Group Assignment of Abdi
Group Assignment of Abdi
Group Assignment of Abdi
Here's a variety of factors that influence decisions in the supply chain network design.
1. Strategic Factors
A company's competitive strategy has a significant impact on decisions in the supply chain network
design. Companies that focus on cost leadership will try to find or create the lowest cost for facilities
manufakturingnya. Companies that focus on response rate tends to place a facility that closed in the
market and may choose a location to high cost if they meet the company's choice to react quickly to
changing market needs. Global supply chain network to support corporate strategic objectives with the
role of different facilities in different places.
2. Technological factors
3. Macroeconomic factors
These factors include taxes, customs duties, exchange rates, and other economic factors that do not
exist within the company. This factor has a significant impact on the success or failure of the supply
chain network.
4. Political Factors
Political stability in a country is of paramount consideration because it has a significant impact on role in
the choice of location. Companies prefer to place the facility at a location or state which has a stability
that provide clarity in terms of trade rules and ownership.
5. Infrastructure factors
The existence of good infrastructure is an important prerequisite in allocating facilities in certain areas.
Poor infrastructure will further add to business costs.
6. Competitive Factors
Companies must consider the strategy, size, and location of competitors when designing their supply
chain network. Making important decisions the company is now set for the company's facilities are not
accessible by competitors or in other words away from competitors.
Companies that have targeted customers who can respond in a quick time to put the facilities that are
closed to the customer. If the company sends its products to customers, it means that transportation
should be slightly built and continue to increase response time is short. This choice resulted in an
increase or increase in transportation costs. Furthermore, many situations that require these facilities to
customers.
Logistics and facilities costs that occur in the supply chain can undergo changes such as the number of
facilities, location and capacity allocation. Companies should consider, supplies, transportation and
facility costs as the company's supply chain network design. The increasing cost of supplies and facilities,
the greater the number of facilities used in the supply chain. The lower the transportation cost, the
greater the number of facilities. If the number of facilities increased at a point where the journey
economis of scale is lost, then the transportation cost increases. The total number of logistics is the
entire inventory, transportation and facility costs.
The Internet Protocol version 4 (IPv4) is a protocol for use on packet-switched Link Layer networks (e.g.
Ethernet). IPv4 provides an addressing capability of approximately 4.3 billion addresses.
The Internet Protocol version 6 (IPv6) is more advanced and has better features compared to IPv4. It
has the capability to provide an infinite number of addresses. It is replacing IPv4 to accommodate the
growing number of networks worldwide and help solve the IP address exhaustion problem.
One of the differences between IPv4 and IPv6 is the appearance of the IP addresses. IPv4 uses four 1
byte decimal numbers, separated by a dot (i.e. 192.168.1.1), while IPv6 uses hexadecimal numbers that
are separated by colons (i.e. fe80::d4a8:6435:d2d8:d9f3b11).
The main difference between IPv4 and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit
address, whereas IPv6 is a 128-bit hexadecimal address. IPv6 provides a large address space, and it
contains a simple header as compared to IPv4.
A subnet mask is a four-octet number used to identify the network ID portion of a 32-bit IP address. A
default subnet mask is based on the IP address classes we discussed earlier and is used on networks that
are not subdivided.
subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s. In
this way, the subnet mask separates the IP address into the network and host addresses.
The “255” address is always assigned to a broadcast address, and the “0” address is always assigned to a
network address. Neither can be assigned to hosts, as they are reserved for these special purposes.
The IP address, subnet mask and gateway or router comprise an underlying structure—the Internet
Protocol—that most networks use to facilitate inter-device communication.
When organizations need additional subnetworking, subnetting divides the host element of the IP
address further into a subnet. The goal of subnet masks are simply to enable the subnetting process. The
phrase “mask” is applied because the subnet mask essentially uses its own 32-bit number to mask the IP
address.
Network Classes
The first step in planning for IP addressing on your network is to determine which network class is
appropriate for your network. After you have done this, you can take the crucial second step: obtain the
network number from the InterNIC addressing authority.
Currently there are three classes of TCP/IP networks. Each class uses the 32-bit IP address space
differently, providing more or fewer bits for the network part of the address. These classes are class A,
class B, and class C.
Class A Network Numbers
A class A network number uses the first eight bits of the IP address as its "network part." The remaining
24 bits comprise the host part of the IP address,
The values assigned to the first byte of class A network numbers fall within the range 0-127. Consider
the IP address 75.4.10.4. The value 75 in the first byte indicates that the host is on a class A network.
The remaining bytes, 4.10.4, establish the host address. The InterNIC assigns only the first byte of a class
A number. Use of the remaining three bytes is left to the discretion of the owner of the network
number. Only 127 class A networks can exist. Each one of these numbers can accommodate up to
16,777,214 hosts.
A class B network number uses 16 bits for the network number and 16 bits for host numbers. The first
byte of a class B network number is in the range 128-191. In the number 129.144.50.56, the first two
bytes, 129.144, are assigned by the InterNIC, and comprise the network address. The last two bytes,
50.56, make up the host address, and are assigned at the discretion of the owner of the network
number.
Class C network numbers use 24 bits for the network number and 8 bits for host numbers. Class C
network numbers are appropriate for networks with few hosts--the maximum being 254. A class C
network number occupies the first three bytes of an IP address. Only the fourth byte is assigned at the
discretion of the network owners.
Class in Subnet
Subnet classes are made unique by the number of bits their IP addresses have dedicated to a network
and the number of bits dedicated to hosts. They each have a default subnet mask. Classes can be
identified by the number in the first octet of their address.
The gateway is implemented at the e!dge of a network and manages all data that is directed internally
or externally from that network. When one network wants to communicate with another, the data
packet is passed to the gateway and then routed to the destination through the most efficient path.
It is a point of a network that can access other networks. Usually, in the intranet, a router or node can
act as a gateway node or the router that links the networks are called gateways. In large scale
enterprises, the computers manage the traffic between enterprise networks are termed as gateway
nodes. Such as that the computers used by Internet service providers to link varied users to each other
at an instant time to the internet are gateway nodes. In any development team of any commercial
enterprise computer server functions as gateway nodes and it may also be a proxy server or a firewall at
times.
It can be linked-to router since a router accurately knows about the routing path of data packets that
appears at gateway then a switch decides in the suitable in and out the path of the gateway for the
designated packet. The gateway is a mandatory attribute of routes even though the other devices can
act well as a gateway. But the operating system used here with internet sharing behaves like gateway
and establishes the connection with internal networks.
Static routing uses preconfigured routes to send traffic to its destination, while dynamic routing uses
algorithms to determine the best path. How else do the two methods differ?
Static routing and dynamic routing are two methods used to determine how to send a packet toward its
destination.
Static routes are configured in advance of any network communication. Dynamic routing, on the other
hand, requires routers to exchange information with other routers to learn about paths through the
network. Static and dynamic routing are used where appropriate, and some networks use both.
Below is an overview of some of the main differences between static routing and dynamic routing.
"Static routing uses a single preconfigured route to send traffic to its destination, while dynamic routing
provides multiple available routes to the destination.
1. Path selection
Static routing uses a single preconfigured route to send traffic to its destination, while dynamic routing
provides multiple available routes to the destination.
Network administrators must manually reconfigure static routes in order to adjust routes. Dynamic
routing uses algorithms to automatically update with the preferred route change.
3. Routing tables
Static routing has a smaller routing table with only one entry for each destination, while dynamic routing
requires routers to send out their entire routing tables to identify route availability.
Static routing doesn't use protocols or complex routing algorithms. Dynamic routing uses distance vector
protocols, such as RIP and IGRP, and link state protocols, such as OSPF and IS-IS, to adjust routes.
Static routing requires less compute power and bandwidth, as it only has one preconfigured route.
Dynamic routing requires more computation and bandwidth to generate multiple route possibilities.
6. Security
Static routing is more secure because it doesn't share routes across the entire network. Dynamic routing
creates more security risks because it shares complete routing tables across the network.
7. Use cases
Static routing is best used in smaller networks with fewer routers and is ideal for networks with
unchanging network architecture. Dynamic routing is well suited for larger, more complex networks that
have multiple routers, and its flexibility makes it ideal for network architectures that frequently change.