Saturday, January 25, 2020

Local Area Network Protocol Standards Information Technology Essay

Local Area Network Protocol Standards Information Technology Essay Local area network referred to a network that works inside a building such as office, company and home office. LAN are used in small geographical area. LAN is capable in transferring data in a very fast speed that can up to 10Mbps in limited network distance. There are two types of network architecture that can be implemented in the local area network, peer-to-peer networking and client-server networking. The common types of connections that used in LAN are Ethernet and Token Ring. LAN Standards and Protocols Each network has its own rules and standards. Therefore, protocols are use in network technology to govern the communication between network and network. There are many different kinds of protocols, the most common protocol used in the OSI data link layer in LAN are Ethernet and Token Ring. Ethernet Ethernet is the most well-known type of local area network that most widely installed in offices, home offices and companies. The standard of an Ethernet is IEEE 802.3. Ethernet normally are used coaxial cable and sometimes different grades of twisted-pair cable as the transmission medium. Token Ring Token Ring is a network that connects computers in a star or ring topology. It is originally developed by IBM Company. There will have a token ring that passed through the network to allow computers to access the network. The standard for Token Ring network is IEEE 802.5. A token bit will move around the ring from computer to another computer. If the computer wants to transmit a data, the data will attach to the token and pass to the next computer. It has to keep passing through computers in the network until it comes to the destination. If the computer doesnt want to transmit any data, the token ring will just pass to the next computer. Ethernet Token Ring Advantages Cost Effective Flexible to use in star and bus topologies Simplicity of installation Scalable, support upgrade Allow packets to take turns to transmit, avoid collision. Disadvantages System will down during the heavy traffic in the network. Needs proper network planning before installed. Difficult to install. Not cost effective. Justification After comparing both Ethernet and Token Ring, I had chosen Ethernet as the LAN protocol for the network. The very main reason of using Ethernet is because of its availability and popularity in todays network system. Secondly, it is simple to install and its scalability support upgrades in future. This is very important for the company as the company is still developing and probably will be adding more workers in the future. Thirdly, the speed of Ethernet is fast and can support transfer speed from 1Mbps up to 100Mbps. Wide Area Network (WAN) Wide area network referred to a network that connecting multiples of LAN network together in a wide range. The distance range of a WAN can be between country and country. A very good example of WAN is the Internet. WAN are connected using a router. A router can help to choose the most suitable path for a connection to reach to the destination. WAN are categorised into two main ways which is circuit switching and packet switching. Circuit Switching Circuit Switching is a connection will be establish between 2 network nodes before they can start transmitting data. The bandwidth is only dedicated for the particular connection. The connection will be terminated after the data transmission ends. Examples for circuit switching are the telephone networks. Packet Switching In packet switching, data is broken up into packets before transmitted to the destination. There is a destination address and sequencing information in every packet. When reaching at destination node, the packets need to be reassembled. Justification Leased lines will be used in the proposed network. Leased lines normally are used in private networks. Advantages of using a leased line is because it is dedicated for private use only, people from other network will not have the chance to access the leased line. The disadvantage of using leased lines is it is very expensive compare to other WAN standards. Therefore, the transferring speed when connect each office in WAN is very fast and reliable. Leased lines connection is available 24 hours every day. Therefore, it is very suitable to Internet Connection In order of to connect the users to the Internet in the network, we need to have an internet connection to access the Internet. In here, I choose Symmetric Digital Subscriber Line (SDSL) for the company. SDSL provides the equal bandwidth for downstream and upstream for the connection. This is very suitable for business companies because they have big usage on uploading information to the Internet and also download information from the Internet. Here, we used T1 line which is 1.54Mbps with the SDSL for the internet connection of the company. SDSL will require a modem in order to connect to the Internet. The modem will be provided by the local service provider. Networks Architecture Peer to peer networking Peer to peer networking is defined as a type of network in which each workstation has equivalent capabilities and responsibilities (About.com, 2010). Small Scale Peer to peer networking is a network architecture which designed for small scale business that can support 10-15 numbers of users. Therefore, if the company is having a plan to upgrade the network in the future, peer to peer networking definitely is not suitable for the company. Resource Sharing Secondly, peer to peer networking doesnt have the ability of sharing files, printers, projectors and etc. Therefore, if the company uses peer to peer networking, they probably have issues on resources sharing. Data Redundancy Thirdly, as in terms of peer, means there is no centralized server for the network, each computer works as individual. As a result, it is difficult for user to retrieve data and synchronize data as the data are stored separately at different computers. Advantages Disadvantages No dedicated administrator. No security on the network No dedicated server required.   No centralization on network Each workstation has individual resources.   Limited numbers of user. Cost effective Too many passwords to remember Client-server networking Client-server describes a type of computer application architecture within network computing that designates tasks between clients that instigate requests and servers that process requests. (E-How.com, 2010) Centralization In client-server networking, information are stored in a centralized server and allows ten computers or above to access them and share information throughout the network. Centralization also makes the finding of resources easier as all the resources are stored in a centralized server. Scalability Scalability is also one of the important fact in client-server network. Using this architecture, the network is able to scale to a certain numbers of users and also can expand in the future if needed. Security Thirdly, security is no more an issue in client-server networking because only qualified user with valid login username and password can access to the system. Advantages Disadvantages Scalability can support upgrade. Not cost effective due to the high price of server. Higher efficiency and optimization. Dependability on server. If any point of the server fails, the system will be facing failure. Centralised network, resources, users are control through the server. Need to maintain by high skill technician, hence higher maintenance fees. Flexibility, new technology can be integrated into the network easily. Will be suffering from congestion during heavy traffic. Justification After comparing both peer-to-peer networking and client-server networking, the architecture that would best suits the company is client-server networking. Considering the company is still growing and probably having expansion of networking in the future, the number of staffs in the company in the range of 35-40 users, the scalability, flexibility, centralization and security characteristic of client-server network are the best choice. Topology Star Topology The star topology is the most common network topology that most home and office are using. Computer and other devices in star topology are connected to the center and attached on a small device called the central hub. The central hub plays the role of a switch to control the flow from the source machine to the destination machine. The central can either be a hub, router or switch. Mesh Topology Every computer and device in this topology will have a dedicated link to each device. They are connected using point-to-point. If a network has n device, then the network will have n (n-1)/2 link connected to each device. Bus Topology Bus topology is a network that connects all computers in a single backbone. The backbone functions as a sharing platform where all devices in the network can use the backbone to transfer data. Ring Topology In ring topology, computers and devices are connected with the device on the both side of it and forms a ring shape. A signal will be passed along the ring shape in only one direction from one to another till it reaches its destination. The device in the ring topology incorporates with a repeater to regenerate the signal and passed them through the network. Topology Cable Media Advantages Disadvantages Star Twisted Pair Fiber Optic Easy to install because of its simplicity. Easy to install, replace or remove computers or other devices during expansion When one node fails, it wont affect the other nodes. Fully dependent on the central hub, when the hub fails the whole network will fail. Need a lot of cabling to connect many computers. Mesh Twisted Pair Coaxial Has dedicated link to each computer Easy to identify the fault node. Lack of centralization. Data redundancy at each computer. Bus Twisted Pair Coaxial Fiber Optic Less cabling Low cost Easy to extend System will slow down during heavy network traffic If the back bone failed, it will affect the whole system Ring Twisted Pair Easy in installing or reconfiguring If one node fails, the whole network will be affected Difficult to add new nodes to the network. Difficulty in troubleshooting. Justification In this assignment, we were asked to determine a suitable topology that the ICT Resources Malaysia Public Limited Company will be need within the office. Therefore, after doing a lot of researches in network topologies, we finally decided to choose star bus hybrid topology as the companys topology. Hybrid topology Hybrid topologies basically is a topology which combines two type or more than two types of basic topology and inherits their advantages and make it more powerful and usable compare to using only one type of topology. Advantages Disadvantages Hybrid topology are customize designed to meet the requirement of the network. Nodes in the network can be expanded and removed easily. Combines the simplicity and fault tolerance from bus and star topologies. Can find out the failed node when a node is not working and carried out diagnostic test without affect the other part of the network. Some specific device in hybrid topology might not suitable to use in other network topology and they become not reusable. Transmission Medium Transmission media allows a connection between sender and receiver. Transmission medium are categorized into two main categories which is guided media and unguided media. Twisted pair cable Twisted pair cable is a type of wire that twists together in pairs. The reason why the cable is being twisted together is to decrease the electromagnetic interference and noise that affect the data transmission along the cable. Twisted pair cable has two different categories, Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP). Coaxial Cable Coaxial cable is a type of cable that contains a copper conductor in the center. It also has a metal foil layer and braid which both is covered by an outer conductor. The metal foil layer helps to block interference that will affect the cable. The coaxial cable carries a higher frequency signal compares to twisted pair cables. Coaxial cables are categorized by the radio government rating which called the RG numbers. Fiber Optic Cable Fiber optic cables have glass conductors in its center. Fiber optic cables use light to transmit data instead of using electricity signal. It uses reflection to guide light travels along the channel. Fiber optic has two propagation mode, single mode and multi-mode. Multi-mode has two forms which are step index and graded index. Twisted Pair Coaxial Fibre Optic Frequency 100Hz-5MHz 100Khz-500MHz Bandwidth 4mbps 100mbps 10Mbps- 600Mbps Up to 2Gbps Advantages Reduce noise and cross talks Cost effective Readily available Flexible Lighter weight compare to other media. Easy to install Higher bandwidth Less vulnerable to interference than twisted pair Resistance to noise Less signal attenuation Higher Bandwidth Disadvantages Vulnerable to signal distortion. Low bandwidth. Expensive to purchase Bulky compared to twisted pair. Very expensive. Difficulty in installation or maintenance Need skillful technician for maintenance. Fragility- Glass fiber inside the cable are easily broken Justification UTP and Fibre Optic Cable are chosen for this network. The fibre optic cable will use as the back bone for the Ethernet and the UTP will be used as connecting the machines and devices in the network. The reason fiber optic cables are used as the back bone in Ethernet because it has a very high bandwidth. In bus topology, the bandwidth of the backbone will decrease during heavy traffic; therefore if using fiber optic cables, the bandwidth will increase and wont decrease easily. Fiber optic cable is highly security and not affect by electromagnetic interference. For the UTP, its weight is lighter compare to STP because it doesnt have the outer shield. Secondly, it is cost effective than using coaxial cable. Besides that, UTP has high availability in the market. When the cables are broken, replacement cable can be purchased from the market easily. Servers File Server File server is a central storage of a network. It provides access control for user to access files, folder in a same network. User can share files and information without physically transfer using USB drive or portable hard disk. FTP Server File transfer protocol server is one of the oldest of the Internet service. It provides security and transfer control in transferring files. Web Server Provide web access and web storage to the users on the network. Application Server Application server acts as a middleware of the back-end application of the network and the front-end user. It allows users access the applications which stored in the database. Print Server Print server allows users in a network to share printers. User can use any printer in the network to print files instead of connecting every computer with a printer. This will reduce the cost to buy printers. Database Server Database server is a server that stores database for a company in a server. Database servers do job such as analyzing data, data storage, data manipulation and etc. Email Server Email server responsible in receiving emails from the network and send out the email to the receivers in another network. Email servers use SMTP (Simple Main Transfer Protocol) and POP3 (Post Office Protocol) when sending and receiving email. Protocols There are 5 protocols that I choose to apply in the network: HTTP Hypertext transfer protocol (HTTP) is a protocol that used in accessing data in the Internet. It transfers information such as image, hypertext, audio, video and etc. It used the service of TCP to transfer information. HTTP is used in the application layer of the OSI model. DHCP Dynamic host control protocol is a protocol that will auto assigning dynamic IP address to the machines on the network. When a computer connects to the network, it will send a request to the DHCP Server and ask for IP assigning. Then the server will send an offer to the machine then the machine will accept the IP. The machine is then connected to the network. IP Internet Protocol is the most common protocol that used in the Internet. It is used in the network layer in the OSI model. Its job is to send data from one computer to another. Data are broken into packet and every packet contains a header and its own information. TCP TCP is a protocol that allows two hosts to make a connection and transferring data. It also guarantees the transfer of data packets and make sure they arrived at destination in the same order like they were sent out. It is in the transport layer of the OSI model. ICMP Internet Control Message Protocol (ICMP) is a protocol that used to test the response of destination. LAN Diagram WAN Diagram Floor Plan Ground Floor The departments that located in the ground floor are the Human Resource Department and the Sales and Marketing Department. The human resource department has 4 workers whereas the sales and marketing department has 6 workers. There are two printers in this floor. First floor First Floor The CEO and secretary room is located at the 1st floor. The server room of the network also located at the 1st floor. There are two other departments in this floor which are Operation Department and Financial Department. Each of the departments has six workers. There are two printers in this floor. Second Floor At the second floor, there are customer service department and IT department. Customer service department has 3 workers and IT Department has 6 workers. Limitation Security Although the network has a firewall to prevent network attack from hackers, it is still not good enough to fully blocking hackers from attacking the network. Therefore, the security of the network s Performance Performance of this network will be affected by the switches in the star topology. If the switches failed, the department will be affected. The performance of the network also will be affected by the backbone of the bus. Gantt chart

Friday, January 17, 2020

Bobcats

The bobcat (Lynx rufus) is a North American mammal of the cat family Felidae, appearing during the Irvingtonian stage of around 1. 8 million years ago (AEO). [3] With 12 recognized subspecies, it ranges from southern Canada to northern Mexico, including most of the continental United States. The bobcat is an adaptable predator that inhabits wooded areas, as well as semidesert, urban edge, forest edges, and swampland environments. It persists in much of its original range, and populations are healthy. With a gray to brown coat, whiskered face, and black-tufted ears, the bobcat resembles the other species of the mid-sized Lynx genus.It is smaller on average than the Canada lynx, with which it shares parts of its range, but is about twice as large as the domestic cat. It has distinctive black bars on its forelegs and a black-tipped, stubby tail, from which it derives its name. Though the bobcat prefers rabbits and hares, it will hunt anything from insects, chickens, and small rodents to deer. Prey selection depends on location and habitat, season, and abundance. Like most cats, the bobcat is territorial and largely solitary, although with some overlap in home ranges.It uses several methods to mark its territorial boundaries, including claw marks and deposits of urine or feces. The bobcat breeds from winter into spring and has a gestation period of about two months. Although bobcats have been hunted extensively by humans, both for sport and fur, their population has proven resilient. The elusive predator features in Native American mythology and the folklore of European settlers. The bobcat resembles other species of the Lynx genus, but is on average the smallest of the four. Its coat is variable, though generally tan to grayish-brown, with black streaks on the body and dark bars on the forelegs and tail.Its spotted patterning acts as camouflage. The ears are black-tipped and pointed, with short, black tufts. There is generally an off-white color on the lips, chin, and underparts. Bobcats in the desert regions of the southwest have the lightest-colored coats, while those in the northern, forested regions are darkest. Kittens are born well-furred and already have their spots. [10] A few melanistic bobcats have been sighted and captured in Florida. They appear black, but may still exhibit a spot pattern. [11] The face appears wide due to ruffs of extended hair beneath the ears.Bobcat eyes are yellow with black pupils. The nose of the bobcat is pinkish-red, and it has a base color of gray or yellowish- or brownish-red on its face, sides, and back. [12] The pupils are round, black circles and will widen during nocturnal activity to maximize light reception. [13] The cat has sharp hearing and vision, and a good sense of smell. It is an excellent climber, and will swim when it needs to, but will normally avoid water. [14] The adult bobcat is 47. 5 to 125 cm (18. 7 to 49 in) long from the head to the base of the tail, averaging 82. 7 cm (32. 6 in); the stubby tail adds 9 to 20 cm (3. to 7. 9 in) [12] and its â€Å"bobbed† appearance gives the species its name. [15][16][17][18] An adult stands about 30 to 60 cm (12 to 24 in) at the shoulders. [10][19] Adult males can range in weight from 6. 4 to 18. 3 kg (14 to 40 lb), with an average of 9. 6 kg (21 lb); females at 4 to 15. 3 kg (8. 8 to 34 lb), with an average of 6. 8 kg (15 lb). [20][21] The largest bobcat accurately measured on record weighed 22. 2 kg (49 lb), although unverified reports have them reaching 27 kg (60 lb). [22] Furthermore, a June 20, 2012 report of a New Hampshire roadkill specimen listed the animal's weight at 27 kg (60 lb). 23]The largest-bodied bobcats are from eastern Canada and northern New England of the subspecies (L. r. gigas), while the smallest are from the southeastern subspecies (L. r. floridanus), particularly those in the southern Appalachians. [24] The bobcat is muscular, and its hind legs are longer than its front legs, giving it a bobb ing gait. At birth, it weighs 0. 6 to 0. 75 lb (270 to 340 g) and is about 10 in (25 cm) in length. By its first birthday, it will reach about 10 lb (4. 5 kg). [14] The cat is larger in its northern range and in open habitats. 25] A morphological size comparison study in the eastern United States found a divergence in the location of the largest male and female specimens, suggesting differing selection constraints for the sexes. The bobcat is crepuscular. It keeps on the move from three hours before sunset until about midnight, and then again from before dawn until three hours after sunrise. Each night it will move from 2 to 7 mi (3. 2 to 11 km) along its habitual route. [14] This behavior may vary seasonally, as bobcats become more diurnal during fall and winter in response to the activity of their prey, which are more active during the day in colder months.

Thursday, January 9, 2020

Homeless Essay - 924 Words

â€Å"The weather seems to be getting a bit chillier around here lately† Charlie Houser proclaims. â€Å" Living homeless is not so bad as long as you understand that you are homeless and make it your every day life.† implies Charlie. Charlie is a man that goes around thinking of things to do from day to day. On Vine Street in Coryville, a thin, short, black man stands between two buildings fighting off another Cincinnati winter. He is unshaven with a scraggly beard. His skin is rugged looking and tough. His outfit consists of a tannish-brown jacket, which clashes with his turquoise pants that are short in length. Charlie wears a pair of black, puppy dog chewed up shoes. It is winter and he is shuffling back and fourth to keep warm. His steps are†¦show more content†¦He has been doing this for quite sometime now, so he doesn’t think badly of himself. Charlie address strangers coming up with tales such as, â€Å" I just ran out of gas and my kids are stranded in the car, I was wondering if I could have some money for gas.† Often times, people just look the other way and keep on walking, and other times people give him a smirk, and tell him to go find a job. His squinted eyes began to open wider revealing them from his eyelids when he takes a bite of the arby’s sandwich, probably his first decent meal in a long time. He replies, â€Å" I used to have meals such as this years ago.† â€Å" I used to have a job†, he explained that he had been discriminated against because of his color. Charlie worked as a salesperson, but as he put it â€Å" I was a Life saver.† He was a door-to-door salesperson for life insurance. One day Charlie went to a ladies house asking if she would want to buy life insurance, and before he could even get another word in, the door was closed on his face, as if he was not even there. The lady called up to his company and said that the sales person was rude and that she didn’t want a black man selling her thing of her future. Charlie was fired the next day, even though he had been working there for 11 years. Charlie replied, â€Å"You saw the way they looked at me, everybody reacts the same way. They point, stare, and laugh at me. You do not know how that feels, and you never will.† Charlie is a man that lives lifeShow MoreRelatedHomeless People : The Homeless1265 Words   |  6 PagesHomeless in Baltimore City is a serious issue that must be resolve. There are different types of homeless people: Chronic, transitional and episodic homeless people. However, there are several or multiples reasons for which people become homeless. It could be due to lack of financial incentives or economic reason, immigrants people (students or foreign), a choice of an individual or poverty, housing needs of the lack of low-income housing and other issues such as unemployment, underemployment, domesticRead MoreHomeless People And The Homeless Essay1970 Words   |  8 PagesHomelessness there were about 600,000 homeless people in America in January of 2015. This paper will hopefully spread insight on homelessness as a whole. There are many misconceptions about homeless people and many facts that people do not realize about homeless people. These facts should be brought to attention in order to help increase the knowledge of what normal everyday individuals can do to help. Every day we are surrounded by someone who is homeless and we don’t even know it. People tendRead MoreHomeless Shelters : Homeless Shelter Essay2067 Words   |  9 Pagesshelters that tend to the homeless. With the San Gabriel Valley services being so distant and clustered, it was difficult to assess the overall feel of the homeless services. That is, it was difficult to find any homeless shelters even with the use of a handheld GPS and map, signifying that access to the homeless services is not as simple as it sounds. On the other hand, it was not at all difficult to find other services that seemed, to be very helpful for the homeless in general. A screenshot ofRead MoreHomeless Child Education : Homeless Children1678 Words   |  7 PagesHomeless Children Education Several factors severely compromise the ability of homeless children to succeed in school, as I discovered in interviews with 277 homeless families in New York City in 1988. Barriers to the success of these children include health problems, hunger, transportation obstacles, and difficulty obtaining school clothes and suppliesà ¢Ã¢â€š ¬Ã¢â‚¬ all of which are linked to low attendance rates (Rafferty and Rollins 1989). Other factors are associated with the nature of the emergency shelterRead MoreHomeless People s View On The Homeless869 Words   |  4 Pages Here in America there is a high percentage of homeless people. People often label homeless people as lazy, not willing to work, or they believe they are just looking for hand out. But that is just other people s views on the homeless. My point of view is that maybe they had a rough start in life, or something happened to them or maybe they didn’t have a mother or father figure in their lives to tell them right from wrong. Other might of grown up in broken homes which might of caused them to beRead MoreThe Homelessness Of The Homeless1745 Words   |  7 Pagesdiscussed topics around the world is homelessness. Each and every day more and more people become homeless. People around the world have tried numerous times to resolve this dilemma. This situation is growing and it s starting to spiral out of control. One solution that is getting popular the more we let this situation grow is that criminalizing the homeless is ok. People cannot criminalize the homeless. Homeless people should not be criminalized because they have nowhere to go, they have it hard enoughRead MoreThe Stigma Of The Homeless1556 Words   |  7 PagesDuring the Great Depression, the homeless were almost glamorized as vagabonds who rode the rails with their belongings neatly tied up in a bandana over their shoulder. Today, the homeless can be anyone: children or women escaping an abusive relationship or those who just cannot afford to pay for housing. While some homeless people maintain employment of some sort, long term homelessness is usually a function of the inverse; either severely under-employed or no income stream at all with which toRead MoreHomeless Volunteer1842 Words   |  8 PagesHomeless Volunteer Tera Penrod Purpose: To share my experience of being homeless and how it has affected me. Audience: Readers interested in being enlightened about the homeless at a personal level. â€Å"Better is a poor man whose walk is blameless than a rich man whose ways are perverse.†- PROVERBS 28:6. I learned the truth in this verse while living with relatives in Colorado Springs, Colorado and the time I became homeless. What comes to mind when thinking about homeless people? I rememberRead MoreThe Media Of The Homeless2516 Words   |  11 Pagespeople have become socially and morally numb to the issue. As homelessness worsens, the homeless are being seen less and less as humans and more as a nuisance such as pests and wildlife, or even just a statistic. Being at the bottom of the social class structure is rough, to put it lightly. There is nothing glamorous about living at the streets; in fact, there are very few positive points, if any, to being homeless but that doesn t mean they are that much different from other classes. At the coreRead MoreHomeless And Non Homeless Lesbian, Gay, And Bisexual990 Words   |  4 Pagesexamined two groups, homeless and non-homeless Lesbian, Gay, and Bisexual (LGB) youths (Rosario, Schrimshaw, Hunter, 2012). There were a total of 156 participants between the ages of 14 and 21 years with a mean age of 18.3 years. Participants were recruited from community based organizations, which focused on youths and two college organizations of LGB students. Researchers wanted to explore potential risk factors associated with the reason some LGB youths become homeless, while others do not.

Wednesday, January 1, 2020

Life History of Siddiqure Rahman - 2216 Words

Prologue: When we think of golf in Bangladesh, the name of Siddiqur Rahman, a prominent golf star of Bangladesh, is pronounced first of all. Siddiqur Rahman had passed his boyhood days through severe hardship. He had a childhood life of struggle and spent his days in utmost misery. Golf in Bangladesh is a game totally for the privileged quarter but glory of Siddikur Rahman can only be termed as a fairy tale. Proving him as was not just a one-match wonder. He had to work extremely hard to climb out of the poverty of his birthplace, Dhamalcoat, a slum-like area in the capital city. He is making a name for himself and for his country on a global stage. It can indeed be termed as a fairytale that a boy from Madaripur, despite all the†¦show more content†¦There was determined competition and only three candidates out of more than 40 were chosen. Among the lucky three was Siddiqur Rahman. After being chosen a sparkling eyed Rahman says â€Å"The Lahore Gymkhana Golf Club invited us to repr esent Bangladesh on October 14, 1999 in Lahore, Pakistan and it was my first international tournament. Out of the three Bangladeshi amateurs to compete in that tournament, Rahman performed the best. He felt really good after that game. It gave him an idea how people played at the international level and he became very confident that he would improve in the future. But playing in tournaments, national or otherwise, requires not only financial solvency because of the expensive equipment involved in it but also time and dedication. All the costs that the team had to bear abroad were being taken care of by the Bangladesh Golf Federation and they continue to back these promising youngsters. Rahman has had a number of awards and his trophies include the Champion trophy of the 2001 Bangladesh Open Amateur Tournament sponsored by Partex, becoming the first Bangladeshi to confirm the title. He won in Bangladesh again at the Bangladesh Amateur Tournament in the beginning of 2005, after having been the runner-up the two previous years. In 2003, he became the runner-up at the SAARC Golf Tournament, after having confirmed two championship trophies in 2002 and 2003 in the Dutch-Bangla Pro-Am Championship. His other proceeds include the Nepal