Saturday, December 28, 2019

The Physics Of Satellites Orbiting Earth - 2079 Words

Satellites orbiting earth will experience external perturbations that can affect the orbit. The primary force acting on the satellite depends on the altitude of the orbit. The most significant effect is caused by atmospheric drag which affects satellites in low earth orbit. Outside of low earth orbit, satellites still experience external forces that could change the orbit however unlike atmospheric drag, the orbit altitude will not necessarily decrease. In addition to atmospheric drag, satellites are subject to thermal drag and gravity perturbations. Atmospheric Drag: (Author: Emma) Atmospheric drag effects all spacecraft orbiting earth below 2,000 km, producing both short periodic and slow perturbations. It is the is the largest source of error in modeling the force on many satellites because it is difficult to predict [2]. Atmospheric drag is caused by the collisions of gas molecules with the spacecraft. Over time, the collisions start to decay the orbit. Demonstrating a positive feedback effect, where drag decreases the orbital altitude where the density is greater which produces more drag which then decays quicker. Factors that influence drag are the atmospheric drag surrounding the spacecraft, as well as the spacecrafts drag coefficient, area, mass and velocity [1]. The atmospheric density is not constant and changes with solar activity. The solar magnetic activity cycle is the periodic change in the sun s activity that lasts around 11 years. During solar maximum,Show MoreRelatedShould Space Be Commercialized?1393 Words   |  6 Pagesspace travel routine. Introduction I. Attention getting device: To get your guys’ attention I have some really recent news concerning the future of space. The European Space Agency just landed a research probe on a comet 300 million miles away from earth! II. Relevance of topic to audience: Whether you realize it or not the negative effects of commercializing space effect your health and your everyday lives. III. Establish credibility: After my last speech I learned a lot about space travel. It wasRead MoreTaking a Look at Orbital Mechanics661 Words   |  3 Pagesgravitational constant (GM) and also Kepler and his three laws of planetary motion. Though my interest did not sprout from who was involved with orbital mechanics, but the orbital mechanics themselves. I’ve always had an interest in astronomy and physics, and this seems like the perfect combinations of both. There are six general aspects of orbital mechanic elements eccentricity (e), semi-major axis (a), inclination (i), argument of periapsis (ω), time of periapsis passage (T), and longitude ofRead More Galileo: The Father of Science Essay examples1798 Words   |  8 PagesGalileo was a teacher, astronomer, philosopher, and physicist and was known to be a major part of the scientific revolution. With all of his elaborate drawings and notes he has been referred to as the father of modern astronomy, father of modern physics, and as father of science. Galileos experimentation was an active process involved the investigating of causal relationships among variables. His studies in scientific experimentation would quickly become and forever remain a cornerstone of unlockingRead MoreA Vicious Cycle1094 Words   |  5 Pagesdeployment of space weapons is currently beyond present technology. Although earth-to-space based laser systems, specifically Anti-Satellite weapons (ASATs), have in fact been shown to damage satellites orbiting in space, the same cannot be said for space-to-earth weapons systems. Aside from the scientific hurdles that must be crossed in zero-gravity conditions, which affect the everyday physics inherent in our current earth-based weapons, it is very difficult to launch one of these systems reliablyRead MoreA Thesis Statement On Neil Armstrong s Moon1091 Words   |  5 Pagestransportation. Space exploration has also resulted in remarkable innovations that has played a key role in aeronautics research, preventative medicine, and allows scientists to study asteroids, along with other space debris and their impacts on Earth. II. Body Paragraph 1 – Topic Sentence 1 With the threat of Congress cutting NASA s budget, the United State s sixty year preeminence in space exploration is in serious peril.. A. Supporting Evidence In the 2013 article â€Å"Budget Gains For PhysicalRead MoreBiography Of Nicolaus Copernicus s Discovery Of Heliocentrism Transformed Astronomy1940 Words   |  8 PagesLatin America and Europe, people started to question the Catholic Church and began doubting if the Church was abusing their power. After the Scientific Revolution, philosophical thinkers and scientists discovered new theories, such as gravitational physics laws and other opinions written in books. Nicolaus Copernicus’s discovery of heliocentrism transformed astronomy, his writings changed the people’s perspective of the universe further challenging the Catholic Church’s beliefs. Before Copernicus,Read MoreThe Expansion Of Space Architecture1610 Words   |  7 Pagesarchitecture in space could help humanity to maintain Earth as well as to explore other planets broadening our knowledge of the Universe. Recent Space Projects Visiting other planets is splendid, no doubt. But the stated argument for colonizing them as insurance policy in case of global disaster seems senseless. Yes, humanity definitely has to survive, but it goes to our Mother Earth too! Scientists often talk about ‘terraforming’ or ‘Earth-shaping’ different planets, deliberately modifying itsRead MoreQuantum Theory Of Time Essay1418 Words   |  6 PagesA recent experiment published in Science this June focused not on the size of objects, but on the ability of quantum effects to span large distances. In the study, scientists pulsed a laser through a crystal aboard a Chinese satellite orbiting about 300 miles above the earth. The process generated pairs of ‘entangled’ photons, which were subsequently separated and sent to two cities in China about 750 miles apart. When researchers measured the photons, they were still mysteriously connected. MultipleRead MoreThe Need to Renewable Sources of Energy16 44 Words   |  7 Pageslighting and water heating, satellite, power security systems, electric fencing etc. 1.2 JUSTIFICATION AND SIGNIFICANCE OF THE RESEARCH Because there is no solar cell characterization laboratory experiment for undergraduate students, there is need to develop one. 1.3 PROBLEM STATEMENT Kenya is catching up in the renewable energy sector but institutions of higher learning are lagging behind. Only a few have embraced solar education. For example, The Department of Physics at The University of NairobiRead MoreAnne: Armageddon Reaction Paper1265 Words   |  6 Pagesexplosions! Shouting, running, screaming, fighting! Fire, tremors, crashes and collisions!   In the movie Armageddon, who are the evil ones? They are thousands of rocks led by an asteroid the size of Texas that threatens to extinguish life on Earth? And who are the good ones? They are a motley makeshift group of old-drillers who will risk their lives in a daring rocket journey to save the world. A few NASA astronauts and one Russian cosmonaut are also thrown in to help steer the two shuttle spacecrafts

Friday, December 20, 2019

Wikileaks A Perfect Record Forever - 1271 Words

analyses.† They get their sources from anonymous people and groups all over the world, which led to the publication of over 10 million documents and associated analyses. It is stated that, â€Å"Although no organization can hope to have a perfect record forever, thus far WikiLeaks has a perfect in document authentication and resistance to all censorship attempts.† Moreover, WikiLeaks won numerous of awards for many years now, which proves that they are really credible sources and they deliver the truth that everyone deserves to know. â€Å"We publish without fear or favor, bringing transparency to powerful factions and secretive institutions, not taking any sides except that of the truth. We believe in the democratization of information and the power that knowledge gives to people to further peace, accountability and self-determination.† A recent news is about the thousands of deleted emails of Hillary Clinton when she was the Secretary of State and went against t he law by using her own private server. These email leaks may have affected the last presidential election since citizens discovered something that they do not like. It is indicated that, â€Å"WikiLeaks has contractual relationships and secure communications paths to more than 100 major media organizations from around the world. This gives WikiLeaks sources negotiating power, impact and technical protections that would otherwise be difficult or impossible to achieve.† Almost everyone in this world pretty sure knows by heart theShow MoreRelatedWar Is A Driving Factor2157 Words   |  9 Pagesfurther, larger and larger contraptions were built. Catapults, trebuchets, and other mechanical monstrosities were created in order to overwhelm one’s opponent even more. Then came the 1600’s, the birth of the firearm; the invention which changed war forever. Suddenly attacks could become impersonal, done from a distance. Then came the world wars, where much of today’s technology was created: rockets, poison gas, machine guns, planes, and most prominently, atomic weapons. With one attack, an entire city

Thursday, December 12, 2019

Reliabilty and Validity

Question1: What were the research findings?What statistics were included in this section?Did the authors report any reliability data for their measures? What were they? Did you note construct validity in this experiment? If so, what type?Describe the possible research findings and measures that would be used to assess the experimental outcomes.Define the proposed statistical methods as either descriptive or inferential with a specific example that supports your choice. Answer1: For analyzing the hypothesis on the effects of stress on the memory of a person it is important to understand the two perspective of hypothesis conducted for completing the research study. It is important to notice that is there any difference on the basis of procedure of conducting the test or on basis of time (Blonna, 2014). For commenting on the reliability and validity of the results of a hypothesis, it is important to understand the difference between the observations from the participants in the interview session. A self assessment test was conducted with about 20 participants and it was found that the response of the participants was different in two different sessions (CAO, LIU, TIAN GUO, 2012). In the first session the participants were full of stress and the memory of the participants did not work that much as compared to the session after the break. It was found from the experiment that the memory of the participants responded more effectively when there is less stress, i .e. after the break. As the participants got time to rest, their mind went through a restoration period and the capacity of their mind to memories the words increased. Hence, it was found from the hypothesis that a human minds works better when the stress level is low (Carmines Zeller, n.d.). For conducting the research different types of participants are used, those who faces stress in their daily job. Through the research different types of variables are used that are analyzed to get the outcomes of the research (Franzen, Robbins Sawicki, 1989). These variables are of two types. One is dependent variables and the other is the independent variables. Dependable variables are different from that of independent variables because of their dependency with other variables. The variables that are directly related with stress and memory capacity are dependent variable whereas those variables which are correlated with the other variables are independent variables. Here in this hypothesis, the correlation between the dependent and the independent variables are utilized to get a huge difference in the observation of the hypothesis. These variables are compulsory for conducting a research study. The variables are collected by conducting the interview and self assessment program in which the T-test was done with the use of the variables (Kirk Miller, 1986). The variables collected can be represented in tabular format that will help the researcher in solving the research problems. Here the data that sates that the participant is able to answer how many questions and job of the participant are useful variable that helps to find the outcome of the research. Yes the author has provided reliability of data because the author has supported the data with a personal interview and self assessment session that proves the reliability of the data collected for analysis in the research study (Aven Heide, 2009). The measurement of number of words remembered by each participants, result for each session, etc. are the examples of reliability of data that is been used in the research study. The hypothesis also shows signs of construct validity because it is conducted on the basis of the personal interview and self assessment of the participants. No external source of data is been used in the hypothesis. The results from the interview can be used as variables which would help in statistical analysis. Through statistical analysis the finding and measures can be utilized to get the final outcome of the research study (Koc Erdemoglu, 2010). The variables can be used to find the standard deviation to know the difference in the observation of the variables and correlation and regression to know the inter dependency of the variables. From this measures and findings the outcome of the research is obtained that shows the statistical analysis of the data. The statistical data for how many words the student remembers, stress level of the student, etc. helps the researcher to make the statistical analysis with numeric values and this further helps to find the actual outcome of the hypothesis (Sherif, 1987). Here in this hypothesis, descriptive statistical analysis is used to show the results of the findings and measures (Litwin, 1995). The analysis done explains the outcome of the report and provides enough information to know the final outcome of the hypothesis. Hence, the descriptive method is suitable in this hypothesis. This hypothesis generally depends on descriptive analysis therefore a descriptive statistical method is been used in this research study.This shows that the variables used in the hypothesis are reliable and valid because it is supported by a personal interview and self assessment of the participants (Acaroglu, Suhonen, Sendir Kaya, 2010). Question2: Did the research findings support the hypothesis?Was the research reliable? Why or why not?Did the study list any suggestions for improvement and replication? How? Write your answer with examples.A discussion of any potential ethical concerns related to the experiment design.A discussion of potential variables that could influence internal validity.Comments about how the outcomes of this experiment would be generalized to the general population. Answer2: After all the research work has been done it can be said that the research findings are certainly supported the hypothesis to a great extent. After thoroughly examined of the research studies one can easily find impact of stress on the memory of human beings. As it is told in the hypothesis human brain can be certainly affected by daily life stress to a huge extent (Schubert, 2009). The memory power can be decreased if the level of stress exerted on brain is increased. For example the persons who have been working regular for about 14 to 18 hours and have lack of sleep can lose the memory power to some of extent. The research work which has been done is certainly reliable. As shown in the research work, human brain can react to stress. It can cause shortage of memory to those who are very busy and have lead to live stressed life for their studies or work or for some other reasons. A lot of important statistics can be obtained from this research on this particular subject such as the pattern of the memory shortage of a particular group of people who lead same sort of life and goes through the same amount of pressure. Of course, the study indeed listed some suggestions for improvement (Liu Li, 2014). There are more scopes to ensure how human brain acts when it is gone through the stress of some variable levels. This particular study shows that more experiments should be done to determine the stress level of a human brain. It can be elaborated through the following examples.This type of experiments should be done more and more on different type of people to understand the different reaction of human brains in different circumstances. That should enlarge the information about the behavior of human brain and the whole society should be benefited from this (Patchen, 1965). To avoid any potential ethical concerns the experiments should be monitored very carefully and one has to make sure that results are well verified before it is published publically. For the society it is very important to ensure this type of measures should be taken.One has to keep an eye on the potential variables such as the peop le who are taking part in the studies as they possibly could affect the outcome of the experiment. The more the variable are the more different types of result have to be emerged (Saipanish, Lotrakul Sumrithe, 2009). Therefore the experiment should be done on the people in proper way and the observation part becomes more and more important. People is tend to get carried away in these types of experiments and thus the outcome could be different. That part should be taken under huge consideration too. After all the hard works have been done the outcomes of the particular experiment from different types of variables become more and more important. Therefore the analysis of the outcome is too much essential for the experiment (WU, 2008). Through the outcome people should able to understand how the human brain can act in certain stressful situation. People can also learn to deal with their stress if they can control their brain to some extent through practice. The people who are undecided in stress can find a way out through these types of experiments outcome to a great extent. So far it can be said that human brain can adopt itself when it comes to memory in stressful situations too if it can be trained in a proper way. References Acaroglu, R., Suhonen, R., Sendir, M., Kaya, H. (2010). Reliability and validity of Turkish version of the Individualised Care Scale.Journal Of Clinical Nursing,20(1-2), 136-145. doi:10.1111/j.1365-2702.2010.03468.x Aven, T., Heide, B. (2009). Reliability and validity of risk analysis.Reliability Engineering System Safety,94(11), 1862-1868. doi:10.1016/j.ress.2009.06.003 Blonna, D. (2014). Validity and reliability of the SPORTS score for shoulder instability.Jts. doi:10.11138/jts/2014.2.2.059 CAO, X., LIU, X., TIAN, L., GUO, Y. (2012). The reliability and validity of the Chinese version of nurses self-concept questionnaire.Journal Of Nursing Management,21(4), 657-667. doi:10.1111/j.1365-2834.2012.01419.x Carmines, E., Zeller, R.Reliability and validity assessment. Franzen, M., Robbins, D., Sawicki, R. (1989).Reliability and validity in neuropsychological assessment. New York: Plenum Press. Kirk, J., Miller, M. (1986).Reliability and validity in qualitative research. Beverly Hills: Sage Publications. Koc, R., Erdemoglu, A. (2010). Validity and Reliability of the Turkish Self-Administered Leeds Assessment of Neuropathic Symptoms and Signs (S-LANSS) Questionnaire.Pain Medicine,11(7), 1107-1114. doi:10.1111/j.1526-4637.2010.00837.x Litwin, M. (1995).How to Measure Survey Reliability and Validity. Thousand Oaks: SAGE Publications. Liu, P., Li, Z. (2014). Corrigendum to Comparison of task complexity measures for emergency operating procedures: Convergent validity and predictive validity [Reliab. Eng. Syst. Saf. 121 (2014) 289293].Reliability Engineering System Safety,127, 97. doi:10.1016/j.ress.2014.03.002 Patchen, M. (1965).Some questionnaire measures of employee motivation and morale. [Ann Arbor]: Survey Research Center, Institute for Social Research, University of Michigan. Saipanish, R., Lotrakul, M., Sumrithe, S. (2009). Reliability and validity of the Thai version of the WHO-Five Well-Being Index in primary care patients.Psychiatry And Clinical Neurosciences,63(2), 141-146. doi:10.1111/j.1440-1819.2009.01933.x Schubert, A. (2009). Validity and Reliability of Faculty Evaluations.Anesthesia Analgesia,108(6), 1992. doi:10.1213/ane.0b013e31819f9775 Sherif, Y. (1987). The reliability and validity of correlating human health hazards and nicotine content in cigarettes.Microelectronics Reliability,27(5), 859-865. doi:10.1016/0026-2714(87)90334-9 WU, W. (2008). Assessment of reliability and validity of food frequency questionnaire.Acad J Sec Mil Med Univ,28(5), 571-573. doi:10.3724/sp.j.1008.2008.00571

Wednesday, December 4, 2019

ELECTRONSRUS Management

Questions: ELECTRONSRUS is a company that designs, manufactures and sells electronic network equipment based in Wrexham. Business is so good for this HI-TEC company that they have decided to take over the old hospital which is on the other side of Wrexham about 5 miles away from their existing building. The buildings require some modification to fit in with the new plans of the company and as part of this you have been asked to provide a design to install the network infrastructureTo ensure that they do not interfere with the support of their customers during the move they have decided to install a new IT system and Computer Network in the new building before they move in. For this reason, and for the immediate future, a link to the old office will be essential.The attached sheet shows a plan of the premises. A list of the proposed use of the buildings is provided below. Further information is available from your lecturer. 1. Brief but concise description of the available technological solution s2. Compare and contrast these options3. Make a judgement as to the preferred solution for ELECTRONSRUS, justifying your choice. Answers: Requirement Analysis Introduction ELECTRONSRUS are manufacturers of electronic network equipments. They design sale their products in Wrexham,United Kingdom since long years. Because of increased business, they have expanded to include new office buildings in their company. ELECTRONSRUS hire us, for the effective and vital communication between old and new offices and within the premises of each building.We are providing Virtual local area network (VLAN) for the whole ELECTRONSRUS Company. VLAN VLAN is a virtual LAN.Say , you have connected multiple PCs to a single switch providing a private subset of LAN where computers are interacting with each other.A single switch will behave like multiple switches .Each VLAN has its own boradcast domain and IP subnet.[1] The VLAN is used to create multiple broadcast domains in a switch. For example a single CISCO catalyst switch 2970 series of 48 ports can be divided in two VLANs . VLAN 1 is craeted using 1 to 24 and VLAN 2 is created using 25to 48 .One of the special feature of VLAN technology is less hardware usage like two VLANs are created on a single switch .VLANs help in minimising traffic.To connect VLANs in network that have multiple interconnected switches, we use VLAN trunking. Cisco catalyst 2970 supports two different trunking protocols: Inter Switch Link (ISL) and IEEE 802.1q.VLAN provides physical topology independence by grouping users regardless of their physical location. For instance,a two storey building with 20 users on each floor is connected via CISCO catalyst 2970 switch with 48 ports. VLAN is bounded in logical subnet so to reach other subnet layer 3 routers are needed. All devices in same VLAN share same IP subnet and PCs connected in different VLANs are in different subnets . It helps in reducing latency by using Layer 2 devices and therefore, minimizing usage of layer 3 routers.VLAN technology is beneficial in existing practical networks.There can be port based VLAN , Mac address based VLAN and Layer -3 based VLAN.IEEE 802.1Q is a standard for VLAN and provides details of VLAN interoperions.IEEE 802.1 Q has provided standard method for implementation in Ethernet frames. Benefits Of Vlan Effective easy management of workstations Load Balancing Bandwidth Allocation Effective Securitymanagement and more security options Increased performance Simplified software configurations Reduced latency VLANs provide an easy and cheap costs infrastructure for networks. They allow easy management of large networks by enabling centralized configuration of devices. They give high performance over shared devices by reducing collisions and limiting broadcast traffic. It simplifies configuration by grouping of department resources into a single subnet. IP addresses and subnet masks configured on PCs will be in same subnet for same VLAN. Figure 1:Network diagram for VLAN configuration Customer Requirements Installation of IT system and computer network in new building. All admin,design, manufacturing plant and store should be connectedto reliable network. A network link must be provided to connect old and new offices of ELECTRONSUS. Site Map And Details Figure 2 :New site for ELECTRONSRUS Site Description: Administration office: The administration office is a threestorey building and is going to be used for various departments. Top Floor = Management and directors sittings. Total member at floor = 60 members Middle Floor = Human resource purchasing department personnels Total member at floor = 60 members Ground Floor = IT Staff Total member at floor = 60 members Design office: This is a 2storey building and is going to be usedin various departments. Top Floor = Engineering design staff Total member at floor = 150members Ground Floor = Sales Marketing Total member at floor = 75 members Stores office: The Stores is where all the components for the manufacturing are kept along with the completed equipment ready for dispatching. It is a fourstorey building with approximately five members of staff on each floor. Top Floor = Store Staff Total member at floor = 5 members Second Floor = Store Staff Total member at floor = 5 members First Floor = Store Staff Total member at floor = 5 members Ground Floor = Store Staff Total member at floor = 5 members Manufacturing Plant: This is where the equipment is manufactured. It is a single storey building where about 120 production operatives will work. They are many different areas in this building since there are lots of different tasks that need to be performed. It includes a Machine shop where there are heavy electrical cutting machines and Arc welders. There is also a test bay where all the equipment is thoroughly tested before being shipped. The offices are for the Area managers. External Access It must be possible to have the following External access:- General Internet access Access to Suppliers Network Access to Suppliers to restricted part of ELECTRONSRUS Intranet Access for Sales Marketing staff to the ELECTRONSRUS Intranet when they are remote from the site Network Topology The most mainstream designs, or topologies, incorporate the token ring, bus, point to point, star topologies. Basic Topologies BUS With a bus design, every node/hub is joined consecutively along the system backbone. A node/hub is any equipment associated with the system, for example, a printer, scanner or PC. Backbone is the term used to portray the primary links to which the system fragments are joined. At the point when one node/hub sends data to another node/hub through the system, the data goes along the backbone until it achieves the wanted accepting node/hub. Token Ring With a ring arrangement, every node/hub is joined successively along the system backbone. Be that as it may, not at all like the bus arrangement, the end of the network associate with the first node/hub, resulting in a circuit. Node/hubs on a token ring alternate sending and getting data. In the token ring topology, a token goes along the backbone with the data being sent. The node/hub with the token sends data to the following node/hub along the backbone. The getting node/hub peruses the data tended to it and afterward passes the token and any extra data to the following node/hub. This proceeds until the token and information make it back to the first node/hub in the system. Star With a star design, every node/hub is joined with a focal center point by means of system sections. At the point when one node/hub sends data to another node/hub, the data goes through the hub. The hub does not channel or course the data in any capacity; it just serves as a connector between system sections. Point-To-Point Point-to-point topology is the least complex of all the system topologies. The system comprises of an immediate connection between two PCs. This is quicker and more solid than different sorts of associations since there is an immediate association. The impediment is that it must be utilized for little zones where PCs are in close vicinity. VLAN Segmentation A VLAN is a switched network that is segmented logically by departments of an organization or applications. A VLAN creates broadcast domain defined set of switches. VLAN consists of end systems, switches, and routers. VLANs are created to provide the segmentation services.It address scalability, security and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization traffic flow management. [4] VLANs technology divides broadcast domains in different VLANs. So that packets are switched between ports designated to the VLAN range. Communication Between VLANS CiscoIOS software (switches and router OS) provides full-feature routing at Layer 3 and translation at Layer 2 between VLAN.Five protocol are mainly used: [4] IEEE 802.10 Protocol IEEE 802.1Q protocol Inter Switch LinkProtocol ATM LANE Protocol ATM LANE Fast Simple Server Replication Protocol Electronsrus Detailed Networktopology Admin office, manufacturing, store and design office routers are connected. Admin office is connected via the internet cloud, and its fixed line will be leased theline by the service provider. To connect old building/office ip sec tunnel is used. Design building router is used for back up lease line by service provider. Multiple switches are used in topology with 48, 24 0r 8 ports. There will be free ports in every vlan , so that in the future there can be enhancements. Ip Addresses And Subnet Mask For Each VLAN New Buildings premises Floor Members IP address Subnet IP address range Name of the Vlan First 60 192.168.0.0/26 192.168.0.0- 192.168.0.62 Vlan_admin_First Second 60 192.168.1.0/26 192.168.1.0- 192.168.1.62 Vlan_admin_Second Third 60 192.168.2.0/26 192.168.2.0- 192.168.2.62 Vlan_admin_Third Design Building Engineering design Top 150 192.168.5.0/25 192.168.5.1-192.168.5.126 Vlan_design_Top Sales and Marketing Ground 75 192.168.5.128/25 192.168.5.129- 192.168.5.254 Vlan_design_Ground Stores building First 5 192.168.7.0/28 192.168.7.1-192.168.7.14 Vlan_Stores_First Second 5 192.168.8.0/28 192.168.8.1-192.168.8.14 Vlan_Stores_Second Third 5 192.168.9.0/28 192.168.9.1-192.168.9.14 Vlan_Stores_Third Manufacturing Plant Ground 120 192.168.10.0/25 192.168.10.1-192.168.10.126 Vlan_manf_Ground Hardwar Requirements Hardware Repeaters At the point when Ethernet was initially implemented, a great many people utilized a copper coaxial link. Notwithstanding, the most extreme length of this link was 500 meters, which was not sufficiently long for a few systems. To address this issue, system designers utilized repeaters to join a few Ethernet portions. Bridges Bridges give a Transparent ways to joining LANs. A bridge is a gadget that join physically isolated LAN fragments, (for example, diverse Ethernet links) into one legitimate LAN section. There are four classifications of bridges: source routing, Transparent, translating, and encapsulating. Transparent extensions are utilized for Ethernet, though source routing bridges are utilized for token ring systems. Encapsulating extensions unite two fragments of the same media, (for example, token ring to token ring) more than a medium. The accepting extension takes out the envelope, checks the destination, and sends the casing to the destination gadget. Routers LAN fragments joined by a switch are physically and intelligently separate systems. Rather than a bridge, when different system sections are joined by a switch they keep up their different legitimate identities (system location space), yet constitute an internetwork. Switches determine the destination and course for every bundle, and they can be utilized to direct bundles and interconnect a mixed bag of system architectures. A noteworthy contrast between an extension and a switch is that the bridge recognizes bundles by source and destination address, though a switch can likewise recognize parcels by convention sort. Switches accommodate the interfaces to WANs. Switches Ethernet communicates over the system utilizing the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) process. A convention utilizing CSMA/CD screens, or listens to, the media for system movement, or data going through the system starting with one hub then onto the next. In the event that a hub does not sense any activity, it will send casings or bundles of data onto the media. A system edge is similar to a sent letter. The letter is put in an envelope that has an arrival location and the location of its destination. Information are similar to the letter and the casing is similar to the envelope. The information is put in the edge and the casing has the tending to data and lapse checking code Hardware Requirements In Design There are many vendors of network devices like Allied Telesis, Arista , Avaya , Brocade , Cisco , Dell , D-Link ,Draytek , Enterasys Secure Networks , Extreme Networks ,Fortinet, HP, Juniper Networks ,Net gear , Transition Networks and Zyxel. But, CISCO is one of the leaders in networking solutions and provides a wide variety of switches from SMB to enterprise and ISP provider networks.Cisco peripherals are alittle bit costly, but they are known in themarket for their customer support. We are opting for Cisco peripherals. Designing Guidelines: Ideally thenetwork should be designed hierarchically in 3 layers (Access, Aggregation, and Core) but looking at the requirements I am proposing following guidelines: Each building will have its layer twoswitches where they do would be isolated using VLANS. Vlanbe restricted Broadcast domain. We will call It as Access Layer Private IPv4 Subnets would be assigned based on number of members per floor. We can go for IPv6 addressing, but that would make the migration cumbersome as of now. We can plan for Migration to IPV6 if required once everyone is migrated to anew network Aggregate traffic of these switches will be uplink to Core/Aggregate router that in our case would be one. Each building would be connected to each other using Core router We can have redundancy by having multiple Core routers as well Layer 2 Switch, but this would depend on customer investment and criticality both of which is still unclear. Leased line would be purchased from Service provider and will be connected to any building core router that would act as a gateway. We can have back up leased line as well from other service provider, but that would again depend on customer BCP. Core router would be required to do NATTING in case of IPV4 address to access the internet as private range is not routable on internet Design For Electronsrus Network VLANs are available on the CISCO Catalyst 6000 running CatOS 5.4 or later, on the Catalyst 4000, 2980G, 2980G-A, 2948G, and 4912G running CatOS 6.2 or later. We are opting for CISCO Catalyst 2970 series. CISCO catalyst is layer 2 Series Switch used for Access connectivity in VLANs. I am selecting Cisco hardware as Cisco is known for its customer support as well as they keep bringing latest features on their products as and when required. These series switches have features like QOS, STP, etc. which can be required in the network as anetwork grows. There are vendors Like Alcatel Lucent, Summit, Juniper that offer similar hardware required for the network, but I am going in with Cisco Hardware. Configuration The following two configurations comprise the Cisco Catalyst 2970 Series: Cisco Catalyst 2970G-24TS-24 Ethernet 10/100/1000 ports and four small form-factor pluggable (SFP) ports Cisco Catalyst2970G-24T-24Ethernet 10/100/1000 ports Cisco catalyst 2970m series comes with Cisco Enhanced Image (EI) IOSSoftware .CISCO catalyst suports IGMP leave timer ,IGMP snooping querier,DSCP transparency , VLAN-based QoS1and hierarchical policy maps on SVIs , Device Manager ,SSL Version 3.0,IEEE 802.1x, Flex Links , SFP module diagnostic management ,Smart ports Macros. [3] Hardware used Cisco catalyst 2970 series switches around 15 or more Router 2900 series around 3 in quantity. Connectors and cables 10BASE-T ports: RJ-45 connectors , 100BASE-TX ports: RJ-45 connectors 1000BASE-T ports: RJ-45 connectors, 1000BASE-T SFP-based ports: RJ-45 connectors[3] 100BASE-TX ports: RJ-45 connectors 2-pair Category 3, 4, or 5 unshielded twisted-pair (UTP) cabling 2-pair Category 5 UTP cabling 1000BASE-SX, -LX/LH, -ZX, and CWDM SFP-based ports: LC fiber connectors (single-mode or multimode fiber)[3] Management console port: RJ-45-to-DB9 cable for PC connections[3] Power connector RPS 675 Internal power supply connector Environmental conditions Operating temperature:32 to 113F (0 to 45C)[3] Storage temperature: -13 to 158F (-25 to 70C)[3] Operating relative humidity: 10 to 85 percent (noncondensing)[3] Operating altitude: Up to 10,000 ft (3049 m)[3] Storage altitude: Up to 15,000 ft (4573 m) [3] Contempora 4(C4) Series Rack cabinet system Linux windows servers For VOIP Connectivity , require IP phones For Security , surveillance cameras(CCTV) Biometrics , card punching system Centralized Air conditioning Software Requirements Lan Software/ Operating System As the name suggest LAN operating system is required to operate on the LAN system, manage the tremendous work load with a number of various types of server attached to it. It has basically two aspects (i) Server Software (ii) Work station Software. As case of other multi user operating system, LAN operating system also facilitate the sharing of expensive resources such as printer, storage space etc. among all LAN users, provides security of data permits connections to other network. There are various types of LAN operating systems for example Novel Netware, LAN server, omni met, PC Net, IBM PC LAN, Etherlik plus etc. Catalyst 2970 G-24T uses Cisco IOS Release 12.2(18)SE Catalyst 2970 G-24TS uses Cisco IOS Release 12.2(18)SE Supported windows 98,NT 4.0 , 2000 XP 7 Supported Microsoft internet explorer 5.5,6.0,7.0. Supported Microsoft Netscape Navigator 7.1 2970 Supports IGMP leave timer ,IGMP snooping querier,DSCP transparency , VLAN-based QoS1and hierarchical policy maps on SVIs , Device Manager ,SSL Version 3.0,IEEE 802.1x, Flex Links , SFP module diagnostic management ,Smartports Macros. Cisco IOS software release 15.0. All the above requirements, can be altered after any discussion with IT Team of ELECTRONSRUS. Internet Connection Internet Connection Internet connection or broadband can be taken from any SERVICE PROVIDER like reliance,airtel, Vodafone etc. I suggest following connections: BroadBand Connections: It is a high speed internet connection. User can dial phone and remain connected on internet at the same time.With broadband , users can watch live news and sports. Fixed Broadband Connections: There is wireless or fixed modem in this connection. Fixed Wireless and satellite connections: In some countries, in remote areas fixed wireless connection or a satellite connections are provided. Remote Access Remote Procedure Call (RPC) is an authoritative method for building applications like client/server based, distributed etc. The Remote Procedure Calls (RPC) method is a model of high-level interactions for various applications in the network. RPC is a dominant method for building applications based on client/server or distributed networks. It is base on enlarging the idea of predictable or local calling procedure, in such a way that the procedure called not required to exist near the similar address space just like the procedure of calling. The two procedures can be on the same system, or rather can have dissimilar systems and are connected using a network. By means of RPC, agenda on platform of networking can interact with resources like remote and local. RPC permits the use of particular kinds of calling procedures that are designed to conceal the underlying mechanisms on which network is working in a network application. The complication concerned in the expansion of distributed doling out is decreased by maintaining the remote call semantics whether the same or different the server and client are using the same system. This feature of transport autonomy of RPC cuts off the elements of physical and logical layer application from the layer of data communications method and gives the flexibility to the application for a diversity of transports applications. Remote procedure call (RPC), exactly, permits you to call up a course of action on both a local and a remote machine evidently. A call of client is interpreted into a remote machine call Client Remote File SystemWrite (hello); Server File SystemWrite (Hello); RPC is executed on above layer of two-way messaging by means of a procedure stubs available on the client as well as server. The procedure stubs just offers the interface of invocation for programmers. The real applications of those actions are described remotely. Basically the client stub has following tasks at hand: Marshalling or Building messages Sending messages Response wait Unpack reply Return result The server stub has following tasks at hand: Do N threading in order to wait for the requests Loop: For some time just look for command Upon receiving command perform decoding and unpacking of request parameters, this is also called as unmarshalling Now next step is procedure call Using results obtained build message for replay Now finally send reply Implementation Issues The stubs are repeatedly produced. A client has no clue about which port is for communication because this is runtime. Consequently, the client requests to have an already known port for moreover a server or a process name server that decides which server to get in touch with. Features RPC acts as a local host but Mask remote function calls The RPC is a Client-server based model message passing is the basic way for Request to reply paradigm in remote procedure call Functions uses methods like message passing and using function parameters it returns value Properties of RPC The Remote procedure call do function call based on the pattern of Language-level The Remote procedure call is quite simple for any programmer to understand There is a Synchronous method for request and reply communication between host and client It has no specific choice for any programming language and hence language neutral Before forwarding a reply to any request, it do matches the corresponding port for that requests There is automatic matching for replies and requests It posses Distribution transparency which put out of sight the complication of a distributed system and gives quality assurance Failure Modes of RPC Sometimes there can be failure in the system due to semantics of Invocation hold up by RPC due to some congestion in network or server, congestion in client network or last due to server failure Disadvantages of RPC One disadvantage is the way of interaction that is it uses Synchronous interaction for the request and replies hence more chance of connection loss etc. Client and server are closely coupled and have direct effect on each other. In some scenarios the client might block the process for a quite long time in case loading of server directs to client with multi-threaded programming Some clients are slow or failed to reply due to network problem or other which delays the reply to the server There must be multi-threading at the server interface because generally it has more than 1 client Distribution Transparency is not probable to mask all troubles RPC model is not object-oriented and hence duplication cannot be avoided The above factor leads to invocation of servers functions rather than using objects to call methods, which just store references and hence avoid all loading at invocation. Remote Access In Network Application Through IP sec tunnel old and new office buildings are connected. IP SEC TUNNEL MODE IPSec tunnel mode is thedefault mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer).[5] Tunnel modeis most commonly used between gateways (Cisco routers or ASA firewalls), or at an end-station to a gateway, the gateway acting as a proxy for the hosts behind it.[5] Security And Network Management Security Information and computer security is a task of software team. We concern here for physical security. Physical security faces different threats of environment, political, natural as compared to computer and information security. The threats are classified as: Natural Calamity threats: Catastrophe, Floods, earthquakes, storms and tornadoes, fires, extreme temperature conditions and so forth. System threats:Power supply issues, voltage issues, temperature issues so forth. Man interference threats: Unauthorized access, hijack attack, spoof attack so on. Politically motivated threats:Strikes and riots in the city, civil disobedienceand so forth. security and network management measures Develop security team. Develop proper plan. Do risk analysis management. Entries in critical data center rooms should be limited Proper pathways around building to guide to main entrance Back door entries should be limited to suppliers and equipment deliveries. Pathways should have proper lighting to guide people in night. Do natural surveillance sometimes Deploy electronic motion sensors There should be continuous video surveillance Biometric access and exit sensors for critical areas like data center UPS backup generators ,gas based fire suppression system Server monitoring Redundant HVAC controlled environments Proper fencing IP support for devices such as switches and routers Effective Fencing near building Proper web access management Proper password management on devices Back up of data every day. References : Difference between VLAN and LAN.[online]. Available:https://www.differencebetween.net/technology/internet/difference-between-vlan-and-lan/.[Accessed: July 19, 2011]. Vlan configuration examples[online]. Available:https://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switches/H3C_S3100_Series_Switches/Configuration/Typical_Configuration_Example/Low-end_E_S_Configuration_Examples(V1.04)/200809/616200_1285_0.htm. Cisco catalyst 2970 series switches[online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-2970-series-switches/product_data_sheet09186a0080197384.html. Routing between VLANs overview[online]. Available:https://www.cisco.com/en/US/docs/ios/lanswitch/configuration/guide/lsw_rtng_vlan_ovw_ps6350_TSD_Products_Configuration_Guide_Chapter.html Understanding VPN IPSEC TUNNEL mode and IPSEC TRANSPORT MODE[online]. Available: https://www.firewall.cx/networking-topics/protocols/870-ipsec-modes.html

Thursday, November 28, 2019

Ch 6 Notes Essay Example

Ch 6 Notes Essay Chapter 6 – Network Servers 6. 1. 1 Client/Server Relationships| | 1. | What is a server? | A host running a software application that provides info or services to other hosts connected to the network. | | 2. | What factor is crucial to enabling complex interactions? | They all use agreed standards and protocols | | 3. | What is a client? | Name given used a device that is running web client software | | 4. | What is the key characteristic of client/server systems? | Client sends a request to a server and the server responds by carrying out a function. | | 5. What is the most commonly used instance of a client/server system? | Combination of a web browser and web server | 6. 1. 1. 4 Activity| 6. 1. 2 Role of Protocols in Client/Server Communication| | 6. | What does HTTP define? | Hypertext transfer protocol It uses a method to transfer or convey info on the world wide web | | 7. | What is the transport protocol that manages the individual conversations between web servers and web clients? | TCP transmission control protocol | | 8. | What else does TCP provide? | It provides flow control and acknowledgement of packets exchanged bw host | | 9. What is the most common internetwork protocol? | Internet protocol IP | | 10. | What is IP responsible for? | Taking the formatted segments from TCP, assigning the the local addressing, and encapsulating them into packets 4 routing to destination host | | 11. | What governs how the bits are represented on the media, how the signals are sent over the media, and how they are interpreted by the receiving hosts? | We will write a custom essay sample on Ch 6 Notes specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Ch 6 Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Ch 6 Notes specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The standards and protocols | 6. 1. 3 TCP and UDP Transport Protocols| | 12. | What are the two most common transport protocols? | TCP(transmission control protocol) and UDP(user datagram protocol)| | 13. What protocol is used when an application requires acknowledgment that a message is delivered? | TCP | | 14. | What type of system is UDP? | Best effort delivery | 6. 1. 3. 4 Activity| 6. 1. 4 TCP/IP Port Numbers| | 15. | What is a port? | Numeric identifier within each segment that is used to keep track of specific conversations and destination services requested | | 16. | What is the port number for HTTP services? | Port 80 | | 17. | What is the port number for FTP services? | Port 21 | | 18. | How is the source port identified? | By a conversation bw 2 devices| | 19. | What is a socket? Combination of the source and destination ip address | | 20. | What is the purpose of the socket? | used to identify the server and service being request by the client| 6. 2. 1 Domain Name Service (DNS)| | 21. | What does a DNS server do? | Provides a way for hosts to use this name to request the IP address of a specific server| | 22. | What is the port number for DNS services? | 53 | 6. 2. 1. 3 Lab Activity| 6. 2. 2 Web Client and Servers| | 23. | What is the most commonly used markup language? | Hypertext Make up Language (HTML)| | 24. | Is HTTP a secure protocol? | No | | 25. | Where are requests for secure HTTP sent? Sent to port 443| 6. 2. 2. 2 Packet Tracer Activity| 6. 2. 3 FTP Clients and Servers| | 26. | What does FTP do? | Provides an easy method to transfer files 4rm one compute to another. | | 27. | What port numbers are associated with FTP? | Port 21 and port 20 | 6. 2. 3. 2 GUI FTP Client| 6. 2. 3. 3 Lab Activity| 6. 2. 4 Email Clients and Servers| | 28. | What is one of the most popular client/server applications on the Internet? | Email | | 29. | What are some of the protocols used in processing email? | | | 30. | What is SMTP used for? | Used by an email client to send messa ges to its local email server. | 31. | What port number is associated with SMTP requests? | Port 25 | | 32. | What does SMTP stand for? | Simple mail transfer protocol | | 33. | What does the acronym POP stand for? | Post office protocol | | 34. | What port number is associated with POP3? | Port 110 | | 35. | What is POP3 used for? | The client connects to the email server; the messages are downloaded to the client. | | 36. | What is SMTP used for? | Used by an email client to send messaged to its local email server| | 37. | What port number is associated with IMAP? | Port 143| | 38. | What is the difference between POP3 and IMAP4? | | 6. . 4. 4 Lab Activity| 6. 2. 5 IM Clients and Servers| | 39. | What is one of the most popular communication tools today? | IM (instant messaging) | | 40. | Can you transfer video, music, and speech files using IM? | Yes | 6. 2. 6 Voice Clients and Servers| | 41. | What is IP telephony? | Client that uses peer-to-peer technology similar to that used by IM. | | 42. | How do you get started using Internet telephone? | Download the client software 4rm one of the companies that provide the service. | 6. 2. 7 Port Numbers| | 43. | How many ports are available? | 1-1023| | 44. | What are the three categories of ports? Well-known, registered, and private ports. | | 45. | Who assigns and manages ports? | | | 46. | What are well-known ports? | Destination ports that are associated with common network applications| | 47. | What is the range of port numbers for well-known ports? | | | 48. | What port is assigned for Telnet? | | 6. 2. 7. 2 Activity| 6. 3. 1 Protocol Interaction| | 49. | What does successful communication between hosts require? | Interaction bw a numbers of protocols. | | 50. | What is a protocol stack? | Interaction bw protocols | | 51. | What are the benefits of a layered model? | 1. Assist protocol design 2. Fosters competition 3. Prevents technology or capability changes in one layer 4rm affecting other layers above and below 4. Provides a common language to describe networking functions and capabilities | | 52. | What are the layers of the TCP/IP model? | | | 53. | Which layer of the TCP/IP model is responsible for end-to-end delivery services? | | | 54. | Where is error checking information found? | | 6. 3. 2. 3 Activity| 6. 3. 3 Open Systems Interconnect Model| | 55. | Who developed the OSI model? | International organization for standardization (ISO) | | 56. When was the OSI model developed? | 1984 | | 57. | How many layers are there in the OSI model? | 7| | 58. | What are the layers of the OSI model? | Application, presentation, session, transport, network, data link, physical. | | 59. | What is an acronym for helping to remember the OSI layer? | All People Seem To Need Data Processing| | 60. | Which layer encrypts and decrypts data and compresses and deco mpresses data? | Presentation| | 61. | Which layer detects and corrects frame transmit errors? | Data link| 6. 3. 3. 3 Activity | 6. 3. 3. 4 Activity | 6. 3. 3. 5 Packet Tracer Activity| 6. 5. 1. 1 Chapter Quiz|

Sunday, November 24, 2019

Persuasive Essay on Gun Control

Persuasive Essay on Gun Control Persuasive Essay on Gun Control English teachers encourage students to look for controversial issues in society on which to base a persuasive essay. The reason is that the teacher wants a topic that can be easily debated on either side of the issue and that brings forth strong emotions from both sides. The purpose is to help students organize and express ideas in a clear and coherent manner. One such controversial issue is gun control. One side of the argument is that the policies for owning and using guns should be stricter. One who holds such a position might argue as follows: It is very unfortunate that people are losing their loved ones due to the misuse of guns. While guns should be used to enhance security of people in a society, the same guns have been using in perpetuating crimes that have worsened the security status of many countries. In order to eradicate the issue of insecurity, guns should be used only when necessary. In this case there is a need to put in place policies that will ensure that gun use is properly controlled. In addition to this example are suggestions below on how to write a persuasive essay on gun control. Suggestions on How to Write a Persuasive Essay on Gun Control: First, determine what your position is on gun control. Next, plan the major arguments in support of your position. Be sure to offer explanations, facts and statistics, as well as examples. You can even include anecdotal material. Do not forget the â€Å"so what† factor. In other words, make certain to get the reader to see why it is important to that individual’s personal life. Secondly, when preparing a persuasive essay on gun control, the writer should explain the reason why guns are in the hands of the people. Constitutional rights can be discussed as to the original intent and modern interpretation of those rights. In addition, the writer can point out reasons why people should respect the sanctity of life and the right of every human being to be alive, regardless of ones stance on regulations involving gun control. Next, the writer can help the reader to explore whether everyone should have a right to own and operate a gun. For example, should criminals be permitted to own and use a fire arm? What about individuals with mental health issues? While every person is entitled to security, not all people should be issued guns. This is the reason why governments put into place stringent measures for applying for and purchasing weapons. Additionally, the writer can remind the reader that cooperation between civilians and the police is important in following the due process for acquiring guns. Regulations and the need for regulations can be explored in this context. Preparing a persuasive essay on gun control is not as easy as one may think. Emotions run high. On one hand is the need to protect oneself and even ones country. Furthermore, some individuals use weapons for sport, such as range shooting or hunting. However, there are safety issues where someone acts out anger or frustration by pulling a gun and shooting the other person. In addition to that are issues with criminals. Some say that guns should be better monitored to keep them out of the hands of those who would harm society, while others argue that those who break the law will obtain guns anyway. However, regardless of what side of the issue you choose to support, you will need to make your position clear and your arguments strong. Moreover, you will need to convey your ideas in a clear and compelling manner. Feel free to succeed in persuasive essay writing with !

Thursday, November 21, 2019

The Geology of Dagger Mountain at big bend national park Term Paper

The Geology of Dagger Mountain at big bend national park - Term Paper Example Several cretaceous sedimentary rocks are present and they include buda, boquillas, santa Elena, and del rio. The site also consists of two faults which include the basin and range high angel fault and Laramide thrust fault which create a graben. The Dagger Mountain has an elevation of 4173 feet and 1300 feet of relief. The anticline of the mountain is trending at north- northwest within the Sierra del Carmen. There are a number of reverse faults and folds. They are located on the eastern side of cordilleran orogen. On the eastern Trans-pecos province, there are mafic sills found near the Dagger Mountain. The mafic sills are made up of magmas that crystallized after cordilleran contraction and at the beginning of range and basin extension (Cloud et al 121). The anticline of Dagger Mountain is one of the laramide orogen (Cullen et al 105). This is a period of mountain building which started seventy to eighty million years ago in the late cretaceous. It then ended thirty to fifty five million years ago. Laramide orogen was triggered by subduction of tectonic plate and took place in sequence of pulses. The intrusions of Sierra del Carmen towards the Trans-Pecos province, occurred during the mafic and alkali rich felsic lava flows, and the pyroclastic flows (Cullen et al 106). The lava flow formed a northwest trending belt which intruded the north part of Mexico. This belt holds the Dagger Mountain. At the end of laramade orogeny, most of the magmas were produced by the mantle upwelling. The production of magmas was triggered by the foundering subduction of farallon plates. The field trip made to the big bend national park was based on the study and observation of dagger mountain’s cretaceous sedimentary rocks as well as igneous intrusions. The following were some of the discovery made in the field: There are a number of cretaceous sedimentary rocks discovered within and around