (Armour, n. d. ), though this has caused an overhaul in Barclays that resulted in the increase of share prices months after. Moreover, investment firms and municipal government who fell victim to the Libor scandal due to the buying of bonds or signing of contracts demanded reimbursement from Barclays and will inevitably elicit legal actions (Bloomberg News 2012). 5. Role of Financial ManagementProfit maximization is the terminus of financial management (Hillier et al, 2011) indicating that its objective is gaining greatest profits by using all likely resources irrespective of the consequences or underlying risk (OFarrell n. d. ). This is seen as Barclays traders tried to maximize profits for their own benefit as well as their stakeholders. Shortcomings of Profit Maximization During the financial crisis, banks were financially unstable, they refused to borrow one another funds because of the low confidence they had for one another, seen through the Libor ratings that were previously submitted before the Libor rigging scandal.Barclays chose to conceal its proper Libor rates that would have indicated its upset state to the public. This was second by the fact that a firm who pursues the goal of profit maximization will inevitably exploit its workers and consumers, which exemplify an unethical way of carrying out a business resulting from its corrupted practices (MBA Knowledge brute n. d. ). In Barclays case, this was shown by its objective to save the banks reputation by finding means to profit maximize to avoid possible outcomes of failure.Jerrys assumption of Bobs instruction to fix the Libor rate when it was unfavorable (Bischoff & McGagh 2013) is another illustration of profit maximization gone misuse when financial managers think solely for the purpose of profit maximization for the shareholders as it diverge its actions by carrying out unethical behaviors to gain short-term gratification. Barclays has miss possible risks because they were in like manner focus on profit maximization as they rigged the Libor for the past years. Risk ignorance is another flaw of profit maximization (eFinance Management n. . ) because firms tend to be shortsighted towards maximizing profit they desolate their morale. This is shown by the reputational d amage as a consequence of the scandal. Lastly, the disregard of musical note is a shortcoming (eFinance Management n. d. ) shown through Barclays scandal because Barclays obsessed over profit maximization, it neglected the goodwill of the bank. Barclays being a world-renowned bank that was get through the years overlooked its goodwill as an asset as it rigged the Libor rate to earn short-term profits. . Summary It can be concluded that Barclays manipulation of the Libor rate was unacceptable. However, they have taken full certificate of indebtedness over the consequences. It is suggested that Barclays make an overhaul in its management by changing its mentality from a bank that gravitated its goal on profit maximization to prioritizing an ethical environment before its success (Mcgee 2013) through removing workers incapable of committing to the rewrite goal (BBC (A) 2013), as this will be a long-term change. (Waldie 013) Antony Jenkins, the new Barclays CEO mentioned in Barclay s Boss Lays Out Revival Plans (2013) that Barclays was previously too shortsighted as well as being too rapacious and self-serving. Nonetheless, the current damage helps Barclays to learn from experience. Presently, it is advice to create shareholder value by combining a well-thought-of goal with focused financial planning that will deliver returns to shareholders but in an ethical manner that is acceptable by the society (Barclays Boss Lays Out Revival Plans 2013).Installation of more advanced surveillance devices further enforces this plan as employees are monitored closely in efforts to control the wellbeing of the workers (Roland 2013). Lastly, it is suggested to form a neutral ring-fenced rate-setting unit to monitor the rates submission (Daniels 2013) in Barclays and this combines with trainings that shall be implemented to nurture an ethical and systematical way of setting the Libor rate. This plan aids by applying a squad submission rate rather than an individuals whereby rates submitted will be relatively reliable. BibliographyACTUELNEWSCHANNEL. 2013. Barclays Boss Lays Out Revival Plans online. Accessed 22 February 2013. available from http//www. youtube. com/watch? v=4dznoD8yd14 ARMOUR, J. 2012. The Price of Reputation Lessons from the Barclays LIBOR Scandal online. Accessed 9 jar against 2013. gettable from http//www. clmr. unsw. edu. au/article/ethics/libor-manipulation/price-reputation-lessons-barclays-libor-scandal BBALIBOR. no date. bbalibor explained online. Accessed 28 January 2013. in stock(predicate) from http//www. bbalibor. com/bbalibor-explained/the-basics BBC. 2012.Libor what is it and why does it matter online. Accessed 28 January 2013. usable from http//www. bbc. co. uk/news/business-19199683 BBC (A). 2013. Barclays boss tells staff sign up to ethnics or leave online. Accessed 18 February 2013. Available from http//www. bbc. co. uk/news/business-21064590 BBC (B). 2013. Timeline Libor-fixing scandal online. Accessed 8 February 2013. Available from http//www. bbc. co. uk/news/business-18671255 BISCHOFF, V and MCGAGH, M. 2013. Q&A what is Libor and what did the banks do to it online. Accessed 8 February 2013.Available from http//citywire. co. uk/money/qanda-what-is-libor-and-what-did-the-banks-do-to-it/a600479/3 BLOOMBERG NEWS. 2012. Consequences to banks of Libor scandal staggering online. Accessed 8 February 2013. Available from http//www. winnipegfreepress. com/fpnewsvoices/Consequences-to-banks-of-Libor-scandal-staggering-162730376. hypertext mark-up language DANIELS, V. 2013. RBS Outlines The Actions Management Has Taken Following Discovery Of LIBOR Scandal online. Accessed 8 environ 2013. Available from http//hereisthecity. com/2013/02/06/rbs-outlines-the-actions-management-has-taken-following-libor-sc/EAVIS, P and POPPER, N. 2012. Libor Scandal Shows Many Flaws in Rate-Setting online. Accessed 22 February 2013. Available from http//dealbook. nytimes. com/2012/07/19/libor-scandal-shows-many-flaws-in -rate-setting/ EFINANCE MANAGEMENT. no date. Profit Maximization online. Accessed 6 March 2013. Available from http//www. efinancemanagement. com/finance-financial-management/87-profit pecuniary SERVICE AUTHORITY. 2012. Final Notice. England FSA. Accessed 22 February 2013. Available from http//www. fsa. gov. uk/static/pubs/final/barclays-jun12. pdf FLETCHER, N. 2012. Barclays drops more than 10% after Libor scandal, with other UK banks also hit online. Accessed 8 February 2013. Available from http//www. guardian. co. uk/business/marketforceslive/2012/jun/28/barclays-uk-banks-libor-scandal HILLIER ET AL. 2011. Fundamentals of Corporate Finance. Europe McGraw. INVESTOPEDIA. no date. London Interbank Offered Rate Libor online. Accessed 28 January 2013. Available from http//www. investopedia. com/terms/l/libor. aspaxzz2LAAqHDOs KIFF. 2012. What is LIBOR online. Accessed 28 January 2013. Available from http//www. mf. org/external/pubs/ft/fandd/2012/12/basics. htm MBA KNOWLEDGE BASE. no date. Objectives of Financial Management online. Accessed 22 February 2013. Available from http//www. mbaknol. com/financial-management/objectives-of-financial-management/ MCGEE, S. 2013. Confessions of a Barclays Banker Whos Seen The Light online. Accessed 22 February 2013. Available from http//www. thefiscaltimes. com/Columns/2013/02/19/Confessions-of-a-Barclays-Banker-Whos-Seen-the-Light. aspxpage1 MURRAY-WEST, R. 2012. What does the Libor scandal mean for us online. Accessed 8 February 2013. Available from http//www. telegraph. co. uk/finance/personalfinance/consumertips/banking/9364994/What-does-the-Libor-scandal-mean-for-us. hypertext markup language OFARRELL, R. no date. Advantages & Disadvantages of Profit Maximization online. Accessed 22 February 2013. Available from http//smallbusiness. chron. com/advantages-disadvantages-profit-maximization-11225. html R. D. 2012. bird of Jove fried online. Accessed 8 February 2013. Available from http//www. economist. com/blogs/schumpe ter/2012/06/barclays%E2%80%99-libor-emb

Privacy vs. Surveillance Essay

NSA Surveillance Program A Threat to Civilians Privacy Since the beginning of WWI, detection activity has become a very important part of issue security to United States. To track the activity of people, U.S.A. has many spying agencies and topic Security Agency (NSA) is one of them. NSA is the main producer and manager of token intelligence for the United States. It collects, monitors, translates, and analyses global instruction, and data for intelligence purposes and performs c be course of instructions in spite of appearance the United States. The activity of NSA and the issue of the covert of citizens has long been debated for decades. With advanced engineering and newly installed equipment it is possible to spy on almost everyone.Though the justice enforcement officials consider the NSA surveillance programs as necessary weapons in the war of terror, the well-mannered rights groups claim that it is a clear violation of civilian privacy defend by the Constitution of the United States. The U.S. Constitution gives every U.S. citizen the right to entertain their privacy. The Fourth Amendment prohibits unreasonable searches and seizures and sets surface requirements for search warrants based on verisimilar cause as determined by a neutral articulate or magistrate (U.S. Constitution). But the NSA argues that because of security reasons surveillance programs should be continued and appeals to copulation not to limit the powers of NSA. After the disclosures of the classified advertisement documents by the former NSA contractor Edward Snowden, it has become clear that NSA willingly avoided judicial system, conducted much broader surveillance program and did not abide by the Constitution at a least(prenominal) bit. The Guardian reports the vastness of the disclosure shocked many people, including the elected representatives of the sexual congress who were unawargon of the extent of the surveillance.NSA conducts domestic surveillance through a make sense of programs. The agency never publishes any comprehensive, official list of programs. The majority of the surveillance programs are classified, meaning that they are not available to public. The entirely reason people know active these programs is because of the whistle blower Edward Snowden who discover classified documents after meeting Glenn Greenwald, a reporter of The Guardian. The first discover classified document was about the PilotProject, which contents agitate the country. On October 2, 2013 The New York Times reported that NSA carried out a private pilot project in 2010 and 2011 to test the collection of bulk of data about the location of Americans cellphones. The existence of pilot project was also confirm by James R. Clapper, the director of national intelligence, at a senate judiciary committee hearing.The pilot project used data from cellphone towers to resolve anyone who is using any electronic device which is Wi-Fi or cellular technology enabled . This project was a serious violation of Fourth Amendment and has been highly criticized twain by the lawmakers and U.S. citizens. As prof. William Stuntz, a criminal justice scholar and a professor at Harvard Law School, points out the Fourth Amendment was drafted partly in reaction to the British Government in eighteenth century which carried out general warrants to seize personal diaries and letters in support of seditious- smear prosecutions that were aimed to suppress political thought. The top secret documents reveal that the NSA is collecting and storing the online metadata of millions of meshwork users, regardless of whether or not they are the persons of interest to the agency (The Guardians).Metadata is a cloud or envelope that includes the duration of a phone call, the individualism of the caller and the receiver for an email it could include the location information, the sender and the recipient, time, and roughtimes its content, the web browsing history of an user and in some case account passwords. This envelope can be used to relieve oneself a detailed picture of an individuals life. From the disclosed classified documents of Edward Snowden, The Guardian reported on September 30, 2013 that NSA has developed a metadata repository, codenamed Marina. each computer metadata collected by NSA software is directed to the Marina database, Phone records are directed to a separate system. The agency is also gathering information from Facebook, twitter, Skype to build individual profile of every U.S. citizen (The New York Times). This type of work out of NSA greatly hampers civilians right to free speech. Extensive surveillance is harmful because it desponds the play of civil liberties. Just consider the surveillance of mass people when they are reading, thinking, and communicating with each other in order to make decisions about social and political issues. The only solution to protect our intellectual privacy to think and decide is we need inte llectualfreedom from state interference.

Monday, February 25, 2019

Ece Lab Manual Ece 315

LABORATORY MANUAL ECE 315 MI oscilloscopePROCESSOR BASED SYSTEM DESIGN LABORATORY 1 TABLE OF CONTENTS S. No. Title of the experiment Perform the by-line apply 8085 Simulator and 8085 Micro performanceor fit up in assembly row (i). relieve a design to hyperkinetic syndrome deuce 8- chip shot conceives. (Or) Write a chopine to amplify 2 16- bit rime. (ii) Write a political program to subtract two 8-bit numbers. (Or) Write a program to subtract two 16-bit numbers.Perform the side by side(p) utilise 8085 Simulator and 8085 Microprocessor turnout in assembly terminology (i) Write a program to multiply two 8 bit numbers by exigent addition regularity (Or) Write a program to multiply two 8 bit numbers by rotation method. (ii)Write a program to tell apart 16-bit number by 8-bit number. Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly talking to (i) purpose 1s and 2s complement of an 8-bit number. (ii) Finding 1s and 2s complement of an 16-bit number.Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly lyric poem (i) Write a program to count number of 1s in a program. (ii) Split hex data into two beaks and patronage the higher nibble and abase nibble of that number. Write a program to convert a 2- build BCD number into its binary star equivalent weight number. Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language (i) Write a program for displaying BCD megabucks counter. snack counter should count numbers from 99 to 00 and it should growing after every(prenominal) 1 sec. (ii) Write a program for displaying binary up counter. attender should count numbers from 00 to FFH and it should increment after every 0. 5 sec. Interfacing of vii subdivision display with 8085 microprocessor. Interfacing of D/A converter with 8085 microprocessor to hold incline wave. Interfacing and oblige of stepper motor using 8085 microprocessor. Design 8085 M icroprocessor establish profession unmortgaged control. Page No. 1 3 2 7 3 11 4 15 5 17 6 19 7 8 9 10 21 23 25 26 2 experiment 1 1. get down Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Write a program to add two 8-bit numbers. (Or) Write a program to add two 16bit numbers. ii.Write a program to subtract two 8-bit numbers. (Or) Write a program to subtract two 16-bit numbers. Equipment required 8085 microprocessor kit 2. nurture documentary a. To acquaint with 8085 microprocessor performance. b. To sterilise the addition and subtraction of two numbers. 3. program design ( i. a ) computer programme (i. b) 3 computer program ( ii. a) 4 Program ( ii. b ) 5 4. ask Results foreplay 1st number . second number Output Addition of two numbers . entailment of two numbers .. 5. Cautions a. forwards place down the program air squelchure RST attain on 8085 kit. b. puritanical fear moldinessinessinessiness be interpreted magic spell handling the microprocessor kit. . Learning outcomes Mathematical trading operations using 8085 kit. 6 Experiment 2 1. point Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Write a program to multiply two 8 bit numbers by repetitive addition method (or) write a program to multiply two 8 bit numbers by rotation method. ii. Write a program to divide 16-bit number by 8-bit number. Equipment required 8085 Microprocessor kit. 2. Learning fair game a. To acquaint with 8085 microprocessor performance. b. To determine the division and multiplication of two numbers. 3. Program Program (i. a) 7 Program ( i. b) 8 Program (ii)MVI E, 00 Quotient = 0 LHLD 2200H Get dividend LDA 2300 Get divisor MOV B, A Store divisor MVI C, 08 Count = 8 NEXT DAD H Dividend = Dividend x 2 MOV A, E RLC MOV E, A Quotient = Quotient x 2 MOV A, H SUB B Is most solid byte of Dividend divisor JC SKIP No, go to Next step MOV H, A Yes, subtract div isor INR E and Quotient = Quotient + 1 SKIPDCR C Count = Count 1 JNZ NEXT Is count =0 restate MOV A, E STA 2401H Store Quotient Mov A, H STA 2410H Store ease HLT End of program. 9 4. Required Results Input 1st number 2nd number Output Multiplication of two numbers .Division of two numbers .. 5. Cautions a. sooner immortalise the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Mathematical operations using 8085. 10 Experiment 3 1. subscribe Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Finding 1s and 2s complement of an 8-bit number. ii. Finding 1s and 2s complement of an 16-bit number. Requirements 8085 Microprocessor kit. 2. Learning Objective Complement of a number using 8085 kit. 3. Assembly language Program (i. a) Program (i. b) 11 explanation This program finds the 2s complement of an 8-bit number stored in storage location 3000H. Let us assume that the operand stored at retrospect location 3000H is 85H. The operand is travel to accumulator from holding location 3000H. Then, its complement is prime by using CMA instruction. One is added to accumulator by incrementing it to find its 2s complement. The firmness of purpose is stored at storehouse location 3001H. Program (ii. a) comment This program finds the 1s complement of 16-bit number stored in memory 3000H3001H. There is no direct way to find 1s complement of 16-bit number.Therefore, this can be accomplished by finding the 1s complement of two 8-bit numbers. Let us assume that the operand stored at memory locations 3000H-3001H is 45H-6AH. The operand is pixilated into H-L pair from memory locations 3000H-3001H. The lower-order is moved from register L to accumulator. Its complement is arrange by using CMA instruction. The response obtained is moved jeopardize to register L. Then, the higher-order is moved from register H to accumulator. Its complement is found by using CMA instruction. The result obtained is moved back to register H. Now, the final result is in H-L pair. 12 The result is stored from H-L pair to memory locations 3002H-3003H. Program (ii. b) Explanation ? ? ? ? ? ? ? ? ? ? ? ? ? This program finds the 2s complement of 16-bit number stored in memory locations 3000H- 3001H. There is no direct way to find 2s complement of 16-bit number. Therefore, this can be accomplished by finding the 1s complement of two 8-bit numbers and then incrementing it to get 2s complement. Let us assume that the operand stored at memory locations 3000H-3001H is 12H05H. The operand is loaded into H-L pair from memory locations 3000H-3001H.The lower-order is moved from register L to accumulator. Its complement is found by using CMA instruction. The result obtained is moved back to register L. Then, the higher-order is moved from register H to accumulator. Its complement is found by using CMA instruction. The result obtained is m oved back to register H. H-L pair is incremented to get 2s complement. Now, the final result is in H-L pair. The result is stored from H-L pair to memory locations 3002H-3003H. 4. Required Results Input 8-bit number 16-bit number 13 Output 1s and 2s complement of 8-bit number . 1s and 2s complement of 16-bit number . . Cautions a. Before code the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Student leave alone be equal to happen upon how to use logical instructions. 14 Experiment 4 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Write a program to count number of 1s in a program. . ii. Split hex data into two nibbles and trade wind the higher nibble and lower nibble of that number. Requirements 8085 Microprocessor kit. 2. Learning Objective Swapping of lower and higher nibble of a number. . Assembly language Program ( i ) MVI B,00H MVI C,08H MO V A,D spine RAR JNC SKIP INR B SKIP DCR C JNZ BACK HLT Program ( ii ) LDA 2200H Get the packed BCD number ANI F0H block out lower nibble RRC RRC RRC RRC Adjust higher BCD fingerbreadth as a lower digit STA 2300H Store the partial result LDA 2200H Get the original BCD number ANI 0FH Mask higher nibble STA 2301H Store the result LDA 2300H Get the content of memory location 2300H into accumulator MOV B, A save the circumscribe in B register LDA 2301H Get the contents of memory location 2301H into accumulator.STA 2300H Store the contents of accumulator at address 2000H. MOV A, B Get the saved contents back into A register STA 2301H Store the contents of accumulator at address 2200H HLT give up program execution 15 4. Required Results Input Enter the number Output number of unitarys in number . Result after swapping . 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning ou tcomes Students allow be able to learn mathematical operations using 8085 kit. 16 Experiment 5 1.Aim Write a program to convert a 2-digit BCD number into its binary equivalent number. Requirements 8085 Microprocessor kit. 2. Learning Objective BCD to binary conversion of a number. 3. Program exemplar problem (2200H) = 67H (2300H) = 6 x OAH + 7 = 3CH + 7 = 43H Sample Program LDA 2200H Get the BCD number MOV B, A Save it ANI OFH Mask most significant four bits MOV C, A Save unpacked BCDI in C register MOV A, B Get BCD again ANI FOH Mask least significant four bits RRC deepen most significant four bits into unpacked BCD2 RRC RRC RRC MOV B, A Save unpacked BCD2 in B register XRA A Clear accumulator (sum = 0) 7 MVI D, 0AH Set D as a multiplier factor of 10 Sum ADD D Add 10 until (B) = 0 DCR B Decrement BCD2 by one JNZ SUM Is multiplication complete? i if not, go back and add again ADD C Add BCD1 STA 2300H Store the result HLT Terminate program execution 4. Required Re sults Input Enter 2 digit BCD number Output Equivalent binary number . 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. . Learning outcomes Student will be able to learn the use of stack pointer and occasions. 18 Experiment 6 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. ii. Write a program for displaying BCD down counter. Counter should count numbers from 99 to 00 and it should increment after every 1 sec. Write a program for displaying binary up counter. Counter should count numbers from 00 to FFH and it should increment after every 0. sec. Requirements 8085 Microprocessor kit. 2. Learning Objective Implementation of BCD down counter and Binary UP counter. 3. Program ( i ) LXI SP, 27FFH format stack pointer MVI C, 99H format counter = 99 BACK chat Display C totally display modus operandi CALL Delay Call jibe subroutine ADI 99H See Addition on a lower floor DAA Adjust for decimal CPI 99H Compare with last count JNZ BACK If no, repeat HLT 19Program ( ii ) LXI SP, 27FFH Initialize stack pointer MVI C, OOH Initialize counter BACK CALL Display Call display subroutine CALL Delay Call slow subroutine INR C ontogenesis counter MOV A, C CPI OOH Check counter is FFH JNZ BACK If not, repeat HLT Stop Delay Routine Delay LXI B, count Initialize count BACK DCX D Decrement count MOV A, E ORA D Logically OR D and E JNZ BACK If result is not 0 repeat RET Return to main program 4. Cautions a. Before enter the program press RST key on 8085 kit. b.Proper care must be taken while handling the microprocessor kit. 5. Learning outcomes mathematical operations using 8085. 20 Experiment 7 1. Aim Interfacing of Seven segment display with 8085 microprocessor. Requirements 8085 Microprocessor kit, Seven Segment LED & wires. 2. Learning Objective Seven segment interfacing using 8085 kit. 3. Circuit plot 4. Program MVI A, 80H issue CR K LXI H, 2000H MVI B, 10H KK MOV A, M OUT PA CALL retard INX H JNZ KK 21 JMP K HLT Delay LXI D, Count plump for DCX D MOV A, D ORA E JNZ Back RET 5.Inputs 2000 40H, 79H, 24H, 30H, 19H, 12H, 02H, 78H, 00H, 18H, 08H, 03H, 46H, 21H, 06H, 0EH 6. Result On the Seven segment LED we can see all the hexadecimal nos displayed with some delay as mentioned. 7. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 8. Learning outcomes Students will be able to learn how to interface seven segment with 8085. 22 Experiment 8 1. Aim Interfacing of D/A converter with 8085 microprocessor to generate RAMP wave.Requirements 8085 Microprocessor Kit, DAC0808, 100nF(2), 1k, Op-Amp 741. 2. Learning Objective Digital to analog converter interfacing. 3. Circuit Diagram 4. Program MOV A, 80H OUT CW MVI A, 00H KK OUT PA CALL clutch INC A JMP KK RST 5 Delay LXI D, Count Back DCX D MOV A, D ORA E JNZ Back RET 23 5. Result On the CRO we can see a RAMP wave generated. 6. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 7. Learning outcomes Students will be able to learn how to interface digital to analog converter with 8085. 4 Experiment 9 1. Aim Interfacing and control of stepper motor using 8085 microprocessor. Requirements 8085 Microprocessor kit, stepping motor Motor, Motor driver circuit (ULN2003) & wires. 2. Learning Objective hoofer motor interfacing with 8085. 3. Program i) To rotate in Clock Wise guardianship MVI A, 80H OUT CR MVI A, 44H KK OUT PA CALL DELAY RRC JMP KK RST 5 ii) To rotate in Anti-Clock Wise direction MVI A, 80H OUT CR MVI A, 44H KK OUT PA CALL DELAY RLC JMP KK RST 5 Delay LXI D, Count Back DCX D MOV A, D ORA E JNZ Back RET 4.Result Stepper motor rotates in Clock wise & Anti-clock wise direction. 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be t aken while handling the microprocessor kit. 6. Learning outcomes Students will be able to learn how to interface and control stepper motor with 8085. 25 Experiment 10 1. Aim Design a 8085 Microprocessor based Traffic light control for figure shown below with the following conditions Allow traffic to flow from N to S & S to N for 1sec Glow all Yellow lights for 0. sec Allow traffic to flow from W to E & E to W for 1sec Glow all Yellow lights for 0. 2sec Make this process continues. Requirements 8085 Microprocessor Kit, 9 LEDs, 5K resistors (9) 2. Learning Objective Traffic light control system using 8085. 3. Circuit Diagram 4. Program MVI A, 80H Initialize 8255, air A and sort B OUT CR (CR) in fruit mode START MVI A, 09H OUT PA (PA) come out data on PA to glow R1 and R2 MVI A, 24H OUT PB (PB) carry data on PB to glow G3 and G4 MVI C, 28H laden multiplier count (40 ) for delay 26CALL DELAY Call delay subroutine MVI A, 12H OUT PA PA disseminate data on Port A to glow Y1 a nd Y2 OUT 81H PB Send data on port B to glow Y3 and Y4 MVI C, 0AH onus multiplier count (10 ) for delay CALL DELAY Call delay subroutine MVI A, 24H OUT 80H PA Send data on port A to glow G1 and G2 MVI A, 09H OUT 81H PB Send data on port B to glow R3 and R4 MVI C, 28H Load multiplier count (40 ) for delay CALL DELAY Call delay subroutine MVI A, 12H OUT 80H Send data on port A to glow Y1 and Y2 OUT 81H Send data on port B to glow Y3 and Y4 MVI C, 0AH Load multiplier count (10 for delay CALL DELAY Call delay subroutine JMP START Delay Subroutine DELAY LXI D, Count Load count to give 0. 5 sec delay BACK DCX D Decrement counter MOV A, D ORA E Check whether count is 0 JNZ BACK If not zero, repeat DCR C Check if multiplier zero, other than repeat JNZ DELAY RET Return to main program 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Students will be able to learn how t o design microprocessor based traffic light system using 8085. 27