Monday, September 30, 2019
Network Consultation Proposal Essay
DesignIT is a graphic arts company that is expanding business and has recently purchased a new building 56ââ¬â¢*36ââ¬â¢ space for the purpose of housing two full time designers and a receptionist. The new building has four cubicles, one office, one server room, one reception desk, and a conference room. DesignIT has already relocated one Web Server (Microsoft IIS Server), one File Server (Microsoft Server 2008), and one more Server 2008 (Small Business Server). As a network design consultant, I have been charged with the task of designing and configuring the network for DesignIT. The small company has informed me that the network should include six computers, three printers, a Firewall, a wireless network for portable devices, and a high speed internet connection. DesignIT has also requested me that all the interconnected devices and wiring, along with the speed should be able to offer the best performance. I will design a Local Area Network (LAN) for DesignIT, a Local Area Net work (LAN) is a network of computers, and other network devices such as printers which exchange data, and are located under one roof. LAN networks are mostly used in small organizations or small businesses. The computers in a LAN communicate through protocols and share data such as files and emails. Every computer in a network is assigned a unique Internet Protocol (IP). When a computer communicates by sending a request to the LAN network, it is routed to a particular server that has the requested data. The server then communicates back to the IP address of requesting computer with the information that was requested (Kenyon, 2002). There are three servers for DesignIT, the Web Server will be used to connect the company to the internet, and the File Server will be utilized for sharing while the Small Business Server will be utilized as a Mail Server. Since DesignIT needs a network that incorporates six computers, three printers, and a wireless network, the network design should therefore takeà several factors into consideration. These factors will impact on the network costs, speed, infrastructure, and functionali ty. When designing this Local Area Network (LAN) for DesignIT, there is also need to consider the network requirements. The network should integrate sound, video, synchronous, as well as asynchronous data. When designing the LAN network, the organizational goals of DesignIT should be factored in the LAN design. I will also pay attention to network throughput, line charges, security, and the integration of newer technologies in the future. When designing a LAN network, some issues must be considered, one of these issues is the organizationââ¬â¢s short, medium, and long term goals. Several factors to be considered include the network equipment, user applications, end-user equipment (workstations), and connectivity to the internet. The LAN network for DesignIT will include other network devices which include gateways, routers, firewall, and cables. Without these devices communication cannot be possible from a computer to another in the LAN network. A router and switch are the most important devices of a network. Networks which are well configured and have a good infrastructure are helpful in improving manageability, performance, reliability and reducing overall operating cost (Kenyon, 2002). To set up this LAN network for the DesignIT, the following are the hardware and software devices that I would utilize so as to design the LAN network for DesignIT. T1 Lines- This is a standard for data communication which was first developed in the 1960s. T1 lines offer a data rate of 1.544Mbps. I will utilize T1 link from Verizon to connect DesignIT to the internet. T1 lines are offer private voice and reliable data networking. A T1 line typically costs $1000 per month. Cisco Linksys Firewall- A firewall is a software or hardware network device that controls incoming and outgoing data communication through analyzing data packets and giving permissions whether to allow or not based on a set of rules. A firewall may also include a default gateway or a proxy server which helps to make network request on the behalf of a user. I will utilize Cisco-Linksys BEFSX41 EtherFast Cable/DSL Firewall Router (4-Port 10/100 Switch / VPN Endpoint) for this network. The device costs $150. LAN Switch- A LAN Switch performs the same work as a hub except that, a switch does not broadcast packets to every computer in the network like hubs. All the computers and computer devices will be connected to the switch by Ethernet cables. The LANà Switch costs $150. Linksys Wireless Router- A router is a network device that is used to connect two or more computer devices in a network. The Linksys Wireless router will be utilized to connect wireless devices the LAN network. The Linksys WRT54G Wireless Router that I will use in this case costs $150. Ethernet Cables- Ethernet Cables will be utilized to connect all the network devices in the DesignIT LAN network. They will connect routers, switches, computers, and printers in the LAN network. I will utilize CAT5 Ethernet Cables for this network. The Ethernet cables will cost about $100 for DesignIT LAN network. ESET NOD32 Antivirus- an Antivirus is software that is used to prevent, detect, and remove malicious computer programs. ESET NOD32 Antivirus is a good choice since it also acts against other types of malware such as worm, Trojan horses, backdoors, and spyware. The ESET NOD32 Antivirus 6 that I will utilize for this network costs $40 for subscription of one year. The building will share one internet connection (T-1 link from Verizon). This connection will come to Web Server in the server room. This will be the access point of the LAN network of DesignIT. The T-1 link from Verizon will connect the company to the internet and can also be utilized to connect the LAN network to another LAN or WAN network in case the company decides to expand business in future. The T-1 link utilizes frame relay which will provide the building with high speed data connection between and among all users. This connection will also enable all computers to receive dedicated connection at a speed that every computer requires. This connection will also be affordable for DesignIT since it is only charged for the resources. It costs an average of $1000 per month. Frame relay is an industry standard technology for accessing fast packet switched, ââ¬Å"cloud computingâ⬠data networks (Bates, 2000). Through T1 link DesignIT will use frame relay as an interface between data terminal equipment such as routers, switches, and host machines such as servers. This technology will provide connectivity via logical channels or permanent virtual circuit connections which will be deployed over dedicated access facilities and shared on a high performance switching platform. This shared data platform and backbone makes transport more efficient, such that all users will receive better network throughput which is also cost effective. T-1 link technology is an added advantage for DesignIT LAN network since it is flexible to use and an excellent platform for many application. Since multiple virtual connections are established over one physical access line, Frame Relay can reduce the number of customer premises router ports necessary for LAN applications. The number of private lines required to attain mesh connectivity and reliability can also be reduced. Frame Relay handles terminal to-host, LAN-to-LAN connections, or applications like imaging, e-mail and graphic file transfers with equal simplicity. With all of these capabilities, Frame Relay is an excellent choice for DesignIT. I will configure a Class C network for DesignIT with an IP of 192.168.0.0/16. There will only be one subnet for this network. I have selected a Class C network because it exhibits the ability to combat spamming of sites located on the same server. Search engines have removed linking power from one site to the other in case they are on the same class C IP. I will take network security measures so as to implement the best security for DesignIT. The security will be designed in regard to the user group in question, this means that the two designers will share different user groups with the receptionist if need be. I will implement access control measures such as access logs so as to manage what each user should have access to in regard to the organizational pol icies and procedures. I will also install ESET NOD32 Antivirus in the Small Business Server. The Cisco Linksys Firewall will also be a key device for enhancing security; it will control incoming and outgoing data communication through analyzing data packets and giving permissions based on security rules. The Bus Topology is the best suited for this network; the bus topology is the simplest network topology. Also known as linear bus, in this topology all computers will be connected to a contiguous cable or a cable joined together to make it contiguous. Ethernet is the common example of a bus topology. Each computer determines when the network is not busy and transmits data as needed. Computers devices in a bus apology listen only for transmission from other computers; they do not repeat or forward the transmission on the other computers. It is also worth noting that the signal in a bus topology travels to both ends of the cable. To keep the signal from bouncing back and forth along the cable, both ends of the cable in a bus topology will be terminated.
Sunday, September 29, 2019
Air Asia- Porter’s Five Forces
Porterââ¬â¢s five forces Michael E. Porter claimed that there are five competitive forces which can shape every industry by identify and analysis those five forces(appendix) and thus determine strengths and weaknesses of the industry. Those five forces are now used to determined Air Asiaââ¬â¢s strengths and weaknesses which are shown as below: Threat of Entry There is a high barrier entering airlines industry since it requires high capital to set up everything such as purchase or lease air craft, set up office, hire staffs, and etc. Thus, this has reduced the treat to Air Asia. Moreover, brand awareness is quite important in this industry. Thus, to enter this industry not only required high capital but also have to take some time to create brand awareness. Consumers always choose the product or service they really trust. Thus, instead of creating brand awareness, new entry has to create so called brand loyalty. Hence, this is reducing treat to Air Asia too. ( Roy L. Simerly) However, the government legislation is one of the barriers for entering airlines industry. For example, MAS has been protected by Malaysia government on the route to Sydney and Seoul Incheon. Therefore Air Asia find itself very difficult getting a new route from government. This not only affects the timeline set by Air Asia but also influence their profit. Power of suppliers Every industry has someone to play the role as suppliers. Power of the suppliers is important as it will affect the industry. In airline industry, the power of suppliers is quite high since there are only two major suppliers which are Airbus and Boeing hence there are not many choices to airline industry. Nevertheless, the global economic crisis has limited the new entrant and also reducing the upgrade of planes in the immediate future. However, both suppliers provide almost same standard aircrafts and hence the switching to Air Asia is low. Moreover, Air Asia placed a large amount of order from Airbus in order to expand its routes to international routes. As a result, the power of suppliers may be reduced as Airbusââ¬â¢s profit may be influenced by Air Asia. ( Roy L. Simerly) Power of buyers Buyers are one of the factors which will give influence the industry whether making profit or loss. Nowadays, those buyers are much more knowledgeable and high educated. Thus, they are very sensitive to the price no matter in what product or service. In this case, even Air Asia always provide lowest price to customers, but they still will make comparison between airlines. Secondly, to switch to other service is very simple because Air Asia is not the only one who provides airline service. I. e. customers still can choose MAS, Tiger Airway, Firefly and etc. ( Roy L. Simerly) Moreover, Air Asia always leaves customers an image as they always delay the flight. Hence, as an investor or business man, they will choose more reliable airlines instead of Air Asia. Threat of substitutes Substitutes are products or services which can replace the original products or services and give almost same satisfaction to the consumers. In airline industry, there are two types of substitutes, indirect and direct substitutes. Indirect substitutes include train, bus, cruise and etc. On the other hand, direct substitutes indicate the other airline. Consumers usually prefer low cost. For example, from Kuala Lumpur to Singapore, there are few transports that consumers can choose such as bus, train and air travel. If the customer is going to a budgeted trip, definitely he will choose bus which is the lowest price among the three. Moreover, the technology is now make information much more easily to assess. Customers can easily compare the price among few airlines just by assessing internet as internet make information more transparency. Nevertheless, the archipelago geographical structure in Malaysia make air travel is the most viable, efficient and convenient mode of transportation. For example, travel from Kuala Lumpur to Bangkok, the customer may choose to take bus or air flight. However, air plane are much more convenient and also lesser time consuming compare with taking bus to Bangkok. Rivalry among existing competitors In every industry, there is positive or negative trend to industry growth rate. If there is positive trend, then the firms have not to steal the market share among them. However, in airline industry, the growth rate is really low due to limited customers. Thus, in order to expand, Air Asia has to steal the market share from its competitors. ( Roy L. Simerly) Secondly, Air Asia leads the main battlefield in price among competitors due to its low operating costs. However, there are more competitors enter to airline industry who have major carriers as their backers or owners may lead to ââ¬Ëunreasonableââ¬â¢ price war in the future. Moreover, Air Asia is not the only one who provides airline service. There are few low cost carriers such as Firefly, Tiger Airway and etc which makes their services provided weak differentiation. Thus, it becomes a threat to Air Asia. Biblography Roy L. Simerly, Strategic Management Case Analysis,http://www. westga. edu/~bquest/2002/strategic1. htm, assess date: 10th may 2010 Investopedia, Industry Handbook: Porter's 5 Forces Analysis, http://www. investopedia. com/features/industryhandbook/porter. asp, assessed date: 8th may 2010
Saturday, September 28, 2019
Advantages And Disadvantages Of In Depth Interviews Psychology Essay
Advantages And Disadvantages Of In Depth Interviews Psychology Essay Health, social work, education and other social activities are considered as social sciences and fields of practice because they influence peoples lives every day (Merriam 2009). Due to humans curiosity and eager to learn, we choose to discover and learning more about ones practice rather than improving ones practice. Through qualitative research, it can leading us to ask more researchable question, not only find the solution, but also discover why it happen and how to overcome it Definition of Qualitative Research Qualitative research is specific relevance to the study of social relations, due to the fact of the diversification of life worlds. According to Hennink (2010), qualitative research is a broad umbrella term that covers a wide range of techniques and philosophies. It can examine peoples experiences in details, by using a specific set of research methods such as focus group discussions, in-depth interviews, visual methods, observations, content analysis and life histories o r biographies. One of the distinctive features of qualitative research is to identify the issue from the perspective of study participants. Through interpretation, understand the meanings that towards the behavior, events and objects. The skill of qualitative researcher must be expert so that they can extract the information and meaning form the given data, convert them into useful information such as report or presentation. Tools of Qualitative Research In-depth Interviews In-depth interviews are open-ended and guided discussion that involves conducting thorough individual interviews with a small number of respondents. The main objective is to discover their perspectives on a particular situation, idea and program (Boyce 2006). In-depth interviews are used to explore and understand about a persons thoughts, ideas and behaviours. Through interview, information and outcome data can be obtained, thus understanding what happen in a specific program and why it happened. When to use? In- depth interviews can be used when making complementary method strategy to a survey. Researchers had to develop techniques and strategies for working with groups of children and young people. In addition, in-depth interviews will be the best if someone are interested in individual information which regarding several topics of interest that can be attained only through an informal conversation alone with the child informant. When not to use? As long as the interview person is children, it is important to treat them as active participants, rather than mere respondents. It is essential to give them the opportunity to explain their responses in the interviewing process. Their emotion must be concern, so that they will not feel like been force giving the right answer. Advantages and disadvantages of In-depth Interviews The primary advantage of in-depth interviews is that much comprehensive information can be obtained through other data collection methods such as surveys. Survey can create a friendly environment for people to fill out their ideas and thought, thus the results and feedbacks can be obtained more easily and accurately. The secondary advantage of in-depth interviews is to allow interviewers to understand deeper with the participant, and gain more extra knowledge and insight than focus group. Thirdly, the faster process had become one advantage of in-depth interviews. In-depth interviews can enable the recruiting and scheduling process easier and faster.
Friday, September 27, 2019
California's sex offender registration Essay Example | Topics and Well Written Essays - 1250 words
California's sex offender registration - Essay Example d a copy of the notification form processed in this stage is also sent to the DOJ. The sex offender tracking program is an expedient tool utilized for keeping track of the sex offenders in California since 1947; the state is also regarded as being the first ever to enact a sex offender registration law. This was major step towards public disclosure of criminals, for many states did not recognize such laws until the 1990s. These registration requirements are lifetime, and with an ever-increasing and current population of 35million people, California is respectively the holder of the largest database of sex offenders in the USA (Lockyer, 2002, 3). This lifelong obligation can only be reversed if the offender a ââ¬ËCertificate of Rehabilitationââ¬â¢ ten years after s/he has been released from custody or it can also be relieved if ââ¬ËGovernmentââ¬â¢s pardonââ¬â¢ is attained. However, many serious offences are not even eligible to attain the aforementioned relieving docume nts (IPS, 2009, 1). There are certain conditions which must be met duly by the sex offenders, these are the requirements and the guidelines set by the DOJ. It is incumbent upon the registered offenders to update their whereabouts and necessary information per annum, within 5 working days of their birthday. This requirement is more stringent for some, the transients must update every month while the sexually violent predators are extended 90 days worth of time. Recently, they have also been imposed with the responsibility of submitting their vehicle license plate number along with a recent photograph. Since 2002, they have also been required to register themselves with the campus police department in case they plan to enroll in any courses, attend any specific programs or even as much as work. Furthermore, even for people who are sex offenders, if convicted by the military or federal court, of other states but they enter the jurisdiction of Californian state; they are required to reg ister within 5 working days of entering California. Those who fail to register and have been convicted of a felony would be convicted of a felony yet again in case of non-compliance. This tracking program requires regular updates, and if any offender violates the registration requirements, it would show the registrant to be in violation. It is necessary for the transients to update their status within five working days with a local agency, in case they change their address or is homeless; the local agency is then responsible for forwarding the information to the DOJ. The latter then updates the information in the database, on a regular daily basis. The website www.meganslaw.ca.gov is responsible for publishing the data online, however 25% of the offenderââ¬â¢s records are kept confidential and are not publicly disclosed, this condition depends on the specific type of crime being committed. According to the information available on this government website, the sex offenders can ev ade public disclosure in the following conditions (Harris, 2009; Department of Justice, 2010): 1- Sexual battery by
Thursday, September 26, 2019
Divorce in popular culture and Its relationship to the American Essay
Divorce in popular culture and Its relationship to the American culture,beliefs and attitude - Essay Example Despite the growing trend of marital disruption in the United States and how its romantic plot remains to be an accepted theme in the popular culture, it is often the case that the destructive nature of divorce is overlooked especially when its negative consequences on the society, family, man, woman and child are not taken into consideration. Divorce has been an existing theme of popular culture over the years. In 1938, a British comedy romantic comedy movie ââ¬Å"The Divorce of Lady Xâ⬠was released. From the title itself, the film had a main theme of marital disruption. Even up to now, after several decades have already passed, such theme is very much alive like the American romantic comedy film ââ¬Å"Le Divorceâ⬠which was made available to the public on 20 Meanwhile, even when bound with marriage, having sexual affairs in both men and women can be observed as a common plot in some popular culture. Both films illustrate the romance that can be found in infidelity in g eneral, not only unfaithfulness within marriage. Likewise, the fun, thrill and excitement in such affairs of this sort are present. Nonetheless, pleasure is not always the side of every story for the reason that despondency can be found on the parts of those people who have been affected and hurt by such relationships. Without a doubt, those people who are hurt in the cases of divorce are often not taken into consideration. ... Divorce in Popular Culture and Its Relationship to the American Culture, Beliefs and Attitude According to Stevenson and Wolfers (27), the family as an institution is not stable. This reality is reflected by the artifacts of popular culture as well as different studies on divorce which have a wide array of scopes. As a matter of fact, Chandra, Martinez, Mosher, Abma,à and Jones (17 and 90) claimed in 2002 that within a span of 10 years, there are about 29 percent of first marriages among 15 ââ¬â 44 year old women that used to end their union through separation, annulment or even divorce. In the analysis of how the artifacts of popular culture speak about the American culture, beliefs and attitudes, I have evaluated divorce as the subject matter. In this sense, I have assessed two films coming from different eras. I have first assessed ââ¬Å"The Divorce of Lady Xâ⬠which was released in the year 1938 as well as the other film, ââ¬Å"Le Divorceâ⬠which was released in 2003. Aside from the fact that it talks about divorce, for me, their point of convergence is that both have promoted the romance in extra ââ¬â marital affairs as if there are no other people to be affected in set up of this sort. The way I look at it, this is most especially true for ââ¬Å"The Divorce of Lady Xâ⬠because the marital disruption issue including infidelity is managed in a way of comedy. In the first movie, both husband, Everard Logan, and wife, Lady Meere, have cheated on each other but the story has managed to end up happily through remarriage to other partner. Meanwhile, ââ¬Å"Le Divorceâ⬠has more heart ââ¬â breaking aspects in a sense that Roxy, a pregnant wife, was cheated by her husband and was asked by her husband to end their marriage even if they have kids to consider. Her husband
Effectiveness of Medical Honey for Leg Ulceration and Wound Care Literature review
Effectiveness of Medical Honey for Leg Ulceration and Wound Care - Literature review Example These methods of wound care are meant to facilitate recovery and prevent the infection of the wound (Hess, 2004). In instances of prolonged healing, additional and alternative measures of wound care are often considered. One of these methods includes the use of medical honey (Boulton, Cavanaugh, and Rayman, 2006). Medical honey has been considered as an alternative form of therapy in wound management, especially for chronic and diabetic pressure ulcers (Boulton, et.al., 2006). Leg ulcers are common among diabetic patients and with diabetic patients often having prolonged wound healing times, the importance of implementing speedy and effective wound healing methods has become imperative (Shai and Maibach, 2004). The use of medical honey has been recommended by various studies and practitioners, with much support attributed to its use due to its healing and antibacterial properties (Shai and Maibach, 2004). The more traditional practitioners however have not supported the use of medica l honey over and above conventional methods of healing. Studies with contrasting results have been presented on this subject matter. For which reason, this study now seeks to carry out a literature review on studies discussing the use of medical honey for leg ulceration and wound care. ... A conclusion shall also provide a summary of the paper and a discussion on how the results of this study can contribute to the nursing practice. Literature Review Search strategy This literature review is being carried out in order to establish a critical analysis of the current research information on the efficacy of medical honey on leg ulcers and wound care. This literature review shall start through an internet database search of Google Scholar, Cochrane, PubMed, Medline Plus, and CINAHL using the following key words: medical honey leg ulcers; honey leg ulcers; and honey wound healing. The search shall also be narrowed down to a time limit from December 2006 to August 2012. Specific studies which discuss the efficacy of medical honey on leg ulcers and other wounds shall be prioritized and set aside for abstract review. Randomized controlled trials, cohort studies, systematic reviews, case studies, prospective, and English-language studies shall be used as inclusion criteria for t he literature search. Secondary research studies, retrospective, chart reviews, descriptive, non-English language literature shall be excluded from this review. Those meeting the inclusion criteria shall then be set aside for further review, mostly on authors, publication, reliability, and validity of results. Critical Analysis: Support for the use of honey in leg ulceration Various studies have been carried out on the use of medical honey on leg ulcers and other wounds (Cooper, et.al., 2010). In a study by Molan (2009), the antibacterial qualities of honey in wound care was reviewed. His systematic review discussed the inhibitory impact of honey seen in bacteria which often infect wounds. Based on Moranââ¬â¢s (2011) study, honey was seen to have
Wednesday, September 25, 2019
Operation Iraqi Freedom Research Paper Example | Topics and Well Written Essays - 1250 words
Operation Iraqi Freedom - Research Paper Example Iraq had no link to terrorism, no weapons of mass destruction (WMD), and no legal rationale to attack. Despite this, Bush decided to invade the Republic of Iraq for causes deemed objectionable to the majority of other countries so he frequently relied on and utilized false information to rationalize it. He lied. This discussion will examine how the truth was a casualty early and often during the lead up to the war and outlines some of the consequences brought about by these far-reaching and deadly deceptions. Bush voiced his disagreement to the concept of ââ¬Ënation buildingââ¬â¢ during the 2000 presidential election debates but as president waged an undeclared war against a sovereign country that had neither attacked first nor threatened to. Immediately following and as a reactionary reply to the terrorist attacks on September 11, 2001, Bush stated the countyââ¬â¢s intention to begin a ââ¬ËWar on Terrorismââ¬â¢ which he portrayed as a protracted battle against those t hat would use terrorist actions in addition to the countries that enabled them. The eventual culmination of the selective legal reasoning and rhetoric concerning the ââ¬ËWar on Terrorââ¬â¢ was Bushââ¬â¢s order of the military to invade both Afghanistan and Iraq, an illegal action on many fronts. Bush had constantly claimed that these actions were legal. First, he argued, due to language existing within the UN Security Council Resolution 1441 regarding Iraq and secondly, the invasions were an act of self-defense which is permitted by international law. Conversely, according to Richard Perle, advisor to U.S. Defense Secretary Donald Rumsfeld and official of the U.S. Defense Policy Board, ââ¬Å"international law ... would have required us to leave Saddam Hussein alone.â⬠(Burkeman & Borger, 2003). However, this option would have been ââ¬Å"morally unacceptableâ⬠according to the Bush administration. The United Nations Charter, Article 51, Chapter Seven stipulates à ¢â¬Å"nothing shall impair the inherent right of individual or collective self defense if an armed attack occurs against a member of the United Nationsâ⬠(United Nations Charter, 1945). Article 51 allows a country the justification to ââ¬Å"deter an act, or acts of imminent or ongoing violenceâ⬠but only as a transitory solution until the UN Security Council takes the appropriate actions to ensure the protection of the affected region. By precise interpretation of this Article, the rights of self-defense a country can exercise does not comprise the right to retaliate after an attack has ceased. The U.S. defended its invasion and occupation of Iraq to the countries of the world by announce, if not substantiating, that it was a undertaking to remove WMD which endangered not only the U.S. but all other countries as well. Secretary of State Colin Powell as well as other administration officials, predominantly with the U.S. Department of State, enthusiastically endeavored to s tate their justification for aggressive military actions and make this plan as acceptable to as many other nations as they could. Paul Wolfowitz, Deputy Secretary of Defense at that time, is quoted in a Vanity Fair magazine interview dated May 28, 2003 as saying ââ¬Å"For bureaucratic reasons, we settled on one issue, weapons of mass destructionâ⬠(Shovelan, 2003). Before to the invasion, Hans Blix, the man in charge of the UN weapons inspection team in Iraq, said unequivocally and very publicly
Subscribe to:
Posts (Atom)