Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

NETWORK ANALYSIS REPORT

ORGANIZATION NAME:-

LOCATION: - GOTH MACHHI, SADIQABAD

GROUP MEMBERS: - MAVIZ ZAFAR CHEEMA


FA08-BCE-053

MANSOOR KHALID
FA08-BCE-036

HAFIZ GHULAM MUSTAFA QAMAR


FA08-BCE-045

SUBMITTED TO: - Respected sir MIR SALEEM


ABOUT FFC
With a vision to acquire self - sufficiency in fertilizer production in the country, FFC was
incorporated in 1978 as a private limited company in goth machi Sadiqabad. This was a joint
venture between Fauji Foundation (a leading charitable trust in Pakistan) and Haldor Topsoe A/S
of Denmark.

The initial share capital of the company was 813.9 Million Rupees. The present share capital of
the company stands above Rs. 8.48 Billion. Additionally, FFC has more than Rs. 8.3 Billion as
long term investments which include stakes in the subsidiaries FFBL, FFCEL and associate
FCCL.

FFC commenced commercial production of urea in 1982 with annual capacity of 570,000 metric
tons.

 Through De-Bottle Necking (DBN) program, the production capacity of the existing
plant increased to 695,000 metric tons per year.
 Production capacity was enhanced by establishing a second plant in 1993 with annual
capacity of 635,000 metric tons of urea.
 FFC participated as a major shareholder in a new DAP/Urea manufacturing complex with
participation of major international/national institutions. The new company Fauji
Fertilizer Bin Qasim Limited (formerly FFC-Jordan Fertilizer Company Limited)
commenced commercial production with effect from January 01, 2000. The facility is
designed to produce 551,000 metric tons of urea and 445,500 metric tons of DAP.
 This excellent performance was due to hard work and dedication of all employees and the
progressive approach and support from the top management.
 In the year 2002, FFC acquired ex Pak Saudi Fertilizers Limited (PSFL) Urea Plant
situated at Mirpur Mathelo, District Ghotki from National Fertilizer Corporation (NFC)
through privatisation process of the Government of Pakistan.
 This acquisition at Rs. 8,151 million represents one of the largest industrial sector
transactions in Pakistan

COMPANY Interaction with Clients


The production facility is in direct contact with the marketing department which is handles
the consumer producer relation.
Organization hierarchy

ti
i
k
r
a
M g
n
a
e
H
u
d
o
r
P
I
C
F
/
o
r
P
i
a
M
n
m
d
A
I
C
L
B
F
hII
ti
c
c
u
t
s
i
a
T
I
a
e
H
d
T
n
c
e(
c
t
o
G
(
i
v
r
c
c
n
o
ti
p
i
M
r
a
K
)
p
t
i
l
w
e
r
f
h
c
a
M
l
a
c
i
ffi
n
h a
R
ffi
O
e
S o
h
a
L
e
s
e
r
u
i
h
c
)
i
d
n
y
Organization of company’s Network
Company’s network is administered by the IT department. IT department hierarchy is as follows

r
a
H
/
S
a
D
w
t
e
N
O d
o
T
I
r
a
w
i
n
e
s
B
k
r
g
a
w
fte
e
r

Employees (Management) Working in IT department


Other then the management staff, there are 16 IT technicians working as subordinates of system analysts
and IT engineers.

 Is good logical and physical layout documentation available?

YES but only for official use.

 Is the IT network being administered centrally from one location or has the
administrative control been distributed to the divisions?

Network is administered centrally by the IT department which further distributes it to other


departments but with partial privileges over network control.

 Sometimes a company employs another company to run certain aspects of its affairs.
This is called Outsourcing. This frees up resources allowing the company / organization
to concentrate on its core business. Does this company / organization do that? Is another
company the employer of some personnel working within the company / organization?

NO. FFC IT department has all in house network facilities.

 You will find that in most cases decisions come from high up in the management
pyramid. In some cases, the Rupee cost of the decision determines the level from which
the decisions come. In other cases, specialists are permitted to make some types of
decisions. At what level are the IT related decisions being made in this company /
organization?

Recommendations and suggestions are passed on through proper channel to the higher
authorities which in this case are the section head and IT manager and final decisions lies in
their hand.

 A network requires investment to set up and maintain. Some of the costs are obvious
while the others are not. The obvious costs include licensing fees and the capital invested
in acquiring the hardware. The less obvious costs include that of training, replacement,
upgrading, etc. Occasionally, users make such changes to their profile as require effort
by the administrator group to undo. Undoing these changes increases the operating
costs. Are policies in place to prevent this happening?

All the users are technically sound so they use their privileges responsibly So need of
undoing the changes is not usually encountered.

 How are the resources such as fax machines, printers, etc distributed in the network?

These resources are distributed among departments as per their need.

 What is the organization of the department set up to support the network?

Organizational hierarchy chart has been discussed earlier.


 What are the employee’s professional qualifications, special skills, experience, etc?

Iqtidar Hussain (IT manager)


Ms IT
21 years of experience in FFC
IT related certifications (Alcatel-Lucent Network Routing Specialist II (NRS II), CSA)

Asif Nawaz (section head)


Ms IT
15 years of experience in FFC
Many IT related certifications (Enterasys Certified Internetworking Engineer (ECIE)

Ali Rizwan(System analyst)


Mcs
6 years of experience in FFC
INFINIDOX Network and Internet Security Specialist Certification

Muhammad Khalid (system analyst)


BCS
6 years of experience in FFC
CWNT, CWNE

Ishfaq Ahmed (IT engineers)


BIT
4 year of experience in FFC

Raja Mohsin (IT engineer)


Telecom eng
4 year of experience in FFC

 Does the company / organization have access to in-house (or outsourced) maintenance
facility?

YES

 If the company / organization has an in-house repair / maintenance facility how many
people are employed in it?

The hardware and the o/s software departments deal with the repair maintenance problems. It
includes a staff of 2 IT engineers and 8 IT technitions.

 How many computers and auxiliary devices did you count in the workshop that were
awaiting repairs?

Complaints are registered by user and entertained by the department.


2 Fax machines
4 printers
27 computers
3 complaints for faulty switches/routers

 What type of repair work is within the capability of the workshop?

Software/os related.

 If maintenance has been outsourced, try to obtain a copy of the contract and attach to
your report. If it is confidential try to obtain the salient data, e.g. rupee amounts, man-
hours, type of services provided, maximum number of stations that may be awaiting
repairs, etc.

NO

 Is there a lag or communication problem associated with this network? If so what is the
cause, and how can it be rectified?

NO

 Is there a Network Management System in place to monitor equipment proactively?

YES

Software running in the Network

 What is the operating system being used?

Ubuntu for servers


Windows xp for users

 Is it licensed or is it pirated?

Ubuntu is an open source


Windows xp is licenced

 If it is properly licensed what sort of license is being used, Site or Corporate?

Corporate licence

 What applications are being used?

SAP at high level


MS Access
MS Office
 Are they licensed or are they pirated?

Licenced

 Is there a central repository where usable software has been placed and from where a
user can download and install it?

Server provide the required software.

 Is an Active Directory (AD) being maintained for the network?

YES

 In spite of all the love and care invested in administering a network, mistakes or errors
of judgment are sometimes made. Change Management is the process that allows an
administrator to rectify the wrong. This usually involves revising the Active Directory
structure. Who is allowed to grant permission to change the Active Directory?

Manager IT

 Are AD changes documented

YES

 How are the users informed of a change in the AD?

By Email

 Are users allowed to download and execute software from the Internet?

NO

Network Security, Disasters, Attacks and other Risks

 Every network is potentially vulnerable to attack and disaster. What are the potential
attacks and disasters (Hacking, Viruses, Flood, Fire, Earthquake, Theft, Power Outage, etc)
the network is susceptible to?

Hacking is encountered by techniques such as renewal of IP,s and anti hacking softwares
Viruses by antivirus
 How susceptible is the network to each of these? Describe each risk in detail.

Hacking is encountered by techniques such as renewal of IP,s and anti hacking softwares
Viruses by antivirus.
Theft by high security.
Company has its own power generation which ensures uninterrupted power supply.

Natural disasters haven’t been reported till present.

 Has the Management identified the risks?

YES

 What measures, if any, have been adopted to reduce exposure to and the impact of an
attack or a disaster?

Viruses by system scanning


New OS installed
Data recovery from backup

 Is the network cabling, and network interconnectivity devices like hubs, switches, and
routers adequately ducted or secure in rooms?

All cables are under ground and hubs and switches are also secure in cases.

 Does the network a comprehensive solution to periodically backup, save and re-install data
in case of loss of data?

Yes by recovery disk.

 Does the network have a system of UPSs to enable the network to continue operating in case
of a power outage?

Standby power systems are provided.

 Has the network suffered from any of these factors in the past? If so what was the nature of
the setback and how was it managed?

No such major incident has been reported.

 Are devices like proxy server, firewall or suitably programmed routers being used to
prevent unauthorized traffic passing into/out of the network?
DHCP services are installed which only allow access to its own designated IP, s.

 Is encryption being used? If so, what type, EAP, MS-CHAP, PAP or SPAP?

WEP and WPA

 You will study network security during the course. Compare what you will learn in the class
with what exists in the company / organization.

Has not studied yet.

 Has someone in the company / organization been tasked with tracking Internet browsing by
the employees?

Log is generated on daily bases which records the activities preformed by users

 Does the company / organization maintain a record of what sites, especially porn, are visited
by the employees?

Pornographic contents are blocked.

 Are certain sites being blocked? These might include inappropriate sites, MSN Messenger,
Youtube, etc.

No such sites are blocked.

 Are users allotted disc spaces or can they save how much ever they choose to?

Almost each system is equipped with personal storage of about 20GB and shared storage of about
20GB.

 Is a username and password required to login to a computer or can anyone login?

Each user has its own unique password and login ID.

 What password policy is in place? Has a time limit been set to replace a stale password? Is
password history being maintained? Verify this yourself.
Passwords are provided by the IT administration.
 Is a user locked-out after a number of unsuccessful attempts to login? If yes, how many
attempts?

No such limits on unsuccessful attempts is applied.

 Is an event log being maintained?

Log is generated on daily bases which records the activities performed by user, s.

 In case a cyber crime is committed using one of the computers of this network, can the
perpetrator be traced?

YES

Bandwidth Management

 Determine the bandwidth of the LAN(s) in Mbps.

100Mbps

 What is the bandwidth (speed) of the lines that connect the LAN(s) to the Internet?

100Kbps

 Is the network based on copper, wireless, fiber-optic or a mix of all?

Mixed

 Have any steps been taken to free up bandwidth? For example, have certain sites like
Youtube or MSN Messenger been blocked?

Yes

 At what time is the heaviest traffic passing through the network?

During office hours ( 9am to 5Pm)


 At what time is the network traffic at an average level?

6pm to 11Pm

 How dependable or reliable is the network especially in times of heaviest traffic?

Above Average response

 Is the network built around switches or are hubs (collision domains) being used?

Switches

 What is the utilization of the Ethernet collision domains, expressed as percentage of LAN
bandwidth?

50% Approx

 Is the LAN carrying only data or is voice traffic also being carried?

Data

Strengths and Weaknesses of the Network, Recommendations, Upgrade Plans

 What are the weaknesses in the network that need to be improved?

Wireless connectivity sometimes create problems

 What improvements do you suggest in the network? These suggestions must be based upon
the weaknesses you have discovered.

Redundancy in wireless connection with increased bandwidth or replacement of current wireless


with wired connection

 Does the company / organization have any upgrade plans? If so, what are they?

LAN is currently working on 100Mbps because of backbone CAT-6, it is under-consideration to


upgrade it to 1000Mbps with CAT-7 STP cables

You might also like