implementation of an ITC system

Identification Problem There is a company called BlackBurry's, who supply home insurance. They have thousands of costumers all over the UK. Every year they have to send out a renewal confirmation letter to all of their clients, stating that they need to renew their membership details. Each year they ask a different group of staff, to write the letter another group of staff to post then off and another group to file all of the reconfirmation mails which have been returned back to the company from their clients. After they have been received they all need to processed, according to the answer in the letter. They have a team of 40 members of staff, who work on creating and building the databases. They have to meet every day to work on this together, and it is very inconvenient, as they all have to work on it at the same time. They have 14 sectaries, which have to sit by the phone all day. They take phone messages, and relay them to staff in the complex, arrange meetings between senior staff and potential clients and to relay messages from phone calls. The only way in which BlackBurry's Ltd are able to contact clients or visa versa is by phone fax and post. These are the only forms of communication, and they are extremely inefficient, especially for urgent problems and issues. The End User is: BlackBurry's Ltd., 33, The Ridgeway, Stanmore, Middlesex, H7 4BE, England

  • Word count: 6487
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI 1. Introduction For the reliability of ATM networks, there is an urgent need to apply some formal methods in validating these protocols and in generating test cases. The tools needed to accomplish these purposes include: a technique to model the protocol, a formal description language to describe the model, a protocol simulator to perform verifications, and a test generator to produce test cases. This work is a case study of applying formal verification and test generation tools to the ATM network routing protocol, or the ATM Forum Private Network-Network Interface (PNNI) Specification Version 1.0 [1]. The PNNI specification consists of three layers of protocols: the Hello protocol for identifying the status of NNIs; the Database Synchronization protocol for maintenance of routing databases; and the Peer Group Leader Election protocol for operations of hierarchical routing. Each of the PNNI sub-protocols can best be modeled as communicating Extended Finite State Machines (EFSM) with parameters [2]. The system behavior of the PNNI protocol system is the combined effects of three communicating EFSMs. The issue at hand is: Is it necessary to develop a complete composite state machine to correctly model PNNI, and if so, how? Furthermore, since a PNNI system represents an ATM network

  • Word count: 5529
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Produce a report for the Managing Director of Animal World Magazine outlining different ways of implementing a client-server Local Area Network (LAN) for the business.

Produce a report for the Managing Director of Animal World Magazine outlining different ways of implementing a client-server Local Area Network (LAN) for the business. This includes; * Topologies o Cables o Connector o Hardware o Software o Advantages and Disadvantages * Network o Advantages and Disadvantages * TCP/IP o Advantages and Disadvantages * IP Address o Advantages and Disadvantages * MAC Address o Advantages and Disadvantages What is Network? A network is a collection of terminals, computers, servers, and components which allows for the easy flow of data and use of resources between one another. The three basic types of networks include: o Local Area Network (LAN) o Metropolitan Area Network (MAN) o Wide Area Network (WAN) LAN - A Local Area Network (LAN) is a network that is confined to a relatively small area (in one building). MAN - A Metropolitan Area Network (MAN) covers larger geographic areas, such as cities or school districts. WAN - Wide Area Networks (WANs) connect larger geographic areas, around the world therefore is world wide. What is Topology? The topology describes the way in which the devices on a LAN are connected together. There are four main LAN topologies: bus, star, ring and mesh. Bus A Bus topology is a single wire with terminator at each end. All nodes (server, workstation and peripherals) are connected to

  • Word count: 4882
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks.

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks. A network can be defined as "A group of two or more computer systems linked together". The main reason for doing this is to enable any 2 or more computers to share each other's resources and thus this is a feature of all networks. Security in this context can be defined as "the act of protecting information (data files) from being access by unauthorised individuals or groups". There are three common types of network set up which are defined by there topology. Figure 1 illustrates the difference between Star, Bus and Ring networks which are used in network types as LAN, WAN, WLAN etc. A network runs on protocols, which define a common set of rules and signals that computers on the network use to communicate. A network can be isolated and independent such as a small home-area network (HAN) but once a network is connected to another network it can be defined as an Internet. Networks are frequently thought of as two different systems due to the fact that they can be access internally as well externally. Both methods give rise to different security issues and should be tackled differently by the network administration. Internal users in most cases are over looked as threats to security as they can cause malicious and unintentional damage to a

  • Word count: 4645
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Visual Basic and Databases.

Visual Basic and Databases . Introducing Visual Basic and Databases Preview * In this first chapter, we will do a quick overview of what the course entails. We will discuss what you need to complete the course. We'll take a brief look at what databases are, where they are used, and how Visual Basic is used with databases. And, we'll review the Visual Basic development environment and the steps followed to build an application in Visual Basic. Course Objectives ==> Understand the benefits of using Microsoft Visual Basic to build a 'front-end' interface as a database programming tool ==> Learn database structure, terminology, and proper database design ==> Learn how to connect to a database using the Visual Basic DAO (data access object) control ==> Use the ADO (ActiveX data object) data control and data environment to connect to a database (Visual Basic 6 only) ==> Learn the use of Visual Basic data bound controls ==> Learn to make database queries using SQL (structured query language) ==> Understand proper database search techniques ==> Learn how to use the Visual Data Manager to create a database ==> Learn database management techniques ==> Learn to create and produce database reports ==> Learn how to distribute a Visual Basic database application ==> Understand connection to remote databases ==> Introduce other advanced database concepts Course

  • Word count: 4369
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Networks.

Element 4.3 Computer Networks 2. Types of Networks A LAN (local area network) is a collection of computers connected together over a small area, usually a single building or site (e.g. a school). If a school was to have a LAN it would own all the equipment and be able to run the network as it sees fit. If changes need to be made to the network, such as adding new terminals, it will be relatively easy and cheap. A WAN (wide area network) consists of computers connected over a large area using telecommunications equipment, such as telephone or satellite communications links. A school could have a LAN which is connected to other schools around the country (or world) to form a WAN. WANs are more sophisticated than LANs as the operator has to deal with telecommunications companies and doesn't own all the equipment. Wires between one LAN and another are owned supplied by a telecommunications service provider, each of which has it's own regulations and service charges. Two schools with a LAN could be connected using two modems and appropriate software on each machine together with a public telephone line. This method is fairly cheap to set up with no need for much extra equipment, but data transfer is slow and the phone bills can be high. As it is a public telephone line it is not very secure and so vulnerable to hackers. Renting a dedicated leased line from a

  • Word count: 3617
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Threats to Organisations and Systems. Describe the countermeasures available to an organisation that will reduce the risk of damage to information.

Section A - Task 1 and 2 Three types of threats to organisations Loss of revenue Natural disasters are a threat which most businesses face. This can happen at the spur of the moment, anywhere and anytime. Floods, earthquakes Loss of reputation Loss of reputation is one major threat that faces every company. A good business reputation is essential if a company or organisation is to do well and become a success. If a company losses reputation this may detract people such as users and business clients. Industrial Espionage This is when another company tries to look and steal at what other companies are doing , this is also know as competitive intelligence. This is usually done by someone applying for a rival company and then using their position there to give their company information about their rivals. This information can then be used for other companies gain such as stealing ideas. Task 2 - Impact on Teign & Tow because of industrial Espionage Other companies may want to get access to Teign & Tows data for things like future products they are planning on. Since Teign & Tow create and produce their own products which some of them are patented or patent pending. If rival companies were to get a hold of data from Teign & Tow about future products they may go about to make a similar product to rival theirs, this could cause a loss in revenue for Teign & Tow Ltd.

  • Word count: 3021
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Building Local Area Networks

Ray Nimmo HND 2 Building Local Area Networks Assessment 3 - Outcome 2 Scenario 2: Analysis: Summary of requirements SweetCo Ltd wishes to computerise their stock control system in their warehouse. Their intention is to connect portable barcode readers (via USB) to laptop PC's. They plan to use these to track incoming and outgoing stock as well as stock movements within their warehouse. These PC's will then connect to a small local server using wireless links. Current provision The company has already purchased some of the hardware for this task: * Six PIII laptops - Windows 98 - 128MB RAM - 2 No. Type II PCMCIA slots. * Barcode readers with appropriate software. * Server unit - Windows 2000 server - 10/100mbps PCI NIC. The warehouse is a rectangular room measuring 50m long by 30m wide and 4m high. The stock shelving consists mainly of wooden racks with a few of them having steel frames. On the shelving, the stock is mainly in the form of cardboard boxes and plastic wrappings. There is an unused cupboard at one corner of the warehouse; this would be ideal for the placement of the server as it has adequate lighting and power sockets. - Drawing 1 - Existing warehouse layout - Proposal for solution The company only needs to purchase a minimal amount of hardware to implement this network as they have the majority of the requirements already. All that is needed is

  • Word count: 2994
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Download services

Download services There are many types of download service on Internet that include the ability to download music, films, software and upgrades. Music and film downloads are generally aimed at teenagers and young adults because they are more likely to download music onto IPod or MP3 player and watching the new movies which has come out on cinema. Software and upgrades are aimed at a wider audience. The download website call http://www.download.com/ has contains a wealth of downloadable material. Microsoft Download Services Microsoft Window XP has a program can provide automatic download service called Automatic Updates. It used to regularly update the users computer with the latest update from Microsoft. This is can help users to improve the security and reliability of Windows XP, it also reduce the error happen which will possible occurs in future. www.microsoft.com Benefits of Automatic Updates * It can improve computer's health and security. * Microsoft Update is easy to set up and use, because download and install updates can be automatically. * Microsoft releases new drivers and software that increase the performance and functionality of your Windows-based computer. Drawback of Automatic Updates * Every time after install the last update, the computer will asking to restart for getting the effect work, if people are doing work it will wasting time *

  • Word count: 2801
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The Use of Big IP in Gamer.TV.

The Use of Big IP in Gamer.TV Introduction: The aim is to find out about a particular piece of software used in a Business and write a report on it. To start this I needed to find out about a company and what piece of software they use so that I can gather some information on what the software is and does, and also be ready to see it in action. I chose a company called Gamer.TV because it's a large multi-national company that uses many different types of software, whilst also making some of the software themselves. Their most important piece of software that the company uses and keeps the company running is their Load Balancing Software called Big IP by F5 Networks. I thought this would be the best software for me to do because it there would be a lot for me to look at and therefore write about. Also I thought it would be the most interesting. Load Balancing is where you have a range of servers and as users make requests the software directs the user through one of the servers, it sends the user through a particular server if that server happens to be quicker than the others at that time. This service depends on the way the software and hardware has been set up. Gamer hosts a large number of different features including, turn based games (TBG), Single player games (SPG), Forums, Private Messaging Buddy List. TBG's are games that two or more players can play and they take

  • Word count: 2785
  • Level: AS and A Level
  • Subject: ICT
Access this essay