Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
I have discussed about the common problem of network issues of a computer . How we can find out what is the bug on our network wizerd and what should we do for that perticular problem . I also discussed about the physical hardware problem and how to find out what the problem is and what is the way to find the solution for it . If you think for a problem that i am finished or my machine is finished it is your foolishness . So you can read my slides and can find out the problem and their solution .
This document discusses the key components of a network design process by drawing an analogy to building design. It states that a network design consists of describing the technology, topology, products, device configurations, services, vendors, locations, and general structure. It also includes network functions like security and management. Similarly, a building design needs to understand the purpose and layout, including how occupants will move and what resources they will need. The output of both processes are blueprints. A network design specifically produces blueprints, a component plan, vendor selection, equipment choice, service provider selection, and metrics. It takes architecture and analysis products as input to evaluate and produce these design outputs and layout the network.
Chapter 11 laws and ethic information securitySyaiful Ahdan
This document provides an overview of key concepts regarding law and ethics in information security. It discusses the differences between laws and ethics, and how policies function similarly to laws within an organization. Several major US laws are outlined, including those covering general computer crimes, privacy, identity theft, export and espionage, copyright, and financial reporting. International agreements and professional organizations relevant to information security ethics are also mentioned. The document aims to help readers understand the legal and ethical responsibilities for information security practitioners.
This document discusses network cabling and making connections with Cat5 cable. It defines common cable types like coaxial, UTP and fiber optic cables. UTP cable characteristics and categories are described, with Cat5e listed as supporting data transfers up to 1000Mbps. The document outlines the tools and 8 steps to making a connection, including stripping, arranging wires according to the 568A or 568B standard, crimping an RJ45 connector onto the cable, and testing the connection.
The document proposes establishing a local area network (LAN) for the Advanced Technical Institute (ATI) to facilitate resource sharing across its six buildings. It outlines installing ethernet cabling and fiber optic infrastructure to connect the buildings and purchase networking equipment like switches, servers racks and media converters. An implementation plan and budget of approximately $188,000 is presented to achieve the objectives of high reliability, security, cost savings and internet access across all buildings on the ATI campus through the LAN. References for pricing the various networking components are also provided.
A complete Lab Manual with Aim, Procedure, Source Code, ... All the Experiments of Mobile Application Development Lab are developed using Android Studio.
Managing People in Software Engineering SE22koolkampus
The document discusses key topics related to managing people in software development projects and organizations. It covers human cognition limitations, factors for effective teamwork and communication, choosing and retaining technical staff, and the People Capability Maturity Model for improving workforce capabilities. Specific areas discussed include memory organization, problem solving, motivation, group composition and dynamics, communication, and the importance of understanding human factors for successful management.
Academic course on Computer Network Chapter -1 for BCA, Tribhuwan University
** Applicable for other courses as well
Includes the Basic of Computer Network, Topologies, Types of Network
I have discussed about the common problem of network issues of a computer . How we can find out what is the bug on our network wizerd and what should we do for that perticular problem . I also discussed about the physical hardware problem and how to find out what the problem is and what is the way to find the solution for it . If you think for a problem that i am finished or my machine is finished it is your foolishness . So you can read my slides and can find out the problem and their solution .
This document discusses the key components of a network design process by drawing an analogy to building design. It states that a network design consists of describing the technology, topology, products, device configurations, services, vendors, locations, and general structure. It also includes network functions like security and management. Similarly, a building design needs to understand the purpose and layout, including how occupants will move and what resources they will need. The output of both processes are blueprints. A network design specifically produces blueprints, a component plan, vendor selection, equipment choice, service provider selection, and metrics. It takes architecture and analysis products as input to evaluate and produce these design outputs and layout the network.
Chapter 11 laws and ethic information securitySyaiful Ahdan
This document provides an overview of key concepts regarding law and ethics in information security. It discusses the differences between laws and ethics, and how policies function similarly to laws within an organization. Several major US laws are outlined, including those covering general computer crimes, privacy, identity theft, export and espionage, copyright, and financial reporting. International agreements and professional organizations relevant to information security ethics are also mentioned. The document aims to help readers understand the legal and ethical responsibilities for information security practitioners.
This document discusses network cabling and making connections with Cat5 cable. It defines common cable types like coaxial, UTP and fiber optic cables. UTP cable characteristics and categories are described, with Cat5e listed as supporting data transfers up to 1000Mbps. The document outlines the tools and 8 steps to making a connection, including stripping, arranging wires according to the 568A or 568B standard, crimping an RJ45 connector onto the cable, and testing the connection.
The document proposes establishing a local area network (LAN) for the Advanced Technical Institute (ATI) to facilitate resource sharing across its six buildings. It outlines installing ethernet cabling and fiber optic infrastructure to connect the buildings and purchase networking equipment like switches, servers racks and media converters. An implementation plan and budget of approximately $188,000 is presented to achieve the objectives of high reliability, security, cost savings and internet access across all buildings on the ATI campus through the LAN. References for pricing the various networking components are also provided.
A complete Lab Manual with Aim, Procedure, Source Code, ... All the Experiments of Mobile Application Development Lab are developed using Android Studio.
Managing People in Software Engineering SE22koolkampus
The document discusses key topics related to managing people in software development projects and organizations. It covers human cognition limitations, factors for effective teamwork and communication, choosing and retaining technical staff, and the People Capability Maturity Model for improving workforce capabilities. Specific areas discussed include memory organization, problem solving, motivation, group composition and dynamics, communication, and the importance of understanding human factors for successful management.
Academic course on Computer Network Chapter -1 for BCA, Tribhuwan University
** Applicable for other courses as well
Includes the Basic of Computer Network, Topologies, Types of Network
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
What's the Right Messaging Standard for the IoT?Angelo Corsaro
Different messaging and data sharing standards, such as AMQP, CoAP, DDS, MQTT, and REST have been proposed as candidate for addressing the data sharing challenges of the Internet of Things (IoT) and the Industrial Internet (I2).
In technical forums and social media there is no lack of passionate discussions that praise the merits of one standard over the other. Yet, to date, there are little or perhaps no analysis that look at the details of the different standards and perform an in depth, qualitative, analytic and empirical evaluation.
This presentation, will (1) introduce the key standards that are being proposed for the Internet of Things and the Industrial Internet, such as AMQP, CoAP, DDS, MQTT and REST, (2) present a qualitative comparison that highlights the different features provided by the various standards, (3) present an analytic comparison looking at the efficiency and scalability of the various protocols and (3) report the results of an empirical evaluation comparing the actual performances of the various standards.
This document is a presentation on information security and business continuity. It covers topics such as ISO 27001 on information security, risk management, laws relating to information security in Qatar, and examples of product recalls due to incidents. The presentation provides an overview of ISO 27001, including its structure following the PDCA model and the roles of internal and external interested parties. It also discusses why information needs protection due to threats and vulnerabilities, and the principles of information security management systems.
The document discusses auditing IT infrastructure including hardware, networks, and telecommunications devices. It provides details on objectives of IT audits such as assessing continuity, management/maintenance, and security of systems. It also discusses standards and guidelines for auditing such as CobiT, ISO 27001, and reviewing hardware assets, network design, security, backups, and telecommunication agreements and invoices.
A security audit assesses security risks and controls to mitigate risks. It involves interviewing personnel, conducting vulnerability assessments, examining assets and policies, and using technology tools. The goals are to evaluate how difficult passwords are to crack, who has access to what data, whether malware scans are performed, and more. Effective audits are continuous and assess not just compliance but the quality of policies and controls.
The document discusses computer networks and networking concepts. It defines what a network is and explains the need for networking. It describes the components of a network including nodes, servers, network interface units. It covers the evolution of networks from ARPANET to the internet. It discusses different types of networks including LAN, MAN, WAN and their characteristics. It also covers topics like communication media, switching techniques, wireless networking and networking terms.
This document discusses various tools and techniques for testing and troubleshooting networks. It describes loopback tests, network monitors, LAN testers, cable testers, protocol analyzers, and troubleshooting models for isolating network issues. Common commands like ipconfig, netstat, nbtstat and route are also summarized for examining TCP/IP settings and troubleshooting connectivity problems.
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersITExamAnswers.net
The document provides exam answers for IT Essentials (ITE v6.0 + v7.0) Chapter 6. It includes explanations for 24 multiple choice questions covering topics like wireless networking issues, DHCP, static IP addressing, IPv6 addressing and compression, and network troubleshooting steps. Some key issues addressed are weak wireless signals, DHCP server faults, default gateway problems, and IP address conflicts.
Introduction to Network and System AdministrationDuressa Teshome
The document provides an overview of computer networks and system administration. It defines what a computer network is and describes different types of networks including WANs, LANs, peer-to-peer networks, and the internet. It also discusses servers, switches, hubs and the roles and responsibilities of a system administrator. Key aspects of system administration include automating tasks, documenting all changes, communicating with users, securing systems, and planning for expected and unexpected issues.
A domain name provides a memorable way for users to access websites by typing a name instead of an IP address. The domain name directs the user to the IP address, which then directs them to the location of website files. Data sent over the internet is broken into smaller data packets that are reassembled at their destination. Routers determine the fastest route to send each data packet through the network and redirect packets if part of the network becomes busy or a server goes down.
A computer network connects multiple computers allowing them to communicate and share resources. It requires a minimum of two computers connected by cables or wirelessly with network interface cards. There are different types of networks including local area networks covering a small area like a building, metropolitan area networks spanning a city, and wide area networks covering larger distances like the internet. Networks can be configured in a peer-to-peer setup where computers act as equal partners or a client-server setup with dedicated server computers.
The document discusses Linux iptables firewall. Iptables is the default firewall package for Linux and runs inside the Linux kernel. It has three built-in tables (filter, nat, mangle) that are used to filter, alter, and inspect packets. Iptables uses built-in chains and user-defined rules to allow or deny traffic based on packet criteria like source/destination, protocol, interface etc. Common iptables commands and options are also explained.
This document summarizes key points from Chapter 2 of the textbook "Principles of Information Security". The chapter discusses the need for information security in organizations. It states that information security programs aim to keep information assets safe and useful by addressing threats from attacks. The responsibilities of information security are discussed, including protecting business functions, data, applications, and technology assets. Common threats like malware, phishing attacks, and data breaches are outlined. Internal and external threats are rated based on a survey of organizations. The chapter objectives are to understand the need for security programs and the threats faced.
Unit testing is often automated but it can also be done manually. Debugging is a process of line by line execution of the code/ script with the intent of finding errors/ fixing the defects.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
The document provides guidance on troubleshooting network issues. It discusses maintaining documentation of problems, using utilities to detect physical and connectivity issues, and following a troubleshooting process. The process involves gathering information from the user and equipment. It then details various commands and tools to verify TCP/IP connectivity and test different network components. Specific issues that could occur with wired, wireless, and client connections are explored.
Computer system and network configurationVon Alvarez
This document discusses computer network configurations. It defines a computer network as interconnecting two or more computers. There are two main types of networks: local area networks (LANs) which connect computers within a single location, and wide area networks (WANs) which span larger distances using phone or satellite links. Setting up a network involves designing the network type and hardware, rolling out the physical infrastructure like cables and servers, configuring user accounts and shared resources, and ongoing management like security, backups, and troubleshooting issues.
EC-Council Certified Secure Computer User C|SCU ProgramITpreneurs
Responsible Cyber Users, Safer Organizations. Over 95% of end users is not receiving adequate cyber security training across organizations. Hackers target the weaker point and through the end user they gain access to critical data centers.
EC-Council Certified Secure Computer User (C|SCU) is a comprehensive Cyber Security Awareness program that offers employees and end users a fundamental understanding of various computer and network security threats.
ITpreneurs has formed a partnership with EC-Council to provide a diverse portfolio of IT Security training and certifications in the Middle East (Kingdom of Saudi Arabia, United Arab Emirates, Kuwait, Oman, Bahrain, Qatar, Lebanon, Jordan) and Turkey. EC Council (International Council of E-Commerce Consultants) is one of the world’s largest certification bodies for information security professionals and e-business. ITpreneurs partners can provide unique offerings to help their clients in these countries to manage the emerging challenges posed by cyber security related threats.
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
The document provides guidance on basic computer troubleshooting, including checking connections, rebooting the computer, documenting error messages, and identifying recent changes that could be causing issues. It also includes tips for troubleshooting issues with new monitors, motherboards, hard drives, and other hardware. Common beep codes and their meanings are listed to help diagnose potential problems.
The document is a project report submitted to the Computer Networking Lab at City University summarizing a proposed network design for the Bangladesh Computer Council building. It includes logical and physical diagrams of the proposed network layout, a list of required equipment and their costs, and a total projected budget of 5.3 million taka. The network aims to provide improved security, reliability, and fault tolerance across 8 floors of offices and various rooms through the use of switches, routers, servers, access points, and security cameras connected with CAT6 cables.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
What's the Right Messaging Standard for the IoT?Angelo Corsaro
Different messaging and data sharing standards, such as AMQP, CoAP, DDS, MQTT, and REST have been proposed as candidate for addressing the data sharing challenges of the Internet of Things (IoT) and the Industrial Internet (I2).
In technical forums and social media there is no lack of passionate discussions that praise the merits of one standard over the other. Yet, to date, there are little or perhaps no analysis that look at the details of the different standards and perform an in depth, qualitative, analytic and empirical evaluation.
This presentation, will (1) introduce the key standards that are being proposed for the Internet of Things and the Industrial Internet, such as AMQP, CoAP, DDS, MQTT and REST, (2) present a qualitative comparison that highlights the different features provided by the various standards, (3) present an analytic comparison looking at the efficiency and scalability of the various protocols and (3) report the results of an empirical evaluation comparing the actual performances of the various standards.
This document is a presentation on information security and business continuity. It covers topics such as ISO 27001 on information security, risk management, laws relating to information security in Qatar, and examples of product recalls due to incidents. The presentation provides an overview of ISO 27001, including its structure following the PDCA model and the roles of internal and external interested parties. It also discusses why information needs protection due to threats and vulnerabilities, and the principles of information security management systems.
The document discusses auditing IT infrastructure including hardware, networks, and telecommunications devices. It provides details on objectives of IT audits such as assessing continuity, management/maintenance, and security of systems. It also discusses standards and guidelines for auditing such as CobiT, ISO 27001, and reviewing hardware assets, network design, security, backups, and telecommunication agreements and invoices.
A security audit assesses security risks and controls to mitigate risks. It involves interviewing personnel, conducting vulnerability assessments, examining assets and policies, and using technology tools. The goals are to evaluate how difficult passwords are to crack, who has access to what data, whether malware scans are performed, and more. Effective audits are continuous and assess not just compliance but the quality of policies and controls.
The document discusses computer networks and networking concepts. It defines what a network is and explains the need for networking. It describes the components of a network including nodes, servers, network interface units. It covers the evolution of networks from ARPANET to the internet. It discusses different types of networks including LAN, MAN, WAN and their characteristics. It also covers topics like communication media, switching techniques, wireless networking and networking terms.
This document discusses various tools and techniques for testing and troubleshooting networks. It describes loopback tests, network monitors, LAN testers, cable testers, protocol analyzers, and troubleshooting models for isolating network issues. Common commands like ipconfig, netstat, nbtstat and route are also summarized for examining TCP/IP settings and troubleshooting connectivity problems.
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersITExamAnswers.net
The document provides exam answers for IT Essentials (ITE v6.0 + v7.0) Chapter 6. It includes explanations for 24 multiple choice questions covering topics like wireless networking issues, DHCP, static IP addressing, IPv6 addressing and compression, and network troubleshooting steps. Some key issues addressed are weak wireless signals, DHCP server faults, default gateway problems, and IP address conflicts.
Introduction to Network and System AdministrationDuressa Teshome
The document provides an overview of computer networks and system administration. It defines what a computer network is and describes different types of networks including WANs, LANs, peer-to-peer networks, and the internet. It also discusses servers, switches, hubs and the roles and responsibilities of a system administrator. Key aspects of system administration include automating tasks, documenting all changes, communicating with users, securing systems, and planning for expected and unexpected issues.
A domain name provides a memorable way for users to access websites by typing a name instead of an IP address. The domain name directs the user to the IP address, which then directs them to the location of website files. Data sent over the internet is broken into smaller data packets that are reassembled at their destination. Routers determine the fastest route to send each data packet through the network and redirect packets if part of the network becomes busy or a server goes down.
A computer network connects multiple computers allowing them to communicate and share resources. It requires a minimum of two computers connected by cables or wirelessly with network interface cards. There are different types of networks including local area networks covering a small area like a building, metropolitan area networks spanning a city, and wide area networks covering larger distances like the internet. Networks can be configured in a peer-to-peer setup where computers act as equal partners or a client-server setup with dedicated server computers.
The document discusses Linux iptables firewall. Iptables is the default firewall package for Linux and runs inside the Linux kernel. It has three built-in tables (filter, nat, mangle) that are used to filter, alter, and inspect packets. Iptables uses built-in chains and user-defined rules to allow or deny traffic based on packet criteria like source/destination, protocol, interface etc. Common iptables commands and options are also explained.
This document summarizes key points from Chapter 2 of the textbook "Principles of Information Security". The chapter discusses the need for information security in organizations. It states that information security programs aim to keep information assets safe and useful by addressing threats from attacks. The responsibilities of information security are discussed, including protecting business functions, data, applications, and technology assets. Common threats like malware, phishing attacks, and data breaches are outlined. Internal and external threats are rated based on a survey of organizations. The chapter objectives are to understand the need for security programs and the threats faced.
Unit testing is often automated but it can also be done manually. Debugging is a process of line by line execution of the code/ script with the intent of finding errors/ fixing the defects.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
The document provides guidance on troubleshooting network issues. It discusses maintaining documentation of problems, using utilities to detect physical and connectivity issues, and following a troubleshooting process. The process involves gathering information from the user and equipment. It then details various commands and tools to verify TCP/IP connectivity and test different network components. Specific issues that could occur with wired, wireless, and client connections are explored.
Computer system and network configurationVon Alvarez
This document discusses computer network configurations. It defines a computer network as interconnecting two or more computers. There are two main types of networks: local area networks (LANs) which connect computers within a single location, and wide area networks (WANs) which span larger distances using phone or satellite links. Setting up a network involves designing the network type and hardware, rolling out the physical infrastructure like cables and servers, configuring user accounts and shared resources, and ongoing management like security, backups, and troubleshooting issues.
EC-Council Certified Secure Computer User C|SCU ProgramITpreneurs
Responsible Cyber Users, Safer Organizations. Over 95% of end users is not receiving adequate cyber security training across organizations. Hackers target the weaker point and through the end user they gain access to critical data centers.
EC-Council Certified Secure Computer User (C|SCU) is a comprehensive Cyber Security Awareness program that offers employees and end users a fundamental understanding of various computer and network security threats.
ITpreneurs has formed a partnership with EC-Council to provide a diverse portfolio of IT Security training and certifications in the Middle East (Kingdom of Saudi Arabia, United Arab Emirates, Kuwait, Oman, Bahrain, Qatar, Lebanon, Jordan) and Turkey. EC Council (International Council of E-Commerce Consultants) is one of the world’s largest certification bodies for information security professionals and e-business. ITpreneurs partners can provide unique offerings to help their clients in these countries to manage the emerging challenges posed by cyber security related threats.
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
The document provides guidance on basic computer troubleshooting, including checking connections, rebooting the computer, documenting error messages, and identifying recent changes that could be causing issues. It also includes tips for troubleshooting issues with new monitors, motherboards, hard drives, and other hardware. Common beep codes and their meanings are listed to help diagnose potential problems.
The document is a project report submitted to the Computer Networking Lab at City University summarizing a proposed network design for the Bangladesh Computer Council building. It includes logical and physical diagrams of the proposed network layout, a list of required equipment and their costs, and a total projected budget of 5.3 million taka. The network aims to provide improved security, reliability, and fault tolerance across 8 floors of offices and various rooms through the use of switches, routers, servers, access points, and security cameras connected with CAT6 cables.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Bangladesh Computer Council Networking ProjectMDMusab
The document summarizes a student project to design the computer network for the Bangladesh Computer Council building. It includes logical and physical network diagrams connecting 8 floors and various rooms using different topologies. A bill of materials is provided listing the required equipment such as switches, routers, servers, and their estimated costs, totaling approximately 39.15 million BDT. Security measures are discussed like encryption, firewalls, and access control. Assembly and disassembly photos demonstrate how to build a computer. The project aimed to provide a reliable, secure, and fault-tolerant network for the government agency.
This document provides a network design for a small office. It outlines the hardware requirements, including routers, switches, printers, access points, cables, and computers. It assigns IP addresses to devices on two floors and shows the network topology diagram. The physical diagram and simulation pictures demonstrate how the network will be implemented. Costs are provided for each hardware component, with a total projected cost of the network. Advantages of the design include efficient performance, file and device sharing between users, and centralized data backup. Disadvantages include high upfront equipment costs and potential virus spreading.
1) The document discusses Google Global Cache (GGC) operations for YouTube, telecommunication between mobile phones, IP phones, and traditional telephones, and Mikrotik router configuration.
2) It provides details on GGC which caches popular YouTube content closer to users, and ways telecommunication devices can connect through different networks.
3) The document also gives instructions on basic Mikrotik configuration including WAN/LAN setup, DHCP, VLANs, VPNs, and using a Mikrotik router with a modem.
This document outlines a network design for a small office. It includes descriptions of the devices, logical and physical diagrams of the network layout, and details of servers and security features. The total cost of the proposed design is approximately 34.64 lakh taka. Key aspects of the design include connections between rooms and devices via switches, a server room with five servers, and security features like CCTV cameras, motion detectors, and smart door locks. The network aims to provide a secure infrastructure to support file sharing, email, and device connectivity across the office.
The document is an internship presentation summarizing work done on networking concepts. It discusses how the internship was conducted under Cisco's Networking Academy to learn about network addressing, IP classes, subnetting, and configuring network devices using CLI. Packet Tracer was used as the simulation tool. The presentation covers networking fundamentals and a case study on variable length subnet masking and basic server and switch configuration.
This document provides a summary of a presentation on Cisco Certified Network Associate (CCNA) certification. It discusses the objectives of CCNA training, including providing skills for a career as a network administrator. The presentation covers networking fundamentals like topologies, protocols, IP addressing and routing. It also describes a project implementing a network for a hotel using concepts like VLANs, DHCP, routing and wireless access points. The conclusion is that the project and CCNA certification enhance networking skills and knowledge.
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
This document summarizes a study that implemented a dynamic internetworking in a real-world IT domain. The study created a network topology for an organization using Cisco Packet Tracer with routers, switches, computers and a DHCP server. It configured routing protocols, access control lists, authentication, VLANs and inter-VLAN routing. DHCP was configured to automatically assign IP addresses. Routing protocols like RIP, OSPF and EIGRP were configured between routers. Access control lists were used to filter traffic and provide security. Authentication ensured security and remote access was provided using telnet. VLANs divided the network into broadcast domains and inter-VLAN routing allowed communication between VLANs.
The document discusses planning, optimizing, and evaluating performance of a TCP/IP network. It describes how to plan TCP/IP addressing structures and subnet configurations. Methods for selecting IP configuration, evaluating network performance using tools, and calculating actual data throughput are presented. Optimizing network performance involves determining if the network is overloaded and monitoring bandwidth utilization.
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
This document outlines the network configuration of three branches - London, Manchester, and Cardiff. It describes setting up subnets, IP schemes, DHCP servers, DNS servers, VPNs, and other network protocols to connect and manage the branches. Key aspects covered include designing the network diagrams, configuring DHCP scopes and relay agents, setting up forward and reverse lookup zones in DNS, installing WINS servers, and configuring VPNs and IPSec policies for secure remote access.
This document provides a network requirement analysis and plan for Affinity Living Communities. It includes an IP address table, network topology diagram, and outcomes of the designed network. The network topology was developed using Cisco Packet Tracer and includes routers, switches, wireless routers, and a firewall. The network was configured and tested to provide residents with reliable and secure internet access across multiple locations. The design is scalable but limitations include potential single point of failures and costs of future expansion.
The document discusses the design and implementation of a secured network for Super Finance Solutions Pvt. Ltd. It outlines the network topology, including IP configurations, servers, routing protocols and VLAN configurations. It then covers secure implementations like ACLs, IPsec VPN, NIPS and the Zero Trust framework. Finally, it discusses VPN reliability and the cryptographic mechanisms of IPsec. The secured network architecture provides privacy and security for remote users and customers through protocols added for security.
This document describes the design and implementation of an online interactive data acquisition and control system using a Beagle Board. Key points:
- The system uses a Beagle Board running the Real-Time Linux operating system to function as both an embedded web server and data acquisition/control unit. This allows remote monitoring and control via a web browser.
- Hardware includes sensors like an ultrasonic sensor and camera connected to the Beagle Board via interfaces like I2C. Software is designed using languages like HTML, JSP.
- The Beagle Board boots Linux and runs the Apache Tomcat web server. This allows clients to access sensor data, video feed, and control machinery from a web page on their browser.
This document summarizes the network configuration of a computer lab with 25 computers. It details the network topology including 5 sample computer specs, the use of DHCP with an IP address for the DHCP server, 3 DNS servers, fiber optic cabling and switches connected to subnets. It also discusses dividing the network into 4 subnetworks of 50 computers each and the use of the Wireshark network analysis tool to capture packets and examine protocol headers and fields.
We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
Energy Meters using Internet of Things PlatformIRJET Journal
This document proposes an architecture and implementation for integrating energy meters with an Internet of Things (IoT) platform. The key aspects of the approach are: 1) Integrating smart grid applications and home applications using a common IoT infrastructure, 2) Collecting data from different sensor communication protocols, 3) Providing secure and customized data access, and 4) Mapping sensors and actuators to a common abstraction layer to enable multiple concurrent applications. The proposed system was demonstrated with a kit using Zigbee meters and gateways connected to an IoT server and custom user interface.
Modeling, Configuration and Performance Analysis of the customized network us...Fatema Zohora
The document describes a student project using Riverbed Modeler to simulate and analyze the performance of a customized enterprise network. The student modeled a retail company network with multiple LANs and offices. Key steps included designing the network topology, configuring IP addresses, applications and profiles, running simulations to analyze traffic, throughput, delays and the impact of failures. The project provided experience using Riverbed Modeler to simulate and evaluate network performance.
IRJET- Raspberry Pi and NodeMCU based Home Automation SystemIRJET Journal
This document describes a Raspberry Pi and NodeMCU-based home automation system with low-cost and wireless capabilities. The system uses NodeMCU modules installed around the home to control electrical devices via relays. A Raspberry Pi acts as a central server to synchronize switch statuses and provide a user interface to control devices from anywhere via the internet. Node-RED software is used to create the backend programming and user interface, while MQTT protocol enables communication between the Raspberry Pi and NodeMCUs. The system was implemented with two NodeMCUs controlling rooms, demonstrating real-time monitoring and remote control of devices with a low-cost, customizable design.
Similar to Network assignment on project design (20)
What is Qualitative Research_ Different Qualitative Research Topics of InterestTotal Assignment Help
A lot of thought goes into the selection of qualitative research topics in order to make an outstanding research paper. The article explores the reason behind qualitative research and presents 12 topics to take inspiration, along with some key factors to consider while selecting a qualitative research topic.
The majority of quantitative research is based on numerical data that has been acquired from a source. The raw numerical data is subjected to statistical calculations and analysis in order to discover any trends or important tidbits of information.
There are a number of qualitative research subjects that focus on obtaining information directly from the source. Qualitative research relies on information gleaned directly from participants themselves. Qualitative research involves interviewing subjects one-on-one to gather data.
Human resource-management-essay-challenges-in-employee-attraction-and-retenti...Total Assignment Help
The human resource management essay represents the analysis of the challenges that the finance sector is facing in order to attract and retain the employees to their job roles.
Human resource-management-essay-on-attracting-and-retaining-staffTotal Assignment Help
The aim of human resource management essay is to understand the attraction and retention of talent within communication sector organizations followed by its key challenges.
Machine Learning Assignment: How JD utilizes Artificial Intelligence?Total Assignment Help
In this Machine Learning Assignment, a detailed analysis is being provided about the latest Machine Learning that is being used by JD, an online retail company.
This document contains solutions to various financial management assignment questions. It includes calculations to determine the monthly savings required to accumulate $60,000 over 5 years, NPV calculations at different discount rates, computing future values of investments and superannuation, calculating monthly pension amounts, real vs nominal interest rates, effects of changing cash reserve ratios, risk-return tradeoffs of different investments, imputation credits, monthly/annual returns of stocks, standard deviation and beta calculations using CAPM model, and constructing a portfolio with expected return. Formulas and step-by-step workings are provided for all calculations.
This research study of management assignment is related to the physical environment design of restaurant by developing a Multiple Criteria Decision-Making model.
The primary aim of this article discussed in change management assignment is to explore the case studies where managerial communication skills have helped in successfully managing the change initiatives.
As per the Utilitarian theory of ethical consideration discussed in Robotics assignment, it can be identified that consequence is a strong determinant within the course of ethical analysis of a certain activity.
Marketing assignment ultimate guide to advertising trends in 2019Total Assignment Help
The Big Tobacco Company discussed in this marketing assignment is utilizing social media as a weapon to trap the young generation of society with smoking addiction.
The current marketing assignment presents the reflective analysis of two articles where one relates to the marketing trends and another one explores the concept of misconception of consumers while buying sustainable products.
Business environment assignment on analysis of different types of companies t...Total Assignment Help
An organisation can be of different types and size. According to the size and sectors, the scope of the companies varies. In Business Environment Assignment, a brief analysis of different types of companies, their size and scope.
Finance assignment globalization and cross-border business relationsTotal Assignment Help
This Finance Assignment reviews the important of increased globalization and cross-border business relations have made it mandatory for the financial reports of different countries to communicate a similar language. This is achieved through the convergence to IFRS which makes interpretation of financial statements easier and more apt to suit the business requirements.
This document discusses sustainable urban planning with a focus on the cities of Curitiba, Brazil and Adelaide, Australia. It defines sustainable cities and explores how Curitiba implemented sustainable development through policies like organized transportation networks and zoning laws. While Curitiba is held up as a model, it still faces issues like poverty and lack of public participation. Adelaide also pursues sustainability through practices such as renewable energy, community gardens, and preserving green spaces. Both cities provide examples of sustainable urbanization, though each city faces its own ongoing challenges.
Research project assignment proposal for oxygen share program in perth-conve...Total Assignment Help
The current research project assignment aims to plan the suburbs in a way where every household will generate their own share of Oxygen. The location proposed is the city of Perth, Australia.
Financial analysis assignment: Analyzing the Business Strategies of Various C...Total Assignment Help
The major part of operations as discussed in this financial analysis assignment of
Woolworth's Limited is in Australia and New Zealand. The company belongs to consumer goods
industry (Woolworth's, 2019)
Project management assignment evaluating the process in car manufacturingTotal Assignment Help
In this Project Management Assignment it is identified that Lean manufacturing process is utilized in the engine design and manufacturing in car industry for increasing the work efficiency and reducing the negative impact on the environment.
8+8+8 Rule Of Time Management For Better ProductivityRuchiRathor2
This is a great way to be more productive but a few things to
Keep in mind:
- The 8+8+8 rule offers a general guideline. You may need to adjust the schedule depending on your individual needs and commitments.
- Some days may require more work or less sleep, demanding flexibility in your approach.
- The key is to be mindful of your time allocation and strive for a healthy balance across the three categories.
Artificial Intelligence (AI) has revolutionized the creation of images and videos, enabling the generation of highly realistic and imaginative visual content. Utilizing advanced techniques like Generative Adversarial Networks (GANs) and neural style transfer, AI can transform simple sketches into detailed artwork or blend various styles into unique visual masterpieces. GANs, in particular, function by pitting two neural networks against each other, resulting in the production of remarkably lifelike images. AI's ability to analyze and learn from vast datasets allows it to create visuals that not only mimic human creativity but also push the boundaries of artistic expression, making it a powerful tool in digital media and entertainment industries.
How to Create User Notification in Odoo 17Celine George
This slide will represent how to create user notification in Odoo 17. Odoo allows us to create and send custom notifications on some events or actions. We have different types of notification such as sticky notification, rainbow man effect, alert and raise exception warning or validation.
Creativity for Innovation and SpeechmakingMattVassar1
Tapping into the creative side of your brain to come up with truly innovative approaches. These strategies are based on original research from Stanford University lecturer Matt Vassar, where he discusses how you can use them to come up with truly innovative solutions, regardless of whether you're using to come up with a creative and memorable angle for a business pitch--or if you're coming up with business or technical innovations.
How to Create a Stage or a Pipeline in Odoo 17 CRMCeline George
Using CRM module, we can manage and keep track of all new leads and opportunities in one location. It helps to manage your sales pipeline with customizable stages. In this slide let’s discuss how to create a stage or pipeline inside the CRM module in odoo 17.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
1. Network Assignment On Project Design
1. Project Scope and Requirements
1.1 Scope of the Project discussed in network assignment:
From the newly developed system, expects of the organization is included in the
following project scope:
For new office branches, the implementation of structure and design architecture
is required.
By developing network architecture, the organization can implement the
connectivity within the organization.
To measures, the resource and cost required the organization to invest in new
architecture developments.
1.2 Requirements of the Project:
In IT project of a company should follow these essential types of equipment are:
Security: Security measures need to implement to giving protection to the
confidential information so that outsiders cannot access any technology or
information.
Effective Communication: To improve the growth and effectiveness of the
business, it is essential to build communication among various department of a
company.
Addressing: To avoid conflict while data transaction, it is essential to use the
effective addressing scheme.
Budget: For developing an active network within time and budget, it is essential to
evaluate budget [1].
2. 1
2. Network Design and Justification:
2.1 Network Design:
For the IT industry, various devices of hardware have selected with the support of
Cisco Packet Tracer. The structure of the IT industry has shown in the image below:
2.2 Justification:
With the help of Cisco Packet Tracer, the above structure mentioned in this network
assignment depicts the configured and design for the organization. For support, the
business organization various device such as PCs, switches, routers have set. Based
on the departments, the network has categorized. The departments are HR, sales, IT,
development and accounting. These departments are also interconnected with
various VLANs [3]. Multiple techniques have been used to assign an IP address. For
enable, device communication, need to configure RIP routing protocol over the
devices. FastEthernet cables are uses for interdependent connection; on the other
hand, serial cables are used for the connection of central organization router with
department routers.
3. 2
3. Network Topology Diagram and its Implementation:
The structural, organizational relationship has shown in the below:
3.1 IP Addressing:
For serial infrastructure, the IP address, i.e. 220.200.200.1 at R@1, will provide an
opportunity to communicate with other branches.
4. 3
To interact with other departments, configured sub-interfaces has considered as a
gateway. Every different department uses it. Commands that use for setting sub-
interfaces are in below:
With address 200.200.200.2, another router has configured. The name of the router is
R@2.
5. 4
Configured addressing as 200.200.200.5 in the second serial interface
These following commands are used in the CLI mode to assign gateway address to
FastEthernet port.
10. 9
3.3 Routing protocol Configuration:
RIP that is a routing protocol has methods for adding the communication medium
among all other routers [2]. Multiple network addresses have added in this protocol,
which has connected with the router.
With the scheme of addressing, other routers have configured.
12. 11
Internet Service provider configuration, as shown below:
3.4 Host Configuration:
The IP address, which is a unique identification address has assigned in PC14 for
identifying the location of the device through the network.
The successful and productive connection is built through a PC4. Through the below
gateway, successful results within this network assignment have been shown:
13. 12
Through VLAN’s 3 PC4 by pinging to ISP router the testing has been done. With the
ISP, all the devices are communicating successfully as indicated below:
14. 13
Configuration of Access-list:
The access of R@3 router should block from R@2 router because it belongs to the
sales department. The picture below shows the successful communication before
access-list configuration.
In the picture, the following commands indicate the configuration on R@3. From
specific departments, it blocks access.
15. 14
This picture shows that ping to accountant network in sales department PC6 is not
able.
The sales department cannot access or connect with the accounting department.
The access of another network can quickly identify by PC9. This also indicates the
successful communication between each device.
17. 16
3.5 Server Configuration:
Through IP address, the networks can connect n number of devices that makes the
function faster.
The configuration setup of DHCP Server's as shown below:
To PCO, by DHCP server dynamic IP allocation is successful.
18. 17
4. Timeline and Budget Estimation
The schedule followed for completing this project is presented with the help of the
Gantt chart [4]. By making the most use of different resources, the performance of
the project is shown approximately:
4.1 Project timeline
The project is displayed with the help of MS Office Project software, it is completed
with the timetable, and phases followed. Users can be able to understand the
resources that are utilized for deploying the network with the help of the timeline [5]:
19. 18
4.2 Human resources
The screenshot below portray the supplies along with the standard rate that acquires
to implement the system:
4.3 Hardware requirements
The table illustrated in this network assignment is showing all the hardware devices
costs that needed to arrange the network for the IT Company:
Device
Type
Device
Model
Manufacturer No. of
devices
configured
Cost
(Individually)
Total
Layer 2
Switch
Cisco
Catalyst
2960
Cisco 6 $550 $3300
Router Cisco
2911
Cisco 4 $2001 $8004
Server Cisco ASA
5506-X
Cisco 1 $1200 $1200
PC C0028IN HP 20 $635 $12700
Total Estimation $25204
20. 19
4.4 Cable used
4.5 PCs specifications
The following table is showing the specification of the PC that suggested
implementing in the network:
Brand HP
Colour Black
Item Height 19 Centimetres
Item Width 9.8 Centimeters
Screen Size 21.45 Inches
Maximum Display Resolution 1920x1080
Item Weight 7.76 Kg
Product Dimensions 23.6 x 9.8 x 19 cm
Item model number AIO 22-C0028IN
Processor Brand Intel
Processor Type Core i3
RAM Size 4 GB
Memory Technology DDR4
Maximum Memory Supported 4 GB
Hard Drive Size 1 TB
Hard Disk Technology Hybrid Drive
Speaker Description Integrated Stereo Speakers
Graphics Coprocessor Integrated Graphics
Connectivity Type Wi-Fi, Bluetooth-V4.2
Wireless Type 801.11ac
Number of USB 2.0 Ports 2
Number of USB 3.0 Ports 2
Number of HDMI Ports 1
Number of Audio-out Ports 1
Number of Ethernet Ports 1
Number of Microphone Ports 1
Operating System Windows 10 Home
Cable Type Series Length Price Total
Ethernet Cables Cat 5 Cable 2500m $3/meter $7500
21. 20
Included Components AIO Desktop, Wireless Keyboard, Wireless Mouse, AC Adapter,
User Guide and Manuals
4.6 Server Specifications
The table below shows the details of the server:
Brand Name Cisco
Series CISCO ASA 5506-X WITH FIREPOWER
SERVICE
Item model number ASA5506-K9=
Item Weight 6 pounds
Product Dimensions 9 x 2 x 8 inches
Item Dimensions L x W x H 9 x 2 x 8 inches
Processor Count 1
Flash Memory Size 50
Voltage 240 volts
5. Summary
In this network assignment, it is stated that the configuration of different devices that
are performed by using commands can be utilized to implement the network. The
22. 21
installation of a system is for IT Company, for increasing the growth of the business of
the new branch office that is planned to be open. The branch office network will
comprise of switches, PCs, constitute routers and server. Cisco tracer tool is utilized
for the simulation of the system, and by running different commands, it provides the
different number of devices to connect and configure. DHCP server deploys to
support IP addressing allocation process. It assigns an IP device when it is requesting
the network to access the tools. By configuring access-list, the security measures are
implemented, in which it blocks access to the sales department of the accountant
department. In the IT Company, the discussion of the timeline it also discusses and
follows to deploy the desired network.
23. 22
References
[1] A. M. Rahmani et al., “Smart e-Health Gateway: Bringing intelligence to
Internet-of-Things based ubiquitous healthcare systems,” in 2015 12th Annual IEEE
Consumer Communications and Networking Conference, CCNC 2015, 2015.
[2] A. Y. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck, “Software defined
networking for security enhancement in wireless mobile networks,” Comput.
Networks, 2014.
[3] B. D. Allen, A. C. Singer, and E. S. Boyden, “Principles of designing interpretable
optogenetic behavior experiments,” Learning and Memory. 2015.
[4] A. G. Fiks et al., network assignment “Comparative effectiveness research
through a collaborative electronic reporting consortium,” Pediatrics, 2015.
[5] N. Kratzke and P. C. Quint, “Investigation of impacts on network performance in
the advance of a microservice design,” in Communications in Computer and
Information Science, 2017.
[6] B. Camburn et al., “A Systematic Method for Design Prototyping,” J. Mech. Des.
Trans. ASME, 2015.
[7] T. El-Diraby, T. Krijnen, and M. Papagelis, “BIM-based collaborative design and
socio-technical analytics of green buildings,” Autom. Constr., 2017.