Monday, September 30, 2019

A Study on Enterprise Network Role of Brac Bank

A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science in Electronics & Telecommunication Engineering INDEPENDENT UNIVERSITY, BANGLADESH May 2011 Internship A STUDY ON ENTERPRISE NETWORK ROLE OF BRAC BANK by Sabina Kamal ID: 0631038 has been approved May 2011 ______________________________ Dr. Firoz Ahmed Assistant Professor School of Engineering & Computer Science Independent University, Bangladesh ABSTRACTThis internship report is an exclusive study of Enterprise Network role at BRAC Bank Ltd. The main Objective of this report is to get the practical experience through observing all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc. through LAN & WAN and also ensure utilization of internet and intranet effectively. iii ACKNOWLEDGEMENTSFirst of all I wish to convey our heartfelt thanks and gratitude to Almighty Allah to complete the internship successfully and also those who all rendered their cooperation in making this report. Without their assistance I could not have completed my internship. I like to convey my sincere and cavernous sense of respect and appreciation to my supervisor Dr. Feroz Ahmed, for his persistent support and guidance throughout the whole program and also for giving me the opportunity to work with this project. I would like to express my heartiest gratitude to my co-supervisor Mr.Mohammad Morshed, (Analyst, Technology User Infrastructure, BRAC Bank Limited). Discussions with him about various topics have enriched my conception and knowledge about this internship. I also convey grateful thanks to Mohammad Fakrul Alam (Senior Manager of Network Service) and Md. Mahbubul Alam (Network Analyst) of Technology Operations division of BRAC Bank Ltd. The completion of this report would not have been possible without the help of the people who provided tremendous amount of help and support in the making of this report. I acknowledge expressing heartiest gratitude to my honorable supervisor.My internship achieved its desired success. This internship gives me the opportunity to practically work on the overall technology based banking systems, focusing on the various aspects & analysis. Accomplishing the report, I gathered a thorough idea and view on various Issues about how to maintain or support of a Banking System. iv TABLE OF CONTENTS Page LIST OF TABLES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. LIST OF FIGURES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. CHAPTER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1. 1 1. 2 1. 3 1. 4 1. 2 Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Origin of the Report †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Objective of the internship†¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ About BRAC BANK†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1 1 2 3 3 6 6 8 8 x xi ENTERPRISE NETWORK ROLE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 1 2. 2 Enterprise Network Role at BRAC BANK †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Daily, Weekly, Monthly & Other regular duties †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. 2. 1 Daily Activates†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Monitoring Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. . 2. 1. 1 8 8 2. 2. 1. 2 LAN & WAN Support for Total Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v 2. 2. 1. 3 LAN / WAN security†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 4 Internet connectivity†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 5 Western Union and Other Remittance Program †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 1. 6 SWIFT server administration †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦ 2. 2. 1. 7 APN connectivity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 8 8 9 9 9 9 9 10 10 10 10 11 11 13 15 16 17 2. 2. 1. 8 Allocation of IP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. 2. 1. 9 Network devices health check †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. 2. 2. 2 Weekly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 2. 1 Configuration Back†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2. . 3 Monthly Activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. 2. 3. 1 SWIFT archive and backup†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 NETWORK ARCHITECTURE DESIGN 3. 1 3. 2 3. 3 3. 4 3. 5 Data Center Architecture †¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Omnibus Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Eldorado Architecture †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of Branches †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Network Architecture of a sample Branch†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦ vi 3. 6 4 ATM Architecture†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 19 19 20 21 21 21 21 22 22 22 22 23 23 30 30 30 LINK ESTABLISHMENT, CONF IGURATION AND TROUBLESHOOTING 4. 1 4. 4. 3 4. 4 New link deployment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link vendor selection †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Network maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 4. 1 4. 4. 2 4. 5 Branch Link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ATM link monitoring & maintenance†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Link troubleshoot checklist†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4. 5. 1 4. 5. 2 Radio Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Fiber Link†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4. 6 5 Remote access policy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Wi-Fi AND INTERNET CONNECTIVITY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. 1 Wi-Fi activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ BANDWIDTH MANAGEMENT AND MONITORIN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 1 6. 2 Overview of Bandwidth management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Bandwidth Management at BRAC Bank†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ vii 6. 3 OpUtils†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6. 3. 1 Switch Port Mapper†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. 3. 2 IP Address Manager†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 30 32 34 37 37 37 42 44 45 7 MAINTENANCE OF GRAMEENPHONE APN†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1 Maintenance of GP Access point Network†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 1 GP Huawei Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7. 1. 2 ZTE Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7. 1. 3 ADN Modem Installation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 1 Western Union†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 1. 1 Installation process†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8. 2 SWIFT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 1 BRAC Bank Swift Network Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 2 SWIFT Infrastructure Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3 Maintaining the SWIFT environment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8. 2. 3. 1 Daily activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 45 45 65 66 66 68 68 viii 8. 2. 3. 2 Weekly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦. 8. 2. 3. 3 Monthly activities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. 2. 3. 4 Yearly activities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. MAINTENANCE, MONITORING & SUPPORT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. 1 9. 2 Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. What's Up Gold†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦ 9. 2. 1 Create a New Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9. 2. 2 What’sUpGold Web Server†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 CONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. REFFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 68 68 69 70 70 70 70 74 75 76 ix LIST OF TABLES Table 4. 1 Issues related link vendor selection 8. 1 Support Level 8. 2 User format for Western union 8. 3 Terms and description of SWIFT Page 20 64 65 67 x LIST OF FIGURES Figure 3. 1 3. 2 3. 3 3. 4 3. 5 3. 6 3. 7 4. 1 4. 2 4. 3 4. 4. 5 4. 6 4. 7 BRAC Bank Data Center Architecture Data Center Connectivity Architecture BRAC Bank Omnibus Architecture BRAC Bank Eldorado Architecture Network Architecture of Branches Network Architecture of Entire Branch ATM Architecture of BRAC Bank Link Deployment Process flowchart Network Maintenance flowchart Branch Link monitoring & maintenance flowchart ATM Link monitoring & maintenance flowchart Radio Link Troubleshooting Process Fiber Link Troubleshooting Process Remote Access Policy Process Page 11 12 13 15 16 17 18 19 21 21 21 22 22 22 xi 5. 1 6. 1 6. 2 6. 3 6. 4 6. 5 6. 6 6. 7Wi-Fi Activation Process OpUtils Login Page OpUtils Home Page (Summary Report) Switch Port Mapper portion List of Switches List of Routers Switch information summary Finding a MAC address IP Address Manager Modem Installation Profile Creation Profile Change Western Union Installation Swift Network Diagram Swift Infrastructure Creat New Map in What's Up Gold Select device for mapping 23 31 31 32 32 33 33 34 6 . 8 7. 1 7. 5 7. 9 8. 1 8. 37 8. 38 9. 1 9. 3 35 38 40 42 45 66 66 70 72 xii 9. 4 9. 5 9. 6 Configure device properties Polling device What’sUpGold Web Server Overview 73 73 74 xiii CHAPTER ONE INTRODUCTION . 1 Introduction In the modern age, academic edification is not enough to enable students to compete with self-assurance and reach his/her ambition without having experience with the real world related applications. Internship is highly needed to expand idea, familiarity and experience. Computer networking is one of the most essential terns in order to run a modern organization. This internship report is based on the Enterprise Network Role at BRAC Bank 1. 2 Origin of the Report Independent University, Bangladesh offers a 06 credit course as Internship for the undergraduate students in her course curriculum.The curriculum requires every student to do an internship in an alleged firm for hands on experience about the proficient works. It is a realistic exposure of theoretic ally gained knowledge and can be considered as an opening tryout to be acquainted with any organization and to make oneself confident enough to move toward into service life and start building career. As the outside world is very much competitive for anyone after graduation, IUB provides such an opportunity to build up the capability with most appropriate opportunities.This gives the student great opportunity in the service world and also to get exposure to various diversifications of the service world. Intern students are supervised under a particular faculty member throughout their Internship stage. Here the student gets the chance to apply his theoretical knowledge and practical skill that 2 he has gained in the entire under graduation student life. They are responsible to report weekly or fortnightly to his/her respective Supervisor to get his/her assistance. And the project gets advancement by following the Supervisor’s instruction.The internship period is for at least 3 months. After that the student submits a report on his project work, which reflects his knowledge gained in the entire B. Sc. course. That is the main purpose of this report to give an outline of the outcome of internship during the entire period of the course in the company. 1. 3 Objectives of the Internship ? Get the practical knowledge about enterprise network. ? Get the clear view about network monitoring and maintenance. ? Relate theory with practice of networking. ? This is the beginning of a student’s professional career. The student’s competency and efficiency in the working environment can be accessed from this course. ? Teaches the student to take up the responsibility and pressure of work. ? Teaches the student to learn from work. ? To help students enhance their creativity and efficiency in dealing with projects related to their field of study. ? Helping students to express dependability, initiative, resource fullness and professionalism in the tasks they are assigned. To increase the confidence level of IUB students, which would help them work after graduation. 3 1. Scope I’ve done my internship in Network Service, Technology Operations department of BRAC BANK LIMITED. Focus of the department is network implementation and management. My main task was to Network Monitoring and design network architecture, implement the Branches, ATM, SME Service Centre which includes implementing Network Topology, Router and Switch Configuration, VLAN, VTP, VPN, NAT, ACL, EDGE Modem Support, Western Union Installation. My task was configuring router and switches; configuring VLAN, VTP and VPN and design of network structures of Branches, ATM and SME, EDGE Modem Support and Western Union Installation.In the later portion of my internship I was also involved support team of Technology User Infrastructure. The task of Support team is to provide instant pc related support to the users as they call for help. The support may be of two kinds, remote – which is given by using VNC, sometimes this team provides support by being physically present to the user end. Throughout my internship period I was always experiencing the practical implementation of networking topics covered in my academic courses. This internship helped me a lot. Now I’m confident that I could efficiently work in Networking Industry with my full dedication. . 6 About BRAC Bank BRAC Bank Limited (BBL) is a scheduled commercial bank in Bangladesh. It established in Bangladesh under the Banking Companies Act, 1991 and incorporated as private limited company on 20 May 1999 under the Companies Act, 1994. BRAC Bank will be a unique organization in Bangladesh. The primary objective of the Bank 4 is to provide all kinds of banking business. At the very beginning the Bank faced some legal obligation because the High Court of Bangladesh suspended activity of the Bank and it could fail to start its operations till 03 June 2001.Eventually, the judgment of the High Court was set aside and dismissed by the Appellate Division of the Supreme Court on 04 June 2001 and the Bank has started its operations from July 04, 2001. BRAC Bank will be a unique organization in Bangladesh. It will be a knowledge-based organization where the BRAC Bank professionals will learn continuously from their customers and colleagues worldwide to add value. They will work as a team, stretch themselves, innovate and break barriers to serve customers and create customer loyalty through a value chain of responsive and professional service delivery.Continuous improvement, problem solution, excellence in service, business prudence, efficiency and adding value will be the operative words of the organization. BRAC Bank will serve its customers with respect and will work very hard to instill a strong customer service culture throughout the bank. It will treat its employees with dignity and will build a company of highly qualified professionals who have integrity and believ e in the Bank’s vision and who are committed to its success. BRAC bank will adhere to professional and ethical business principles and internationally acceptable banking and accounting standards. Sustained Growth in Small and Medium sector, continuous low cost deposit growth with controlled growth in retained Assets. †¢ Achieve efficient synergies between the branches, SME unit offices and BRAC field offices for delivery of Remittance and Banks other products and services 5 †¢ Manage various lines of business in fully controlled environment with no compromise on service quality †¢ Keep a diverse, far-flung team fully motivated and driven towards materializing the bank’s vision into reality. BRAC Bank will be the absolute market leader in the number of loans given to small and medium sized enterprises throughout Bangladesh.It will be a world class organization in terms of service quality and establishing relationships that help its customers to develop an d grow successfully. It will be the Bank of choice both for its employees and its customers, the model bank in this part of the world. Bank has adopted trust as a corporate value which is acronym for team work, respect for all people, unquestionable integrity, excellence in everything BRAC Bank of SME do, Sense of urgency in getting things done and total commitment. All employees are expected to conduct themselves in accordance with the rules and regulations of the bank. CHAPTER TWO ENTERPRISE NETWORK ROLE . 1 Enterprise Network role at BRAC Bank Enterprise network maintain all the network related issue of BRAC Bank. Usually this team is committed to give all sort of network solution to business systems and applications of Bank through flexible Data communication model, Moreover the strategic direction of enterprise network places high value on data communication systems which can support various distribution channel like Branch, SMESC, CRM, ATM etc through LAN & WAN and also ensure utilization of internet and intranet effectively. Here is some basic roles discussed and these are going to describe later on this report. . 1. 1 Network Architecture design: Network Layout design for DC, DR, various distribution channels and business applications. 2. 1. 2 Link establishment, configuration and troubleshooting: By selecting vendors, ensure Data connectivity through fiber and radio link and deploy configured network equipment’s to new distribution channel like Branch, SMESC, ATM, Sales Center, CRM center etc. 2. 1. 3 Wi-Fi and Internet connectivity: Ensure Wi-Fi Connectivity by following particular wireless access policy and Provide secure internet connectivity through proxy server. 7 2. 1. Bandwidth Management: Bandwidth Management for BBL network and configure various server like, NTP, Proxy, VPN, and SPAM Filter, also Managing Perimeter firewall for intranet by using OpUtils. 2. 1. 5 Maintenance of GP Access point Network: Maintenance of GP Access Point Net work by establishing IPsec tunnel between BBL and GP network to provide intranet facility to SME Unit offices, also use this secure channel for POS transactions. 2. 1. 6 Connectivity and administration of all payment network Software: Ensure connectivity for all payment network software like Western Union, mRemit and SWIFT Server and Workstation Administration. . 1. 7 Maintenance, Monitoring & Support: Maintain all network device, manage network monitoring application and Provide All LAN & WAN related support. Enterprise network also give solution to BRAC Bank subsidiary institution also . e. g. BRAC EPL, bKash and Aarong. 8 2. 2 Daily, Weekly, Monthly & Other regular duties Duties of this concept are divided into sum subgroup like following. 2. 2. 1 Daily Activates 2. 2. 1. 1 Monitoring Total Network Branch connectivity is being monitored on a constant basis. BRAC Bank has redundant links for every branch.And mechanism has been applied so that if one link goes down, the backup link is activated automatically. Apart from this Primary link is being used for our banking software only. No other services pass their data through it. The backup link is being used for other software and services. If one of the links fail our technical people investigates instantly and communicates the vendors as necessary. 2. 2. 1. 2 LAN & WAN Support for Total Network BRAC Bank technical team provides supports to the remote branches, SMEs and ATM booths.Since there are a large number of PCs and other network enabled devices, problem could occur. 2. 2. 1. 3 LAN / WAN security Monitoring LAN and WAN for any security breach. As part of the daily operations, this is being monitored by the network personnel. 2. 2. 1. 4 Internet connectivity Connection to internet is required for 24Ãâ€"7. Ensuring the interrupt free internet link and troubleshooting if any problem occurs. Maintaining internet access for all approved users. This is vital role for Web Servers, Internet banking, Eldorado Pr ojects, etc. 9 2. 2. 1. Western Union and Other Remittance Program Support Computer terminals used for Western Union service face various type of problem including connection error, password lock, Western Union ID lock etc. BRAC Bank has to provide these types of services to users. It also includes support for BRAC BDP Locations. 2. 2. 1. 6 SWIFT server administration Keeping the service up and running to provide smooth services. 2. 2. 1. 7 APN connectivity Access Point Network is used to connect out SME Unit offices to our core network. This APN service is provided by Grameen Phone.Day to day basis we need to maintain this network in usable condition and to provide services to our users so that they can continue their operations in a trouble free and smooth. 2. 2. 1. 8 Allocation of IP Provide IPs to incorporate new computers in the network and maintain the trouble free operations. 2. 2. 1. 9 Network devices health check Closely monitor critical network devices which include bandwi dth utilization, process, and memory usages. 10 2. 2. 2 Weekly Activities 2. 2. 2. 1 Configuration Backup Taking weekly backup of critical hardware applications including Core Router, Core Firewall and Core Switch. 2. 2. Monthly Activities 2. 2. 3. 1 SWIFT archive and backup Archive SWIFT live messages and monthly backup. CHAPTER THREE NETWORK ARCHITECTURE DESIGN 3. 1 Data Center Architecture: Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls and security devices. Fig- 3. 1 BRAC Bank Data Center Architecture 12 This is the Full Network Architecture of BRAC BANK LIMITED. In this Figure, all remote Branches and office are connected with the Core router.In top of the figure Unilever, Grameen Phone, Banglalink, Aktel and GP APN Sim are connected with Core Router. In Left side the remo te Branches are connected via Radio or Fiber or VSAT link provided by the some ISP named BRACNET, Metronet, Link3, Alap communication, Telnet Communication, ADNSL and X-NET. In the right side all the corporate buildings like Annex 1, 2, 3, 4, and Anik Tower (Head Office) are connected with Core router. In the left side ATMs and Remote Branches are connected with Core router. The ISP’s which provide Internet those are also connected with Core Router via Firewall.The connectivity diagram of Metronet-BRAC Bank Data Center as followed. Fig- 3. 2 Data Center Connectivity Architecture 13 3. 2 Omnibus Architecture: Omnibus is a Transaction Banking Software. BRAC Bank Ltd, the fastest growing bank in Bangladesh, and ITCL (Q-Cash), a private ATM network presently serving 12 member banks, have launched OMNIBUS, the first neutral inter-bank switch in Bangladesh. Fig- 3. 3 BRAC Bank Omnibus Architecture OMNIBUS is the name of the independent association of member banks and institutions t hat will operate and manage the central switch.As a first step, OMNIBUS integrates the ATM & POS networks of BRAC Bank and Q-Cash, enabling cardholders of BRAC Bank and Q-Cash member banks to access their accounts from any of the 150+ ATMs and 14 1,200+ POS terminals. OMNIBUS is modeled around success of 1-Link in Pakistan and TPS has played an instrumental role in terms of technology transfer and adoption of best practices. The shared ATM/POS switch offers significant convenience to customers of its member banks through greater transaction touch points, providing anytime, anywhere banking.This instant increase in the number of ATMs & POS terminals for the customers to use their cards on, not only gives the cost advantage to the bank, it improves operational efficiency and customer services. The Omnibus Server is also connected with BRAC Bank Core Router and all Banking Server is connected via Metronet & Link3 with Omnibus and Omnibus server is also connected via Metronet & Link3. 1 5 3. 3 Eldorado Architecture: Eldorado – a web based remittance and payment processing system, which will be a complementary system of BEFTN (Bangladesh Electronic Fund Transfer Network) of Bangladesh Bank.BRAC Bank is one of the key members of Eldorado. Fig- 3. 4 BRAC Bank Eldorado Architecture Eldorado is a common electronic platform for delivering inward remittances from the originating institutions to ultimate beneficiaries in Bangladesh. Handling inter-bank transactions will be efficient, since electronic reconciliation facility will enhance the capacity to process and payment of large volume of inbound remittances more accurately. This will help the member banks to serve their remittance customers even better and faster. 16To popularize the formal banking channels among the non-resident Bangladeshis for sending their hard-earned foreign currency, Eldorado will play an extensive role. It is a standardized IT platform that will enable all member banks to execute remittanc es electronically in the most expeditious and compliant manner. Reliability and pace of receiving individual remittances matter the most to our customers, especially, when need arises. Every single effort of Eldorado members will trickle down to one single objective bringing smile on the faces of their customers. The Eldorado Server is connected with core router of BRAC Bank via Metronet & Link3. . 4 Network Architecture of Branches: Fig- 3. 5: Network Architecture of Branches The Branch is connected with Cisco 1811 Router. The two Vendors set up the link between the remote Branch and Core Router. The two vendors are configured with Tunnel for security issue. One Native VLAN is configured in Remote Branch and the EIGRP Routing Protocol is configured in Cisco Router for Routing. 17 3. 5 Network Architecture of a sample Branch Fig 3. 6: Network Architecture of Entire Branch In entire Branch the router is connected via two vendors. The router is connected with Cisco 2960 Switch. All De sktop and Share Printers are connected with Switch. 8 3. 6 ATM Architecture When a user inserts a card on ATM, ATM hit with Phoenix soft switch. Phoenix is directly connected with HSM (Host security module). Using HSM the soft switch conformed is the PIN number is correct or not. If HSM send green signal for PIN then Phoenix send the CARD number in Finacle. Finacle is core banking database, an account holder all information is saved on Finacle. Last of all as user interest ATM machine operate operation Fig- 3. 7 ATM Architecture of BRAC Bank CHAPTER FOUR LINK ESTABLISHMENT, CONFIGURATION AND TROUBLESHOOTING 4. 1 New link deployment: The process of new link deployment is as followed.Fig- 4. 1 Link Deployment Process flowchart 20 4. 2 Link vendor selection: The issue consideration and their descriptions are pointed below. Table 4. 1 Issues related link vendor selection Issue Consideration Multiple vendors in same radius Description Any vendor that already has a link running in nearby location should not be given priority. Try to provide the link to another vendor which has no or less links running in that area. Introducing multiple vendors will ensure maximum uptime for that area. Redundant backbone for Intercity Links Select vendors that have different backbone for intercity connectivity.This will increase uptime incase of intercity backbone fails. Shorter Last mile connectivity Try to select vendors that will be able to provide last mile connectivity with shorter cable distance. As longer cables suffer from higher down time and require more maintenance. Licensed Radio Frequency Tower Height for Radio Links This will ensure better service quality and uptime. Identify vendors that will be able to establish a radio link with shorter tower. One time installation charge increases as tower height increases. Longer tower needs more maintenance cost. Service QualityVendors with poor service quality should not be considered even though they have met all other requireme nts. Support Personnel Select vendors that have dedicated support personnel for remote locations. Also count response time for all previous downtime. Balance of Distribution In order to ensure maximum uptime it is important that we balance the distribution among the vendors. This will decrease the overall downtime. Local Loop Avoid same type of media for Last mile connectivity. Avoid any Point-To-Point Radio equipments at Lat mile. 21 4. 3 Network maintenance: Following process follows for the network maintenance for link troubleshoot.Fig- 4. 2 Network Maintenance flowchart 4. 4 Link monitoring & maintenance: Link Monitoring and maintenance works in two different ways. 4. 4. 1 Branch Link monitoring & maintenance Fig- 4. 3 Branch Link monitoring & maintenance flowchart 4. 4. 2 ATM link monitoring & maintenance Fig- 4. 4 ATM Link monitoring & maintenance flowchart 22 4. 5 Link troubleshoot checklist 4. 5. 1 Radio Link Fig- 4. 5 Radio Link Troubleshooting Process 4. 5. 2 Fiber Link Fi g- 4. 6 Fiber Link Troubleshooting Process 4. 6 Remote access policy Fig- 4. 7 Remote Access Policy Process CHAPTER FIVE Wi-Fi AND INTERNET CONNECTIVITY 5. Wi-Fi activation For security purpose Mac filtering and MAC binding is enabled in Wi-Fi Controlling system. So to give WLAN privilege to users is a three layer process. ? ? ? MAC entry to the Wireless LAN controller’s MAC filter table MAC Binding to the DHCP server for user based IP allocation Internet activation (optional: depends on user’s requirements) MAC entry to the Wireless LAN controller’s MAC filter table For MAC entry need to log in to the below link https://10. 100. 83. 250 Fig- 5. 1 Wi-Fi Activation Process 24 Then login with given user name and password Fig- 5. 2 Wi-Fi Activation Process (Continuing)Then go to Security>MAC Filtering Fig- 5. 3 Wi-Fi Activation Process (Continuing) 25 Then Select NEW†¦ from the top right side Fig- 5. 4 Wi-Fi Activation Process (Continuing) Fig- 5. 5 Wi-Fi Acti vation Process (Continuing) 26 Put the MAC Address and select SSID (like BBL) as Profile name, Preferred Interface as Interface Name and give user details and select IP address from the existing Pool Fig- 5. 6 Wi-Fi Activation Process (Continuing) And select Apply after all information given properly. MAC Binding to the DHCP server for user based IP allocation For MAC binding login to https://10. 00. 83. 251:10000 27 Fig- 5. 7 Wi-Fi Activation Process (Continuing) Login with the User Name=Console with its password Fig- 5. 8 Wi-Fi Activation Process (Continuing) 28 Then select DHCP Server Fig- 5. 9 Wi-Fi Activation Process (Continuing) Then select ADD a new host from the Hosts and Host Groups Fig- 5. 10 Wi-Fi Activation Process (Continuing) 29 In Host Description box give the user description, in Host name box give the LAN ID of the user in Hardware Address box put the MAC address and put the IP in to the Fixed IP Address box and then select create to make the user. Fig- 5. 1 Wi-Fi A ctivation Process (Continuing) Then from the DNS Zones select Apply Changes Fig- 5. 12 Wi-Fi Activation Process (Continuing) CHAPTER SIX BANDWIDTH MANAGEMENT AND MONITORING 6. 1 Overview of Bandwidth management: Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. 6. 2 Bandwidth Management at BRAC Bank: BRAC Bank uses some tools for bandwidth management and monitoring.One of them is OpUtils. 6. 3 OpUtils Manage Engine OpUtils is a software to observe the network in a structured way, to visualize the total network and to troubleshoot the user level problems easily. We can find our user bases IP, MAC, OS and connected switch port related information. Form which we can easily sort out day to day operations and support related works like IP allocation for user, for switch port rel ated MAC releasing where switch port security is deployed, real time bandwidth monitoring, and configuration file management related works. For OpUtils related operations need to login to http://10. 0. 0. 236:7080/ 31 Fig- 6. 1 OpUtils Login Page Log in with given username and password. The Home page shows the summary report of the switch port and IP availability. Fig- 6. 2 OpUtils Home Page (Summary Report) 32 6. 3. 1 Switch Port Mapper It contains switches information and the users connected switch port information tagged with its IP address information. In Switch Port Mapper portion Fig- 6. 3 Switch Port Mapper portion Go to switches to see the list of the switches Fig- 6. 4 List of Switches 33 Go to Routers to see the list of the routers Fig- 6. 5 List of RoutersSummary will show the detail switch information of the network Fig- 6. 6 Switch information summary 34 To find any MAC address we need to select the MAC address options from the search tool box and write the MAC in colon (ff:ff:ff:ff:ff:ff) format to get the total IP related information and the connected switch address. Fig- 6. 7 Finding a MAC address 6. 3. 2 IP Address Manager In IP address manager restrain IP related information where we can allocate the IP with specific user information. The IP segregated into three different types: i. ii. Used IP: Currently using IP addresses.Transient IP: was used but is not using for couple of days and the system store the IP in this mode for 30 days and after that system will automatically make it as a Available IP iii. Available IP: free IP’s are known as Available IP Address. 35 In the left side of the window we can see the group’s name from where we can select the specific IP subnet. Fig- 6. 8 IP Address Manager Fig- 6. 9 IP Address Manager (Continuous) 36 Fig- 6. 10 IP Address Manager (Continuous) In the same way as shown in the Switch Port Mapper section we can search a user based on the IP address or MAC address. Fig- 6. 1 IP Address Mana ger (Continuous) CHAPTER SEVEN MAINTENANCE OF GP APN 7. 1 Maintenance of GP Access point Network: 7. 1. 1 GP Huawei Modem Installation: Fig- 7. 1 Modem Installation Click the Next > Button for Starting Installation Fig- 7. 2 Modem Installation (Continuous) 38 Click I Agree for Next Step. Fig- 7. 3 Modem Installation (Continuous) Click Next > for Next Step Fig- 7. 4 Modem Installation (Continuous) 39 Click Install For Starting the Installation Fig- 7. 5 Modem Installation (Continuous) Wait for Installation Fig- 7. 6 Modem Installation (Continuous) Click Finish to Complete the Installation. 0 Fig- 7. 7 Profile Creation Click Profile Management. Then Click New for creating New Profile Write â€Å"BRACBANK† in Profile Name. Click Static and write â€Å"BRACBANK† in APN and write *99# in access number. Fig- 7. 8 Profile Creation (Continuous) 41 Click OK to Complete.. Then Restart your System. Fig- 7. 9 Profile Creation (Continuous) Select BRACBANK from Profile Name. Fig- 7. 10 Profile Creation (Continuous) Click Connect to connect the Network. 42 7. 1. 2 ZTE Modem Installation: All Installation Processes are same as Huawei Modem. But In case of Profile Change Fig- 7. 11 Profile ChangeClick on Tools and Options for creating New Profile. Fig- 7. 12 Profile Change (Continuous) 43 Click Profile Management. Click Add to Create new profile Fig- 7. 13 Profile Change (Continuous) Write â€Å"BRACBANK† in Configure Filename and *99# in Dial Number then click OK Fig- 7. 14 Profile Change (Continuous) 44 Click on BRACBANK then Click Set default then OK. Then Restart the PC. Fig- 7. 15 Profile Change (Continuous) Click Connect to connect the network.. 7. 1. 3 ADN Modem Installation: APN settings : AT+CGDCONT=1,†IP†,†BRACBANK† Phone number : *99***1# or *99# Need to copy ewusbmdm file from d drive IT Use to Windows system32CHAPTER EIGHT CONNECTIVITY AND ADMINISTRATION OF ALL PAYMENT NETWORK SOFTWARE 8. 1 Western Union: To install the western union Translink and activate a client Terminal these steps are followed: 8. 1. 1 Installation process: 1. Download file from ftp://10. 20. 0. 94 ftp server File name is Translink5. 437. zip Fig-8. 1 Western Union Installation 46 2. Unzip that Translink5. 437. zip Fig-8. 2 Western Union Installation (Continuing) 3. Run WUCD. exe from the unzipped folder Fig-8. 3 Western Union Installation (Continuing) 47 4. Select Install Application Fig-8. 4 Western Union Installation (Continuing) . Select Install Translink and follow the bellow steps: Fig-8. 5 Western Union Installation (Continuing) 48 Fig-8. 6 Western Union Installation (Continuing) Fig-8. 7 Western Union Installation (Continuing) 49 Fig-8. 8 Western Union Installation (Continuing) Fig-8. 9 Western Union Installation (Continuing) 50 Fig-8. 10 Western Union Installation (Continuing) Fig-8. 11 Western Union Installation (Continuing) 51 Fig-8. 12 Western Union Installation (Continuing) Fig-8. 13 Western Union Installation (C ontinuing) 52 6. Install the software like other conventional software. Fig-8. 4 Western Union Installation (Continuing) 7. Install ESD service which is recommender after the Western Union installation Fig-8. 15 Western Union Installation (Continuing) 53 Fig-8. 16 Western Union Installation (Continuing) 8. Restart the PC Fig-8. 17 Western Union Installation (Continuing) 54 9. Add internet explorer and translink. exe at My computers> properties>Advanced>Performance>Settings>Turn on DEP>Add Fig-8. 18 Western Union Installation (Continuing) 10. Set security permission to everyone at C:>program files>Western Union Fig-8. 19 Western Union Installation (Continuing) 5 11. Then go to Start>all programs>Western Union>Agent config And need to select administrator and write the password ******* den select ok Fig-8. 20 Western Union Installation (Continuing) Fig-8. 21 Western Union Installation (Continuing) 56 12. Go to Agent(ctrl-G) Set terminal ID Fig-8. 22 Western Union Installation (Continu ing) 13. Go to Tools (Ctrl-L) And select sign on screen password change Fig-8. 23 Western Union Installation (Continuing) 57 14. Go to Printers (Ctrl-P) Then select: Printer Model: LaserJet Printer Name/Port: Canon LBP3460 PCL6 Paper Feed: Front SingleFig-8. 24 Western Union Installation (Continuing) Then select Apply and OK to finish the work. 15. Then need to create a VPN Dialer For this purpose Go to Start>Control Panel> Network Connections>Network Tasks>Create a new Connections 58 Fig-8. 25 Western Union Installation (Continuing) Fig-8. 26 Western Union Installation (Continuing) 59 16. Then select> Next Select Connect to the Network at my Workplace Fig-8. 27 Western Union Installation (Continuing) Select Next 17. Then Select Virtual Private Network Connection Fig-8. 28 Western Union Installation (Continuing) 60 Fig-8. 9 Western Union Installation (Continuing) Select Next 18. Then select > Write company Name Company Name: Link1 Fig-8. 30 Western Union Installation (Continuing) Se lect Next 61 19. If public network page initiated Select Do not dial the initial connection Otherwise Skip this step and go to step 21 Fig-8. 31 Western Union Installation (Continuing) Select> Next 20. Set IP- 10. 20. 0. 251 Fig-8. 32 Western Union Installation (Continuing) 62 Fig-8. 33 Western Union Installation (Continuing) Select Next 21. Then Select Anyone’s Use Fig-8. 34 Western Union Installation (Continuing) Select Next 63 22.Then Select> Add a Shortcut to this Connection to my Desktop Then Select> Finish Fig-8. 35 Western Union Installation (Continuing) 23. Then Need to Set User Name and Password Select> Save this user name and password for the following users; Select > Connect Fig-8. 36 Western Union Installation (Continuing) 64 24. Then add route from the command prompt GW= Gateway Route add 10. 20. 0. 0 mask 255. 255. 248. 0 GW –p Route add 10. 20. 1. 0 mask 255. 255. 255. 0 GW –p Route add 10. 20. 2. 0 mask 255. 255. 255. 0 GW –p 25. Then go t o agent config> Communication And ping the connection points IP; From Start>Run 26.Telnet through those connection points IP with that specific port if there is any problem in western union login. Table 8. 1: Support Level: Error Type Mom. config Invalid Request Type Out of Memory Error 800 Object error Log Sheet Have To Do Reinstall the software Forward to Trade and Remittance Team Installation error at data execution prevention Restart PPTPD service Reinstall the software Printing C:WINDOWSsystem32drivers Extract the attached file (if it is not present) in C:WINDOWSsystem32 [attachment MSHFLXGD. OCX] go on START -> RUN, Type in: regsvr32 MSHFLXGD. OCX then press ok. problem 65 Table 8. User format for Western union Distribution Type Branch Channel User ID Format Password br+SOL ID+wu1 Skb+SOL ID+wu1 sssc+SOL ID+wu1 ho +LAN ID + wu1 ********* ********* ********* ********* SME Krishi Branch SMESC Head Office 8. 2 SWIFT The Society for Worldwide Interbank Financial Telecommunication (â€Å"SWIFT†) operates a worldwide financial messaging network which exchanges messages between banks and other financial institutions. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as â€Å"SWIFT codes†.The majority of international interbank messages use the SWIFT network. As of September 2010, SWIFT linked more than 9,000 financial institutions in 209 countries and territories, who were exchanging an average of over 15 million messages per day. SWIFT transports financial messages in a highly secure way, but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer, rather, it sends payment orders, which must be settled via correspondent accounts that the institutions have with each other.Each financial institution, to exchange banking transactions, must have a b anking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. 66 8. 2. 1 BRAC Bank Swift Network Diagram Fig-8. 37 Swift Network Diagram 8. 2. 2 SWIFT Infrastructure Overview: A typical SWIFT customer environment consists of a combination of individual components that interact with each other to provide messaging services. Fig-8. 38 Swift Infrastructure 67 Table 8. 3: Terms and description of SWIFT Terms FIN CBT SNL RA MQ HSM HTTPS Vendor product VPN box PKIDescription Software product that processes and that exchanges FIN messages, by using the FIN application through the SWIFT network. Alliance Access and Alliance Entry are FIN CBT products that are provided by SWIFT. As of now, these CBT products also offer the functionality to send messages for your Solutions through the Alliance Messenger interface. SWIFTNet Link. Mandatory SWIFT software component that is required in order to connect to SWIFTNet. Remote A PI. SWIFT middleware component that is used in order to link back-end applications and workstations to Alliance Gateway, which acts as the messaging concentrator.Message Queue. IBM middleware component that is used in order to link back-end applications through the Alliance Gateway. Hardware Security Module. A hardware device that is tamper-resistant and that ensures the secure storage and the processing of PKI secrets. HSMs replace the current Secure Card Rearders and the ICCs. There are three types of HSM devices: HSM boxes, HSM tokens, and HSM cards and card readers. Only one type of HSM is supported on the same SWIFTNet Link. Secure Hypertext Transport Protocol. A protocol that is used in order to access web servers that are hosted on SWIFTNet.The HTTPS proxy, which is a part of Alliance Gateway, is used for routing purposes. Product that is offered by a SWIFT partner and that allows to connect to additional services hosted on SWIFTNet. These products have an embedded SWIFTNet L ink, or they connect to Alliance Gateway. Virtual Private Network hardware device. Mandatory SWIFT network component for the connectivity to the multi-vendor secure IP network. A VPN box implements network security that is based on IPsec. Public Key Infrastructure certificate. SWIFT acts as the certification authority on SWIFTNet. 68 8. 2. 3 Maintaining the SWIFT environment: 8. 2. 3. 1 Daily activities ? ? ? ? ? Back up the system and the application data Monitor the systems and review the error logs Login to FIN to process messages that have been received Restart Alliance Access for database maintenance purposes, except if specific Arrangements have been made for continuous operation Export the RMA authorizations and distribute them to your other applications, if required 8. 2. 3. 2 Weekly activities ? Check the SWIFTNet Link connectivity after a weekend when maintenance activities are performed Check the connection to the HSM box by performing the SwHSMSelfTest command (This is a pplicable for HSM box configurations only) ? Archive the Alliance Gateway logs and journals Archive the messages and events of Alliance Access or Alliance Entry 8. 2. 3. 3 Monthly activities ? Restart SWIFTNet Link and Alliance Gateway, in order to ensure that the processes that use certificates are stopped. By performing this restart, the certificates can be renewed the next time that they are used to log on. 69 ? Open all the PKI certificates at least once. Use the CertInfo command or sign on the Web station or Web platform using these certificates, facilitating renewal and change of passwords. ? Back up all the PKI certificates after you have opened them. Use the SNL_BackUp. l command. (Note: This will back up all the certificates that are stored on disk. It will not back up the certificates that are stored in the HSM) Half 8. 2. 3. 4 Yearly activities ? Reboot all your HSM boxes but not together. (Applicable in HSM box scenarios only) CHAPTER NINE MAINTENANCE, MONITORING & SUPPO RT 9. 1 Overview BRAC Bank uses some software to monitoring, support and troubleshooting purpose. One of the software is â€Å"What's Up Gold†. 9. 2 What's Up Gold 9. 2. 1 Create a New Map To create a new map, from the File menu, you choose New Map Wizard to view the New Map dialog box. You can select one of the following options:Discover and Map network devices creates a map using the information sources that you select, such as: SNMP information on your network, information you enter about IP addresses; information in a local hosts file, the Windows registry, Internet Explorer entries in the registry, and Windows Network information. You can specify which of these sources you want to use. Select this option and then click Next. The Discover Devices screen appears. Create a blank map creates an empty map to which you add device icons using any of the create map functions or by cutting and pasting device icons from an existing map. 1 Fig-9. 1 Creat New Map in What's Up Gold F ig-9. 2 Creat New Map in What's Up Gold (Continuing) 72 Now as your Map is created you can start adding new devices for polling and monitoring. Please follow the following steps to add a new device in the map and start monitoring the MAP. Step-1: After creating a Blank Map, drag your desired device from Device Type Panel as directed in the image below. Fig-9. 3 Select device for mapping Now double click on the device you just added from the right panel. And configure the item properties fields as per your requirements.You have to put a valid IP address in order to start monitoring the device using ICMP. Press OK after entering the details. 73 Fig-9. 4 Configure device properties Now click on the Map as directed in the image below to start polling the devices in the network. Fig-9. 5 Polling device You have to set the poll frequency and default timeout as per your need. These can be done from the device properties. 74 9. 2. 2 What’sUpGold Web Server What’sUpGold provide s a web server that lets you view the status of your network from any web browser. You can enable/disable the web server and set access to this server through the web properties.Set up the web server: Click on the links below Configure > Web Server > General > Enable Web Server > Enable Web Configuration. In addition to this setting, you can set access for each web user account. If Enable Web Configuration is not selected, web users will not be able to change any What’sUpGold settings; they will have only the view capabilities. Fig-9. 6 What’sUpGold Web Server Overview CHAPTER TEN CONCLUSION The internship program gave me a chance not only to work with BRAC Bank Limited but also a chance to learn from the good experts.This would reflect much onto my experience. Working with a leading business organization was a rare chance for me. I really appreciate the way I have been guided through this internship program with BRAC BANK LIMITED. Beginning from the opportunity to tak e the time I needed to refresh and expand my knowledge in several issues concerning System Administration. Over a somehow protected period where I could discover and learn to value my new working environment, and finally earned the confidence to deal with assignments myself. It is through them that I did enjoy my work every day.Having a rare opportunity to use the knowledge and skills that I had acquired, I learned how to handle critical network problems and got the new ideas. It was a great experience to work with networking devices practically and to troubleshoot different problems. REFERENCES [1] http:// www. bracbank. com [2] http:// www. eldorado-bd. com/MDMessage3. aspx [3] http:// www. bankinfobd. com/banks/3/BRAC_Bank [4] http:// www. bobsguide. com/guide/news/2008/Jan/15/OMNIBUS_InterBank_Switch_goes_live_in_Bangladesh_with_Phoenix. html [5] http:// www. bdresearchpublications. com/admin/journal/upload/09164/09164. pdf

Sunday, September 29, 2019

Consequences of depression according to Beck’s cognitive theory Essay

According to Beck (1976), depression is characterized by cognitive distortions and is characterized by six features. The first one, arbitrary interference refers to the process of deriving a conclusion from a phenomenon without necessarily having evidence to support the conclusion or when the evidence available does not jell with the conclusion. Secondly, a collapse in the cognitive triad may lead to selective abstraction, which involves focusing on details that do not match with a given context while ignoring the salient features of the phenomenon at hand. For instance, students with a negative cognitive triad will have a tendency to perceive examination questions in their own way which is not in line with the intended answer. Thirdly, the affected people also develop a habit of overgeneralization of facts. This is as situation whereby there is a tendency to create general rules to specific or even isolated instances. For example, a student of mathematics would always view particular calculations as difficult irrespective of how simplified they may be. The fourth point is that depressed people also have tendencies to commit magnification and minimization errors while doing their tasks. This is because they usually have preformed mindsets hence any attempt to inject new knowledge is fruitless. Finally, Beck (1976) noted that depressed individuals might embrace too much personalization and become absolutistic or dichotomous in thinking. This is because of fear that the world does not like them, and that their future is always bleak- the consequences of a purely negative cognitive triad. Personalization for instance makes parents believe that they culpable when their children misbehave. Empirical evidence for Beck’s cognitive theory There is a strong indication that the cognitive triad hypothesis indeed highlights the plight of depressed people. For instance, it could be true that depressed people report more negative thinking about themselves, their world and their future (Beck, 1976). In regard to thinking about the self, distressed people usually resort to less positive self-referent beliefs and become highly critical of themselves and their actions. They are also likely to report a number of imagined activities and how they managed to escape from the tedious tasks (they will never attempt difficult tasks since they always have a sense of lack of confidence in themselves). The theory model therefore builds a foundation for solving psychological problems and since it has every indication that such problems have the sources within the affected individuals, it is these individuals themselves who can best afford a solution to their problems. In essence, the model indicates that people have to change the attitudes towards themselves, the world and the future (and do so in a manner that anticipates good outcomes). Only by doing so can human beings expect a positive cognitive triad, hence positive thinking about life. Beck’s theory and accessibility Beck’s cognitive theory model proposes features that can be procedurally defined and empirically tested, the use of cognition as one of the main parameters to evaluate the behavior and response of people to various phenomena adds impetus to the model’s worth. In spite of the fact that the model does not describe all cognitive processes, it still highlights the varying levels of thoughts and has an assumption that all thoughts associated with psychological abnormalities are spontaneous and just close to consciousness. Another assumption of Beck’s cognitive theory is that individuals can be trained to in order to be able to access the products of their faulty information processing. How this is possible is however amenable to discussion since individuals have different levels of grasping skills and exist in different environments. In short, it may not be possible to train all individuals to be able to trace back their faults and therefore identify their shortcomings. How personality types are created Beck’s theory has evolved over time and one of the most significant modifications it has gone through is its ability to explain differences in personality. According to the theory, people have individual differences that determine the types of events that may cause depression episodes in them. For example, a â€Å"sociotropic† personality is a type where the person concerned bases his or her self-belief in how others regard him or her or talk of his or her actions. For such a person, a perceived snub from a trusted person (like a close friend) is enough cause of a high level of depression. Another kind of personality, according to Beck, is the â€Å"autonomous† type. Such people feel challenged and depressed when their expectations of being in control over situations are challenged, for instance in losing a match where there were high chances of winning.

Friday, September 27, 2019

Cross Cultural Health Perspectives Essay Example | Topics and Well Written Essays - 750 words

Cross Cultural Health Perspectives - Essay Example Four issues will be investigated: The best practice among a range of options in medical language interpretation, legal responsibilities in providing that services, CLAS standards seen in the case, and your role in a similar situation in the future. The best option in providing medical language interpretation is to hire a qualified medical interpreter. This means that the person is trained and is on-hand right away. Outsourcing from an agency also works, but interpreters might not be available at all times. A microphone helps by allowing these interpreters to speak on the phone with the patient and the healthcare provider at the same time. There are three less ideal options to choose from if a professional interpreter is not available: a.) Bilingual hospital staff, b.) community volunteers and c.) Family members and friends. None of these people are trained to be professional medical interpreters. Issues of time management, confidentiality and objectivity may arise when using these people. The legal responsibility of an organization to provide qualified language interpretation comes from Title VI of the Civil Rights Act of 1964, which states, â€Å"No person in the United States shall, on ground of race, color, or national origin, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any program or activity receiving Federal financial assistance† (Office of Minority Health, 2005). This entails providing meaningful access to services even if the patient cannot speak English. Other legal responsibilities are dependent upon the state or the institution. For example, JCAHO Standard RI.2.100 â€Å"requires that organizations ensure effective communication between the patient and the organization through the provision of interpreter and translation services. The standards also require the collection of race, ethnicity, and language data† (as cited in Office of Minority Health, 2005).  

Environmental sustainability Journal questions Essay

Environmental sustainability Journal questions - Essay Example Recreation fishing is a relatively recent idea although continues to gain dominance. Commercial fishing, on the contrary is exploitative and deeply rooted since it started long before recreational fishing. Confusion emanates from what is the scale of consideration that separates the two concepts. The extent of diversity to consider when outlining the distinction between the two practices remains a serious conflict. Although commercial fishing entails a high level harvesting of fish species, recreational fishing continue to increase regarding the scale of exploitation of fish species (Cooke & Cowx, 2006). It, therefore, remains confusing to determine the level of exploitation that defines the two concepts. Another conflicting area of consideration is the selection of fish that the two should distinctly have focus. Undefined categories of species that commercial fishing and recreational fishing should concentrate on remains to be a source of conflicting ideas. The technology applied in the two fishing techniques should be different. Conventionally, recreational fishing should not apply technologies that involve high extraction levels. This has not been so though since recreational fishing technologies tend to improve to be more extractive than expected. This is a source of conflict in marine resource conservation. ... Environmental sustainability as a focus of sustainable building entails improving the energy efficiency of buildings. Installation of solar panels in buildings in buildings continues to gain dominance as a sustainable building strategy. Solar panels utilize solar energy. This is a renewable energy source, a factor that renders the use of solar panels efficient as a source of energy in buildings. Sustainability proponents advocate for the adoption of renewable energy sources as contrary to non-renewable sources. Houses with installed solar panels use minimal energy from the main grid since they utilize solar power. Electrical energy converted by the solar panels is useful for heating and running in-house machines. This saves on electricity tapped from the main grid. The effectiveness of energy conversion by solar panels by reduces from the influence of dusts. Detergents used to clean the dust may cause environmental effects. The introduction of panels that have self-cleaning mechanism s also increases the energy efficiency. Besides promoting energy efficiency, self-cleaning panels also reduce the use of cleaning detergents that may have associated environmental effects. The use of solar panels as a source of energy is a move to promote the utilization of renewable energy. Renewable energy use is essential among the various strategies to promote sustainability. Question 6 Sustainable management of waste is vital engagement in promoting sustainability. Waste from minerals and mining industry contribute to a high percentage of wastes. Waste from demolition and construction contribute to a higher pollution of the environment. Municipal waste management strategies are critical as a development area to promote

Thursday, September 26, 2019

Article Analysis Report (Macroeconomics) Essay Example | Topics and Well Written Essays - 2000 words

Article Analysis Report (Macroeconomics) - Essay Example The world economic situation is apparently under deep scrutiny owing to its frequent fluctuations and rapid alterations which has left multiple countries, irrespective of their global presence as a developing or a developed economy, unstable. It is in this context that fluctuations in the global economic environment also lead to fluctuations in the national contexts of various economies including the US, one of the leading and large economies. Owing to the current economic conditions of the US, Denham (2012) pointed that a larger proportion of funds have been allocated to the public sector of the economy which has left private sector with average funds that might prove insufficient in the future due to international competitions and altering demographic features. Denham (2012) also noted that as the economy intends to massively increase its tax rates, US is likely to witness the challenge of ‘fiscal cliff’ in the near future. In the international context, EU being a larg e contributor to the global Gross Domestic Product (GDP) and therefore operate partially as a world economic power house, may also impose an inevitable impact upon the economic stability of the US owing to the currently witnessed Euro Zone debt crisis. Additionally, poor oil market and export-import industrial performances, US is also quite likely to face the issue of fiscal deficit in the preceding years (Denham, 2012). In the words of Denham (201), â€Å"it seems the fiscal cliff saga is the main focus topic and the rest has little influence†. However, as stated by Denham (2012), ‘fiscal cliff’ is not the only economic challenge that attracts attention with concern to the US economic stability from the global sphere. Furthermore, as stated by Moore (2012), such measures can again lead to a double-dip crisis situation. Indeed, the issues noted by Denham (2012) are noteworthy to ensure economic stability in the US from a future perspective. Nevertheless, agreeing with the issues noted by Denham (2012), Newman (2012) stated that apart from the alleged ‘

Wednesday, September 25, 2019

The Flow of Foreign Direct Investment to Developing Countries Essay

The Flow of Foreign Direct Investment to Developing Countries - Essay Example This theory draws heavily on the more general work of Williamson that explores the conditions under which firms choose a hierarchical approach to engaging in business activities rather than a market-based approach. Williamson argues that where two sets of conditions exist, firms will tend to prefer internal or hierarchical approaches. These conditions include oligopolistic (few sellers) or oligopsonistic (few buyers) market settings and situations of great uncertainty. Oligopolistic or oligopsonistic situations lead to the choice of a hierarchical approach because, in these situations, opportunistic economic agents will make it very difficult for a firm to negotiate an equitable transaction. In situations of uncertainty, the fact that individuals and organizations are limited in their analytical capacity will lead to internal organization because of the difficulty of writing and enforcing long-term contracts that incorporate all the necessary contingencies that arise as a result of a n uncertain environment (Michael, 1982). Building upon this work, international business theorists suggest that firms that venture overseas either have a particular competitive advantage or seek a competitive advantage. A firm's existing competitive advantage might be its superior technology, its unparalleled management expertise, or its unique brand name. Indeed, these competitive advantages are often intangible assets. Though critical to the firm, they are not identified as fixed assets in the firm's balance sheet. The firm has various options it could use to benefit from these competitive advantages. These options span the choice of a market or a hierarchical approach. In particular, the firm could sell or rent these advantages on the... This essay stresses that the worldwide pool of labor expanded beyond the borders of the countries with enfranchised working classes and high levels of reproduction. Employers seeking to minimize their direct employment costs and their indirect political burdens sought out communities of workers who were politically less potent than those in the older industrial states and whose costs of reproduction were lower. This paper makes a conclusion that the findings highlight the interaction between global financial institutions and local political-economic variables. When these variables measure both international and intranational processes simultaneously, they reflect or point to highly interdependent processes that influence the location of foreign investment. In other words, national and international dynamics are so interpenetrating in the modern world system that any analysis that disregards the effect of either set of factors is seriously deficient. As such, the work extends the political sociology of foreign direct investment by showing the importance of international financial institutions in directing and attracting foreign direct investment. Specifically, International Monetary Fund conditionality is both a signal of approval and a generator of policies that create access to foreign investors. When these two factors interact with policies of repressive regimes, foreign investors have re alized their goal: economic access and political protection.

Tuesday, September 24, 2019

Aircraft System Principles and Applications Assignment

Aircraft System Principles and Applications - Assignment Example Effect of air density on aircraft performance Air density is responsible for lifting the aircraft at the start of flight. It is also responsible for favorable amount of fuel consumption as air density affects air fuel mixture which is burned to run the engine. Therefore, fuel consumption and lift of aircraft not only depends on density but also depends upon temperature and pressure, indirectly. Â  Effect of air pressure on aircraft performance An aircraft requires maintaining a specific pressure to keep flying in the air or to move to higher altitudes. As the lift of aircraft is directly affected by the density of air, so in order to move to higher altitudes density of aircraft must be greater than 1225 gm/m-cube. Reduction in density results in lesser amount of air molecules moving around the plane and hence, lesser amount of thrust is applied on the plane than is required to move at higher altitude(FAA). Â   Effect of air pressure on aircraft performance Air may have parcels of air that are having raised temperatures and this raised temperature significantly reduces density of air within these parcels. Whenever a plane enters from a parcel of lower temperature to a parcel of higher temperature, it undergoes variation in performance. Due to lower density, flight of plane is adversely affected and it also affects the fuel efficiency of the engine due to insufficient air required to inject fuel. Therefore, planes are equipped with turbochargers. in order to maintain air pressure. Question 2 Explain the function and operation of aircraft pneumatic systems and their associated status indicators? Old aircraft systems were based on high pressure pneumatic systems which make use of air as a power transmission medium. Most common components that make use of pneumatic system are: Brakes Closing and opening of doors Operation of emergency devices, for example landing gears, flaps etc. Driving of hydraulic and water pumps etc. Pneumatic power systems are most commonly named as vacuum pressure systems, where pressure is measured by making use of suction pressure. Vacuum pressure system facilitates following components named, pumps, relief valves, vacuum air filter, suction gauge gyro instruments(FAA). Before the air enters the pneumatic system, it is passed through the air filter in order to filter out impurities and dust particles. These particles, if enter the pneumatic system, damage the system adversely. After that it is served to the pumps which are used to pump out air at desired pressure required by the pneumatic system. It is considered the most important part of the system without which system would not work. The pumped air is

Monday, September 23, 2019

Communication plan for childhood obesity Term Paper

Communication plan for childhood obesity - Term Paper Example This essay "Communication plan for childhood obesity" outlines the draft how to reduce the growing rate of obese children in consequence of communication strategy. Parents have the greatest responsibility in bringing change to the current level of obesity among the young children in US. Parents have a duty to determine the kind of food their children eat and the involvement of children in physical activities (Williams, et.al, 2013). The mothers should be encouraged to breastfeed their babies adequately and avoid feeding them babies with foods containing high calories, sugar and fat. Parents should encourage their children to take part in physical activities regularly and limit the time which those children spend watching television, videos and playing computer games Teachers determine the kind of physical activities that children engage in which in school. In most cases, teachers are focused on academic performance of their schools and limit the time in which their students engage in physical activities (Williams, et.al, 2013). All training institutions should have a well structured program that specifies the time for students’ involvement in physical activities and time for class work. Therefore, teachers should give adequate time for physical activities to their students every day in order to improve their wellbeing. In addition, students take their meals at school during the day. Therefore, teachers have a duty to ensure that health foods are available for the students while in school.

Sunday, September 22, 2019

God’s rule over human happenings Essay Example for Free

God’s rule over human happenings Essay God controls events of human history to accomplish of his purposes. God’s rule over human happenings is demonstrated many times in the Bible. One of the clearest examples is recorded in the first four chapters of the book of Daniel. Daniel and three of his friends were taken captive by Nebuchadnezzar, king of Babylon. In Babylon they are trained to be special servants of the king. When Nebuchadnezzar had a dream and apparently forgot it, he demanded that his wise men tell him what he dreamed and give its interpretation, on penalty of death if they didn’t. When Daniel heard about this situation, he and his friends prayed to God to learn about the dream and its interpretation. When God revealed the dream and its meaning to Daniel, Daniel thanked God by saying, Blessed be the name of God forever and ever, for wisdom and might are His. . . . He removes kings and raises up kings; He gives wisdom to the wise and knowledge to those who have understanding. . . . I thank You and praise You, O God of my fathers; You have given me wisdom and might, and have now made known . . . the kings demand (Daniel 2:20-23, NKJV). The dream was about a man with a head of gold, his chest and arms of silver, his thighs of bronze, his legs of iron, and his feet partly of iron and partly of clay. Daniel told the king that God had revealed to him the dream and its interpretation. He declared that different parts of the man represented various kingdoms. The head of gold represented Nebuchadnezzar. His was the greatest kingdom. After him would come lesser kingdoms, represented by the inferior medals, until the coming of the greatest – an everlasting kingdom – represented by a stone, uncut by human hands. The stone would strike the image and broke it in pieces. It would then became a great mountain and fill the whole earth. Nebuchadnezzar was grateful to Daniel for telling him his dream and its interpretation. He declared, Truly your God is the God of gods, the Lord of kings, and a revealer of secrets, since you could reveal this secret (Daniel 2:47). The king then promoted Daniel to be ruler over the whole province of Babylon, and chief administrator over all the wise men of Babylon. Moreover, Daniel’s three friends were placed in positions of power in the province of Babylon. Nebuchadnezzar was a most powerful king. He was also very conceited. He built an image of gold, ninety feet tall. Why he built it is not declared in scripture. However, it may be because the dream, wherein he was represented as possessing a kingdom portrayed with a head of gold, motivated him to exalt himself in that way. He called for everyone to fall down before the image and worship it. But Daniel’s three friends refused. Nebuchadnezzar threatened them, saying that they would be put into a furnace of fire if they didn’t prostrate themselves before it. They still refused, saying that God would deliver them, but even if he didn’t, they would not worship the image. Nebuchadnezzar, full of fury, had them put into the fiery furnace. Afterward, however, when he looked into the furnace, he was greatly surprised. There was a fourth person, one like a son of the gods, walking among them and none of them were burned. When Nebuchadnezzar called for them to come out of the furnace, he discovered that they were not singed, nor did they have even the smell of fire on them. Therefore he said, Blessed be the God of Shadrach, Meshach, and Abed-Nego, who sent His Angel and delivered His servants who trusted in Him . . . that they should not serve nor worship any god except their own God! Therefore I make a decree that any people, nation, or language which speaks anything amiss against the God of Shadrach, Meshach, and Abed-Nego shall be cut in pieces, and their houses shall be made an ash heap; because there is no other God who can deliver like this. (Daniel 3:28-29) He then promoted them in the province of Babylon. Nebuchadnezzar thus came not only to recognize, but also to appreciate the Most High God. Nevertheless, Nebuchadnezzar was still filled with great pride. In his own words, Nebuchadnezzar told how he came to be humbled by God. He had another dream which none but Daniel could interpret. The dream was about a great, strong, and high tree with lovely leaves and abundant fruit. In it the birds lodged, under it animals found shade, and from it all flesh was fed. But a voice from heaven commanded the tree to be cut down. Even so, the stump and roots were to be left, bound with iron and bronze in the grass of the field. Before being told the meaning of the dream, Nebuchadnezzar recognized that This decision is . . . in order that the living may know  that the Most High rules in the kingdom of men, gives it to whomever He will, and sets over it the lowest of men (Daniel 4:17). When told the dream, Daniel was disturbed because he knew it was against the King. The tree represented the king. Although the king was great, he would be cut down but not destroyed. His heart would become like that of an animal and he would eat grass for seven times (probably seven years). However, Nebuchadnezzar was assured that the kingdom would be his after he came to realize that Heaven rules. Daniel then advised the king, break off your sins by being righteous, and your iniquities by showing mercy to the poor. Perhaps there may be a lengthening of your prosperity (Daniel 4:20). The dream began to be fulfilled a year later while Nebuchadnezzar was walking in his palace. He said, Is not this great Babylon, that I have built for a royal dwelling by my mighty power and for the honor of my majesty? (Daniel 4:30). It was then that a voice from heaven said, King Nebuchadnezzar, to you it is spoken: the kingdom has departed from you! And they shall drive you from men, and your dwelling shall be with the beasts of the field. They shall make you eat grass like oxen; and seven times shall pass over you, until you know that the Most High rules in the kingdom of men, and gives it to whomever He chooses (Daniel 4:31-32). And so it was. Nebuchadnezzar ate grass like an ox, his body was wet with the dew of heaven, his hair grew like eagles’ feathers, and his nails like bird’s claws. At the end of the time, Nebuchadnezzar’s understanding returned to him, as did his kingdom, honor, splendor, counselors and nobles. He then blessed the Most High, saying, His dominion is an everlasting dominion, . . . He does according to His will in the army of heaven and among the inhabitants of the earth. No one can restrain His hand or say to Him, ‘What have You done?’ (Daniel 4:34-35). He then praised and honored the King of Heaven, saying that his works are true and his ways just. Moreover, he said, those who walk in pride, He is able to put down (Daniel 4:37). God rules. He sent dreams to Nebuchadnezzar. Through Daniel, God made their interpretations known. In this way God caused Daniel to become ruler over  all Babylon and his friends to be elevated to rulership positions. God changed Nebuchadnezzar’s heart and made him to be a believer in the Most High God. He also humbled and then restored Nebuchadnezzar to his kingdom. He thereby caused His name to be heralded by the King throughout all Babylon (Daniel 4:1-3). Nebuchadnezzar came to know that God ruled. Yet he probably did not understood the extent or purposes of God’s rule. He may not have realized that in all these things God was preserving the Israelites in their captivity. When we see disturbing conditions in our world (just as the Israelites saw and were disturbed by the fall of Jerusalem and the overthrow of their nation by the Babylonians) we should realize that God reigns over the nations, God sits on his holy throne (Psalm 47:8; See also Jeremiah 18:7-10). He still rules in the kingdom of men. And while we may not know the extent of God’s rule, we should realize that God is working out his own purposes through contemporary human events.

Saturday, September 21, 2019

Railroads and the American Expansion into the West Essay Example for Free

Railroads and the American Expansion into the West Essay The transcontinental railroad construction began on the West Coast in 1863. The Chinese comprised a major part of the work force that built the Central Pacific railroad eastward, over the high Sierras, and across the deserts of the West — to Promontory, Utah, where on May 1869, it linked up with the Union Pacific whose workers, of Irish, Scottish, German and Italian descent, started in Omaha, Nebraska. The railroad reduced the cross-country trip, from Boston to San Francisco, from six months to one week. When the rails from the opposite sides were almost a the point of meeting, the whole country listened in for news of Promontory. And then a cannon faced over the Pacific and one over the Atlantic went off simultaneously flashing a signal across the United States. Crowds cheered. There was a frenzy of celebration. It was an enormous event for the country. The famous Golden Spike ceremony on May 10, 1869 at Promontory, Utah, commemorated the completion of Americas first transcontinental railroad. The event marked the uniting of the country that had only recently fought the Civil War, and therefore had most special significance. The transcontinental nation became a reality (Williams 4) During the nineteenth century in America, the railroad represented civilization moving into the wilderness. As early as 1835 the U. S Senate discussed surveying the west to build a Transcontinental railroad. However, railroad technology had not yet developed strong enough motive power to cross the mountainous west. That great feat was left to the next generation of railroaders. During the 1840’s the phrase â€Å"Manifest Destiny† was coined to explain the growth of the United States. It was argued that the country had a right, a God-given destiny, to expand from the Atlantic to the Pacific Oceans and to govern all the land in between. However, the nation’s fulfillment of its Manifest Destiny or expansion had to wait until after the Civil War. In the meantime, the railroads increased the population of the United States east of the Mississippi and created a bustling economy with its rapid transporting of goods to and from the larger east-coast cities. Following the Civil War, the railroads made it possible for expansion into the Trans-Mississippi West to the Pacific Ocean. People in the area were assured there was a way to get their products to market, and to receive information and manufactured goods to make their work and lives easier. In the second half of the nineteenth century, the railroads merged vast territories into one nation by creating dependable economic, social and communications unity. The railroads linked California with states in the east, even as they helped the interior regions become quickly populated. Towns sprang up along the track around water and coaling stations for the locomotives. Many times, the men who laid the tracks purchased property and settled down on farms. Prospectors for gold, silver, iron and oil continued to push west to dig mines, pan streams and drill fields in Colorado, Montana, Nevada, and California. At the same time, growing cities back in the east needed more workers for heavy industries, textile mills, machine shops and garment factories and the need was met by migrating Blacks, French Canadians, and a new surge of immigrants from throughout Europe. The first Transcontinental Railroad has been called the engineering marvel of the 19th century, it opened new economies in the American west, while consuming vast quantities of its natural resources; it birthed one way of life on the Great Plains, and destroyed another. In the process of relentless American expansion into the West, the Indian tribes were largely seen as obstacles. For their part, the Indians regarded the white settlers began streaming across the plains toward gold in California and then nearby Colorado, Indians as a new force of nature — mostly a dangerous one. The white travelers spread smallpox and typhoid. The Indians faced it increasingly difficult to find game. Elk and buffalo, antelope was becoming more difficult to pursue because the people who came on the trains were also after them, either for food or sport. Even by the time Pacific Railroad construction began, starvation and disease had already wracked the Cheyenne, the Sioux and the Arapaho. Over the decades, the Indian tribes was severely affected by the encroachment of white settlers and the imposition of federal policies. The United States adopted a policy of relocating tribes farther west or isolating them on reservations. As many see it now, the federal Indian policy was characterized by one primary goal: pushing aside Indian tribes to facilitate the exploitation of the Wests bountiful natural resources. The U. S. Government began to make treaties with the Plains Indians during the 1850s to 1871. Treaties remained as the legal means to snatch Indian homelands away from them, though they created Indian reservations throughout the West. However, federal Indian policy during the period from 1870 through 1900 shifted the focus from creating reservations to gradually assimilating the Indians into the regular population. While the railroads were a symbol of the relentless march of progress, this progress exacted a heavy toll on many traditional peoples and their centuries-old cultures which were alien to its ways. Reference: Williams, John Hoyt. A Great Shining Road: The Epic Story of the Transcontinental Railroad. Lincoln : University of Nebraska Press. 1988.

Thursday, September 19, 2019

Free Billy Budd Essays: Billy Budd as Christ :: Billy Budd Essays

Billy Budd as Christ In this novel, Billy Budd, Melville acts as a "Creator", in that he gives Billy Budd certain superhuman qualities, which allows him to posses the traits of a servant of God. Billy Budd appears Christ-like, because of his peace-making abilities. Although, he is a peacemaker whom will fight for what he believes in and to keep peace. In the beginning of the novel, when Red Whiskers gives Billy Budd problems, he strikes him with a powerful blow and does not have any more problems with him or the crew again. Melville then foreshadows how Billy will use the same tactics the next time he runs into a bully like Red Whiskers. It seems ironic of the names of the ships as we go along in the story. Billy Budd goes from the Rights-of-Man to Bellipotent, it seems then he makes a change like a minister being ordained to a Bishop. Bellipotent signifies a good ship, in that belli- means kind, and -potent means strong and powerful. Melville seems to want his audience to think of the ships as Christ-like symbols also. As in another story, Young Goodman Brown by Hawthorne, a young man is too eager to meet his destiny. Billy Budd is not at the least hesitant, when Lieutenant Ratcliffe wants him for service to King George Ill. Billy Budd goes from a peaceful merchant ship, to a ship at war, full of guns and military discipline. Me lville is suggesting here that Billy will most like endure many problems and hardships entering this service. Billy Budd acts as the foretopman on this ship, which leads the audience to wonder is he doing it out of the grace of God, to make a change on the ship, or is he toying with fate. At the time this novel took place, wars were going on, which was later called the Great Mutiny (a time when sailors rebelled against their own). That explains most of the story Melville is attempting to display. Melville introduces Captain Vere as a dedicated officer who only permits obedience to duty and is very strict with discipline. The author has already foreshadowed many things for the audience. He lets us see how Billy is bound to run into a confrontation with at least one shipmate, and may possibly be accused of mutiny, since the thoughts are already on many officers' minds.

Wednesday, September 18, 2019

C++ Programming :: science

C++ Programming NOTES ON C++ PROGRAMMING Module 1: Pointers and Memory Management NOTES ON C++ PROGRAMMING Module 1: Pointers and Memory Management TABLE OF CONTENTS TABLE OF CONTENTS 1 OVERVIEW 4 BASIC MEMORY MANAGEMENT 5 GROUP ASSIGNMENT 6 INITIALIZATION 8 CONSTANTS 9 INCREMENT AND DECREMENT OPERATORS 10 ELSE-IF 13 SWITCH 14 LOOPS 15 EXAMPLES OF LOOPS 16 BREAK, CONTINUE 18 RETURN 19 FUNCTION DEFINITION: 21 VOID FUNCTIONS 22 FUNCTIONS RETURNING A VALUE 23 OVERVIEW Algorithms: A step-by-step sequence of instructions that describes how to perform a computation. Answers the question "What method will you use to solve this computational problem?" Flowcharts: Provides a pictorial representation of the algorithm using the symbols. Structure Charts: Provides a pictorial representation of the modules contained in the program. Programming Style: Standard form: Function names starts in column 1 and is placed with the required parentheses on a line by itself. The opening brace of the function body follows on the next line and is placed under the first letter of the function name. The closing brace is placed by itself in column 1 as the last line of the function. The final form of your programs should be consistent and should always serve as an aid to the reading and understanding of your programs. Comments: Explanatory remarks made within a program. Help clarify what the complete program is about, what a specific group of statements is meant to accomplish, or what one line is intended to do. Top-Down Program Development: 1. Determine the desired output items that the program must produce. 2. Determine the input items 3. Design the program as follows: a. Select an algorithm for transforming the input items into the desired outputs. b. Check the chosen algorithm, by hand, using specific input values. 4. Code the algorithm into C. 5. Test the program using selected test data. BASIC MEMORY MANAGEMENT Space set aside for the variable: Characters 1 byte (8 bits) Pointers 4 bytes Integers 2 bytes (16 bits) or 4 bytes (32 bits) Short int or short 2 bytes Unsigned int or unsigned 2 bytes Long Integers 4 bytes Floats 4 bytes(single precision, about 7 decimal places) Doubles 8 bytes(double precision, about 15 decimal places) Type Space a) double *values; __________________ ________________________ b) long x[1000]; __________________ ________________________ c) char *s = "string"; __________________ ________________________ d) char s[] = "string"; __________________ ________________________ e) char *name [10]; __________________ ________________________

Tuesday, September 17, 2019

Bmw Films

Decision Problem The primary issue faced by Jim McDowell is what to do for his next marketing campaign. He will need to decide what direction BMW will take in order to stay current in the target market and position the brand as the leader in the luxury car industry. A sub issue that Jim is facing is that in order for BMW to stand out compare to the competition, it must be at the forefront of the marketing trend. There is always pressure on innovative marketing campaigns as a bad campaign can lead to severe damage in the company image and reputation. Decision Alternatives There are a number of alternatives that Jim faces when deciding in what direction to move with the BMW marketing campaign. Develop more short films and build a big series out of it. Develop a full length movie for the theatres Do nothing to the existing campaign and move on to develop a new campaign To continue to use the existing BMW films plus developing a new campaign Creating new films on the heels of the original films plus developing a new campaign Develop a full length movie plus developing a new campaign In order to decide the best alternative it is important to look at some key decision criteria. In this case the important factors would be: delivery time, risk, cost, competitive advantage, ease of implementation. Analysis of Industry In the luxury car segment, BMW and Mercedes have stand strong against the strong competition from Japan like Acura, Lexus, Infiniti. In year 2001, BMW is second best luxury car seller, just behind Lexus amount the other ten major luxury brands. However, BMW only ranked 8th in media expenditures, which again proved the great success on their innovative campaign. In terms of customer loyalty, luxury brand customers do tend to stay among the top brands and are very loyal. There are always customers who switch from BMW to Mercedes or the other way around. Since BMW has the competitive advantage of a younger clientele, it is very important for BMW to create marketing campaign to young adult so they can look forward to own a BMW when they can afford one. Analysis of Company Evaluation of Alternatives Alternative #1, 2, and 3 should only be considered as a short term alternative that can achieve quick beneficial results with no long term prospects because all the alternatives evolve around the same film concept, which eventually will wear out and target audience will not be interested in it anymore. Alternative #4 takes into account with BMW’s long term goal, to be the leader in the industry with innovative campaigns. However, developing a new concept takes time and research before implementation, therefore some immediate alternatives needs to be done before the new campaign kicks in. Alternative #5, 6, or 7 will achieve that goal. Alternative #5 Introduce the BMW films to new markets that may have missed the online films during the campaign period will enable BMW to entice an entirely new segment. By showing the films throughother mediums, BMW will be able to reach a wider audience plus raising the brand awareness. Since this campaign is so successful and unique, BMW can also produce DVD and make itas a collectible item. This alternative is easy to implement, low cost to run, low risk as the campaign is already running with huge success with good reputation. However, other companies may copy the idea and there is a chance that BMW will lose its competitive advantage as the films are getting overly exposed to the original audiences that BMW targeted during the initial campaign period. Therefore, developing another campaign while this is running is necessary in order to achieve BMW’s long term marketing goal. Alternative #6 The other option would be to follow up with another series of films on the heels of the original films. BMW would want to keep the number of films low to try and blend them into the successful original films and not to market them as another series of short films. This alternative will require some time to prepare, and the cost will be much higher in comparison to Alternative #5, which will make it harder as BMW will need more resources in creating a new campaign at the same time. It is easy to implement as all the ground works are in place from the previous films. However, this alternative will have a higher risk than other options due to the high anticipation of BMW to produce high quality films. If any of the film receives negative feedbacks, BMW will risk losing out on the campaign inwhole, plus the reputation of the series. BMW will still keep its competitive advantage with this alternative as they are still the one who leads the marketing trend. Alternative #7 Creating a full length movie can be the next big campaignfor BMW. It is a new approach and will make the brand stand out of all others. The target audience is also much wider in comparison to the initial campaign. It will take a long time to implement, and not as easy as short films because a full length film is more complicated in terms of plot and production. The cost will also go veryhigh that may use up all of BMW’s resources in marketing. It is a two sided sword because if BMW is not placed enough in the film there is no difference in doing product placement in the James Bond movie series; meanwhile if BMW is overly exposed in the film it may create negative feedbacks as it will look like an hour long commercial. The interest level of audience will also be much lower in watching a long commercial than a short film. Decision Criteria Chart Here is the chart for the best 3 alternatives: (X? low score, XXX? high score) Recommendation Based on the analysis above it is evident that the appropriate course of action is to utilize the existing movies in the short term while developing a new full scale marketing plan in the background. By utilizing the existing films BMW will be able to quickly get to market films that they have already completed. They will ride the coat tails of the internet marketing, however by introducing the films to another target markets, BMW will hopefully build on the impact created by the original films. There is relatively low risk to this model because BMW has already invested in the films and by using different mediums to convey their message it is likely that an entirely new market segment will appreciate the films as the original audience did. Although the potential payback may not as great as some off the wall innovative idea, the concept behind releasing the films to a different audience should allow more time and resources to develop another new campaign. If there are enough resources, BMW can also consider creating 1 or 2 more films to avoid losing the competitive advantage toward the target audience. Bmw Films Decision Problem The primary issue faced by Jim McDowell is what to do for his next marketing campaign. He will need to decide what direction BMW will take in order to stay current in the target market and position the brand as the leader in the luxury car industry. A sub issue that Jim is facing is that in order for BMW to stand out compare to the competition, it must be at the forefront of the marketing trend. There is always pressure on innovative marketing campaigns as a bad campaign can lead to severe damage in the company image and reputation. Decision Alternatives There are a number of alternatives that Jim faces when deciding in what direction to move with the BMW marketing campaign. Develop more short films and build a big series out of it. Develop a full length movie for the theatres Do nothing to the existing campaign and move on to develop a new campaign To continue to use the existing BMW films plus developing a new campaign Creating new films on the heels of the original films plus developing a new campaign Develop a full length movie plus developing a new campaign In order to decide the best alternative it is important to look at some key decision criteria. In this case the important factors would be: delivery time, risk, cost, competitive advantage, ease of implementation. Analysis of Industry In the luxury car segment, BMW and Mercedes have stand strong against the strong competition from Japan like Acura, Lexus, Infiniti. In year 2001, BMW is second best luxury car seller, just behind Lexus amount the other ten major luxury brands. However, BMW only ranked 8th in media expenditures, which again proved the great success on their innovative campaign. In terms of customer loyalty, luxury brand customers do tend to stay among the top brands and are very loyal. There are always customers who switch from BMW to Mercedes or the other way around. Since BMW has the competitive advantage of a younger clientele, it is very important for BMW to create marketing campaign to young adult so they can look forward to own a BMW when they can afford one. Analysis of Company Evaluation of Alternatives Alternative #1, 2, and 3 should only be considered as a short term alternative that can achieve quick beneficial results with no long term prospects because all the alternatives evolve around the same film concept, which eventually will wear out and target audience will not be interested in it anymore. Alternative #4 takes into account with BMW’s long term goal, to be the leader in the industry with innovative campaigns. However, developing a new concept takes time and research before implementation, therefore some immediate alternatives needs to be done before the new campaign kicks in. Alternative #5, 6, or 7 will achieve that goal. Alternative #5 Introduce the BMW films to new markets that may have missed the online films during the campaign period will enable BMW to entice an entirely new segment. By showing the films throughother mediums, BMW will be able to reach a wider audience plus raising the brand awareness. Since this campaign is so successful and unique, BMW can also produce DVD and make itas a collectible item. This alternative is easy to implement, low cost to run, low risk as the campaign is already running with huge success with good reputation. However, other companies may copy the idea and there is a chance that BMW will lose its competitive advantage as the films are getting overly exposed to the original audiences that BMW targeted during the initial campaign period. Therefore, developing another campaign while this is running is necessary in order to achieve BMW’s long term marketing goal. Alternative #6 The other option would be to follow up with another series of films on the heels of the original films. BMW would want to keep the number of films low to try and blend them into the successful original films and not to market them as another series of short films. This alternative will require some time to prepare, and the cost will be much higher in comparison to Alternative #5, which will make it harder as BMW will need more resources in creating a new campaign at the same time. It is easy to implement as all the ground works are in place from the previous films. However, this alternative will have a higher risk than other options due to the high anticipation of BMW to produce high quality films. If any of the film receives negative feedbacks, BMW will risk losing out on the campaign inwhole, plus the reputation of the series. BMW will still keep its competitive advantage with this alternative as they are still the one who leads the marketing trend. Alternative #7 Creating a full length movie can be the next big campaignfor BMW. It is a new approach and will make the brand stand out of all others. The target audience is also much wider in comparison to the initial campaign. It will take a long time to implement, and not as easy as short films because a full length film is more complicated in terms of plot and production. The cost will also go veryhigh that may use up all of BMW’s resources in marketing. It is a two sided sword because if BMW is not placed enough in the film there is no difference in doing product placement in the James Bond movie series; meanwhile if BMW is overly exposed in the film it may create negative feedbacks as it will look like an hour long commercial. The interest level of audience will also be much lower in watching a long commercial than a short film. Decision Criteria Chart Here is the chart for the best 3 alternatives: (X? low score, XXX? high score) Recommendation Based on the analysis above it is evident that the appropriate course of action is to utilize the existing movies in the short term while developing a new full scale marketing plan in the background. By utilizing the existing films BMW will be able to quickly get to market films that they have already completed. They will ride the coat tails of the internet marketing, however by introducing the films to another target markets, BMW will hopefully build on the impact created by the original films. There is relatively low risk to this model because BMW has already invested in the films and by using different mediums to convey their message it is likely that an entirely new market segment will appreciate the films as the original audience did. Although the potential payback may not as great as some off the wall innovative idea, the concept behind releasing the films to a different audience should allow more time and resources to develop another new campaign. If there are enough resources, BMW can also consider creating 1 or 2 more films to avoid losing the competitive advantage toward the target audience.