Thursday, July 29, 2010

Networking System in the University

In school, idealistically network is everywhere in the field of university. Technology is really a widespread and seems it touches the heart of every man. Gradually, as anyone would spoke about it, merely they say “I love technologies because it helps in many things. Since people are already capable of living with a life surrounded by different kinds of gadgets, merely do understood its coexistence. The fact that the world has it, humans somehow lives an easy life. Though technology may be there to supply the needs still perfections can never be achieve. Disadvantages is truly inevitable, people whom are knowledgeable just tend to lessen the bad effects. Technology specialists are there to accompany the issues system or may be network faced. They are known to repair problems and create effectiveness by means of giving good service to its user. If we are to consider a college university implementing networking structure by midst of handling a number of computers from different colleges and offices, what comes out unto my mind are the users. If somehow they still feel contented of the service being provided. Others would just think about the situation that if there are many users, somehow, the flow of connections will be affected. The personnel whom take in charge of the network is finding his way of blocking social networking cites, games, and other prohibited cites that could somehow make the internet connections slow. As a matter of fact, slow internet connections mainly are the cause of lots of student head aches. One goes upon ones mind as to how certain things are managed down the network and how do services equally distributed to its student. As what I thoroughly understand about when it comes to the accounted service student had overcome in the line of network, most of those used computers seems to give not so good service at all, but in terms of new ones, their advantages is high. Evidently, they are good ones because new things try to develop and experiment what could be of good deliverability to its users. Even there are new down the line of course people should maintain the capability of its computer. If people have the sense, it just only relies as to how they will take care and maintain the effectiveness of their devices. Technologies could be of good service but they were not in fact there always to maintain its good service still it needs someone for continuity.


Moving on to what the group had taken upon the distribution of questions to the said network specialist, he barely answered some of it personally. I just attach everything I learn and understood about his answers.

A. Reyes stated that “[T]alking about hardware component and technology used, basically I, assigned as the network administrator, am entrusted to maintain our different servers to run 24/7. Currently, we have our Web Server hosted here in our University in our HP ProLiant ML350 Server. It’s an old but stable server set-up here in our Networks Office and has been active since Engr. Val A. Quimno, not yet a dean was appointed as the Network Administrator. The said server has the following specification:
• Intel Xeon 3.0 GHz, 3.2 GHz, or 3.4 GHz processors (dual processor capability) with 1MB level 2 cache standard. Processors include support for Hyper-Threading and Extended Memory 64 Technology (EM64T)
• Intel® E7520 chipset
• 800-MHz Front Side Bus
• Integrated Dual Channel Ultra320 SCSI Adapter
• Smart Array 641 Controller (standard in Array Models only)
• NC7761 PCI Gigabit NIC (embedded)
• Up to 1 GB of PC2700 DDR SDRAM with Advanced ECC capabilities (Expandable to 8 GB)
• Six expansion slots: one 64-bit/133-MHz PCI-X, two 64-bit/100-MHz PCI-X, one 64-bit/66-MHz PCI-X, one x4 PCI-Express, and one x8 PCI-Express
• New HP Power Regulator for ProLiant delivering server level, policy based power management with industry leading energy efficiency and savings on system power and cooling costs
• Three USB ports: 1 front, 1 internal, 1 rear
• Support for Ultra320 SCSI hard drives (six hot plug or four non-hot plug drives supported standard, model dependent)
• Internal storage capacity of up to 1.8TB; 2.4TB with optional 2-bay hot plug SCSI drive
• 725W Hot-Plug Power Supply (standard, most models); optional 725W Hot-Pluggable Redundant Power Supply (1+1) available. Non hot plug SCSI models include a 460W non-hot plug power supply.
• Tool-free chassis entry and component access
• Support for ROM based setup utility (RBSU) and redundant ROM
• Systems Insight Manager, SmartStart, and Automatic Server Recovery 2 (ASR-2) included
• Protected by HP Services and a worldwide network of resellers and service providers. Three-year Next Business Day, on-site limited global warranty. Certain restrictions and exclusions apply. Pre-Failure Notification on processors, memory, and SCSI hard drives.
Aside from it, our mail server running under Compaq Proliant ML330 Server, our oldest server, is also hosted here in our Networks Office. Together with other Servers, such as Proxy and Enrollment Servers, both proxy and our enrollment servers are running in a microcomputer/personal computer but with higher specifications to act as servers.

All Servers are connected in a shared medium grouped as one subnetwork. In general, our network follows the extended star topology which is connected to a DUAL WAN Router that serves as the load balancer between our two Internet Service Providers. All other workstations are grouped into different subnetworks as in star topology branching out from our servers subnetwork as in extended star topology. At present, we are making use of class C IP Address for private IP address assignments. Other workstations IP assignments are configured statically (example: laboratories) while others are Dynamic (example: offices). All workstations are connected via our proxy servers that do some basic filtering/firewall to control users’ access to the internet aside from router filtering/firewall management. So, whenever any workstation has to connect to the internet, it has to pass through software and hardware based firewall.

All workstations are connected via a proxy server. It means that whenever a workstation is turned on, it requests for an IP address from the proxy server (for dynamically configured IP address) and connect to the network after IP address is acquired. As connection is established, each system can now communicate and share resources within the same subnet work and to server following the concepts discuss in your Computer Network Class.

Basically, our servers are expected to be in good condition since it is required to be up 24/7. Daily, during my vacant period, monitoring on the servers are observed that includes checking logs, checking hardware performance such as CPU health, etc. If problems are observed, remedies are then and then applied. Once in a week, regular overall checkup is observed as preventive maintenance to ensure not to experience longer downtime if possible.

As I was appointed as the Network Administrator, everything was already in place except for some minor changes. Basically, different networking standards was already observed such as cabling standards, TIA/EIA 568A-B, different IEEE standards as discussed in your Computer Networks Subject, etc.

As I have mentioned, we have implemented both software and hardware based filtering/firewall. Basically, Risks or vulnerabilities and different mitigation techniques were considered to increase security in our network. Aside from filtering/firewall, constant monitoring on networks activity also increases the security of the system.

Major Interferences are normally encountered as an effect of unforeseen and beyond our control events such as black outs, and the like. The said interference would of course affect University’s day-to-day businesses for obviously this will paralyze all our activities that rely on electricity and further this might cause damage on our network devices, etc. that may later be the reason for longer downtime. Problems encountered by our providers such as connection to the National/International Gateway also affect University’s business such as correlating to University’s Business Partners outside and within the country.


With regards to the book I read about Networking authored by G. Keiser stated that to which also relates to what the university specialist talks about that “Once the hardware and software elements of a local area network (LAN) have been properly installed and successfully integrated, they need to be managed to ensure that the required level of network performance is met. In addition, the network devices must be monitored to verify that they are configured properly to ensure that corporate policies regarding network use and security procedures are followed. This is carried out through network management, which is a service that users a variety of, hardware and software tools, applications, and devices to assist human networks.

In an actual system different groups of network operations personnel normally take separate responsibilities for issues such as administration aspects, performance monitoring, networking integrity, access control and security. There is no special method of organization may take a different approach to fit its own needs. There are two categorize being used namely LAN element management and LAN operations management. The first deals with administrative and performance aspects of individual network components, whereas the second is concerned with the operation with the LAN as a whole and its interaction with other networks.

What would probably be an aide for an effective and efficient network environment ideal for the university is to know the basic network management functions. These are performance, configuration, accounting, and fault and security management.

Performance Management

In carrying out Performance Management a system will monitor parameter such as network throughputs, user response times, line utilization, and the number of seconds during which error occur, and the number of bad messages delivered. This function also is responsible for collecting traffic statistics and applying controls to prevent congestion. Another performance management function is to monitor control the quality of service continually. This may include assigning threshold values to performance or resource parameters and informing the management system or generating alarms when these thresholds are exceeded. Examples of resource parameters include memory usage, free disk space, and the number of concurrent logins or sessions.

Performance Management also permits proactive planning. For example, a software-based capacity-planning tool can used to predict how network growth will affect performance metrics. Capacity planning involves plans to ensure that the network will be able to support the anticipated resources.

Configuration Management

The goal of Configuration Management is to monitor both network setup information and network device configurations in order track and manage the effects on network generation of the various constituent hardware and software elements. Configuration management allows a system to provide network resources and services, to monitor and control their state and to collect status information. This provisioning includes reserving bandwidth for a user, distributing software to computers, scheduling jobs, and updating applications and corporate computers. In addition, information technology support personnel need to know what hardware, operating system, and application software resources are installed on both fixed and mobile computers.

Accounting Management

The purpose of accounting management is to measure network utilization parameters so that individuals or groups of users on the networks can be regulated and billed for services appropriately. This regulation maximizes the fairness of network access across all users since network resources can be allocated based on their capacities. Thus accounting management is responsible for measuring, collecting, and recording statistics on resource and network usage. In addition, accounting management is also may examine current patterns in order to allocate network usage quotas.

Fault Management

Faults in a network, such as physical cuts in a communication line or failure of a circuit card, can cause portions of a network to be in gradable. Since network faults can result system downtime or unacceptable network degradation, fault management is one of the most widely implemented and important network management functions. With the growing dependence of people on network resources for carrying out their work and communications, users expect rapid and reliable resolution on network resources for carrying out their work and communications, users expect rapid and reliable resolution on network fault conditions. Fault management involves the following process:

- Detecting fault or degradation symptoms, this usually is done through alarm surveillance.
- Determining the origin and possible cause of faults either automatically or through the interaction of a network manager.
- Once the faults are isolated, the system issues trouble tickets that indicate what the problem is and possible means of how to resolve it.
- Once the problem has been fixed, the repair is operationally tested on all major subsystems on the network.

Security Management

The ability of users to gain worldwide access to information resources easily and rapidly has made network security is major concern among network administrator. In addition, the mind of network users and personnel who telecommute to access corporate data from outside of the corporation presents another dimension to network security. LAN security covers number of disciplines including:

-Develop security policies and principles
-Creating security architecture for the network
-Implementing special firewall software to prevent unauthorized access of corporate information from the Internet.
-Applying encryption techniques to certain types of traffic.
-Setting up virus protection software
-Establishing access authorization procedures
-Enforcing network security

The principal goal of network security management is to establish and enforce guidelines to control access to network resources. This content is recorded to prevent unintentional sabotage of network capabilities and to prevent viewing or modification of sensitive information by people who do not have appropriate access authorization.

On a certain research paper I had read, it points about policies and guidelines to have an effective network management whish I find helpful. It stated that:

Policies and guidelines are IT security policies, organizational security, asset classification and control, personnel security, operation management and information management. These guidelines if implemented by the appropriate authorities will go a long way in alleviating problems of network insecurity.

IT Security Policy

IT security policies are the rules and practices that an institution uses to manage and protect its information resources. These policies must be developed, documented, implemented, reviewed and evaluated to ensure a properly managed and secured network. Hence, the need for IT security policies in any institution cannot be overemphasized.

Developing Security Policies

Developing security policies involves developing the following: Program policies, System-specific policies and Issue-specific policies [1], [2].
Program policies: addresses overall IT security goals and it should apply to all IT resources within an institution. The institution’s president or an appointed representative must direct policy development to ensure that the policies address the IT security goals of all systems operating within the institution. For instance, program policies can address confidentiality or service availability. All program policies should meet the following criteria:

•Comply with existing laws, regulations, and state and federal policies.

•Support and enforce the institution’s mission statement and organizational structure.

System-specific policies: addresses the IT security issues and goals of a particular system. Large facilities may have multiple sets of system-specific policies that address all levels of security from the very general (access control rules) to the particular (system permissions that reflect the segregation of duties among a group of employees).

Issue-specific polices address particular IT security issues such as, Internet access, installation of unauthorized software or equipment, and sending/receiving e-mail attachments.

Once you have identified the IT security issues you need to address, develop issue-specific policies using the components defined in table 2
The guidelines for developing security policies are:

•Obtain a commitment from senior management to enforce security policies.

•Establish working relationships between departments, such as human resources, internal audit, facilities management, and budget and policy analysis.

•Establish an approval process to include legal and regulatory specialists, human resources specialists, and policy and procedure experts. Allow enough time for the review and respond to all comments whether you accept them or not.

Implementing Security Policies

Successful implementation of IT security policies requires security awareness at all levels of the organization. You can create awareness through widely disseminated documentation, newsletters, e-mail, a web site, training programs, and other notifications about security issues. Table 4 outlines the guidelines for implementing IT security policies:

Reviewing and Evaluating Policies

Institutions/organizations should review their security policies periodically to ensure they continue to fulfill the institutions security needs. Each department is also responsible for reviewing and evaluating the effectiveness of their policies and the accompanying procedures. After an institution/organization has developed IT security policies, the appointed security team will evaluate the policies and provide feedback.

Policy Review within the Institution

Each institution/organization should develop a plan to review and evaluate their IT security policies once they are in place. The guidelines are [2]:


Documentation guideline for security policy

Guideline: Define policies
Description:
Define policies by documenting the following information:
•Identify general areas of risk.
•State generally how to address the risk.
•Provide a basis for verifying compliance through audits.
•Outline implementation and enforcement plans.
•Balance protection with productivity.

Guideline: Define standards
Description:
Define IT security standards by documenting the following information:
•Define minimum requirements designed to address certain risks.
•Define specific requirements that ensure compliance with policies.
•Provide a basis for verifying compliance through audits.
•Outline implementation and enforcements plans.
•Balance protection with productivity.

Guideline: Define guidelines
Description:
Define IT security guidelines by documenting the following information:
•Identify best practices to facilitate compliance
•Provide additional background or other relevant information

Guideline: Define enforcement
Description:
Define how policies will be enforced by documenting the following information:
•Identify personnel who are authorized to review and investigate breaches of policy.
•Identify the means to enforce policies.

Guideline: Define exceptions
Description:
Define the possible exceptions to the IT security policies.

Guidelines for implementing IT security policies

Guideline: Create awareness
Description:
Create user awareness using the following methods:
•Notify employees about the new security polices.
•Update employees on the progress of new security policies.
•Publish policy documentation electronically and on paper.
•Develop descriptive security documentation for users.
•Develop user-training sessions.
•Require new users to sign a security acknowledgement.

Guideline: Maintain awareness
Description:
Maintain user awareness of ongoing and new security issues using the following methods:
•Web site
•Posters
•Newsletters
•E-mail for comments, questions, and suggestions
•Assign responsibility for reviewing policies and procedures.
•Implement a reporting plan in which departments report security incidents to designated
•Implement regular reviews to evaluate the following:
- Nature, number, and impact of recorded security incidents.
- Cost and impact of controls on business efficiency, including third-party vendor compliance.
- Effects of changes to organizations or technology.


Reference:

G. Keiser, “Local Area Networks.”
Jonathan Gana KOLO and Umar Suleiman DAUDA, “Network Security: Policies and Guidelines for Effective Network Management.”








Tuesday, July 20, 2010

The Design of the Enrollment System

The design of the enrollment system probably is an aide for those people who find the enrollment process confusing. Mostly, enrollment system design is naturally the highlights for new incoming students since they are still new in school and just adjusting their selves to the new environment they have chosen. Apparently, through the said design students tend to follow what is being instructed to it. In other words, the students find it useful and helpful in the process. Even though most of the population would say that the design is considerably a good guide, still there are certain issues faced such that some intend to ask questions from other people which are inevitable. This scenario is mostly happening for those new in the process such that they never know where the next step is could be seen and fortunately it’s not a worst thing to do because the design is just mainly a guide or procedural steps for students to know. It does not mean that if you do guided by the design, you all know about what is written on it. Basically, old students in the school can also be a prospect for you to fulfill the process. The design of the enrollment system is just hoping when students have seen it, they will follow and everything will just rely of how eager the students are on finding a way to achieve the next step, in other words, pursue the process.

Without having a design, do students can say I am confident about this enrollment? .Sad to say no. See, we really find the real importance of a thing if we discard it in the process. Mainly, its nothingness in the system is considerably a big loss. What would somehow be the face of the enrollment system without its participation? If I will to say, for sure many would say “What kind of process is this school has? ; Is this the service the school talks about? ; What are they thinking about us, ’nothing’ in this school?”. Somehow, these may be the questions and issues the school will face if that happens. Of course, if the school really is the school for education, they should have think first how the students will be served and to what way the students could coordinate in the process without having any difficulties. I may say that the design itself is one thing that the school being implemented to cater good service to its students.

Tuesday, July 6, 2010

USEP Enrollment System

As being a student, basically I can say something to the enrollment system being implemented this semester. Somehow, I can attach or understand what it is going on the process since students are the actors involved in the enrollment system itself. Enrollment system covered a number of subsystems, involving manual and automated. For a number of operations involved, mainly transactions are uptight. There are also a large number of students will enroll. So merely, the school will find ways on how they could provide service to their students. Actually, my long years of residence here in the university of Southeastern Philippines, I have merely witnessed different ways of enrollment system. I am sure that they really want to try new things or try if it will be an effective one. For every semester of enrollment, I always hear issues such that the system is slow; some said that they come in school early to enroll still they would finish the next day since it can just accompany small number of students at that day. Others just chose to be calm because they have said, after all they would still be enrolled as long as you remain patient, just follow the rules and everything would be ok.

Going to the enrollment system implemented this semester, if I would rate it, probably it passes. By looking at the first procedural step of the system wherein student will pay their miscellaneous fee, though the operation is manual still I can say it delivers good service because student meant to line properly. But if I will to say this service will be improve, I just want that for the next semester of enrollment or maybe next year, the OSCSS as well as the Headlight Office must have their own system, an automated system so that the transactions will be fast. For sure, by then bad comments will lessen.

Scholars of different programs such as barangay or city officials when follow up their scholarships at the OSS in order to be enrolled cause to much effort. The reason why I have said this, it is because I have encountered it a lot. Have to line yourself together with some other scholars in order to be accounted as scholar for the semester. With the problem I observed about this area, the only solution came to my mind is to have an automated system that have the coordination between school and the scholarship organization. If the organization will immediately confirm the school that the student has already been issued a scholarship, then the school will permit the student to be enrolled as input of the system invokes that it will be paid by a scholarship fund. And also, the student will just be updated through mobile phones or via mail regarding the status of their scholarship. I think with this idea, student will not be worried or discourage to enroll.

On the next stop is our way to advising. Here, I may say that the environment is hot and as the quote always state that having patience is a virtue. I intend to say that because the number of line I have face within this semester is kind a long but still I relax myself and just go with the flow. Apparently with the longer hours of waiting, I was entertained and evaluated. In this area, probably what could I suggest is particularly to have an automated system that will automatically generates the subjects that will be enrolled by the students itself than the manual storing of inputs wherein it each to much time. The system must also be accompanied with current and past grades of the students so that it will be the system’s basis for his or her subjects to be enrolled. The miscellaneous payments must also play a part of the system since it is also requirement for evaluation. I suggested as one solution for improvement because every time I encountered this kind of a situation, I merely kind of imagining that scene wherein in fact will free us away from stress and away from the old system.

With the encoding, I don’t really have any problem against it, since it is automated. The service is evidently fast. If I have something to say about this, for sure it is likely those times many students are being encoded and you have to wait for your copy. But then again no problem with that because it just take less of time to wait.

Actually because I am a scholar definitely on the cashier’s area, scholars will just present their scholarship card having updated to this semester together with the COR. Basically, the two things being mentioned will be their basis for the approval of enrollment and subjects taken for this semester. Simply presenting the required documents for the scholars whereas for those ordinary students whom take time to line since they will be issued an official receipt when they paid. Truly, counting money would really took much time but then again, still the process is smooth and nothing to be worry about because students were guided accordingly. For the improvement, I would suggest if the school have fund, I want that respective colleges have respective cashiers in such a way it would ease the process or if it is impossible, why not have added the number of cashiers? (laughs ,still the same!).

Moving on to the registrar’s area, I see that the service being provided is for the whole student even though you are a scholar or not, you have no special treatment and were treated fair. That is why; the students would take time to line to be entertained. But still the service is properly handled and organized especially there are four registrar officer would cater the students. It seems that I have not much comment about the registrar’s service, things were just gone good.

On the last stop is on the library area where you need to present your library card as well as the COR for verification. Then, the library card itself will be validated. So, that’s the end of the process. As you can see in the library’s area, you will really don’t see any problem since the service they catered is not that time consuming.