CONLUSION  AND  RECOMMANDATION

CONLUSION AND RECOMMANDATION

Chapter  6


CONLUSION  AND  RECOMMANDATION

Conclusion
My  practical  training  was  something  which  gave   me  a   clear  vision   under    this   industry  of  information  technology.    Much   more,   I   would   like   to   say   this program   has   enriched   me   with   practical   skills   more   than   that   I   learned   from   class.   Therefore   I   have   got   experience   on   how   to   maintain   the   computer   hardware and software by   theoretically   and   practically.   In   addition,   I go   an   experience  on   good communication   skills   with   other   workers.


Recommendation


Sincerely, I recommended  that the  UCC (University of Computing Centre)  have to help  students  to  go  for  the  field  because  it  enables  a  student to  be  equipped  with  a  lot extra  knowledge  and  skills  and build competence and confidence to the work, I recommended this because I have proved it through the works I have been doing at the field (UCC).
METHODOLOGY

METHODOLOGY

This look is very much in the warmer tones. I would recommend using this more in the fall/ winter time. :)

Chapter  5


METHODOLOGY

a.      Observation
In this way, I can observe tasks done by other staffs then I can try to do it.
b.      Interview
This is face-to-face verbal exchange of staff members.
Technically staff they can elaborate to me procedures to follow in order to perform the specific task.
c.       Document analysis

In this way, I can analyze from different presentations.
COMMUNICATION

COMMUNICATION

Chapter  Four

Pinterest: @ A M I N A T A:  

COMMUNICATION

There   is good    communication   between   members   of    office and   outside   of   the  office .   there   is   socialization   from   one   workers   to   another   because   there  is  sharing   of   views   ideas.
Through  communication,  it  helps  the   workers  to   build  good   relationship  among   them   and   nearby    workers   of   this   school    of   META  SECONDARY  SCHOOL.  Also  there   was   good    communication   between   me   and   student   who  teaching.

Thought  communication   used   to  develop   my   communication   with   other   people   and   it   helps   me   how   to  communicate   with    different   group    of   people   and  how   to  organize   my  self  before   send   my  message  to  other   people,   how  to  share  my  ideas   with   people   in  a   work  place.  In    my   side,  I   gain   a  knowledge   on   how  to  teach  and   communicate   with   student  and   other   workers   in  the   office.
PRESENTATION   OF  RESULTS  AND  DISCUSSION  OF   RESULTS

PRESENTATION OF RESULTS AND DISCUSSION OF RESULTS

Chapter  Three

Pinterest: Nuggwifee☽ ☼☾:  


I  have  been   performing   different   activities   in   field   and  most   concerning  with  computer    activities  and   I   have   been   doing   it  through  co-operative  with  workmate.   My   work   is   related  to   the   whole  process   of   the   firm   because   my  field  is   generally   based   on  IT  activities   like  operating   the   computer,  to  repair   and  maintain   computer.   Also   I  was   based  on  teaching   student   the  topics  of   introduction  to  computer,   computer  generation   and   MS-Office.

Before  engaging  in   practical   training   first  I  searched   a   place   that  is  good  for me to perform a practical and then  I  send  my  application  letter  to  META  SECONDARY  SCHOOL  and  soon  later   they  replay  to  me   that   they   have   accepted   my   applications. And   they  gave   me  a  date  to   start  my  practical.

I  had chosen META SECONDARY   because  it  has  a  department  that  relates  with  my  practical  training.  My goal was to do better in  practical   training,  also   to  get   an experience   in  working  process,   and   to   relate  my  theory  study with   practical   one.

Before   my   practical   training   my   skills   and   abilities   was  normal   but  it developed  to  the  higher  level   during   my   practical    training   and  I  gained  different abilities. I  learned  PC  maintenance  through   mending   the   PC.  The  situation   that  I learned most   is  in  PC  maintenance  because  before  I was  not  experience  a  lot  in  PC  maintenance   but   during   my   practical   training   I   found  myself   deeply   in   this   area.

I think  computer  skills  is needed a lot in daily  working life because  there  are  different activities  that need the skills of computer in working place  and also how to handle the computer, computer  maintenance  and  computer  regulation  for  the  future  benefit.
I apply well the theory that I had learned at the UCC ltd to my working place and I used it effectively and almost all subjects I find that they are useful and are connected with my practical training but the ones are PC maintenance, office automation, and communication skills.

WHAT  I  HAVE  BEEN  COVERED  IN   MY  PRACTICAL  TRAINING

WHAT I HAVE BEEN COVERED IN MY PRACTICAL TRAINING

Pinterest: Nuggwifee☽ ☼☾:

Chapter  Two


WHAT  I  HAVE  BEEN  COVERED  IN   MY  PRACTICAL  TRAINING

Assembling   computer  
Is   a   large   part  a   technician   job.   As   a   technician,  you   will  need   to  work  in  a   logical   methodical   manner   when    working   with   computer   component.  As   with  any   learned   trade   computer   assembly   skills    will    improve   dramatically  with   practice.
Prepare  the  work   space   before  opening   the  case,  there   should   be   adequate,  lighting,   ventilation   and    comfortable   room   temperature.   The   workbench   or   table  should   be   accessible   for  all   sides.   Avoiding  cluttering   the    surface  of   the  workbench   or  table  with   tools  and   computer   component.  An  antistatic   mat   the  table  will  help  prevent  physical   and  ESD  damage   to    equipment.   Small   containers  can  be   used  to  hold  small  screws   and   other    parts   as  they  are  being  removed.
The  process  of   assembling   PC   is  just  to  install  hardware   or  device  in  its  position  setting  configuration  and  become  complete  PC,  all  hardware  and  device  are  plug  in  or  installed  in  motherboard.  Devices  to   plug  are  power   supply,    RAM,  CPU  and   its   fan,  hard  disk,  CD-ROM,  floppy   drive    and  good   main  body. 

Windows   installation
Window   is  a   computer  operation  which   enable  to   ran  programs  installed   in  hard   disk  there   are   several  operating  eg. Window  vista,  Window  XP,  Windows  2000,  Windows  2003  there  is   latest   which   are  not   command   prompt  and    user   friendly.

Window XP
Window  XP   was   released   in  2001   and  presents  the   first  as    built   on   NT  that   was    directly   target   towards   home    user   friendly,   file   sharing   and  network  configuration   for   setting  up   home  networks
In  this   window  all   hard  disk    arrangement   are   done   by  portable   window  CD  which   is   unlikely  to    window   98  soon   after    bios   setup   configuration   and  allocate  computer  to  boot   from   CD   so   as   to   ready   with   window  CD  so   as  to   ready   with  window  CD   and   save    changes  in   Bios   setup.
PC restart  and   lunch  a  Window   XP SETUP,   after   crating   portion   and   format then  set  up   will   copy   window   file   in   the hard disk, soon   PC   restart   and   lunch   a  Window  XP SETUP,   after   crating   portion   and   format   then   set up    will copy   window file in   the hard  disk,   soon  PC   will   restart   and   lunch   window   display   still   setup continue   to   copy   some   file   and   other   configuration  like   network   connection customizing   and   other   after   finalizing  then   installation   is   complete.

Microsoft  office  installation
Microsoft   office   is   the  collection   of     all     application    programs  such  as   MS-office  word,  MS-office  access,  MS-office  excel,  MS-office  publisher   and   MS-office  power  point.   Microsoft  office    divided  into   various    version  like  MS-office  2003,  MS-office  2007,  MS-office  2010   and   MS-office  2013.
Installation   of   Microsoft   office   can   be   done   by    using   CD  which   become  compatible   drivers.   You   can   install   Microsoft office  by   using   serial   number   or  without   using   serial   number.   Also   you   can   install   Microsoft  office   by  using   a  USB  storage   device    like   flash   disk.

 

Printer   installation
Printer :-  This  is  an  output  device  which   convert   file   from   softcopy  to   hardcopy.  Printer   is   connected   to  a  computer  using  a  Universal  Serial   Bus  or  parallel cables   according   to  the  type   of   printer  and  it’s  compatibility.
Installation  of   printer  depends   on  a   package   CD   which  become  with   compatible  drivers  or   you   can   download  drivers   through  an   internet.   After   installation   printout   taste  page   to   know   that   printer  works   printer  works  properly.

Sharing   printer  over  a  network
First stage, click start menu and then select printers and faxes after that select add printer in the  Dialog box of printer.
Dialog  box  of   printer  task   the  printer, the  printer  wizard  will  appear  click   next after  that  there are two option  local or network printer.  I choose network  printer  then  I specifies  printer  name, I click  next  Final  stage, I  browse  the  printer  in  a  net  work  by typing  the  name   which I specified  the  list  of   printer, Which  are on  the  network  will appear   and  I choose  one  which  I  want  to  share  and  connect.



Computer   Generation
This  is  a   topic  which   I  have   been   taught   the   students   in   my   practical   training   at  Meta   Secondary   School. 
Computer  Generation  is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. But nowadays, generation includes both hardware and software, which together make up an entire computer system.
There   are   totally   five   computer   generations   known   till   date.   Each   generation   has been   discussed  in   detail   along   with   their  time   period,   characteristics.   We've used approximate  dates   against   each   generation   which   are normally   accepted.  The   following are   the   main   five   generations   of   computers;
First Generation;  The period of this  generation was  started  1946-1959.  It   was   started  using vacuum tubes as the basic components for memory and circuitry for CPU(Central Processing Unit). These tubes like electric bulbs produced a lot of heat and were prone to frequent fusing of the installations, therefore, were very expensive and could be afforded only by very large organizations.
In this generation mainly batch processing operating system were used. In this generation Punched cards, Paper tape, Magnetic tape Input & Output device were used.
Some  of   computer   in   this  generation  were  ENIAC,  EDVAC,  UNIVAC, IBM-701  and IBM-650
The  following    are   the   characteristics   of   this   generation;
·         Vacuum tube technology
·         Unreliable
·         Supported Machine language only
·         Very costly
·         Generate lot of heat
·         Slow Input/Output device
·         Huge size
·         Need of A.C.
·         Non portable
Second   Generation;   The period  of  this  generation was  started  1959-1965.  This generation using  the  transistor  was  cheaper,  consumed  less  power,  more  compact  in  size,   more reliable  and  faster   than   the  first   generation   machines  made   of   vaccum  tubes.   In   this generation,  magnetic  cores   were   used  as  primary   memory  and   magnetic   tape   and magnetic   disks  as   secondary  storage   devices.
In this generation assembly language and high level programming language like FORTRAN, COBOL was used.
Some  of   computer   in   this  generation  were  IBM 1620, IBM 7094, CDC 1604, CDC 3600, and  UNIVAC 1108.
The  following    are   the   characteristics   of   this   generation;
        i.            Use of transistors
      ii.            Reliable as compared to First generation computers
    iii.            Smaller size as compared to First generation computers
    iv.            Generate less heat as compared to First generation computers
      v.            Consumed less electricity as compared to First generation computers
    vi.            Faster than first generation computers
  vii.            Still very costly
viii.            A.C. needed
    ix.            Support machine and assembly languages
Third Generation;  The period of  this  generation was  started  1965-1971.  This  generation of computer is  marked  by  the  use  of  Integrated  Circuits (IC's)  in  place of  transistors. A  single I.C  has  many  transistors,  resistors  and  capacitors  along with  the  associated  circuitry.  The I.C was  invented  by Jack  Kilby. This  development  made  computers  smaller  in  size,  reliable  and  efficient.
In this generation Remote processing, Time-sharing, Real-time, Multi-programming Operating System were used.
High level language (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
Some  computers of this generation were  IBM-360 series, Honeywell-6000 series, PDP(Personal Data Processor), IBM-370/168  and  TDC-316.
The  main  features  of  Third  Generation  are;
         i.            IC used
        ii.            More reliable
      iii.            Smaller size
      iv.            Generate less heat
       v.            Faster
      vi.            Lesser maintenance
    vii.            Still costly
   viii.            A.C needed
      ix.            Consumed lesser electricity
       x.            Support high level language
Fourth Generation;  The period of this  Generation was  started  1971-1980. The  fourth generation  of  computers  is   marked  by  the  use  of   Very  Large Scale  Integrated (VLSI) circuits. VLSI  circuits  having  about  5000   transistors  and  other  circuit  elements  and their associated  circuits  on  a  single  chip   made it  possible  to   have  microcomputers  of  fourth generation.  Fourth   Generation  computers  became  more  powerful, compact, reliable, and affordable.   As  a  result, it  gave rise  to   personal   computer  (PC)  revolution.
In   this   generation   Time  sharing,  Real time,  Networks,  Distributed  Operating  System  were used.
All  the  Higher  level  languages  like  C and  C++,  DBASE etc.  were used  in  this  generation.
Some  computers  of  this  generation  were  DEC 10,  STAR 1000,  PDP 11,  CRAY-1(Super Computer)  and CRAY-X-MP(Super Computer).
The main features of Fourth Generation are;
        i.            VLSI technology used
      ii.            Very cheap
    iii.            Portable and reliable
    iv.            Use of PC's
      v.            Very small size
    vi.            Pipeline processing
  vii.            No A.C. needed
viii.            Concept of internet was introduced
    ix.            Great developments in the fields of networks
      x.            Computers became easily available
Fifth Generation;  The  period  of  Fifth   Generation is  1980-till  date. In  this  generation, the VLSI  technology  became  ULSI  (Ultra  Large  Scale  Integration) technology,  resulting  in  the production  of   microprocessor chips  having  ten   million  electronic components.
This generation  is  based  on parallel  processing  hardware  and  AI (Artificial Intelligence) software.   AI  is  an  emerging  branch  in   computer  science,   which   interprets   means   and method   of   making  computers   think   like  human  beings.   All the Higher level languages like C  and  C++, Java, .Net etc.   are  used   in   this  generation.
AI includes:
         i.            Robotics
        ii.            Neural  networks
      iii.            Game  Playing
      iv.            Development  of  expert  systems  to  make  decisions  in  real  life  situations.
       v.            Natural   language  understanding  and  generation.
Some  Computer  types  of  this  generation  are  Desktop, Laptop, NoteBook, UltraBook  and  ChromeBook. 
The   main  features  of  Fifth   Generation   are:
        i.            ULSI technology
      ii.            Development  of  true  artificial  intelligence
    iii.            Development  of   Natural  language  processing
    iv.            Advancement In  Parallel  Processing
      v.            Advancement  in  Superconductor  technology
    vi.            More  user  friendly  interfaces   with   multimedia   features
  vii.            Availability of  very  powerful  and   compact  computers  at  cheaper  rates

Introduction  to  computer

Also  this  is  a   topic   which  I   have   been   taught  the   student   at   Meta  Secondary  School  in    my   practical   training.  The   explanation  of   this  topic  it   found   in   CHAPTER 1  at   page  number 1.     
INTRODUCTION  AND  PURPOSE  OF  THE  STUDY

INTRODUCTION AND PURPOSE OF THE STUDY

Pinterest: N a y.:
INTRODUCTION  AND  PURPOSE  OF  THE  STUDY

Introduction

Computer    is   an  electronic   that  can   receive   and   process  data   or   instruction  very  quickly  according  to   the  instruction   provided  by  the   user  and   generate  the  desire  output.   There   are   two  main    component   of   the  computer   these  are   computer  hardware,   which   refers   to   the   physical   parts  that   you    can   touch   and  see  and   touch  it   like  mouse,  keyboard,  monitor,   CPU  and   printers.   Another   is   computer   software   which   are   the   physical   parts   that  you  can   see   but  you  cannot   touch.  These   software   describe   the   program,   that   are   used   to   operate   the   computer  system.
The  computer  hardware  devices  can  be   categories  into  four  types   which   are  input  devices,  processing   devices,  storage  devices  and  output   devices.   The   input  devices  are  the   devices   which  are  used  to  enter   data   in   the  computer  example  mouse,  keyboard, digital camera  and   microphones.
Processing  device  is  the  main  central   device  of  the  computer  system  that  is  used  to  process  data  which  are  displayed  on  the  monitor.  It  is  also  known  as  microprocessor.  It is  the  brain  of  the  computer  because  it  control   all   functions  on  the  computer.
Storage  devices  are  the  devices  which  store  data  permanently  or  temporary to  the    internal  or  external  of  the  computer.  The  examples  of  external  storage  devices  are  flash  disk,  compact  disk (CD)  and  floppy  disk  and  the  examples  of  internal  storage  devices  are  hard disk  and  RAM  Which  is  a  temporary  storage  device.
Output  devices  are  the  devices   of  the  computer  system  which  are   used  to  give   the  display   of  information  in  the   computer.  The   examples   of   output  devices   are  monitors,  printers,  speakers  and   projectors.
Taking   care  your   system   and   a   establish   a   preventive   maintenance  routine  are  critical   to  ensure  that   you  have  reliable  system  that  perform  a   top  efficient   year  after   year.   The    only  way   to   prevent   to  caring   for   your   system   hardware.   These  include  all   factors   that  affects   the   system   as   a  whole.
Computer  maintenance  it  consist  of    PC   assembly,  software   installation,  troubleshooting,  power   supply   maintenance  and  measuring. 



Computer  background
Some of the theories and ideas that would eventually come together to help make up the modern computer were conceived back in the 19th century.
In the 1830s, Charles babage (an English inventor) invented several mechanical calculating machines. His analytical engine (although never actually built) was designed to perform some of the tasks digital computer perform some to day e.g. for instruction perform calculations and have permanent memory (punched cards would have been used)
Had it been built it would have been huge-covering an area about the size of a football pitch.
In 1840s George Boole devised a system of mathematics which becomes know as Boolean algebra. The system used binary (True/false logical and is central to how computers made decisions. By the end of century analogue computing appeared. Herman Hollerith (a US inventor) patented a calculating machine. It used to punch cards and in 1890 it was used to compute census data.
It was during the 20th century that the major developments leading to our modern computers took place.
In the first quarter of the century Hollerith his tabulating machine company experienced several mergers. In 1924 it was final absorbed into a company which adopted the name international Business Machine corporation (IBM).
The Second World War provided a huge stimulus to computer development. Howard Aiken (an American) led the development of computer to decode messages from the German Enigma machine.
Shortly after the war the Americans built the ENIAC-the most sophisticated computer of it time
In 1947 Bell laboratories in the USA invented the transistor. A few years later the microchip and microprocessor were invented. These could store and manipulate information in a small space.
In 1974 micro instrumentation telemetry systems in New Mexico release the Altair 8800-the first personal computer.
In 1975 the Microsoft Corporation was founded by William H. Gates 111 (bill Gates) and Paul Allen. First version of the BASIC programming language for the MITS Altair. They moved Microsoft to a suburb of their home town of Seattle, Washington in 1979. Two years later they took their first step in diversifying beyond programming language when they released the original IBM PC. Microsoft went on to convince other PC manufactures to license MD-DOS, which made it the defector software standard for PCs.
Microsoft moved into application software, eg.word and excel and extended beyond the PC In 1984 they began to produce application software for the Apple Macintosh.         The 1970s and early 1980s saw the development of ARPA net a long distance computer
network developed by the US Government’s Advanced Research Project Agency and its evolution into the first stage of four computers, another 200 in military and research
Establishments throughout the USA were linked using this network during the 1980 several academic networks had been setup.
The combined with the ARPA net to form the internet.  Computers become progressively smaller, better and cheaper in the 1980s, and by 1992 the computer industry was fastest growing industry in the world.
 1991 saw the end of collaboration between Microsoft and IBM. IBM chose to pursue former joint venture with Microsoft on the OS/2 operating system, while Microsoft chose to evolve its windows operating system delivering window 3.1 in 1992. There was the farthest development of the windows operating system through the 1990s and by the end of the century Microsoft had cornered the lion’s share of the PC software market with window, its desktop application and internet browsers. These computers in a daily life the computer are used in a different are some of the including in education department at home in industrials and in offices.
Some of the functions as a follows:
Airline booking on-line banking insurance claim processing are done using computers.
Money-Automatic Teller machine (ATMs) or debit and credit cards use computers to records transaction.
 Today there are different types of computer such as;
Personal computer, Laptop, Han-held devices, Palmtops and Minicomputer.
Among of this types of computers in my report am going to deals with  personal  computer

Purpose  for  the  study
The   purpose   of   this  is   apply   back  taught   into   more   practice  to  work  on  organization   like  UCC  to  be   an  instructor/ Technical  staff.   Also   it   enable  to  develop  my   skills    and   ability   that   supports   my   professionals  studies  eg. (Computer  Maintenance   and   repairing)  and   prepare   for   responsibilities  for   daily   work  as   technician.   Practical  training  enable  to   have   enough  experience   and  confidence  to  work  at   any   organization   or   to   open  your   owned    company   and   expand    carrier.  Not   only   but   also   practical   training   is   very  important    study   of   computer   technology   whereby   it   transfer    theory    into    practice    and   that   the   way   help  the  student   to   understand    in  deeply    about    information   technology,  also  gives   me  confidence   on   working   to  different   devices   of   computers.
Practical   training  is   important  study  of   computer   technology  whereby  it   transfer   theory   into   practice    and   that   is   the   way  of   helping   student   to  understand  clear  the   subject   into   both   sides  (Theoretically  &  practically).



Identifying Technical Constraints

Identifying Technical Constraints

✝Pinterest: @natlopez14:
Identifying Technical Constraints
Technical constraints often focus on architecture decisions that limit your solution design. They tend to be inflexible and unchanging, and can have an impact on your solution implementation. They include areas such as development languages, hardware, other infrastructure, and software that must be used for your project.
The assumptions and constraints are an important aspect of your project requirements.  You need to make sure that you analyze and document them appropriately on your projects. Although they are not requirements, I often recommend documenting them along with the requirements that they impact. It is a simple step to manage and communicate the requirements assumptions and constraints once you have them identified and documented.  You may also identify new project risks related to your project’s assumptions and constraints that need to be added to your risk register.

Remember, any project stakeholder may be involved with identifying and defining the assumptions and constraints for your project, so keep your ears open!  The project team should use these assumptions and constraints to identify potential risks that may impact project implementation and delivery or have a negative impact on end-user expectations of the resulting solution.  It is essential to keep a handle on the assumptions and constraints that are part of your project.
Qn3: Identifying Project Assumptions and Constraints

Qn3: Identifying Project Assumptions and Constraints

Eyes xox:
Qn3: Identifying Project Assumptions and Constraints
Assumptions and constraints show up frequently on our projects. Successful project managers and business analysts keep an eye out for the assumptions and constraints present on their projects.  After all, they can impact your project across a number of variables, including your project requirements and your resulting solution.  Giving the risks that assumptions and constraints can add to your project, I think it’s worth taking a closer look at what they are and how we should identify and manage them.
Experienced project managers look for three elements as they and the team define, analyze, and document the assumptions and constraints on their project: assumptions, business constraints and technical constraints.  Let’s have a closer look at each of these elements.
Identifying Project Assumptions
Assumptions are factors that we believe to be true, although these factors are not confirmed to be true. Assumptions add risk to a project since it is possible that they will turn out to be false. Assumptions can impact any part of your project life cycle and resulting solution implementation, so it is important to document and analyze them.
Identifying Business Constraints
Business constraints limit the solution based upon the current organizational state. They usually focus on the available time, money and resources for a project. Common business constraints include budget and time restrictions, resource limitations, and resource skill limitations. For example, your project’s business case may contain assumptions about realizing the business benefits for your project. Any assumptions about a specific business benefit should be documented and linked to the requirements that will deliver those benefits. This may introduce additional risk into the premises contained in the business case, since it is possible that the assumptions you are assuming to be true may not be true in the end.

Qn2: Network Design Process - Effective Network Planning and Design Overview

Qn2: Network Design Process - Effective Network Planning and Design Overview

☼ ☾:
Qn2: Network Design Process - Effective Network Planning and Design
Overview
The network planning and design methodology describes a process with nine specific steps and a sequence for those activities. As mentioned it is an engineering life cycle that supports technical initiatives such as Windows migration, IP telephony and wireless design to name a few examples. The methodology begins with examining company business requirements. It is absolutely essential that you understand the company business model, business drivers and how they are growing from a business perspective. That will build the foundation for a design proposal that serves the business, technical and operational requirements of the company.
Step 1: Business Requirements
Any design project starts with an understanding of what the company does and what they need to accomplish from a business perspective. This begins with an understanding of their business model, which really describes how their company works from an operational and business perspective to generate revenues and reduce costs. Many vendors today have conducted their own return on investment (ROI) studies for new implementations such as Unified Communications and Telephony. It is an effective sales tool that illustrates the cost benefits compared with investment over a specified period of time.
This is a list of some typical business drivers:
o Reduce Operating Costs
o Generate Revenue
o Client Satisfaction
o Employee Productivity
This is a list of some typical project business requirements:
o Budget Constraints
o Office Consolidations
o Company Mergers and Acquisitions
o Business Partner Connectivity
o Telecommuter Remote Access
o Implement New Offices and Employees
o New Data Center Applications
o Reduce Network Outage Costs
o Cost Effective Network Management
o Vendor Contracts
Step 2: Design Requirements
Now that you understand the basic business requirements of the company, you can determine the standard and specific design requirements. Standard Design Requirements
o Performance
o Availability
o Scalability
o Standards Compatibility
o Rapid Deployment
Step 3: Network Assessment
A network assessment is conducted after we have finished the business and design requirements of the company. A network assessment provides a quick snapshot of the current network with an examination of the infrastructure, performance, availability, management and security.
Step 4: Infrastructure Selection
After doing an network assessment we are ready to start selecting specific infrastructure components for the network design.
The following numbered list describes the specific infrastructure components and their particular sequence.
1. Enterprise WAN Topology
2. Campus Topology
3. Traffic Model
4. Equipment Selection
5. Circuits
6. Routing Protocol Design
7. Addressing
8. Naming Conventions
9. IOS Services
10. Domain Name Services
11. DHCP Services

Step 5: Security Strategy
We must now define a security strategy for securing the infrastructure. The need for enterprise network security shouldn't be ignored with the proliferation of the Internet. Companies are continuing to leverage the public infrastructure for connecting national and international offices, business partners and new company acquisitions.
Step 6: Network Management Strategy
This section will define a network management strategy for managing all equipment defined from infrastructure and security.
o 7 Management Groups
o SNMP Applications
o Monitored Devices and Events

Step 7: Proof of Concept
All infrastructure, security and management components must now be tested with a proof of concept plan.
1. Prototype Design
2. Provision Equipment
3. Define Tests
4. Build Equipment Scripts
5. Review Test Results

Step 8: Design Proposal⁄Review
With the proof of concept finished, you are now ready to build a design proposal for the design review meeting. Your intended audience could be the Director, CIO, CTO, Senior Network Engineer, Consultant or anyone that is approving a budget for the project. It is important to present your ideas with clarity and professionalism. If a presentation is required, power point slides work well and could be used to support concepts from the design proposal document. The focus is on what comprises a standard design proposal and the sequence for presenting that information.
Step 9: Implementation
The final step will have us defining an implementation process for the specified design. This describes a suggested implementation methodology of the proposed design, which should have minimal disruption to the production network. As well it should be efficient and as cost effective as possible. As with previous methodologies there is a sequence that should be utilized as well.