network analysis report

13
NETWORK ANAL YSIS REPORT ORGANIZATION NAME:- LOCATION: - GOTH MACHHI, SADIQABAD GROUP MEMBERS: - MAVIZ ZAFAR CHEEMA FA08-BCE-053 MANSOOR KHALID FA08-BCE-036 HAFIZ GHULAM MUSTAFA QAMAR FA08-BCE-045 SUBMITTED TO: - Respected sir MIR SALEEM

Upload: abdul-qadous

Post on 08-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 1/13

NETWORK ANALYSIS REPORT

ORGANIZATION NAME:-

LOCATION: - GOTH MACHHI, SADIQABAD

GROUP MEMBERS: - MAVIZ ZAFAR CHEEMAFA08-BCE-053

MANSOOR KHALID

FA08-BCE-036

HAFIZ GHULAM MUSTAFA QAMAR

FA08-BCE-045

SUBMITTED TO: - Respected sir MIR SALEEM

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 2/13

 

 ABOUT FFC

With a vision to acquire self - sufficiency in fertilizer production in the country, FFC wasincorporated in 1978 as a private limited company in goth machi Sadiqabad. This was a joint

venture between Fauji Foundation (a leading charitable trust in Pakistan) and Haldor Topsoe A/Sof Denmark.

The initial share capital of the company was 813.9 Million Rupees. The present share capital of the company stands above Rs. 8.48 Billion. Additionally, FFC has more than Rs. 8.3 Billion as

long term investments which include stakes in the subsidiaries FFBL, FFCEL and associateFCCL.

FFC commenced commercial production of urea in 1982 with annual capacity of 570,000 metric

tons.

y  Through De-Bottle Necking (DBN) program, the production capacity of the existing

 plant increased to 695,000 metric tons per year.y  Production capacity was enhanced by establishing a second plant in 1993 with annual

capacity of 635,000 metric tons of urea.y  FFC participated as a major shareholder in a new DAP/Urea manufacturing complex with

 participation of major international/national institutions. The new company FaujiFertilizer Bin Qasim Limited (formerly FFC-Jordan Fertilizer Company Limited)

commenced commercial production with effect from January 01, 2000. The facility isdesigned to produce 551,000 metric tons of urea and 445,500 metric tons of DAP.

y  This excellent performance was due to hard work and dedication of all employees and the progressive approach and support from the top management.

y  In the year 2002, FFC acquired ex Pak Saudi Fertilizers Limited (PSFL) Urea Plantsituated at Mirpur Mathelo, District Ghotki from National Fertilizer Corporation (NFC)

through privatisation process of the Government of Pakistan.y  This acquisition at Rs. 8,151 million represents one of the largest industrial sector 

transactions in Pakistan

COMPANY Interaction with Clients

The production facility is in direct contact with the marketing department which is handles

the consumer producer relation.

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 3/13

Organization hierarchy

Headoffice(Rawalpind

i)

Markiting HeadOffice(Lahore)

Productionfacility

FFC I/II

Goth Machi

Production

1. Ammunia

2.urea

3. utility

Maintainance

1. Electrical

2. Mechanical

3.instrumentation

TechnicalServices

1. labs

2. Safety

IT

1. data base

2. os/softwares

3. networking

4. hardware

Admnistration

1. HR

2. Finance

3. Audit

FFC III

Mirpur

FBL

Karachi

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 4/13

Organization of companys Network Companys network is administered by the IT department. IT department hierarchy is as follows

Employees (Management) Working in IT department 

IT

Data Base Networking OS/Software Hardware

IT Manger

(1)

Section Head

(1)

System Analyst

(1)

System Analyst

(1)

IT Engineer

(1)

IT Engineer

(1)

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 5/13

Other then the management staff, there are 16 IT technicians working as subordinates of system analysts

and IT engineers.

y  Is good logical and physical layout documentation available?

YES but only for official use.

y  Is the IT network being administered centrally from one location or has the

administrative control been distributed to the divisions?

 Network is administered centrally by the IT department which further distributes it to other departments but with partial privileges over network control.

y  Sometimes a company employs another company to run certain aspects of its affairs.

This is called Outsourcing. This frees up resources allowing the company / organization

to concentrate on its core business. Does this company / organization do that? Is another

company the employer of some personnel working within the company / organization?

 NO. FFC IT department has all in house network facilities.

y  You will find that in most cases decisions come from high up in the management

pyramid. In some cases, the Rupee cost of the decision determines the level from which

the decisions come. In other cases, specialists are permitted to make some types of 

decisions. At what level are the IT related decisions being made in this company /

organization?

Recommendations and suggestions are passed on through proper channel to the higher 

authorities which in this case are the section head and IT manager and final decisions lies intheir hand.

y  A network requires investment to set up and maintain. Some of the costs are obvious

while the others are not. The obvious costs include licensing fees and the capital invested

in acquiring the hardware. The less obvious costs include that of training, replacement,

upgrading, etc. Occasionally, users make such changes to their profile as require effort

by the administrator group to undo. Undoing these changes increases the operating

costs. Are policies in place to prevent this happening?

All the users are technically sound so they use their privileges responsibly So need of 

undoing the changes is not usually encountered.

y  How are the resources such as fax machines, printers, etc distributed in the network?

These resources are distributed among departments as per their need.

y  What is the organization of the department set up to support the network?

Organizational hierarchy chart has been discussed earlier.

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 6/13

y  What are the employee¶s professional qualifications, special skills, experience, etc?

Iqtidar Hussain (IT manager)Ms IT

21 years of experience in FFC

IT related certifications (Alcatel-Lucent Network Routing Specialist II (NRS II), CSA) 

Asif Nawaz (section head)Ms IT15 years of experience in FFC

Many IT related certifications (Enterasys Certified Internetworking Engineer (ECIE) 

Ali Rizwan(System analyst)Mcs

6 years of experience in FFC 

INFINIDOX Network and Internet Security Specialist Certification 

Muhammad Khalid (system analyst)BCS

6 years of experience in FFC

CWNT, CWNE

Ishfaq Ahmed (IT engineers)

BIT4 year of experience in FFC

Raja Mohsin (IT engineer)

Telecom eng4 year of experience in FFC

y  Does the company / organization have access to in-house (or outsourced) maintenance

facility?

YES

y  If the company / organization has an in-house repair / maintenance facility how many

people are employed in it?

The hardware and the o/s software departments deal with the repair maintenance problems. It

includes a staff of 2 IT engineers and 8 IT technitions.

y  How many computers and auxiliary devices did you count in the workshop that were

awaiting repairs?

Complaints are registered by user and entertained by the department.

2 Fax machines4 printers

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 7/13

27 computers

3 complaints for faulty switches/routers

y  What type of repair work is within the capability of the workshop? Software/os related.

y  If maintenance has been outsourced, try to obtain a copy of the contract and attach to

your report. If it is confidential try to obtain the salient data, e.g. rupee amounts, man-

hours, type of services provided, maximum number of stations that may be awaiting

repairs, etc.

 NO 

y  Is there a lag or communication problem associated with this network? If so what is the

cause, and how can it be rectified?

 NO 

y  Is there a Network Management System in place to monitor equipment proactively?

YES

Software running in the Network 

y  What is the operating system being used?

Ubuntu for servers

Windows xp for users

y  Is it licensed or is it pirated?

Ubuntu is an open sourceWindows xp is licenced

y  If it is properly licensed what sort of license is being used, Site or Corporate?

Corporate licence

y  What applications are being used?

SAP at high levelMS Access

MS Office

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 8/13

 

y  Are they licensed or are they pirated?

Licenced

y  Is there a central repository where usable software has been placed and from where a

user can download and install it?

Server provide the required software.

y  Is an Active Directory (AD) being maintained for the network?

YES

y  In spite of all the love and care invested in administering a network, mistakes or errorsof judgment are sometimes made. Change Management is the process that allows an

administrator to rectify the wrong. This usually involves revising the Active Directory

structure. Who is allowed to grant permission to change the Active Directory?

Manager IT 

y  Are AD changes documented

YES

y  How are the users informed of a change in the AD?

By Email

y  Are users allowed to download and execute software from the Internet?

 NO 

Network Security, Disasters, Attacks and other Risks

y  Every network is potentially vulnerable to attack and disaster. What are the potential

attacks and disasters (Hacking, Viruses, Flood, Fire, Earthquake, Theft, Power Outage, etc)

the network is susceptible to?

Hacking is encountered by techniques such as renewal of IP,s and anti hacking softwares

Viruses by antivirus

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 9/13

y  How susceptible is the network to each of these? Describe each risk in detail.

Hacking is encountered by techniques such as renewal of IP,s and anti hacking softwaresViruses by antivirus.

Theft by high security.Company has its own power generation which ensures uninterrupted power supply.

 Natural disasters haven¶t been reported till present.

y  Has the Management identified the risks?

YES

y  What measures, if any, have been adopted to reduce exposure to and the impact of an

attack or a disaster?

Viruses by system scanning New OS installedData recovery from backup

y  Is the network cabling, and network interconnectivity devices like hubs, switches, and

routers adequately ducted or secure in rooms?

All cables are under ground and hubs and switches are also secure in cases.

y  Does the network a comprehensive solution to periodically backup, save and re-install data

in case of loss of data?

Yes by recovery disk.

y  Does the network have a system of UPSs to enable the network to continue operating in case

of a power outage?

Standby power systems are provided.

y  Has the network suffered from any of these factors in the past? If so what was the nature of 

the setback and how was it managed?

 No such major incident has been reported.

y  Are devices like proxy server, firewall or suitably programmed routers being used to

prevent unauthorized traffic passing into/out of the network?

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 10/13

DHCP services are installed which only allow access to its own designated IP, s.

y  Is encryption being used? If so, what type, EAP, MS-CHAP, PAP or SPAP?

WEP andWPA 

y  You will study network security during the course. Compare what you will learn in the class

with what exists in the company / organization.

Has not studied yet.

y  Has someone in the company / organization been tasked with tracking Internet browsing by

the employees?

Log is generated on daily bases which records the activities preformed by users

y  Does the company / organization maintain a record of what sites, especially porn, are visited

by the employees?

Pornographic contents are blocked.

y  Are certain sites being blocked? These might include inappropriate sites, MSN Messenger,

Youtube, etc.

 No such sites are blocked.

y  Are users allotted disc spaces or can they save how much ever they choose to?

Almost each system is equipped with personal storage of about 20GB and shared storage of about20GB.

y  Is a username and password required to login to a computer or can anyone login?

Each user has its own unique password and login ID.

y  What password policy is in place? Has a time limit been set to replace a stale password? Is

password history being maintained? Verify this yourself.

Passwords are provided by the IT administration.

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 11/13

 

y  Is a user locked-out after a number of unsuccessful attempts to login? If yes, how many

attempts?

 No such limits on unsuccessful attempts is applied.

y  Is an event log being maintained?

Log is generated on daily bases which records the activities performed by user, s.

y  In case a cyber crime is committed using one of the computers of this network, can the

perpetrator be traced?

YES

Bandwidth Management 

y  Determine the bandwidth of the LAN(s) in Mbps.

100Mbps

y  What is the bandwidth (speed) of the lines that connect the LAN(s) to the Internet?

100Kbps

y  Is the network based on copper, wireless, fiber-optic or a mix of all?

Mixed

y  Have any steps been taken to free up bandwidth? For example, have certain sites like

Youtube or MSN Messenger been blocked?

Yes

y  At what time is the heaviest traffic passing through the network?

During office hours ( 9am to 5Pm)

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 12/13

y  At what time is the network traffic at an average level?

6pm to 11Pm

y  How dependable or reliable is the network especially in times of heaviest traffic?

Above Average response

y  Is the network built around switches or are hubs (collision domains) being used?

Switches

y  What is the utilization of the Ethernet collision domains, expressed as percentage of LAN

bandwidth?

50% Approx

y  Is the LAN carrying only data or is voice traffic also being carried?

Data

Strengths and Weaknesses of the Network, Recommendations, Upgrade Plans

y  What are the weaknesses in the network that need to be improved?

Wireless connectivity sometimes create problems

y  What improvements do you suggest in the network? These suggestions must be based upon

the weaknesses you have discovered.

Redundancy in wireless connection with increased bandwidth or replacement of current wirelesswith wired connection

y  Does the company / organization have any upgrade plans? If so, what are they?

LAN is currently working on 100Mbps because of backbone CAT-6, it is under-consideration to

upgrade it to 1000Mbps with CAT-7 STP cables

8/6/2019 Network Analysis Report

http://slidepdf.com/reader/full/network-analysis-report 13/13