Abc construction company

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.


"In the beginning, business computers were used for the practical business of computing the payroll and keeping track of accounts payable and receivable. As applications were developed that provided managers with information about sales, inventories, and other data that would help in managing the enterprise, the term "MIS" arose to describe these kinds of applications. Today, the term is used broadly in a number of contexts and includes (but is not limited to): decision support systems, resource and people management applications, project management, and database retrieval applications." (,,sid80_gci214098,00.html)

In ever-changing world it is important to know our products and our customer. And also we should know our business environment to keep abreast with the others. Technology is one of the most effective factors for an organisation to beat our competitors. As a IT manager of our company, I would like to report about how we manage our IT department. Which technology has being used for customer satisfaction? How we create our environment safe?

1. Company Overview

Established in 1986, ABC Construction has completed thousands of projects within Metropolitan and London area. Projects range from small repairs to projects up to about £1.0M. ABC has and continues to undertake project work for the England Department of Housing and Department of Commerce. This work involves tasks such as refurbishment of the Department's housing stock, including replacement or repair of kitchens, bathrooms, painting, electrical, plumbing and other trades as well as responsive repairs. ABC maintains separate offices with refurbishment being managed from Fairfield and responsive repairs from the Penrith call center office. The responsive repairs is 24/7 operation with a 4 hour response deadline for urgent repairs.

ABC has mobilized a workforce of up to 200 people (subcontractors) in various building trades and skills

1.1 Building the new network PC

Table1.1 Server Configuration (Dell Power Edge T105 Server)


Intel Dual Core 2.3GHz

Memory RAM

2GB 800MHz Dual Channel DDR2 SDRAM

Operation System

Window XP professional

Storage (Hard Drive)

1 X hard drives 3.5", 7200 RPM, 160GB

Backup Option

Internal: Power Vault RD 1000 Removable Disk Drive

Drive Bay

2 x 3.5" Non-Hot Swap for Hard-Drives


USB 2.0: 6 externally accessible USB Ports (3 side, 3 back)

Audio: 1 headphone Jack on the side I/O, 1 microphone Jack on the side I/O, line-out, 1 audio Out Jack on the rear I/O

Other: 1 Serial, 1 Parallel, 2 PS/2 for Keyboard and Mouse, 1 RJ-45 10/100/1000

Drive Controller

Embedded SATA, Optional SAS

RAID Controller

Optional SAS6i/R for SAS or SATA RAID


Embedded Gigabit Ethernet Controller (Broadcom)


Height: 15.21" (386.39mm)

Width: 18.79" (477.39mm)

Depth: 4.09" (103.98mm)

Weight: 14.3~17.6 lbs (6.5 to 8 kg)


Single power supply (305W)


Integrated Graphic


Single Quad-Core AMD Opteron 1300 series at up to 2.3GHz

Memory RAM

Four ECC DDR-2 667/800 SDRAM DIMM sockets for up to 8GB of memory

Operation System

Red Hat (Linux)

Storage (Hard Drive)

400GB 10K SAS Hard Disk Drives

Backup Option

Internal: Power Vault RD 1000 Removable Disk Drive

Drive Bay

2 x 3.5" Non-Hot Swap for Hard-Drives


4 total I/O slots

3 PCI Express slots (two with x8 connector, one with x1 connector)

1 32-bit/33MHz PCI slot

Slots can support only half length cards

Drive Controller

Embedded SATA, Optional SAS

RAID Controller

Optional SAS6i/R for SAS or SATA RAID


Embedded Gigabit Ethernet Controller (Broadcom)


16.25" (41.3 cm) H

7.36" (18.7 cm) W

18" (45.8 cm) D

28.6 lbs


Rear: 5 x USB 2.0, 1 x serial connector, 1 x VGA video connector, 1 x RJ-45 NIC connector (Gigabit Ethernet)

Front: 2 x USB 2.0


Single power supply (305W)


Integrated Graphic


O/S-based monitoring and Dell Systems Build and Update Utility for PowerEdge Servers

1.2 Hardware Requirements for the Server


A motherboard is the central or primary circuit board making up a complex electronic system that holds electronic components and interconnects, as well as physical connectors (sockets, slots, and headers) into which other computer components attached.

Processor (CUP)

Central Processing Unit (CPU) is a computer internal storage, processing, and control circuitry, including the arithmetic logic unit (ALU), the control unit, memory (ROM), and (RAM). The ALU and control unit are wholly contained on a chip called the microprocessor; the memory is elsewhere on the motherboard or an adapter on the expansion bus.

Hard Disk

A secondary storage medium that use several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism. Hard drive performance is measured in terms of access time, seek time, rotational speed (measured in revolutions per minutes), and data transfer rate. Hard drive interface standards- the means by which hard drives transmit their contents to other parts of computer include IDE, EIDE,ESDI,SCSI, and Wide SCI.

Memory (RAM)

RAM is the computer's primary working memory, in which program instructions and data are stored so that they can be accessed directly by (CPU) via the processor's high-speed external data bus. RAM often is called read/write memory to distinguish it from read-only memory (ROM), the other component of personal computer's primary storage. In RAM, the CPU can write and read data. Most programs set aside a portion of RAM as a temporary workspace for data so that one can modify (rewrite) as needed until the data is ready for printing or storage on secondary storage media, such as a hard or floppy disk.


CAT6 cable is the twisted-pair cable which is wrapped in foil insulation. The foil insulation provides excellent resistance to crosstalk and enables CAT6 support a signaling rate 250MHz and at least si times the throughput supported by CAT5.

Network Printer

Network printer is the essential part of our call centre. Internal print facilities are provided by a network attached printer. Total print volume requirement is about 50,000 copies per month. I recommend to buy the two medium network printers for our call centre instead of the big one. By using two printers can recovery for crushing one printer and system can still be running without any problem. Moreover, the system can print at the same time, so more productivity. Finally, I recommend HP Colour LaserJet 2840 Multi Function Laser Jet Network Printer, USB with Printer, Scanner, Copies, Fax, Memory Card Reader & LAN.

1.3 The Features of HP Colour LaserJet 2840

Print Speed: Up to 20ppm (black, draft); Up to 4ppm (color, draft)

30,000 pages per month duty cycle

Print Resolution: Up to Fasters 1200 print quality (600 x 1200 dpi) black; 600 x 600 dpi, Image REt 2400 color

First Page Out: black - 18sec; color - 29sec

Memory: 96MB (expandable to 224MB)

Connectivity: Built-in 10/100 wired Ethernet network connectivity with RJ-45 port; Hi-Speed USB (compatible with USB 2.0 specifications) port

Photo memory card slots

250 sheet input tray

Print Languages: HP PCL 6, HP Postscript Level 3 emulation, PostScript Printer Description (PPD)

Copy Resolution: 600 x 600 dpi (black and colour)

Copy settings: Contrast (lighter/darker), quality (copy quality), reduce/enlarge 25 to 400%, 2-up, 4-up, copy collation, number of copies, paper size

Up to 99 copies at once

Fax Resolution: 300 x 300 dpi

Fax Speed: 3 seconds per page

Fax auto redial, PC interface, broadcast, forwarding, auto-reduction, junk-fax barrier, delayed sending, and distinctive ring detection

Up to 120 speed dials

Scanner Resolution: 19200 x 19200 dpi enhanced; 1200 x 1200 dpi optical

Maximum Scan Size: 8.5" x 11.7" (from flatbed), 8.5" x 15" (from ADF)

Bit depth: 42-bit (internal), 24-bit (external)

Dimensions: 19.6"W x 37"D x 29"H (with scanner lid/ADF in up position and Tray 2 extended)

Weight: 75.3lb

RAID stands for Redundant Array of Inexpensive Disk or Redundant Array of Independent Disks. A group of hard disks under the control of array-management software that work together to improve performance and decrease the odds of losing data due to the mechanical or electronic failure by using such techniques as data striping. Because of their complexity and cost, RAID implementations are most often used on network servers. There are three keys concept in RAIDare mirroring, striping and error checking.

. As far as I am concern, I assume to use the RAID level 1 for our system because It is cost effective than other RAID technology. Moreover, it provides simple redundancy, improving data reliability and can improve the performance of read-intensive applications.

RAID cannot supply as a replacement of regular backups and take care of something as simple as replacing a file when you delete it by accident (for example, Earthquake, fire, theft, etc).

Therefore, we need the backup system for our call center. It will be discussed at the backup section.


Any backup strategy starts with a concept of a data repository. Even though we use the data redundancy using RAID technology, we also need to have backups of our important data. Therefore, one of the most neglected tasks of system administration is making backup copies of files on a regular basis. The backup copies are vital in three instances:

System malfunctions and files are lost

Catastrophic disaster (earthquake, fire and so on)

User or administrator deletes or corrupts a file by accident

It is a good idea to have a written backup policy and to keep copies of back up offsite (in another building, at a completely different facility or campus) in a fireproof vault or safe.

We must back up file systems on a regular basis. Back up files are usually kept on magnetic tape or some other removable media. Exactly how often you should back up which files depends on the system and your needs. In our call center, the major sources of product data do not need to back up very often. However, we need to back up the Customer Emails and Calls are needed to back up every day.

Therefore, we need to choose the Backup Medium. There are a lot of backup medium. Most likely you want to use a tape system for backups. Because tape drive hold many gigabytes of data, using tape simplifies the task of backing up the system, making it more likely that you will take care of this important task regularly. Even though we use backup for Tape a long time ago, CD, DVD and removable Hard Disk are more popular in these day. For cost-effective or able to store as much as tape systems, offer convenience and improved performance over using tape. Finally, I have decided to use the Removable Hard Disk of our backup system.

Major Networking Hardware and Equipment

Router Configuration (Jupiner Network Router J-series J6350)

Jupiner J6350 supports:

Support for T1, E1, Fast Ethernet, Synchronous Serial, ISDN BRI, ADSL2/ADSL2+, G.SHDSL, DS3, E3, Gigabit Ethernet interfaces

Support for integrated IP telephony using the Avaya IG550 Integrated Gateway

Support for application acceleration using the Juniper WXC Integrated Service Module

4 fixed Gigabit Ethernet LAN ports, 2 PIM slots, and 4 EPIM/PIM slots

DC version available

1 GB DRAM default, expandable to 2 GB DRAM

512 MB compact flash default, upgradeable to 1 GB

Hardware encryption acceleration standard

NEBS-compliant models available

Redundant AC or DC power supplies



OSPF, BGP, BGP Router Reflector*, RIPv2, Static routes, IS-IS, Multicast (IGMPv3, PIM, SDP, DVMRP, source-specific), MPLS, IPv6 Multicast Listener Discovery (MLD)

IP Address Management

Static, DHCP (client and server), DHCP relay


Ethernet (MAC and tagged), PPP (synchronous), Frame Relay, HDLC, Serial (RS-232, RS-449, X.21, V.35, EIA-530), 802.1q support, MLPPP, MLFR (FRF.15, FRF.16), PPPoE, Data-link switching (DLSw)

Traffic Management

Marking, policing, and shaping, Class-based queuing with prioritization, WRED, Queuing based on VLAN, DLCI, interface, bundles, or filters


Network attack detection, DoS and DDoS protections (anomaly-based), Tunnels (GRE, IP-in-IP, IPSec), DES (56-bit), 3DES (168-bit), AES (256-bit) encryption, MD5 and SHA-1 authentication, Prevent replay attack, Stateful firewall filters

Voice Transport

FRF.12, Link fragmentation and interleaving (LFI), Compressed Real-Time Transport Protocol (CRTP)

High Availability

VRRP, Dial backup


Layer 2 VPN, Layer 3 VPN, LDP, RSVP, Circuit Cross-connect (CCC), Translational Cross-connect (TCC)

System Management

• Juniper Networks JUNOScope Manager

• Juniper Networks J-Web browser interface

• Juniper Networks Service Deployment System™ (SDX)

• Juniper Networks JUNOScript™ XML API

• Juniper Networks JUNOS command-line interface (console, telnet, SSH)

• SNMPv2 and SNMPv3

SLA and Measurement

• Real-time performance monitoring

• Top talkers (sessions, packets, bandwidth usage)

• J-Flow flow monitoring and accounting services*

Logging and Monitoring

Syslog, Traceroute


• External administrator database (RADIUS, LDAP, SecureID)

• Auto configuration

• Configuration rollback

• Rescue configuration with button

• Commit confirm for changes

• Auto record for diagnostics

• Software upgrades

Switch Configuration (24 Port 10/100 Mbps Ethernet SNMP Switch with Dual Optional Uplink Ports (Part No: 1591058-1)

Ethernet Ports

24 x 10/100 Mbps STP/UTP RJ-45 ports and dual slots for Gigabit or 100 Mbps uplink ports

Interface Standards

IEEE802.3 (10 Mbps), IEEE802.3u (100 Mbps) and IEEE 802.3z (Gigabit) Ethernet

UTP Copper Interface

24 shielded RJ-45 ports, per port support for auto MDI/MDI-X

UTP Port Data Rates

10 Mbps and 100 Mbps auto-negotiation via IEEE802.3 N-Way support

Port Duplex Mode

Full or half duplex auto-negotiation via IEEE802.3 N-Way support

Transceiver Types

Copper UTP RJ-45 (1000BASE-T) 10/100/1000 Auto-negotiating

Multimode SC duplex or MT-RJ (100BASE-FX) utilizing a 1300nm LED source; SC duplex 1000BASESX) utilizing a 850nm laser source

Single mode SC duplex (100BASE-FX) or (1000BASE-LX) utilizing a 1300nm laser source

Optical Budget

Multimode 12dB for 100BASE-FX, 7.5dB for 1000BASE-SX

Single mode 13dB for 100BASE-FX, 10.5dB for 1000BASE-LX


Console menu via RS232 port on front of switch

TELNET session for remote management

SNMPv1via MIBs and RMON MIB (1,2,3 and 9)

Web Browser graphical interface

Management Security

Passwords and SNMP community strings

MAC Entries

8k with auto aging and learning


128 port and tagged IEEE802.1Q VLANs, GVRP support

Multicast Support

IGMP V1 and V2 Snooping

QOS Support

IEEE802.1p Priority support on all ports

Data Buffer Size

6 Mb memory buffer sharing

Port Trunking

Supports IEEE802.3ad and LACP on up to 4 ports

Software Updates

Remote or local using TFTP on the network

Link/System Resilience

IEEE802.1d Spanning Tree Protocol on all ports

Power / Consumption

100v to 240v AC, 50/60Hz, internal power supply unit using 17 Watts maximum

Emissions / Safety

Complies with FCC Class A and CE Class A, cUL and CE listed for safety

Temperature / Humidity Range

0°C - 45°C with humidity 10% to 90% non-condensing

Mounting Methods

Standalone or 19" rack-mount formats (19" rack mount brackets included)

Dimensions / Weight

17.3"L x 8.9"W x 1.8"H (440mm x 225mm x 45mm) weighing 4.4 lbs.

Current Hardware leader

The current hardware leader for our company is dell.

They offer a portfolio of services designed to make it easy to transition and easy to deploy new Dell hardware. These factory enabled services can help lower deployment costs and put you in control of your IT environment.

Simplify the process of distributing applications by packaging them in the .MSI format.

They provide an integrated suite to simplify software image development, validation, deployment, and maintenance.

We eliminate installation hassles by integrating hardware, images, applications, peripherals, and documents as your systems are built.

The Dell Client Migration Solution is designed to save cost and deployment time, mitigate risk, and reduce network traffic to ensure a successful migration.

Deploy our systems fast with services from system set-up to install/de-install with user data transfer. We can reduce the time to deploy a typical system by 88%*.

They provide a comprehensive set of remote and on-site deployment services for Dell server and storage products.

They provide the logistic and disposal capabilities to recover and dispose of owned or leased computer equipment in a manner that follows local regulatory guidelines.

The server I am going to install for the ABC company

Server Name

Server Type

Server Function



Domain Name Service



Electronic Mail



for all need application



Transfer and share file over the internet



Web service



student tracking, attendance, grading and other administration functions



Assigning IP address automatically

Web Server

The World Wide Web (www) is a collection of servers that hold material, called content that Web browsers can display. Web server is a program that accepts requests for information framed according to the Hypertext Transport Protocol (HTTP). The server processes these requests and sends the requests and sends the requested document. Each of the servers on the Web is connected to the Internet, internet work. Designing and building a web server is something that needs the utmost care and attention, simply because and internet based business needs a web server that's reliable and is able to run 24/7 for months without requiring any servicing. There are a lot of web servers such as Microsoft IIS web server, NCSA, Netscape, MacHTTP web server for Macintosh, Stunnix Perl web server, Apache web server and so on.


Apache is the most popular web server on the Internet today. It is both robust and extensible. The Apache HTTP Server is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows NT. That responds to requests from Web browsers, or clients, such as Firefox, Netscape, lynx, and Internet Explorer. When you enter the web site address into the browser address bar, the browser sends a request over the Internet to the Apache web server at that address. In response, the servers send the requested content back to the browser. The browser then displays or plays the content, which might be a song, picture, video clip, or other information. Apache works as a application agnostic front-end, meaning it can support J2EE applications as easily as a PHP or Python application.

This diagram illustrates the statistics on server share for the period August 1995 - May 1999. You may notice the (horizontal) symmetry indicating the rise of Apache and corresponding decline of NCSA over this period of time

Apache web server for our company web server. It is the free open source software and free license under the General Public License (GPL). It offers to the Virtual Hosting that allows serving many different actual websites. Apache offers various advantages to users, developers and Web administrators:

Apache has various useful features. Apache's modular architecture allows you to build a server that is "made to measure."Apache configuration files are in ASCII, have a simple format, and can be edited using any text editor. They are transferable, so one can effectively clone a server. One can control the server from command line, which makes remote administration very convenient.

Mail Server is a program that responds automatically to e-mail messages. Mail server programs exits that enter or remove subscriptions to mailing lists and send information in response to a request. It is also know as the MTA (Mail Transport Agent). Microsoft Exchange, qmail, Exim, Axigen, Kerio and sendmail are among the more common mail server programs.

The mail server works in conjunction with other programs to make up what is sometimes referred to as a messaging system. A messaging system includes all the applications necessary to keep e-mail moving as it should. When you send an e-mail message, your e-mail program, such as Outlook or Eudora, forwards the message to your mail server, which in turn forwards it either to another mail server or to a holding area on the same server called a message store to be forwarded later. As a rule, the system uses SMTP (Simple Mail Transfer Protocol) or ESMTP (extended SMTP) for sending e-mail, and either POP3 (Post Office Protocol 3) or IMAP (Internet Message Access Protocol) for receiving e-mail.

Our company needs the mail server software. By using Kerio Outlook Connector (both online and offline) and Kerio Synchronization Plug-in. It has the anti-spam and anti-virus features, so can support for our system to be convenience, safe and secure. Kerio supports Backup all user data and server configuration without having to stop Kerio Mail Server or be present during the backup. Schedule full or differential backups and receive email notifications when the backup has successfully completed or an error occurred during the backup. Finally, I chose to use the Kerio Mail Server for our call centre system.

Benchmarking of Kerio with other mail servers


A collection of related information about a subject organized in a useful manner that provides a base or foundation for procedures, such as retrieving information, drawing conclusions, and making decision. Any collection of information that servers these purposes qualifies as a database, even if the information is not stored on a computer. In fact, important predecessors of today's sophisticated business database system were files kept on index cards and stored in file cabinets. Information usually is divided into data records, each with one or more data fields.

Database Management System (DBMS)

Database management systems are usually categorized according to the database model that they support. The data model determines the query languages that are available to access the database. A great deal of the internal engineering of a DBMS is independent of the data model, and is concerned with managing factors such as performance, concurrency, integrity, and recovery from hardware failures.

Relational database management system (RDBMS) is a relational database management program, especially one that comes with all the necessary support programs, programming tools, and documentation needed to create, install, and maintain custom database applications.


MySQL is the open source Relational Database Management System(RDBMS) which rely on the SQL for processing the data in the database. It provides APIs for the languages C, C++, Eiffel, Java, Perl, PHP and Python. MySQL is most commonly used for Web applications and for embedded applications and has become a popular alternative to proprietary database systems because of its speed and reliability. MySQL can run on UNIX, Windows and Mac OS.

There are several reasons using MySQL for our system, MySQL offers, these are scalability, high performance, ,high availability, robust transitional support, web and data warehouse strengths, strong data protection, comprehensive application development ,management ease, open source freedom support and 24/7 support.


Dynamic Host Configuration Protocol (DHCP) is the internet protocol that assigns IP addresses to deliver TCP/IP stack configuration parameter such as subnet mask and default router, and provide other configuration such as the addresses for printer, workstations on a local area network (LAN).Instead of storing network configuration in local file on each system, DHCP enables client systems to retrieve network configuration information each time they connect to the network. A DHCP server assigns an IP addresses from pool of address to clients as needed. Assigned addressed are typically temporary, but not be.

A new user can set up an Internet connection without having to deal with IP addresses, net masks, DNS addresses, and other technical details. An experienced user can set up a connection more quickly.

DHCP facilitates assignment and management of IP addresses and related network information by centralizing new system, including laptops that connect to the network from different locations, to use DHCP. Then DHCP assigns IP addresses only when each system connects to the network. The pool of IP addresses is managed as a group on the DHCP server.

IP addresses can be used by more than one system, reducing the total number of IP addresses needed. This conservation of addresses is important because the Internet is quickly running out of IPv4 addresses.

In the Red Hat Linux, The client daemon, declined (part of the dhcp package), contacts the server daemon, dhcpd, to obtain the IP address, net mask, broadcast address, name server address, and other networking parameters. The server provides a lease on the IP address to the client. The client can request the specific terms of lease, including its duration; the server can, in turn, limit these terms. While connected to the network, a client typically requests extensions of its lease as necessary so its IP address remains the same. The lease can expire once the client is disconnected from the network, with the server giving the client a new IP address when it requests a new lease.

The DHCP leasing process

Giving the IP addresses to that workstations and printer, I assume to give the dynamic IP address rather than the static IP address. This is one of the facility in the Red Hat Linux, DHCP server maintains a list of IP addresses and other configuration parameters. When requested to do so, the DHCP server provides configuration parameters to a client. By using DHCP server,

To reduce time and planning spent on IP address management.

To reduce the potential for errors in assigning IP address.

To enable user to move their workstations and printer without having to change their TCP/IP configuration.

Therefore, DHCP server is going to be set up in our system.

File Server

In the local area network (LAN), a computer that stores on its hard disk the application programs and data files for all the workstations in the network. In a peer-to-peer network, all workstations act as a file servers because each workstations can provide files to other workstations. In the more common Client/Server architecture, a single, high-powered machine with a huge hard disk is set aside to function as the file server for all the workstations (clients) in the network.

What does the File Server have to do in our system?

The computer responsible for the central storage and management of data in our call centre (other computer can access data on the network).

We can connect the File Server and access the data without having to physically transfers files ( eg. Floppy, CD )

Central computer provides calculation resources.

It can connect and work together with FTP server, Apache HTTP (web server), MySQL Database server, and Print Server.

FTP Server

The File Transfer Protocol (FTP) (Port 21) is a network protocol used to transfer data from one computer to another through a network, such as over the Internet.FTP is a commonly used protocol for exchanging files over any TCP/IP based network to manipulate files on another computer on that network regardless of which operating systems are involved (if the computers permit FTP access). There are many existing FTP client and server programs. FTP servers can be set up anywhere between game servers, voice servers, internet hosts, and other physical servers. FTP is commonly used to download a file from a server via the Internet or uploading a file to a server. For our call centre, FTP support the PDF data file uploading and make easy and reliable for downloading these files from our customers.

Anti-Virus Software

A utility designed to check for and remove computer viruses from mmemory and disks. An antivirus program detects a virus by searching code recognized as that of one of the thousands of virus known to afflict computer system terms. Even though Linux OS is secure and stable, we need to install the antivirus software for our system.

We suppose to install the Macfee Antivirus in our system for security.

Features of Macfeeare, always-on, on access anti-virus protection, heuristic scanning, archive scanning, automatic updating, antivirus protection against windows virus, enterprise management and reporting, kernel module versioning and kernel module versioning.


In a cross-platform network, programs that serve as intermediaries between clients requesting information and server programs that provide requested data, even though the clients and servers may be running on different computing platforms and were not originally designed to work with each other. A simple example of middleware is a Web server script written according to Common Gateway Interface (CGI) guidelines; the script enable external Web browsers to communicate with programs that can provide such functions as database searching.

A client/server environment that incorporates middleware in this fashion is said to have a 3-tier architecture because of its three layers: clients, middleware, and server. To take advantage of a 3-tier architecture, a client workstation requires the appropriate client software, for example, a web browser or remote terminal services client.

JBoss Middleware

JBoss, a division of Red Hat, is the global leader in open source middleware software, enterprise-class open source software to build, deploy, integrate, orchestrate, and present web applications and services in a Service-Oriented Architecture.

JBoss Enterprise Middleware can:

Decrease development complexity

Improve inadequate end-user experience

Resolve business process friction

Enable unparalleled flexibility

Significantly lower total cost of ownership

Deliver superior value

Jboss Enterprise Middleware delivers a better way to improve developer productivity, reduce time and market, automate business processes, and efficiently share enterprise data. Jboss Enterprise Middleware not only reduce costs but enables you to make contributions that actually increase revenue. Our call centre need the middleware to serve for different platform. Jboss Middleware is compatible with the Red Hat Linux Server.

Policies (policies are an written document of intentions which are readily available to all that the policy will effect)



a. Antivirus policies

- Antivirus software shall be able to automatically scan the

system daily

b. Audit policy

I. User logon

II. Directory access

- All users shall be authenticated with username and password

- Directory access shall be as assigned by the administrator

c. Archiving policies

I. Data

II. Email

- A copy of all data shall be kept off site as a backup image

- Email content is shall be indexed and backed up to enable administrators, auditors and end users quick retrieval of any email message stored in the organization's email archive..

d. Backup policies

I. Data

II. Email

III. Applications

IV. System State

- A full backup shall be done every week and a differential

Back up done every day.

- A copy of all emails shall be stored on the Service provider's server.

-Automatic updates shall be applied to applications daily

- System state shall be benchmarked using Everest software

every week and a report made.

e. Network security policies

I. Authentication

II. Authorization

III. Security logs

- All network users shall be authenticated using a logon name

and password

- Authorization to resources shall be by group policy

- All systems shall automatically save a copy of the security log

to the central server

f. Intranet security policies

I. Authentication

II. Authorizations

- Intranet users will only be able to logon in their respective

Departments using a username and password.

- Authorization to resources shall be as assigned in the group


g. Internet security policies

I. Firewalls

II. Access to Internet sites

III. Virus

- Firewalls shall be configured to allow in only trusted traffic

- Access to undesirable and social internet sites shall be


- All attachments received through the internet shall be scanned

for viruses

h. Other policies that you should be put in place

- All staff members shall wear their budges so that it is visible

during their time in the company premises

Network Operating system

A 'networking operating system ' is an operating system that contains components and programs that allow a computer on a network to serve requests from other computer for data and provide access to other resources such as printer and file systems.

Types of Network Operating System are:

* JUNOS, used in routers and switches from Juniper Networks.

* Cisco IOS (formerly "Cisco Internetwork Operating System") is a NOS having a focus on the internetworking capabilities of network devices. It is used on Cisco Systems routers and some network switches.

* BSD, also used in many network servers.

* Linux

* Microsoft Windows Server

* Novell Netware

Operating system

An operating system (OS) is an interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine. As a host, one of the purposes of an operating system is to handle the resource allocation and access protection of the hardware. This relieves the application programmers from having to manage these details.

RMS provides an efficient means for the Office of Personnel Security and Suitability

(DS/SI/PSS) offices to conduct background investigations (BIs) on candidates for positions that require security and suitability determinations and clearance updates.

RMS allows the DoS personnel assigned to a case to compile investigative data.

Electronically on the subject of the investigations, RMS reduces the amount of time to receive case assignments and return reports of the investigation.

RMS collects and maintains the following information on the subject of the investigation.

• Name

• Phone Number

• Address

• Date of Birth

• Place of Birth

• Social Security Number

• Medical History

• Employment History

• Criminal History

• Credit History

• Citizenship Status

• Ethnicity

• National Origin

• Educational History

• Mother's Maiden Name

The information collected by RMS is obtained from the individual being investigated and the investigating officer. Analysis of the information is limited to non-record date-based statistical information, such as the number of cases entered, subject matter or action taken on an aggregate. RMS is a Government owned system which was primarily designed and developed by contractors. All contractors have abided to regulatory guidelines and have signed and follow DS's Rules of Behavior cycle (i.e., Monthly, Quarterly, Yearly, etc.).

O-R mapping

(Object-Relational Mapping) is Converting data from tables in a relational database to objects and vice versa. Many applications employ object-oriented programming, but keep the data in traditional relational tables. The O-R mapping function can be accomplished with statements in the object-oriented programming language or via a third-party O-R mapping program.When an object model is very complex with a large number of many-to-many relationships, it takes time to store the data in relational tables. This "impedance mismatch" is resolved with the use of an object database, which is designed for complex object data.

Object-relational mapping is used to map object-oriented programming objects to relational databases managed by Oracle, DB2, Sybase, and other relational database managers (RDBMSs).

Object-relational mapping products are designed to work well with object programming languages such as C#, C++, and Java. Database objects appear as programming language objects. Often, the interface for object-relational mapping

Decision support systems could be categorized in terms of the generic operations that can be performed by such systems. These generic operations extend along a single dimension, ranging from extremely data-oriented to extremely model-oriented. Alter conducted a field study of 56 DSS that he categorized into seven distinct types of DSS. His seven types include:

1. File drawer systems that provide access to data items.

2. Data analysis systems that support the manipulation of data by computerized tools tailored to a specific task and setting or by more general tools and operators.

3. Analysis information systems that provide access to a series of decision-oriented databases and small models.

4. Accounting and financial models that calculate the consequences of possible actions.

5. Representational models that estimate the consequences of actions on the basis of simulation models.

6. Optimization models that provide guidelines for action by generating an optimal solution consistent with a series of constraints.

7. Suggestion models that perform the logical processing leading to a specific suggested decision for a fairly structured or well-understood task.

A common way of accessing object data is by navigation, also known as "traversal." Many times these structures are "trees" or "graphs." If you would draw one of these data structures, it might look something like the diagram shown below. Moving from one node in this graph to another node is navigating or traversing the data structure. This navigation is built into object programming languages such as Java or C++.

8. Conclusion

I'm sure that the above data for my computer department is the most suitable for my company. And I am hoping that it will fit with today situation to get customer satisfaction with the best service. The best way to get benefits is this system as I believed. We need to establish this system.






5. (report management system intro)

6. (report management system intro)