10.30

Vigenere Cipher dan Hill cipher

A. Vigenere Cipher
Vigenere Cipher merupakan salah satu cipher yang terkenal. Vigenere Cipher termasuk cipher substitusi abjad-majemuk. Vigenere Cipher dipublikasikan pada tahun 1856 dan dapat dipecahkan oleh Babbage dan Kasiski pada pertengahan abad 19.
Proses enkripsi dan dekripsi pada Vigenere Cipher menggunakan bujursangkar Vigenere. Kolom paling kiri menyatakan huruf-huruf kunci, baris paling atas menyatakan huruf-huruf plainteks.

Hill cipher bekerja pada kelompok huruf dalam cara yang agak berbeda. Hill cipher bekerja dengan melihat sekelompok huruf sebagai vektor, dan enkripsi dilakukan dengan perkalian matriks. Namun, kami akan menghindari referensi aljabar linear dalam penjelasan kami.
Hill cipher pertama kali dijelaskan oleh Lester Hill dalam sebuah makalah yang diterbitkan pada tahun 1931. Sementara cipher ini dapat bekerja pada blok surat dari setiap panjang, kami akan menjelaskan sebagai bekerja pada pasangan huruf, atau digraf.
Pertama, kunci kami terdiri dari empat nomor-nomor yang kita sebut a, b, c, dan d. Angka-angka ini harus dipilih sehingga iklan kuantitas - bc relatif prima dengan panjang alfabet (26 dalam kasus kami, sehingga iklan - bc tidak bisa genap atau kelipatan 13).
Untuk mengenkripsi sepasang surat, kita melihat setara numerik mereka seperti biasa. Misalkan angka-angka ini x dan y

Dalam upaya untuk memecahkan sebuah sandi Hill, kegunaan dari analisis frekuensi menjadi makin kecil dengan ukuran blok meningkat huruf. Sebuah cipher Hill tidak sulit untuk diterapkan pada kelompok 6 atau lebih huruf. Sebuah kerugian yang besar, bagaimanapun, adalah bahwa hal itu sangat rentan terhadap apa yang disebut serangan plaintext yang dikenal. Jika bagian dari plaintext diketahui penyerang, maka menguraikan transformasi dapat disimpulkan hanya dengan menyelesaikan beberapa persamaan linier. Beberapa bantuan dapat diperoleh dengan menerapkan cipher Vigenere setelah enkripsi dengan cipher Hill, 13 walaupun ada banyak cara yang lebih baik untuk meningkatkan keamanan.

10.11

Mesin Enigma

Mesin Enigma adalah sebuah mesin penyandi yang digunakan untuk mengenkripsikan dan mendekripsikan pesan rahasia. Enigma dipatenkan oleh insinyur Jerman Arthur Scherbius, dan awalnya digunakan untuk tujuan komersial, namun nantinya terkenal karena digunakan oleh tentara dan pemerintah Jerman Nazi sebelum dan selama Perang Dunia II. Secara teknis, mesin Enigma termasuk keluarga mesin rotor elektromekanik, yang memiliki berbagai model. Nama Enigma diambil dari kata Latin aenigma, yang artinya teka-teki.

09.47

Simetris Kriptografi

Algoritma kunci rahasia atau sandi kunci rahasia. Adalah algoritma kriptografi yang menggunakan kunci enkripsi yang sama dengan kunci dekripsinya. Algoritma ini mengharuskan pengirim dan penerima menyetujui suatu kunci tertentu sebelum mereka saling berkomunikasi. Keamanan algoritma simetris tergantung pada kunci, membocorkan kunci berarti bahwa orang lain dapat mengenkripsi dan mendekripsi pesan. Agar komunikasi tetap aman, kunci harus tetap dirahasiakan.

Sifat kunci yang seperti ini membuat pengirim harus selalu memastikan bahwa jalur yang digunakan dalam pendistribusian kunci adalah jalur yang aman atau memastikan bahwa seseorang yang ditunjuk membawa kunci untuk dipertukarkan adalah orang yang dapat dipercaya. Masalahnya akan menjadi rumit apabila komunikasi dilakukan secara bersama-sama oleh sebanyak n pengguna dan setiap dua pihak yang melakukan pertukaran kunci, maka akan terdapat sebanyak (n-1)/2 kunci rahasia yang harus dipertukarkan secara sama

Algoritma kunci simetris memiliki beberapa kelebihan dan kekurangan, yakni:

Kelebihan :

Waktu proses untuk enkripsi dan dekripsi relatif cepat, hal ini disebabkan karena efisiensi yang terjadi pada pembangkit kunci.
Karena cepatnya proses enkripsi dan dekripsi, maka algoritma ini dapat digunakan pada sistem secara real-time seperti saluran telepon digital.

Kekurangan :

Untuk tiap pasang pengguna dibutuhkan sebuah kunci yang berbeda, sedangkan sangat sulit untuk menyimpan dan mengingat kunci yang banyak secara aman, sehingga akan menimbulkan kesulitan dalam hal manajemen kunci.
Perlu adanya kesepakatan untuk jalur yang khusus untuk kunci, hal ini akan menimbulkan masalah yang baru karena tidak mudah u menentukan jalur yang aman untuk kunci, masalah ini sering disebut dengan “Key Distribution Problem”.
Apabila kunci sampai hilang atau dapat ditebak maka kriptosistem ini tidak aman lagi.

Block-Cipher

Block-cipher adalah skema algoritma sandi yang akan membagi-bagi teks terang yang akan dikirimkan dengan ukuran tertentu (disebut blok) dengan panjang t, dan setiap blok dienkripsi dengan menggunakan kunci yang sama. Pada umumnya, block-cipher memproses teks terang dengan blok yang relatif panjang lebih dari 64 bit, untuk mempersulit penggunaan pola-pola serangan yang ada untuk membongkar kunci. Untuk menambah kehandalan model algoritma sandi ini, dikembangkan pula beberapa tipe proses enkripsi, yaitu :

ECB, Electronic Code Book
CBC, Cipher Block Chaining
OFB, Output Feed Back
CFB, Cipher Feed Back

Stream-Cipher

Stream-cipher adalah algoritma sandi yang mengenkripsi data persatuan data, seperti bit, byte, nible atau per lima bit(saat data yang di enkripsi berupa data Boudout). Setiap mengenkripsi satu satuan data di gunakan kunci yang merupakan hasil pembangkitan dari kunci sebelum.

Contoh algoritma yang menggunakan kunci simetris:

1. Data Encryption Standard (DES)

Data encryption standar (DES) yang diadopsi oleh NIST (Nasional Institue Of Standar and Technolog) sebagai standar pegolahan informasi federal As.

Data encryption standar (DES) terbagi menjadi tiga kelompok:

Proses Kunci
Enkripsi data 64 bit
Deskripsi data 64 bit

Secara umum skema Data encryption standar (DES) memiliki dua fungsi input yaitu:

Plaintext untuk dienkripsi dengan panjang 64 bit
Kunci dengan panjang 56 bit
2. Triple Data Encryption Standar (3DES)

22.32

Pertemuan Kedua

Nama : Sonya Leoni
NIM : 06491

Komponen jaringan
1.      MAC   CISC              Complex
2.      PC       RISC                Reduce

Sata 1  150 mbps
Sata 2 300 mbps
Sata 3 6000 mbps

Parallel port (LPT2) gunanya untuk printer sekarang lebih banyak menggunakan usb
Kecepatan usb 1
Kecepatan usb 2.0 = 480 mbps
Kecepatan usb 3.0 = 4,5 gbps

Keluaran interface terbaru namanya “ThunderBoat” yaitu kecepatan nya sekitar 10 gbps

Bus jalur keretanya kememori
Ram berfungsi tempat penyimpanan sementara data yang akan diolah (vollatiel)
Memori terbagi 2 yaitu
1.      DIMN
2.      SIMN

Dan sekarang lebih  dikenal dari tekhnologi tersebut adalah DDR (DDR 3)
Adanya  extrenala memori, tipe penyimpanan external berdasarkan piringan  disebut “Harddisk”
Dan ada satu lagi yang disebut sebagai “SSD” yaitu media penyimpanan yan berupa media

Kalau untuk desktop core i5 terdapat Sata 1, II, III serta harddisk dan SSD 2 GB atau menggunakan SLI.

Fungsi dari VGA atau sering disebut dengan kartu grafis atau lanCard berfungsi sebagai yaitu apabila kita mengingikan hasil tampilan lebih bagus dan bagus

Bagian- bagian motherboard

22.26

Pertemuan kedua

Nama : sonya leoni
NIM : 06491

ENKRIPSI DAN DEKRIPSI

Kriptografi, secara umum adalah ilmu dan seni untuk menjaga kerahasiaan berita [bruce Schneier - Applied Cryptography]. Selain pengertian tersebut terdapat pula pengertian ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi seperti kerahasiaan data, keabsahan data, integritas data, serta autentikasi data

Algoritma Sandi
algoritma sandi adalah algoritma yang berfungsi untuk melakukan tujuan kriptografis. Algoritma tersebut harus memiliki kekuatan untuk melakukan (dikemukakan oleh Shannon):
konfusi/pembingungan (confusion), dari teks terang sehingga sulit untuk direkonstruksikan secara langsung tanpa menggunakan algoritma dekripsinya difusi / peleburan (difusion), dari teks terang sehingga karakteristik dari teks terang tersebut hilang.

Block-Cipher
Block-cipher adalah skema algoritma sandi yang akan membagi-bagi teks terang yang akan dikirimkan dengan ukuran tertentu (disebut blok) dengan panjang t, dan setiap blok dienkripsi dengan menggunakan kunci yang sama. Pada umumnya, block-cipher memproses teks terang dengan blok yang relatif panjang lebih dari 64 bit, untuk mempersulit penggunaan pola-pola serangan yang ada untuk membongkar kunci. Untuk menambah kehandalan model algoritma sandi ini, dikembangkan pula beberapa tipe proses enkripsi, yaitu :
�� ECB, Electronic Code Book
�� CBC, Cipher Block Chaining
�� OFB, Output Feed Back
�� CFB, Cipher Feed Back

ROT13
ROT13 (dari Bahasa Inggris rotate by 13, putar 13 kali), adalah algoritma enkripsi sederhana yang menggunakan sandi abjad-tunggal dengan pergeseran k=13 (huruf A diganti dengan N, huruf B diganti dengan O, dan seterusnya). Enkripsi ini merupakan penggunaan dari sandi Caesar dengan geseran 13. ROT13 biasanya digunakan di forum internet, agar spoiler, jawaban teka-teki, kata-kata kotor, dan semacamnya tidak terbaca dengan sekilas. Hal ini mirip dengan mencetak jawaban TTS secara terbalik di surat kabar atau majalah.

22.13

Pertemuan Pertama tgl 01 maret 2011

Komponen-komponen jaringan computer
1.      PC
2.      NIC
Menggunakan interface RJ-45 [8 bit]
 Empat warna dasar kabel :
-          Orange
-          HIjau
-          Biru
-          Cokelat
Empat warna dasar kabel ini memiliki pasangan kabel putih
Konsep pemasanagan kabel
1.      Kabel yang memiliki pasangan kabel putih berada pada pin ganjil
2.      Pin 1 dan  pin 2                   sepasang
Pin 3 dan  pin 6                        Sepasang
Pin 4 dan  pin 5            Sepasang
Pin 7 dan  pin 8            Sepasang
                                                                        Standar warna A                 Standar warna B
            1                      CP                                           HP                                           OP
      C
            2                      C                                             H                                              O
            3                      BP                                            OP                                           HP

      B    4                      H                                              B                                              B
                    H
5                      HP                                           BP                                            BP
            6                      B                                              O                                             H
            7                      OP                                           CP                                           CP                              
      O
            8                      O                                             C                                             C






 Pemasangan Kabel
A
 
A
 
                     Strike     



B
 
B
 
                     Strike



B
 
A
 
                    Cross



3. Network Device
   - HUB 
     Hub adalah sebuah perangkat jaringan komputer yang berfungsi untuk menghubungkan peralatan-peralatan dengan ethernet 10BaseT atau serat optik sehingga menjadikannya dalam satu segmen jaringan. Hub bekerja pada lapisan fisik (layer 1) pada model OSI.
 
- Switch
Switch jaringan (atau switch untuk singkatnya) adalah sebuah alat jaringan yang melakukan bridging transparan (penghubung segementasi banyak jaringan denganforwarding berdasarkan alamat MAC)
 Perbedaan Hub dengan Swicth:
- Hub lebih lambat dari pada Swicth. Swicth mempunyai perangkat Room yang berfungsi untuk mencari data informasi pada alamat yang ada pada komputer PC (NIC0.

ROUTER
Router berfungsi menghubungkan dua jaringan yang berbeda.
outer adalah sebuah alat jaringan komputer yang mengirimkan paket data melalui sebuah jaringan atau Internetmenuju tujuannya, melalui sebuah proses yang dikenal sebagai routing. Proses routing terjadi pada lapisan 3 (Lapisan jaringan seperti Internet Protocol) dari stack protokol tujuh-lapis OS
BRIDGE
Bridge merupakan kebalikan dari Router, menghubungkan dua jaringan yang sama.
Bridge merupakan sebuah perangkat atau alat yang menghubungkan beberapa jaringan untuk mendapatkan jaringan yang efiesien. Kebanyakan bridge dapat mengetahui masing-masing alamat dari tiap segmen komputer pada jaringan disekitarnya.
Diibaratkan bahwa bridge seperti lalu lintas yang mengatur di persimpangan jalan pada saat jam-jam sibuk. Bridge mengatur agar informasi di antara kedua sisi jaringan tetap berjalan dengan baik dan teratur. Bridge juga dapat digunakan sebagai koneksi jaringan yang menggunakan tipe kabel yang berbeda ataupun topologi yang berbeda pula.













 4. Media Transmisi
    Terbagi dua:
- Wire   : - UTP
               - Fiber Optik
               - Coaxial
- Wireless : - WiFi


5. NOS (Network Operating System)
Sistem operasi jaringan (Inggris: network operating system) adalah sebuah jenis sistem operasi yang ditujukan untuk menangani jaringan. Umumnya, sistem operasi ini terdiri atas banyak layanan atau service yang ditujukan untuk melayani pengguna, seperti layanan berbagi berkas, layanan berbagi alat pencetak (printer), DNS Service, HTTP Service, dan lain sebagainya. Istilah ini populer pada akhir dekade 1980-an hingga awal dekade 1990-an.


 

00.15

Pertemuan Pertama

Komponen Dasar Jaringan

1. komputer terdiri dari
a. CPU,
Di dalam CPU terdapat Motherboard atau Mainboard(MB) yaitu papan utama untuk melekatkan / meletakkan perangkat. Kunci utama Mainboard adalah Chipshet.













Perbedaan CISC dan RISC
CISC adalah singkatan dari Complex Intruction Set Computer dimana prosesor tersebut memiliki set instruksi yang kompleks dan lengkap. Sedangkan RISC adalah singkatan dari Reduced Instruction Set Computer yang artinya prosesor tersebut memiliki set instruksi program yang lebih sedikit. Karena perbedaan keduanya ada pada kata set instruksi yang kompleks atau sederhana (reduced), maka mari kita bahas sedikit tentang intruksi itu sendiri.

18.06

Membuat Lima Pertanyaan

1. Bagaimana gambaran informasi yang terkandung dalam BPDU yang digunakan oleh switch? (Pilih dua)
• to determine which ports are placed in forwarding mode
• to determine the root bridge
• to set the duplex mode of a redundant link
• to activate looped paths throughout the network
• to prevent loops by sharing routing tables between connected switches

2. Protokol yang akan digunakan untuk membuat panggilan VoIP (paket suara)?
TCP
PPP
HDLC
UDP

3. Di dalam jaringan perusahaan, ada dua cara keanggotaan VLAN dapat dibuat. Bagaimana caranya ? (Pilih dua.)
• allowing the user to choose a specific VLAN through a GUI menu 
• manually configuring the switch ports to be part of a VLAN • configuring the switch to allow VLAN membership based on NetBIOS association
• implementing an access list that specifies which devices are placed into specific VLANs.
• manually configuring the host devices to be part of a VLAN
• associating MAC addresses to specific VLANs in a VLAN management policy server database

4. Ada sebuah perusahaan sedang mengembangkan sebuah toko Internet untuk situs webnya. Protokol apa yang harus digunakan untuk mentransfer informasi kartu kredit dari pelanggan ke web server perusahaan?
• FTPS
• HTTP
• HTTPS
• WEP2
• TFTP  

5. Apakah jenis alamat dari 192.168.17.111/28?
• host address
• network address
• broadcast address
• multicast address

17.52

Tugas CCNA 4 Labskill Chapter 10

Lab 10.0.2.2 Finding the Right Networking Job
Step 1: Perform a Skills Strength and Interest Assessment
Step 2: Search a job website for a possible IT position
Step 3: Create a résumé and cover letter
Step 4: Reflection
What other areas related to applying for a job are not covered in this particular lab?
• Interviews: types of interviews that can be conducted, potential questions asked in interviews, preparing for an interview
·         wawancara : tipe wawancara, pertanyaan berbobot yang ditanyakan saat interview, persiapan wawancara
·         negosiasi mengenai gaji dan keuntungan yang didapat

17.47

Tugas CCNA 4 Labskill Chapter 9

Lab 9.1.2 Editing and Organizing the Existing Information

Step 1: Collate and organize the information
a. Gather and read through all the project documents that you created in previous labs.
b. Ensure that multipage documents are together and that the pages are in the correct sequence.
Step 2: Review the existing information
Ensure that the documents are complete and contain the information specified. Any incomplete documents, or missing information that was not recorded at the time of that lab, now need to be checked and included at this stage.
Step 3: Organize the information
A project proposal typically contains the following sections:
Section
Description
Executive Summary
Discusses the project goals and project scope at a high level. This section demonstrates that the network vendor understands the extent of the project and the role of the network in meeting the business goals. The goal of the summary is to convince the decision-makers of the business benefits of the design. This section is typically one to two pages long.
Network Requirements
Reviews the business goals and network requirements, including users and applications that need to be supported. This section often lists the business goals, in order of priority, with critical goals marked. This section includes the topologies; protocols, hardware, software, and training that are required to meet the business goals.
Current Network Environment
Documents the state of the existing network. This section includes physical and logical diagrams and the IP addressing scheme. The section summarizes the results of the network characterization, including strengths and weaknesses of the existing network. It also documents the user community and applications currently in use, based on the network characterization.
Proposed Physical Design
Describes the physical layout of the proposed design. This section
documents trade-offs made to accommodate business goals and technical requirements. The section describes the features and recommended uses for the technologies and devices proposed for the new network design. This section documents the new WAN service and new network equipment. The section also includes proposed network diagrams.
Proposed Logical Design
Describes the logical topology of the proposed network. This section
documents any proposed addressing and naming conventions. It describes the routing and switching protocols recommended for the planned network. This section includes recommended security mechanisms and products that support the security policy of the business. The section may include information on recommended network management procedures and applications.
Implementation Plan
Provides a detailed list of the tasks that must be performed to install and implement the new network. This section includes tasks, steps, time required, and proposed schedules.
Cost Proposal
Provides cost proposal for equipment, software, installation, and ongoing
Step 4: Edit and finalize the information
a. Review all the materials to ensure that they are complete. It is important that the FilmCompany   management and technical staff are able to easily find and understand the material contained in the proposal. A disorganized or incomplete proposal can cause the customer to choose another contractor to complete the project.
b. Ensure that all the information has a consistent format and style. If necessary, edit or rewrite sections
so that the proposal has the appearance of a single document and not a set of separate documents.
c. Complete diagrams and other graphics and finalize what is to be included in the proposal.
d. Clearly note those sections of the proposal that have to be completed; these sections will be compiled
in the following labs.
e. Save the word processing documents and file the hardcopy information in your portfolio.
Lab 9.2.1 Creating an Implementation Plan

Step 1: Determine the tasks to implement the network design
Implementing a network design requires the completion of a set of tasks, such as installing hardware,
configuring systems, testing the network, and launching the network into production. Each task consists of several steps.
Each task requires the following documentation:
• A description of the task
• References to design documents
• Detailed implementation guidelines
• Detailed rollback guidelines in case of failure
• The estimated time required for implementation
• Completion sign-off
Analyze the FilmCompany network design documentation that you have compiled in previous labs. Determine and list the three main sets of tasks required to be performed to implement the network upgrade. These sets of tasks will be referred to as phases.
Phase 1
Install Distribution and Core Layer equipment
Configure new IP addressing & VLAN scheme
Configure routing
Phase 2
Upgrade the WAN connectivity
Extend the network to the remote site
Configure ACLs & security
Phase 3
Install wireless/mobility network
Step 2: Note identified success and failure criteria
When implementing a design, the possibility of a failure must be considered – even after a successful pilot or prototype network test. Each step of the implementation may require additional testing to ensure that the network operates as designed.
In the Reflection section in Chapter 2, Lab 2.3.3, you considered success criteria when determining the
objectives of the FilmCompany network upgrade. List two or three success or failure criteria for each phase of the project.
Step 3: Include provision for customer approval
The Implementation Plan details the work required to accomplish the project goals. The plan includes the
customer expectations and the success criteria for customer approval and project sign-off. As soon as customer approval of the implementation plan is obtained, the installation can begin. The customer is given a detailed list of all devices required and the work to be completed. This list forms part of the Implementation Plan. A signed copy of this list is kept by the network designer and account manager.
Upon completion of each task, the customer is required to sign off that the work was completed and that the results are as expected.
a. Include in the documentation a signature page for an authorized FilmCompany representative to sign
and approve the Implementation Plan.
b. Include in the documentation a signature page at the end of each task for an authorized
FilmCompany representative to sign and accept the completion of each task.
Step 4: Document Phase 1
Step 5: Document Phase 2
Step 5: Document Phase 3
Lab 9.2.2 Creating a Phased Installation Plan

Step 1: Compare the installation methods
There are three possible installation methods:
New installation, commonly referred to as a green field installation
Phased installation into an existing, functioning network
Complete replacement, commonly referred to as a fork-lift upgrade
Consider and list the advantages and disadvantages of the three installation methods.
New Installation
Advantages:
Semua peralatan dan layanan dapat diinstal dan diuji pada saat yang sama.
Rencana implementasi untuk jaringan baru kurang kompleks dibandingkan dengan dua jenis instalasi.
Jadwal lebih fleksibel daripada ketika jaringan yang ada di tempat.
Ada gangguan minimal terhadap perusahaan.
Disadvantages:
Modal besar karena semua peralatan dan layanan yang diinstal pada waktu yang sama.
Phased Installation into Existing Network
Advantages:
Bagian-bagian dari upgrade jaringan diimplementasikan dalam isolasi dari bagian yang sedang berjalan.
Upgrade jaringan dibagi menjadi potongan-potongan kecil yang dapat diinstal dan diuji dengan cepat.
Instalasi upgrade secara bertahap yang lebih kecil menyebabkan sedikitnya jumlah downtime.
Disadvantages:
Sebuah penerapan secara bertahap membutuhkan perencanaan yang lebih rinci dengan pelanggan.
Complete Network Replacement
Advantages:
Jaringan yang ada bisa tetap beroperasi sepenuhnya sampai jaringan pengganti dibawa ke dalam produksi.
Disadvantages:
Kedua jaringan mungkin beroperasi secara paralel untuk beberapa waktu, yang meningkatkan biaya operasi dan dapat menyebabkan kebingungan dan dukungan bagi pemakai
Step 2: Select the installation method
Two of the FilmCompany requirements are:
• The company network services must be available during the upgrade.
• Existing equipment must be used in the new network design.
Select the appropriate installation approach for the FilmCompany network upgrade.
Pendekatan instalasi bertahap akan digunakan untuk proyek ini
Step 3: Complete the details for the installation phases
Using the charts created in Lab 9.2.1; fill out the information for each of the Installation Phases.
a. On the table created in Lab 9.2.1 for Phase 1, fill in the Task/Step, Description, and Implementation
Details information:
• Install Distribution and Core Layer equipment
• Configure new IP addressing & VLAN scheme
• Configure routing
b. On the table for Phase 2, fill in the Task/Step, Description, and Implementation Details information:
• Upgrade the WAN connectivity
• Extend the network to the remote site
• Configure Access Control Lists & security
c. On the table for Phase 3, fill in the Task/Step, Description, and Implementation Details information:
• Install and configure the wireless and associated mobility network equipment
Lab 9.2.3 Creating a Timeline

Step 1: List and prioritize the factors affecting the timeline
Note issues such as equipment and material availability, skilled personnel, and customer requirements that should be considered for the following factors when developing a project timeline. Consider the possibility that the project might not begin on the proposed start date.
Equipment order and delivery
Service installation, such as WAN links
Customer schedule, including available maintenance and downtime windows
Availability of appropriate technical personnel
Step 2: Complete the time details for each installation phase
The FilmCompany network upgrade is linked to the StadiumCompany network redevelopment. It would be efficient to align the FilmCompany stadium remote site work with that project. The StadiumCompany RFP states that the project must be completed during the off-season for the two teams. This requirement gives the project a timeline of four months, which can be also applied to the FilmCompany upgrade.
a. On the table created in Lab 9.2.1 for Phase 1, fill in the Date information:
• Install Distribution and Core Layer equipment
• Configure new IP addressing & VLAN scheme
• Configure routing
b. On the table for Phase 2, fill in the Date information:
• Upgrade the WAN connectivity
• Extend the network to the remote site
• Configure Access Control Lists & security
c. On the table for Phase 3, fill in the Date information:
• Install and configure the wireless and associated mobility network equipment
Step 3: Consider customer-caused delays
Customers may make changes to the requirements during the installation of a project. When changes occur, the timeline is used to make adjustments to personnel and other available resources. The timeline
documentation can also be used to show the customer how delays affect the project completion date.
Based on the timeline, write a project variation statement showing the possible delay in the project completion date if the FilmCompany decided at this stage to relocate an additional three production staff and their workstations to the stadium.
Step 4: Using project management software (Optional)
Project management tools such as Microsoft Project can be used to create a project timeline. This software can be useful for:
• Tracking the progress of the project
• Keeping the project on schedule
• Identifying milestones
• Tracking labor assignments and costs
• Alerting the designer if the project is falling behind schedule.
If this software is available, enter the resources and timeline for one phase of the Implementation Plan and examine the output.
Lab 9.2.4 Creating an Installation Schedule

Step 1: List and prioritize the tasks that require downtime on the current network
List the tasks that require network downtime.
Step 2: Document the required downtime on the project timeline
Sometimes it is not possible to complete all of the required tasks during an approved maintenance window. If an installation task requires the network, or part of the network, to be down during normal business hours, it is important to obtain permission from the customer. As soon as the time frame is determined and approved, all the people involved need to be notified accordingly.
a. List those tasks that can be completed during a scheduled maintenance window.
b. List those tasks that require the network to be down during normal business hours.
Step 3: Document customer approved downtime
a. Indicate on the Installation Plan Timeline when the network downtime will occur.
b. Include a provision for customer approval to be recorded for this downtime.
c. Include a task that requires that the users who will be affected are notified with adequate advance
notice of the network downtime. Ensure that the users are also notified when the network or service
returns to full operation.
Lab 9.3.4 Creating the Bill Of Material

Step 1: List the items required
a. Use the table below, or create a similar one, to list all the items and equipment that need to be
purchased for the FilmCompany network upgrade project.
b. Search the Internet or use information provided by your instructor to add possible suppliers or
vendors to the BOM table.
c. Add costs to the BOM. Where possible, obtain costs from local vendors and suppliers. If this
information is not readily available, your instructor will provide estimated costs for you to use.
Step 2: Determine the software requirements
a. During the early stages of the network Design Phase, existing applications were identified. Add new
applications required by the network upgrade to the BOM. Categorize these as either Network or Specialist applications.
b. Add the new applications, installation costs, and required training to the BOM with the identified
hardware. Also indicate whether the network upgrade requires additional licenses to be purchased for
existing software applications.
Step 3: Add maintenance contracts
a. Investigate the maintenance support service contracts available for both the new and existing equipment.
b. Add the details and costs to the BOM.
Step 4: Create the BOM
a. Create the BOM using word processing or spreadsheet software. Using a spreadsheet will facilitate the calculation of total costs and enable easy updating of the document if costs or quantities are amended.
b. Save this file and include it in the proposal document. Add a hardcopy of the file to your portfolio.
Lab 9.4.1 Compiling the Documentation

Task 1: Compile the Project Proposal
Step 1: Finalize the documentation requirements
a. Finalize the documentation created in the previous labs and in your project portfolio.
b. Insert and compile the information under the following headings:
• Executive Summary
• Network Requirements
• Current Network Environment
• Proposed Physical Design
• Proposed Logical Design
• Implementation Plan
• Cost Proposal
Step 2: Prepare the cover page
Include a cover page at the beginning of the proposal. The cover page describes the proposal, including the RFP or solicitation number and date, the customer contact information, and the vendor name and contact information.
Step 3: Prepare the Table of Contents
Develop a Table of Contents for the proposal document.
Step 4: Create the proposal
Complete the proposal document. The proposal layout should be highly readable and should aid the reader in locating information.
• Use graphics to enhance the readability of a proposal and convey information where appropriate.
• Text should be legible, typically a serif typeface such as Times Roman, at 10-point to 12-point type.
• Page margins should be at least 0.5 inches (125mm).
• Page numbers should be included at the top or bottom of each page.
Step 5: Update the Executive Summary
Use information from the completed implementation and costing sections to update the Executive Summary.
Step 6: Organize the Proposal binder
Arrange the proposal components in a binder, based on the order cited in the Table of Contents.
Step 7: Prepare Terms and Signatures page
a. Prepare the terms of agreement and an acceptance page for customer signatures to be included at
the end of the proposal. The terms and conditions describe all relevant legal terms and contracts that
will be required. These terms and conditions support the supply of goods and services related to
network improvements and installations.
Important clauses in the terms and conditions usually include:
• Details about the proposal expiration date
• Obligations of the customer to obtain permission or other consents within their organization
• Obligations of the vendor to provide services and equipment with care and skill
• Dates when completed milestone deliverables are payable
• Interest chargeable on outstanding payments
• The amount of notice the customer must give to cancel their equipment and service orders
• Details about guarantees (if any) provided by the vendor
• Details about escalating and resolving complaints or issues
If the customer accepts the proposal, an appropriate customer representative signs the Terms and
Signatures page.
Your instructor will advise of the standard terms and conditions that will apply to all proposals.
b. Save this file and include in the proposal document.
Task 2: Prepare the Presentation
Step 1: Plan the presentation
After compiling a proposal, network designers review the entire proposal with their management organization by means of a formal presentation. During this stage of the design proposal, the designer must first sell the concept to the internal management and then to the customer.
For your presentation, list the important points to include that illustrate the proposal. A proposal presentation includes slides or other visual aids to graphically represent the proposal. The presentation, along with the proposal document, is vital to ensuring a successful meeting and increasing the probability of a customer sign-off.
Step 2: Create the presentation
This step assumes that the presentation will use MS PowerPoint or equivalent presentation software. Your instructor will advise of the presentation requirements and resources available.
a. The content and presentation format are important in a business environment. Create a presentation
that considers the following points:
• Every slide should have a heading that summarizes the information presented on the slide.
• Computer presentations should not contain full paragraphs of text. Use a bulleted list or
outline format and elaborate on the points during the delivery.
• All type should be legible. Use large fonts, because small fonts are often hard to read.
• Use contrasting colors – either a dark background with light text or a light background with
dark text.
• Keep the format and style consistent throughout the presentation. Do not change text font,
text color, background color, or theme except for an occasional special emphasis.
• Avoid backgrounds that make the text hard to read. Keep the background simple.
• Do not use ALL CAPS! Their use is unprofessional and they are also more difficult to read.
• Include a combination of words, pictures, and graphics. Variety keeps the presentation
interesting.
b. Save the presentation file and any other presentation aids that you created.
Lab 9.4.2 Presenting the Project Proposal

Task 1: Prepare for the Presentation
Step 1: Review the content
a. Ensure that your presentation is complete.
b. Review the content to ensure that there are no technical errors.
c. Rehearse the presentation to become familiar with the flow of the content and develop a sense of the
timing required.
Step 2: Prepare for questions
Your presentation may seem complete and clear to you, but to others there may be points that need clarifying or that contain too much information.
Read through your presentation as if seeing it for the first time, Note the points that you would ask questions about. Remind yourself that you will not be able to prepare for every possible question.
Step 3: Prepare yourself
Your instructor will advise you on the details (time. location, audience) of the presentation class. On the day of the presentation, try to observe the following guidelines:
a. If possible, and appropriate, wear professional attire.
b. Try not to be too nervous. The other students in your class are probably feeling the same as you are.
c. If other students are presenting before or after you, give them your attention and participate in the
class. Do not think too much about your presentation but focus instead on what is happening in the class.
Task 2: Deliver the Presentation
Step 1: Submit your portfolio and proposal
a. Submit your portfolio and proposal to your instructor before delivering the presentation.
Step 2: Begin the presentation
a. Introduce yourself.
b. Deliver the presentation, using your portfolio and a slide presentation such as PowerPoint.
• Speak slowly and clearly.
• Stay with your slide sequence. A common mistake is to introduce material and then continue
to talk about it in detail without advancing from the general overview slide for that topic to the
detailed slides that follow.
c. Demonstrate that you know the content of the proposal and sell it as the one that the customer should
adopt.
d. Be prepared to respond to questions from the instructors and students.
Step 3: Conclude the presentation
a. Invite any final questions from the audience.
b. Finish your presentation by assuring the audience that your proposal meets their requirements and
thank them for the opportunity to present it.