IT Service Documentation
Permanent URI for this community
Browse
Browsing IT Service Documentation by Title
Results Per Page
Sort Options
-
ItemAccess Control List(University of Khartoum, 2016) Abdul Rahim, Tasneem Omer1- an access control list refers to rules that are applied to port numbers or IP addresses that are available on a host or other layer 3 devices. On some types of proprietary computer hardware (in particular routers and switches), 2- Access Control List (ACL) are filters that enable you to control which routing updates or packets are permitted or denied in or out of a network.
-
ItemAccounting System(University of Khartuom, 2016) Osman, Banan Ahmed AlhashimThis system designed to make the task of all employees in accounting department (Accountants or Reviewers) easy and managed and controlled by their admin and manger in any unit in university. The system design according to the rules of global accounting.
-
ItemAccounting System Software Design Document(University of Khartoum, 2016) Information Technology and Network AdministrationThis software design document describes the architecture and system design of accounting system in university of Khartoum. This document helps me and other developers come after me to know the design and architecture of system to help in edit and add new components.
-
Item
-
ItemDefault & Static Routes and Routing Information Protocol(University of Khartoum, 2016) محمد حماد خوجلى ; Hamad, MohammedWhen a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers, a router is always configured with some default route. A default route tells the router where to forward a packet if there is no route found for specific destination, in case there are multiple path existing to reach the same destination, router can make decision based on the metrics used in IP routing protocols : ■ Hop count - A simple metric that counts the number of routers a packet must traverse ■ Bandwidth - Influences path selection by preferring the path with the highest bandwidth ■ Load - Considers the traffic utilization of a certain link ■ Delay - Considers the time a packet takes to traverse a path ■ Reliability - Assesses the probability of a link failure, calculated from the interface error count or previous link failures ■ Cost - A value determined either by the IOS or by the network administrator to indicate preference for a route. Cost can represent a metric, a combination of metrics or a policy. Routes can be statically configured or dynamically learnt. One route can be configured to be preferred over others.
-
ItemThe Emblem of the University of Khartoum-By Prof Alnazeer Dafallah( 1981) Dafallah, Alnazeer
-
ItemGraduate System Development and Website Design Plan(University of Khartuom, 2016) Osman, Banan Ahmed Alhashim ; Mukhrat, Sarah AbbasGraduate System Development and Website Design Plan
-
ItemGraduate System Development Plan(University of Khartuom, 2016) Information Technology and Network AdministrationGraduate collage is a collage to help students to continue in education and take more certificates in them scope of study or other scope of related study.
-
ItemHuman Resource Management System(University of Khartoum, 2016) Information Technology and Network Administration• HR system was made to meet the needs of human resources at university of Khartoum , and to simplify the daily routines and transactions. on the other hand we are trying so far to make it automated, fastest, easiest one, moreover performance improvement. • Accuracy in every tiny operation. • To meet the needs of human resources and to add everything that suppose to upgrade our university to be in the top world wide selective universities.
-
Item
-
ItemRegistration System(University of Khartuom, 2016) Information Technology and Network AdministrationThis system designed to help all employees working in academic offices to doing them tasks easy, quick and safety. In this system we save all data about registration of students and we can edit it and get all reports about data in some point.
-
ItemResults System(University of Khartuom, 2016) Information Technology and Network AdministrationResults System
-
ItemSwitch port security(University of Khartoum, 2016) ali, Ali Jbraldar mohamedNational Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network security encompasses those steps that are taken to ensure the confidentiality, integrity, and availability of data or resour
-
Item
-
ItemWebsite Proposal For Design & Development(University of Khartuom, 2016) Osman, Banan Ahmed AlhashimWebsite Proposal For Design & Development
-
Itemدليل المستخدم نظام التحصيل الالكتروني(University of Khartuom, 2016) Information Technology and Network Administrationنظام التحصيل الالكتروني هو نظام يهدف لتحصيل كل الايرادات الخاصة بالوحدة لتقليل التعاملات الورقية و تسهيل الخدمات المقدمة من الوحدة و تبسيط طريقة الدفع
-
Itemنظام الاصول غير المالية(University of Khartuom, 2016) إدارة تقانة وشبكة المعلوماتنظام الاصول غير المالية