Flipkart.com

Introduction

Flipkart.com is a great interesting new way of buying books online in India. By offering low prices, free shipping and an intuitive interface to help you, It can give what customers’ need to search for all of their favorite books. Those buyers have always wanted for this excellent customers service as the easiest way. It can ascertain that to get the books in time and fair for prices.

Book Information

www.flipkart.com shows clearly to see their books items and moreover separated by heading categories such as all the bestsellers of it and which are recently sold and so on. So customers choose according to writers or what the bestsellers books are. It can give vital information to customers to get and help what they need.

Order Information

Flipart Online Bookshop provides the best possible assistance to any customers. The customer can buy the book through sign in to it’s account and it does not allow to the customers from outsides of India, even if the customer pay extra for the shipping charges, does not send books through VPP or Cash on Delivery (CoD). Every customers use the search box above to check the availability of books. If a book is marked as “Out of Stock” or not listed with this online book shop, then it is not available.

.Other Information

It can give completely secure and safe for the customers to use credit card. If the customer is not local she/he can use International credit card and it can accept all Master cards and Visa cards. It has made easy for everyone to view and update the customers’ account and orders any time through “My Account”. “My account is to complete and control over transactions at flipkart.

Anyway the book from flipkart.com is whether damaged, the customers can send the email to xxxx. This online shop will give refund or replacement of it for this condition within 7 days of receiving shipment. Flipkart.com won’t charge the return policy.

Recommendation

Our Amazing Book website, we will provide the books information. Books information include the Best seller of the weeks, Books Title, Type of Books, ISBN No, Author, and synoptic of the books. The customer can search their favorite books and author. And also the customer can search from the category. The categories include Histories, Article, Stories, and Biographies. So the customer can search easily. We will provide other information for customer. The other include how to order and about the order information (such as shipping charges,) delivery information.

Task2

The recommendation of Amazing Books Stores

The Amazing Books Store, will provide the books information. Such as the Best seller of the weeks, Books Title, Type of Books, ISBN No, Author, and synoptic of the books. The customer can search their favorite books and author. And also the customer can search from the category. The categories include Histories, Article, Stories, and Biographies. So the customer can search easily. We will provide other information for customer. The other include how to order and about the order information (such as shipping charges,) delivery information.

The method and hardware for recording new stock item

Main Types of Topologies

The following sections discuss the physical topologies used in networks and other related topics.

Read also  Company Overview Of Toyota Company Management Essay

Bus Topology

Star Topology

Ring Topology

Mesh Topology

1. Bus Topology

a single data highway connects all the nodes.

Network nodes are tapped onto the highway via T-connections.

Nodes have equal priority and there id no requirement for a control station

The nodes need to co-operate with each other to use the bus successful and to avoid corrupting each other’s transmissions.

It two nodes try to transmit at the same time, the signal on the bus will be impossible to read.

Advantages of Bus Topology

– Easy to connect a computer or peripheral to a linear bus.

-Less cable than a star topology.

Disadvantages of Bus Topology

Entire network shuts down if there is a break in the main cable.

Terminators are required at both ends of the backbone cable.

Difficult to identify the problem if the entire network shuts down.

Not meant to be used as a stand-alone solution in a large building.

2. Star

Computer attached to a central point

Connection is active

Used twisted pair cable

RJ 45 connector ,that connect directly to the NIC on the device end, and to the hub or the other end

Notes are easily added and remove from a network

Advantages Star Topology

Nodes are easily added and remove from a network

Network problems are easier to troubleshoot because suspect nodes can easily be disconnected from the hub

Disadvantages a Star Topology

Requires more cable than bus topology.

If the hub or concentrator fails, nodes attached are disabled.

3. Ring Topology

A ring consists of nodes connected in a ring through multiple point to point links, forming a physical and logical ring structure. A star ring structure consists of a physical star but a logical ring.

The most common type of cabling used in pure ring topologies is Fiber Optic Cable .

Rings are often used as the backbone of networks.

4. Mesh Topology

Multiple point to point link are used to connected multiple site

Types of Media

There are two common methods of media

Cable type

Wireless

Cable Type

Coaxial Cable

Twisted Pair Cable

Fiber Optic Cable

Coaxial Cable

Coaxial cable was one of the first type of cable used in data networks and LANs

Support Ethernet-type networks

Permits high data rates

Provide extra protection from electrical interference

Two types of coaxial cables are

10 base 2 (Thinnest)

Maximum distance 185 meters

Cable type RG-58

Impedance 50 ohms

10 base 5 (Thick net)

Maximum distance 500 meters

Cable type RG-8

Impedance 50 ohms

Advantages

resists EMI better than twisted pair cable

supports higher bandwidth than twisted pair cable

allows for longer distances

Disadvantages

It cannot be bent around tight radiuses

Cable is heavy, and expensive

Difficult to install

Twisted Pair Cable

Consists of a pair of shielded wires twisted together because the wires are twisted, together electrical interference is minimized.

– very high bit rates

– maximum distance 10 meters

Three types of twisted pair cables are

Unshielded Twisted Pair Cable (UTP)

Shielded Twisted Pair Cable (STP)

Screened Twisted Pair Cable (ScTP)

UTP cable category

Category 1 –for analog and digital voice(telephone),low speed data application

Category 2 –for voice , Integrated Service Digital Network (ISDN) , medium speed data up to 4 Mbps

Category 3 –high-speed data, up to 16 Mbps

Category 4 –up to 20 Mbps

Category 5 –up to 100 Mbps

Category 5e – up to 1000 Mps

Advantages

Easy troubleshooting

Easy moves and changes

Read also  Recruitment and selection Training and development, Diversity and performance

Disadvantage

distances from the hub to the node of 100 meters

sensitive to noise

Fiber Optic Cable

Fiber optic cable consists of a light transmitting glass core surrounded by a reflective cladding layer.

Fiber optic cable feature long transmission distance and high transmission speed.

Up to 50 Mbps

Allows long distance transmission (up to 2 km)

Two types of fiber optic cable are

– Multimode and

-Mono mode

Multimode

Specifics a light signal containing more than one light ray

Light source (LEDs – light emitting diode)

Distance 2.5 to 50 km

Mono mode

Only one light signal

Light source (Laser Diode)

Distance 80 to 140 km

Wireless

Wireless connectivity is within the area of Local Area Network (LANs) where traditional cabled systems are being enhanced, extended or even totally replaced by wireless technology in the form of Wireless LANs (WLANs) or Wireless Fidelity (WiFi) systems.

In the case of WLAN, radio waves provide the connection between the various elements of the network.

Components of Wireless LAN

Wireless Access Point (AP)

Wireless Adapter (WA)

Wireless Specification

802.11 the original wireless LAN specification , 1 or 2 Mbps data rates using FHSS OR DSSS signaling technique in the 2.4 GHz frequency range.

802.11a -provides 54 Mbps data in 5 GHz frequency range.

802.11g – provides 54 Mbps data in 2.4 GHz frequency range.

Advantage of Wireless

more flexible than cable

easier to install and alter

Disadvantage of Wireless

transmission speed is much less than cable

cost are higher than cable

less secure than cable

Can be hacked from outside the building.

Any unauthorized mobile device can act as a receiver

Recommendation

Among four possible topologies, the star topology is suitable topology for the Amazing site of books. Because star topology is easy to understand and installed, troubleshooting and maintaintance than others topology.

Task 4

Delivery system of the Amazing online Books shop

Workplace Theft

Theft in the workplace is more common than you might realize as “Workplace theft is a huge problem. Building owners and facility managers need to equip themselves to fight office crime and protect their business with an integrated, careful approach. Find out who may be stealing from you, and how you can prevent it. Who would do this?

Theft in the workplace is a serious matter that’s on the rise for a large majority of facilities. Perpetrators may include vendors, or even thieves off the street who find office building an easy mark. Most often, we think of workplace theft as someone snatching money from a wallet or a purse. It can just as easily be an employee stealing office supplies or committing identity theft. We have to not only safeguard our property, but our information, too.

Prevention

The first step to preventing office theft to hire the right people who won’t steal from you. One of the main strategies to stop the insider is performing background checks that aim to identify them before they’re hired. When you have made sure for these people on your team, the next step is figuring out how secure your building is and where potential weaknesses may be. You can reinforce or add security elements to aspects of your building that might be at risk. The basic solutions should have found out for building and workplace security.

Access control-Electronic physical security (EPS)systems offer several solutions for the safeguarding of assets and personnel from unauthorized entrants into a workplace. EPS systems can include a card, a reader, and an electronic locking device that controls the portal. Burglar alarms and radio frequency identification (RFID) tags are also included in EPS systems. Another aspect of access control includes where people are entering your building, and who is monitoring them. McConnell says “visitors should only have access through one entrance, and should be checked in by a lobby attendant or security guard, there are a number of simple and temporary bad solutions that provide visitors with badges that clearly identify them as a visitor while providing access for only a limited amount of time to limited areas.

Read also  Quality In Pharmaceutical Industry Management Essay

Surveillance system

Video systems in today’s buildings are analog (older technology) or digital, or a hybrid (where analog is being upgraded to digital), Visbal, director of research and technology at the Alexandria, VA-based Security Industry Association explains that. Many video systems incorporate video analytics that detect motion, penetration of a secured area, and objects left behind or moved. In addition to recording events, video surveillance has a psychological impact. Visible cameras and signage are effective deterrents to office crime. Forming an “office watch” group will also reinforce workplace surveillance.

You can use these tips for a safer Facility for building Owners to check the security of your facility.

*Be certain that all windows are secure.

*If doors only have a locking knob or lever, install a deadbolt for additional security.

*Lock steel bars or door barriers with high-security padlocks that have a hardened steel body and shackle to resist drill, hammers, blowtorches, and bolt cutters.

*Make sure all doors are solid. Look for sheet steel on both sides of rear and basement doors. Make sure doorframes and hinges are strong enough that they can’t be pried open.

*Good locks are the first line of defense. Use high-security locks or electronic access-control units on all doors.

*Verify that any electronic access-control unit has secure key bypass.

*Install motion-sensitive and constant outside lights.

*Check the identity of any strangers who are in your office-ask who they’re visiting, and whether you can help them that person.

Security control in warehouse or office

CCTV system enables reliable and real-time warehouse monitoring and alarm verification by security guard. It records the story between pre-and post-alarm video, which can be used as evidence or for visual verification. Equipping CCTV to keep track and strengthen the quality control of product operation is absolutely a cost-effective choice.

There could be assumed that stock inaccuracies are introduced by theft type errors that arise within the store. We analyze the problem of having theft in store by optimizing the holding cost under a service level constraint.

Recommendation

I would like to recommendation for electronic security for hardware, software and network requirement. I like use the Burglar alarms, radio frequency identification (RFID) tags and CCTV camera. By using these hardware, our stock inventory are more secure from theft. And also I like use the Electronic physical security (EPS)systems offer several solutions for the safeguarding of assets and personnel from unauthorized entrants into a workplace. EPS systems can include a card, a reader, and an electronic locking device that controls the portal. Because of using this system is more secure for my Amazing book online system.

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)