Professional Documents
Culture Documents
Network Analysis Report: FA08-BCE-053
Network Analysis Report: FA08-BCE-053
ORGANIZATION NAME:-
MANSOOR KHALID
FA08-BCE-036
The initial share capital of the company was 813.9 Million Rupees. The present share capital of
the company stands above Rs. 8.48 Billion. Additionally, FFC has more than Rs. 8.3 Billion as
long term investments which include stakes in the subsidiaries FFBL, FFCEL and associate
FCCL.
FFC commenced commercial production of urea in 1982 with annual capacity of 570,000 metric
tons.
Through De-Bottle Necking (DBN) program, the production capacity of the existing
plant increased to 695,000 metric tons per year.
Production capacity was enhanced by establishing a second plant in 1993 with annual
capacity of 635,000 metric tons of urea.
FFC participated as a major shareholder in a new DAP/Urea manufacturing complex with
participation of major international/national institutions. The new company Fauji
Fertilizer Bin Qasim Limited (formerly FFC-Jordan Fertilizer Company Limited)
commenced commercial production with effect from January 01, 2000. The facility is
designed to produce 551,000 metric tons of urea and 445,500 metric tons of DAP.
This excellent performance was due to hard work and dedication of all employees and the
progressive approach and support from the top management.
In the year 2002, FFC acquired ex Pak Saudi Fertilizers Limited (PSFL) Urea Plant
situated at Mirpur Mathelo, District Ghotki from National Fertilizer Corporation (NFC)
through privatisation process of the Government of Pakistan.
This acquisition at Rs. 8,151 million represents one of the largest industrial sector
transactions in Pakistan
ti
i
k
r
a
M g
n
a
e
H
u
d
o
r
P
I
C
F
/
o
r
P
i
a
M
n
m
d
A
I
C
L
B
F
hII
ti
c
c
u
t
s
i
a
T
I
a
e
H
d
T
n
c
e(
c
t
o
G
(
i
v
r
c
c
n
o
ti
p
i
M
r
a
K
)
p
t
i
l
w
e
r
f
h
c
a
M
l
a
c
i
ffi
n
h a
R
ffi
O
e
S o
h
a
L
e
s
e
r
u
i
h
c
)
i
d
n
y
Organization of company’s Network
Company’s network is administered by the IT department. IT department hierarchy is as follows
r
a
H
/
S
a
D
w
t
e
N
O d
o
T
I
r
a
w
i
n
e
s
B
k
r
g
a
w
fte
e
r
Is the IT network being administered centrally from one location or has the
administrative control been distributed to the divisions?
Sometimes a company employs another company to run certain aspects of its affairs.
This is called Outsourcing. This frees up resources allowing the company / organization
to concentrate on its core business. Does this company / organization do that? Is another
company the employer of some personnel working within the company / organization?
You will find that in most cases decisions come from high up in the management
pyramid. In some cases, the Rupee cost of the decision determines the level from which
the decisions come. In other cases, specialists are permitted to make some types of
decisions. At what level are the IT related decisions being made in this company /
organization?
Recommendations and suggestions are passed on through proper channel to the higher
authorities which in this case are the section head and IT manager and final decisions lies in
their hand.
A network requires investment to set up and maintain. Some of the costs are obvious
while the others are not. The obvious costs include licensing fees and the capital invested
in acquiring the hardware. The less obvious costs include that of training, replacement,
upgrading, etc. Occasionally, users make such changes to their profile as require effort
by the administrator group to undo. Undoing these changes increases the operating
costs. Are policies in place to prevent this happening?
All the users are technically sound so they use their privileges responsibly So need of
undoing the changes is not usually encountered.
How are the resources such as fax machines, printers, etc distributed in the network?
Does the company / organization have access to in-house (or outsourced) maintenance
facility?
YES
If the company / organization has an in-house repair / maintenance facility how many
people are employed in it?
The hardware and the o/s software departments deal with the repair maintenance problems. It
includes a staff of 2 IT engineers and 8 IT technitions.
How many computers and auxiliary devices did you count in the workshop that were
awaiting repairs?
Software/os related.
If maintenance has been outsourced, try to obtain a copy of the contract and attach to
your report. If it is confidential try to obtain the salient data, e.g. rupee amounts, man-
hours, type of services provided, maximum number of stations that may be awaiting
repairs, etc.
NO
Is there a lag or communication problem associated with this network? If so what is the
cause, and how can it be rectified?
NO
YES
Is it licensed or is it pirated?
Corporate licence
Licenced
Is there a central repository where usable software has been placed and from where a
user can download and install it?
YES
In spite of all the love and care invested in administering a network, mistakes or errors
of judgment are sometimes made. Change Management is the process that allows an
administrator to rectify the wrong. This usually involves revising the Active Directory
structure. Who is allowed to grant permission to change the Active Directory?
Manager IT
YES
By Email
Are users allowed to download and execute software from the Internet?
NO
Every network is potentially vulnerable to attack and disaster. What are the potential
attacks and disasters (Hacking, Viruses, Flood, Fire, Earthquake, Theft, Power Outage, etc)
the network is susceptible to?
Hacking is encountered by techniques such as renewal of IP,s and anti hacking softwares
Viruses by antivirus
How susceptible is the network to each of these? Describe each risk in detail.
Hacking is encountered by techniques such as renewal of IP,s and anti hacking softwares
Viruses by antivirus.
Theft by high security.
Company has its own power generation which ensures uninterrupted power supply.
YES
What measures, if any, have been adopted to reduce exposure to and the impact of an
attack or a disaster?
Is the network cabling, and network interconnectivity devices like hubs, switches, and
routers adequately ducted or secure in rooms?
All cables are under ground and hubs and switches are also secure in cases.
Does the network a comprehensive solution to periodically backup, save and re-install data
in case of loss of data?
Does the network have a system of UPSs to enable the network to continue operating in case
of a power outage?
Has the network suffered from any of these factors in the past? If so what was the nature of
the setback and how was it managed?
Are devices like proxy server, firewall or suitably programmed routers being used to
prevent unauthorized traffic passing into/out of the network?
DHCP services are installed which only allow access to its own designated IP, s.
Is encryption being used? If so, what type, EAP, MS-CHAP, PAP or SPAP?
You will study network security during the course. Compare what you will learn in the class
with what exists in the company / organization.
Has someone in the company / organization been tasked with tracking Internet browsing by
the employees?
Log is generated on daily bases which records the activities preformed by users
Does the company / organization maintain a record of what sites, especially porn, are visited
by the employees?
Are certain sites being blocked? These might include inappropriate sites, MSN Messenger,
Youtube, etc.
Are users allotted disc spaces or can they save how much ever they choose to?
Almost each system is equipped with personal storage of about 20GB and shared storage of about
20GB.
Each user has its own unique password and login ID.
What password policy is in place? Has a time limit been set to replace a stale password? Is
password history being maintained? Verify this yourself.
Passwords are provided by the IT administration.
Is a user locked-out after a number of unsuccessful attempts to login? If yes, how many
attempts?
Log is generated on daily bases which records the activities performed by user, s.
In case a cyber crime is committed using one of the computers of this network, can the
perpetrator be traced?
YES
Bandwidth Management
100Mbps
What is the bandwidth (speed) of the lines that connect the LAN(s) to the Internet?
100Kbps
Mixed
Have any steps been taken to free up bandwidth? For example, have certain sites like
Youtube or MSN Messenger been blocked?
Yes
6pm to 11Pm
Is the network built around switches or are hubs (collision domains) being used?
Switches
What is the utilization of the Ethernet collision domains, expressed as percentage of LAN
bandwidth?
50% Approx
Is the LAN carrying only data or is voice traffic also being carried?
Data
What improvements do you suggest in the network? These suggestions must be based upon
the weaknesses you have discovered.
Does the company / organization have any upgrade plans? If so, what are they?