NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
Now more than ever, today’s businesses require reliable network connectivity and access to corporate resources. Connections to and from business units, vendors and SOHOs are all equally important to keep the continuity when needed. Business runs all day, every day and even in off hours. Most companies run operations around the clock, seven days a week so it’s important to realize that to keep a solid business continuity strategy, redundancy technologies should be considered and/or implemented.
So, we need to keep things up and available all the time. This is sometimes referred to five nines (99.999) uptime. The small percentage of downtime is accounted for unforeseen incidents, or ‘scheduled maintenance’ and usually set to take place during times of least impact, like in the middle of the night, or on holiday weekends if planned. If this is not a part of your systems and network architecture it should be considered if you want to keep a high level of availability. Because things break and unforeseen events do take place, we need to evaluate the need for creating an architecture that is ‘highly available’, or up as much as possible, with failures foreseen ahead of time and the only downtime, is to do planned maintenance.
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
Supportive Security Policies in SOHO
Topic: SUPPORTIVE SECURITY POLICIES IN SOHO
NETWORKING
It is a supportive system of sharing information and services among individuals and groups having a common interest.
A local-area network (LAN) is basically defined as two or more computers connected by a structured wire system for the purpose of sharing resources and files. In this chapter we will explain the various ‘structured wire systems’ that the Network Engineer will deal with during the course of their job. Wireless LANs are becoming more and more popular, but even these devices rely on some amount of physical wires in most cases.
REQUIREMENTS
Network Adapter
A computer needs a network adapter to connect to a network. It converts computer data into electronic signals. It listens for silence on the network cable and applies the data to it when it has an opportunity. The network access element of its job is called Media Access Control, or MAC. The physical address of every computer on a network is called its MAC address. The MAC address is the network adapter's serial number. Most computers are shipped with the network adapter integrated into the motherboard. However, early PCs didn't include this function and computer owners had to buy it separately and fit it into an expansion slot on the motherboard. These were called "network cards" because they were sold on a separate card. Although network adapters are now integrated, the name network card is still used. The wireless equivalent is called a Wireless Network Interface Controller.
Network Medium
Wired networks need cable. The most common form of cable used in networks is called the "Unshielded Twisted Pair." In PC shops, it is generally just referred to as "network cable" or "Ethernet cable." Ethernet is the most widely implemented set of standards for the physical properties of networks. UTP is so closely identified with Ethernet that it is often given that name. Other cable types used for networks are twin-axial, Shielded Twisted Pair and single-mode and multi-mode fiber optic cable. Wireless networks don't need cable; they send data on radio waves generated by the WNIC.
Cable Connectors
In wired networks, the most common form of connector is the RJ45. Every computer with networking capabilities has an RJ45 port. This is sometimes called a "network port" or an "Ethernet port." The RJ45 plug looks like a slightly larger telephone plug and connects the Unshielded Twisted Pair or the Shielded Twisted Pair cable.
Power Supply
Both wired and wireless networks need a power supply. A wireless network uses the current to generate radio waves. A cabled network sends data interpreted as an electronic pulse.
Hub/Switch/Router
In wired networks, one computer cannot connect to many others without some form of splitter. A hub is little more than a splitter. It repeats any signals coming into one of its ports out onto all its other ports. A cable leads from each port to one computer. A switch ...
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Now more than ever, today’s businesses require reliable network connectivity and access to corporate resources. Connections to and from business units, vendors and SOHOs are all equally important to keep the continuity when needed. Business runs all day, every day and even in off hours. Most companies run operations around the clock, seven days a week so it’s important to realize that to keep a solid business continuity strategy, redundancy technologies should be considered and/or implemented.
So, we need to keep things up and available all the time. This is sometimes referred to five nines (99.999) uptime. The small percentage of downtime is accounted for unforeseen incidents, or ‘scheduled maintenance’ and usually set to take place during times of least impact, like in the middle of the night, or on holiday weekends if planned. If this is not a part of your systems and network architecture it should be considered if you want to keep a high level of availability. Because things break and unforeseen events do take place, we need to evaluate the need for creating an architecture that is ‘highly available’, or up as much as possible, with failures foreseen ahead of time and the only downtime, is to do planned maintenance.
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
Supportive Security Policies in SOHO
Topic: SUPPORTIVE SECURITY POLICIES IN SOHO
NETWORKING
It is a supportive system of sharing information and services among individuals and groups having a common interest.
A local-area network (LAN) is basically defined as two or more computers connected by a structured wire system for the purpose of sharing resources and files. In this chapter we will explain the various ‘structured wire systems’ that the Network Engineer will deal with during the course of their job. Wireless LANs are becoming more and more popular, but even these devices rely on some amount of physical wires in most cases.
REQUIREMENTS
Network Adapter
A computer needs a network adapter to connect to a network. It converts computer data into electronic signals. It listens for silence on the network cable and applies the data to it when it has an opportunity. The network access element of its job is called Media Access Control, or MAC. The physical address of every computer on a network is called its MAC address. The MAC address is the network adapter's serial number. Most computers are shipped with the network adapter integrated into the motherboard. However, early PCs didn't include this function and computer owners had to buy it separately and fit it into an expansion slot on the motherboard. These were called "network cards" because they were sold on a separate card. Although network adapters are now integrated, the name network card is still used. The wireless equivalent is called a Wireless Network Interface Controller.
Network Medium
Wired networks need cable. The most common form of cable used in networks is called the "Unshielded Twisted Pair." In PC shops, it is generally just referred to as "network cable" or "Ethernet cable." Ethernet is the most widely implemented set of standards for the physical properties of networks. UTP is so closely identified with Ethernet that it is often given that name. Other cable types used for networks are twin-axial, Shielded Twisted Pair and single-mode and multi-mode fiber optic cable. Wireless networks don't need cable; they send data on radio waves generated by the WNIC.
Cable Connectors
In wired networks, the most common form of connector is the RJ45. Every computer with networking capabilities has an RJ45 port. This is sometimes called a "network port" or an "Ethernet port." The RJ45 plug looks like a slightly larger telephone plug and connects the Unshielded Twisted Pair or the Shielded Twisted Pair cable.
Power Supply
Both wired and wireless networks need a power supply. A wireless network uses the current to generate radio waves. A cabled network sends data interpreted as an electronic pulse.
Hub/Switch/Router
In wired networks, one computer cannot connect to many others without some form of splitter. A hub is little more than a splitter. It repeats any signals coming into one of its ports out onto all its other ports. A cable leads from each port to one computer. A switch ...
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made.
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
01-01-2017
This section will lay out the implementation plan of the entire Authentic Assessment Project (AAP) design, which include configuration of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a deliverables schedule.
Project Implementation Plan
In this lecture I will discuss implementation plan through an example of an enterprise network.
The figure presents a fictitious enterprise factious network. The company would like to implement a scalable solution with a routing protocol that provides fast convergence. For optimal routing and packet forwarding, hierarchical addressing with summarization is required. Users require high-speed access to the server farm with redundant connectivity for protection. The company has many remote offices; a redundant connection to the Internet is required to provide the remote offices with nonstop access to its server farm. For remote offices, a secure connection must be implemented to prevent unauthorized persons from accessing data.
The first step before creating an implementation plan is to gather existing information about the networks and all the requirements.
The existing topology provides redundant connectivity among all the network devices. Internet connectivity is dual homed, which provides redundant access to the remote sites as well as World Wide Web resources. The equipment can provide all the functionalities that are required, but the software version of the operation system must be upgraded.
The networking equipment has existing IP addressing that needs to be changed to ensure optimal routing and forwarding of packets as well as summarization. Requirements for server farm access and remote office connectivity do not include changes in QoS configuration. The server farm hosts the critical applications of the company including VoIP, and these require preferred treatment. OSPF is configured in the network. This configuration must be changed, because a faster convergence time is required. EIGRP is better choice than OSPF.
Security configuration is required to provide secure access to terminal resources. In this case existing security is sufficient, therefor no changes are needed.
For this scenario implementation plan would be
· Project contact list
· Location information and means of accessing the premises
· Tools and resources
· Assumption
· Task and detailed description
· Network staging plan
Project Contact List
Consultant Project Team
Customer Project Team
Project Manager
Telephone
E-Mail
Project Manager
Telephone
E-Mail
Configuration Engineer
Telephone
E-mail
Configuration Engineer
Telephone
E-mail
Project Coordinator
Telephone
E-mail
Project Coordinator
Telephone
E-mail
Equipment installation Plan
Location
Details
Floor
Room
Rack Number
Tools Required
Item Number
Item
1
PC with a VT 100 emulator, 10Base-T interface, FTP Server, TFTP client application
2
Console port cable DB9-RJ45/DB25
3
10Base-T Ethernet cable
The implementa ...
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
Brand NEW 2020 UOP Tutorials JUST UPLOADED! Download NOW @ https://UOP-Tutorials.info
NTC/362 Entire Class, NTC/362 NEW UOP TUTORIALS 2020 VERSION, NTC/362 MindTap Unit 1 Quiz, NTC/362 MindTap Unit 12 Quiz, NTC/362 MindTap Unit 2 Quiz, NTC/362 MindTap Unit 5 Quiz, NTC/362 MindTap Unit 3 Quiz, NTC/362 MindTap Unit 4 Quiz, NTC/362 MindTap Unit 8 Quiz, NTC/362 MindTap Unit 10 Quiz, NTC/362 MindTap Unit 11 Quiz
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
. (TCO 2) _____ is the layer in hierarchical network design that is concerned with switching packets as fast as possible.
2. (TCO 2) The point at which the customer turns over control to the WAN service provider refers to the _____.
3. (TCO 2) _____ is an industry-standard, switched data-link-layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices
4. (TCO 6) Asymmetric encryption is utilized in VPNs to
NEURAL NETWORKS 3Neural NetworksName Group .docxdohertyjoetta
NEURAL NETWORKS 3
Neural Networks
Name: Group - 5
Institution: Cumberland University
Neural Networks
Machine learning refers to the application of artificial intelligence that leads to the provision of systems with the ability of improve and learn automatically without being programmed. It is a process that clearly focuses on the general development of the computer programs that have an access to data and can be clearly used for the learning process themselves (Priddy & Keller, (2015). The procedure involved in learning entails the use of observations such as direct experience or through the use of instruction. It is a practice that is deeply aligned to the use of computers to ensure that functions and operations take place in the required manner.
Neural networks is a topic in machine learning that is highly essential. It refers to a set of algorithms that are loosely modelled after the human brain. The algorithms are created to recognize respective patterns. Through them, the interpretation of sensory data through a machine perception. Clustering raw input and labelling is done (Burkov, 2019). The use of neural networks aids the classification and clustering which are key important topics that need to be appropriately addressed in this case. Thinking of them as the classification and clustering layer that is found on the top of the data applied in management and storage are key matters of concern.
The classifications of the tasks are dependent on the labeled datasets. This implies that humans need to ensure that they transfer their knowledge to the data for the neural network to learn the existing correlation that exists between the data and the labels (Burkov, 2019). The activity is defined as supervised learning which is a key practice that entails face detection, the recognition of gestures through the videos, the identification of the images and the classification of texts.
References
Burkov, A. (2019). The hundred-page machine learning book.
Priddy, K. L., & Keller, P. E. (2015). Artificial neural networks: An introduction. Bellingham, Wash: SPIE Press.
.
Neo-psychoanalytic approaches to personality include theorists such .docxdohertyjoetta
Neo-psychoanalytic approaches to personality include theorists such as Jung, Horney, Erikson, Adler, and Sullivan. Also referred to as “Neo-Freudians,” this group of theorists was influenced by Freud but developed their own unique concepts of personality development. Although they subscribed to Freud’s underlying theory that childhood experiences powerfully impact adult behavior, each theorist departed from Freud in significant ways. Taken together, they emphasize social and cultural roles in personality development.
Behavioral perspectives include the seminal ideas put forth by Watson, Pavlov, and Skinner and apply these ideas to personality development. The behavioral perspective on personality is based on the central role of consequences, either from human interaction or the natural environment. Behaviors are reinforced or discouraged by consequences, which shapes personality. For example, actions such as being kind or agreeable are typically rewarded. When behaviors are rewarded, they are more likely to be repeated. Then, being kind or agreeable as a personality trait takes shape. Conversely, negative behaviors may also be reinforced or represent the failure to learn or have reinforced more appropriate responses. Skinner extended this theory to mental illness as learned maladaptive behavior. In contrast to personality theories that emphasize internal influences, behavioral theories concentrate on the external and the capacity to correct problems through the same focus.
This week, you will examine two theoretical orientations - neo-psychoanalytic and behavioral, including their respective theorists, cultural considerations, assessments/interventions, limitations, and unique aspects. You will also apply one theory from each orientation to case study analyses.
Review the Learning Resources, focusing on theorists, cultural considerations, assessments/interventions, limitations, and unique aspects of both neo-psychoanalytic theory and behavioral theory.
Post
one key idea from the neo-psychoanalytic theoretical orientation and one from behavioral theory. What is a main difference between these theoretical orientations? What is similar between these theories? Which one do you more closely align with?
Required Readings
Cervone, D., & Pervin, L. A. (2019).
Personality: Theory and research
(14th ed.). Wiley.
Chapter 4, “Freud’s Psychoanalytic Theory: Applications, Related Theoretical Conceptions, and Contemporary Research” (pp. 85–126)
Chapter 10, “Behaviorism and The Learning Approaches to Personality” (pp. 273–300)
.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made.
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
01-01-2017
This section will lay out the implementation plan of the entire Authentic Assessment Project (AAP) design, which include configuration of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a deliverables schedule.
Project Implementation Plan
In this lecture I will discuss implementation plan through an example of an enterprise network.
The figure presents a fictitious enterprise factious network. The company would like to implement a scalable solution with a routing protocol that provides fast convergence. For optimal routing and packet forwarding, hierarchical addressing with summarization is required. Users require high-speed access to the server farm with redundant connectivity for protection. The company has many remote offices; a redundant connection to the Internet is required to provide the remote offices with nonstop access to its server farm. For remote offices, a secure connection must be implemented to prevent unauthorized persons from accessing data.
The first step before creating an implementation plan is to gather existing information about the networks and all the requirements.
The existing topology provides redundant connectivity among all the network devices. Internet connectivity is dual homed, which provides redundant access to the remote sites as well as World Wide Web resources. The equipment can provide all the functionalities that are required, but the software version of the operation system must be upgraded.
The networking equipment has existing IP addressing that needs to be changed to ensure optimal routing and forwarding of packets as well as summarization. Requirements for server farm access and remote office connectivity do not include changes in QoS configuration. The server farm hosts the critical applications of the company including VoIP, and these require preferred treatment. OSPF is configured in the network. This configuration must be changed, because a faster convergence time is required. EIGRP is better choice than OSPF.
Security configuration is required to provide secure access to terminal resources. In this case existing security is sufficient, therefor no changes are needed.
For this scenario implementation plan would be
· Project contact list
· Location information and means of accessing the premises
· Tools and resources
· Assumption
· Task and detailed description
· Network staging plan
Project Contact List
Consultant Project Team
Customer Project Team
Project Manager
Telephone
E-Mail
Project Manager
Telephone
E-Mail
Configuration Engineer
Telephone
E-mail
Configuration Engineer
Telephone
E-mail
Project Coordinator
Telephone
E-mail
Project Coordinator
Telephone
E-mail
Equipment installation Plan
Location
Details
Floor
Room
Rack Number
Tools Required
Item Number
Item
1
PC with a VT 100 emulator, 10Base-T interface, FTP Server, TFTP client application
2
Console port cable DB9-RJ45/DB25
3
10Base-T Ethernet cable
The implementa ...
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
Brand NEW 2020 UOP Tutorials JUST UPLOADED! Download NOW @ https://UOP-Tutorials.info
NTC/362 Entire Class, NTC/362 NEW UOP TUTORIALS 2020 VERSION, NTC/362 MindTap Unit 1 Quiz, NTC/362 MindTap Unit 12 Quiz, NTC/362 MindTap Unit 2 Quiz, NTC/362 MindTap Unit 5 Quiz, NTC/362 MindTap Unit 3 Quiz, NTC/362 MindTap Unit 4 Quiz, NTC/362 MindTap Unit 8 Quiz, NTC/362 MindTap Unit 10 Quiz, NTC/362 MindTap Unit 11 Quiz
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
. (TCO 2) _____ is the layer in hierarchical network design that is concerned with switching packets as fast as possible.
2. (TCO 2) The point at which the customer turns over control to the WAN service provider refers to the _____.
3. (TCO 2) _____ is an industry-standard, switched data-link-layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices
4. (TCO 6) Asymmetric encryption is utilized in VPNs to
NEURAL NETWORKS 3Neural NetworksName Group .docxdohertyjoetta
NEURAL NETWORKS 3
Neural Networks
Name: Group - 5
Institution: Cumberland University
Neural Networks
Machine learning refers to the application of artificial intelligence that leads to the provision of systems with the ability of improve and learn automatically without being programmed. It is a process that clearly focuses on the general development of the computer programs that have an access to data and can be clearly used for the learning process themselves (Priddy & Keller, (2015). The procedure involved in learning entails the use of observations such as direct experience or through the use of instruction. It is a practice that is deeply aligned to the use of computers to ensure that functions and operations take place in the required manner.
Neural networks is a topic in machine learning that is highly essential. It refers to a set of algorithms that are loosely modelled after the human brain. The algorithms are created to recognize respective patterns. Through them, the interpretation of sensory data through a machine perception. Clustering raw input and labelling is done (Burkov, 2019). The use of neural networks aids the classification and clustering which are key important topics that need to be appropriately addressed in this case. Thinking of them as the classification and clustering layer that is found on the top of the data applied in management and storage are key matters of concern.
The classifications of the tasks are dependent on the labeled datasets. This implies that humans need to ensure that they transfer their knowledge to the data for the neural network to learn the existing correlation that exists between the data and the labels (Burkov, 2019). The activity is defined as supervised learning which is a key practice that entails face detection, the recognition of gestures through the videos, the identification of the images and the classification of texts.
References
Burkov, A. (2019). The hundred-page machine learning book.
Priddy, K. L., & Keller, P. E. (2015). Artificial neural networks: An introduction. Bellingham, Wash: SPIE Press.
.
Neo-psychoanalytic approaches to personality include theorists such .docxdohertyjoetta
Neo-psychoanalytic approaches to personality include theorists such as Jung, Horney, Erikson, Adler, and Sullivan. Also referred to as “Neo-Freudians,” this group of theorists was influenced by Freud but developed their own unique concepts of personality development. Although they subscribed to Freud’s underlying theory that childhood experiences powerfully impact adult behavior, each theorist departed from Freud in significant ways. Taken together, they emphasize social and cultural roles in personality development.
Behavioral perspectives include the seminal ideas put forth by Watson, Pavlov, and Skinner and apply these ideas to personality development. The behavioral perspective on personality is based on the central role of consequences, either from human interaction or the natural environment. Behaviors are reinforced or discouraged by consequences, which shapes personality. For example, actions such as being kind or agreeable are typically rewarded. When behaviors are rewarded, they are more likely to be repeated. Then, being kind or agreeable as a personality trait takes shape. Conversely, negative behaviors may also be reinforced or represent the failure to learn or have reinforced more appropriate responses. Skinner extended this theory to mental illness as learned maladaptive behavior. In contrast to personality theories that emphasize internal influences, behavioral theories concentrate on the external and the capacity to correct problems through the same focus.
This week, you will examine two theoretical orientations - neo-psychoanalytic and behavioral, including their respective theorists, cultural considerations, assessments/interventions, limitations, and unique aspects. You will also apply one theory from each orientation to case study analyses.
Review the Learning Resources, focusing on theorists, cultural considerations, assessments/interventions, limitations, and unique aspects of both neo-psychoanalytic theory and behavioral theory.
Post
one key idea from the neo-psychoanalytic theoretical orientation and one from behavioral theory. What is a main difference between these theoretical orientations? What is similar between these theories? Which one do you more closely align with?
Required Readings
Cervone, D., & Pervin, L. A. (2019).
Personality: Theory and research
(14th ed.). Wiley.
Chapter 4, “Freud’s Psychoanalytic Theory: Applications, Related Theoretical Conceptions, and Contemporary Research” (pp. 85–126)
Chapter 10, “Behaviorism and The Learning Approaches to Personality” (pp. 273–300)
.
Neoliberalism In what ways does the world of Oryx and Crake reflect.docxdohertyjoetta
Neoliberalism: In what ways does the world of Oryx and Crake reflect the defining characteristics of neoliberal globalization as defined by Rob Nixon? What examples of “the widening chasm” between rich and poor, the “unsustainable ecological degradation,” and the exploitation by transnational corporations does Atwood offer (Nixon 46)? How do the corporations in Oryx and Crake evade responsibility for the damage they do to the environment and to life forms?
Required: at least 2 textual evidence
.
Negligent Tort LiabilityPrior to beginning work on this assi.docxdohertyjoetta
Negligent Tort Liability
Prior to beginning work on this assignment,
Review Chapter 7 and Chapter 36 of the course textbook.(attached below)
Review the cases
Malorney v. B&L Motor Freight, Inc.
, 496 N.C.2d 1086 (Ill. Ct. App. 1986
(attached below), and
Raleigh v. Performance Plumbing and Heating
, 130 P.3d 1011 (Colo. 2006)
(attached below)
**YOU MUST USE THESE CASES and the COURSE TEXT in some of the work in addition to other sources in APA**
Superior Electrical (Superior) was in the business of installing electrical wiring and related components at new construction sites. Because some employees were assigned company vehicles equipped with company tools and materials and were expected to drive those vehicles to the work sites, Superior required all employment applicants to hold a valid driver’s license. Employees who were assigned a company vehicle were expected to drive for the company during the workday in order to transport job materials and company tools that were kept on the vehicle to job sites. These employees were expected to take the company issued vehicle home at the end of the work day.
Superior hired Cory Jones as an apprentice electrician. Jones had completed an employment application in which he stated that he had a valid driver’s license and had not been cited for any traffic violations. These statements were untrue. His license had been suspended because of numerous traffic violations, including careless driving and driving without a license. Superior did not check on his driving record at the time he was hired because, as an apprentice electrician, he was not being assigned a company vehicle and was not expected to drive for the company during the work day.
About a year after hiring Jones, Superior promoted him to electrician and assigned Jones a company vehicle equipped with a rack for transporting wiring and other materials to and from the work sites. Superior intended that Jones drive during the day for the company and to take the vehicle home after the end of the work day. On a later date, when Jones’s work hours had ended and he was driving home in the company vehicle, he collided with two cars. The collision resulted solely from Jones’s negligence. Carolyn Carson and her son were severely injured in the collision and they sued Superior. The Carson’s alleged two theories of recovery against Superior: respondeat superior and negligent hiring.
Write a five-page paper (not including title and references pages) that addresses the following:
Identify and discuss the legal elements of negligent hiring.
Apply those elements of negligent hiring to the facts given in the case.
Analyze whether Superior would be liable for negligent hiring.
Identify and discuss the legal elements of respondeat superior.
Apply those elements of respondeat superior to the facts given in the case.
Analyze whether Superior would be liable on respondeat superior grounds.
The Negligent Tort Liability paper
Must be four to fiv.
Needs to be at least 250 words with at least 1 scholarly article wit.docxdohertyjoetta
Needs to be at least 250 words with at least 1 scholarly article within the past 5 years. No plagiarism. Due tomorrow.
There is much written about implementation fidelity in the design and implementation phases of a practice change project. What does implementation fidelity mean and how does it influence the translation of a research-proven intervention in your future practice change project?
.
Need to write a Research proposal for 5 to 6 pages for above top.docxdohertyjoetta
Need to write a Research proposal for 5 to 6 pages for above topic with references, need to cover below points precisely
Introduction : Proposal introduction has five components –
– Establishing the problem leading to the study
– Reviewing the literature about the problem
– Identifying deficiencies in the literature about the problem
– Targeting an audience and noting the significance
– Identifying the purpose of the proposed study
The Importance of Introductions :
– Sets the stage for the project
– Creates reader interest in the topic
– Establishes the problem leads to the study
– Places the study within the larger context of literature
– Reaches out to a specific audience
• A
research problem
is the problem or issue that leads to the need for a study
• Potential sources
– Personal experience
– Debate in the literature
– Literature gaps that need to be addressed
– Policy debates (in government)
– Research Problem ≠ Research Question
– Write
one paragraph
per element (about 1 or 2 pages)
– State the research problem
– Review studies that have addressed the problem
– Indicate deficiencies in the studies
– Advance the
significance of the study
for particular audiences
– State the purpose statement
•
Outline
: Purpose of Statement, its Significance and Meaning, Mixed methods purpose statement (Qualitative purpose statement + Quantitative purpose statement )
• The purpose statement
– Indicates why you want to do the study
– Indicates what you intend to accomplish
– Is the central controlling idea in a study
– Is written in a sentence or several sentences
– Sets the objectives, the intent, or the major idea of a proposal or a study
A mixed methods purpose statement:
• Contains
– Information about both the quantitative and qualitative strands of the study
– A rationale for combining quantitative and qualitative strands
• Guidelines include
– Begin with words that signal intent: purpose, study aim, intent of
– Indicate the overall purpose of the study from a content perspective
– Indicate the type of mixed methods design (e.g. convergent, sequential)
– Reasons for combining both quantitative and qualitative data
.
New England Journal of Public Policy Reconnecting the Brok.docxdohertyjoetta
New England Journal of Public Policy
Reconnecting the Broken Post-Katrina New Orleans Criminal
Justice System
Graymond Martin
When Hurricane Katrina struck New Orleans and the levees protecting the city gave way in
August 2005, an already struggling and weakened criminal justice system collapsed in spectacular
fashion.
Damage within New Orleans extended far beyond the loss of physical infrastructure. The
city’s population was depleted by more than half. For those who remained or returned within the
first year, spirits were crushed, uncertainty abounded, and the hard work of restoration was riddled
by anxiety, conflict, opportunism, and battles for precious resources.
Longtime judge Leon Cannizzaro Jr., appalled at the near-complete dysfunction of the local
criminal justice system, entered and won the race for Orleans Parish district attorney (OPDA). In
November 2008, because of the urgency and enormity of the task ahead, he assumed the unexpired
term of his elected predecessor, Eddie Jordan, who had resigned under clouds of scandal in October
2007.
Cannizzaro took office more than three years after the flood waters had receded but found his
new agency’s building still uninhabitable. While the OPDA’s office had received three to four feet
of flood water and had been designated by the Federal Emergency Management Agency (FEMA)
as a high-priority critical infrastructure, what should have been a fairly easy restoration hadn’t
begun. Instead, residual moisture from the flood had festered for years, exacerbating the damage
caused by inundation.
Their home office still in shambles, prosecutors were working on plastic picnic tables and
folding chairs inside donated temporary office space in a downtown high-rise across from City
Hall. The location was more than a mile and a half from the Criminal District Courthouse, New
Orleans Police Department headquarters, the Orleans Parish Sheriff’s Office, and the partially
restored Orleans Parish Prison. Assistant district attorneys had limited space for witness interviews
and were forced to carry large seafood boxes containing case files to their personal vehicles and
then up the stairs of the criminal courthouse. The walk began from wherever they could find
parking, first come first served.
Such logistical difficulties were only the beginning of prosecutors’ troubles, soon to be
compounded by the shortcomings of sister agencies.
The sheriff’s office struggled to properly serve court notices and subpoenas and to bring
detainees from the parish jail, so there was no assurance a defendant would appear at scheduled
court hearings. Evidence custody could be an issue if a trial was scheduled and then postponed,
because the NOPD’s Central Evidence and Property Room would provide evidence to OPDA
investigators but not always take it back. On the rare occasions that both defendant and evidence
arrived in court at the same time, the absence o.
Neuroscience meets cryptography ( This is the topic for research p.docxdohertyjoetta
Neuroscience meets cryptography ( This is the topic for research paper)
The problem of inventing passwords that you can remember but others cannot guess is an
important open problem in practice. One solution was proposed the last year, where the
person trains to play a small computer game online, and to log in, it has to play it again. The
server recognizes the person based on his or own playing style. It was shown, based on
real experiments with volunteers, that one can easily train the server to uniquely recognize
your own playing style. However, one cannot teach anybody else to play like himself or
herself, and thus this scheme is even secure against the rubberhose attack (i.e., forceful
reveal of passwords).
Research paper MUST be
· APA format
· https://apastyle.apa.org/
· https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
· 30 pages
· Must have
· Abstract
· Introduction
· The problem
· Is there any sub problems?
· Is there any issue need to be present in relation with the problem.
· The solutions
· Steps of the solutions
· Compare solution to other solution
· Conclusion
· References
· APA format
. https://apastyle.apa.org/
. https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
· Min number of pages are 30 pages
· Must have
· Contents with page numbers
. Abstract
. Introduction
. The problem
3. Are there any sub-problems?
3. Is there any issue need to be present in relation to the problem?
. The solutions
4. Steps of the solutions
. Compare the solution to other solution
. Any suggestion to improve the solution
. Conclusion
. References
Figure 31.1
Logic Model
Logic Models
Karen A. Randolph
A
logic model is a diagram of the relationship between a need that a
p rogram is designed to addret>s and the actions to be taken to address the
need and achieve program outcomes. It provides a concise, one-page pic-
ture of p rogram operations from beginning to end. The diagram is made
up of a series of boxes that represent each of the program's com ponents,
inpu ts or resources, activities, outputs, and outcomes. The diagram shows how these
components are connected or linked to one another for the purpose of achieving
program goals. Figure 31.1 provides an example of the frame work for a basic logic model.
Th e program connections illustrate the logic of how program operations will result in
client change (McLaughlin & Jordan, 1999). The connections show the "causal" relati on-
ships between each of the program components and thus are referred to as a series of"if-
then" sequence of changes leading to th e intended outco mes for the target client group
(Chinman, hum, & Wandersman, 2004). The if-then statements represent a program's
theory of change underlying an intervention. As such, logic models provide a framework
that g uides the evaluation process by laying out important relationships that need t.
NETW204 Class Project This project includes three phases. .docxdohertyjoetta
NETW204 Class Project
This project includes three phases. You need to complete Phase I before moving on to Phase II.
Likewise, you need to complete Phase II before moving on to Phase III or the final phase in the
project.
Hi-tech Net Corp. is operating in three locations in the United States. Their main office is
located in New York, NY. They have two branch offices located in Chicago, IL and Sacramento,
CA.
You have just been hired as Hi-tech Net Corp.’s consulting engineer to implement their network
infrastructure. Both branch offices will be directly connected to the main office in NY via a
leased line circuit (point-to-point serial connection).
New York’s Office IP Information
The main office has four LAN segments: Executive, Engineering, Services, and
Native&Management. Each LAN segment is identified by a VLAN number as seen below. For
example:
Executive: VLAN 15
Engineering: VLAN 25
Services: VLAN 35
Native&Management: VLAN 99
The organization is using the following network address in NY: 10.150.0.0/16.
Executive: 60 computers only including future growth in this number
Engineering: 80 computers only including future growth in this number
Services: 115 computers including future growth in this number
Native&Management: 12 computers including future growth in this number
*** Future growth means that we already take growth into consideration. Do not try to
estimate or add more IP addresses than necessary to avoid getting an incorrect subnet.
Illinois’ Office IP Information
The IL branch has three LAN subnets with 45 IP addresses on each subnet. They use the
following network address to obtain the required IL subnets: 10.150.100.0 /24.
California’s Office IP Information
The CA branch has three LAN subnets with 25 IP addresses on each subnet. They use the
following network address to obtain the required CA subnets: 10.150.200.0 /25.
PHASE I (20 points total)—Due Week 3
Tasks to Do.
Task 1: Subnet the 10.150.0.0/16 network for NY and assign the first subnets to Services
followed by Engineering. You may need to re-subnet for Executive and Native&Management
subnets to avoid wasting IP addresses. Ensure that you re-subnet only the first unused subnet
and nothing else. Assign the subnets to Executive and Native&Management. (5 points)
New York Office IP IP Address Range New Subnet Mask New Network Address
VLAN 15-Executive
VLAN 25-Engineering
VLAN 35-Services
VLAN 99-
Native&Management
Task 2: Subnet the 10.150.100.0 /25 network for IL and assign the last IP address on the three
subnets to the Loopback 1, Loopback 2, and Loopback 3 interfaces of the router. We will use a
loopback or virtual interface to simulate the LAN subnets. This will speed up configuration and
allows us to create our topology without rewiring. (3 points)
Illinois Branch IP IP Address Range New Subnet Mask New Network Address
Loopback 1
Loopb.
Network forensics is considered a very hard problem for a number of .docxdohertyjoetta
Network forensics is considered a very hard problem for a number of reasons:
First, the general anonymity of users on the Internet makes is extremely difficult to determine who a suspect is.
Second, the fact that international borders make it difficult to determine jurisdiction on the Internet, it is sometimes impossible to backtrack all the way form a victim to a perpetrator.
Third, logs are not kept forever, so if efforts are not made relatively quickly, they may be erased.
What can we do in forensics to speed up the process of collecting data? Hypothesize a solution knowing what you know about network data collection.
.
Network Design Proposal Template
Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name
I. Network Design
A. Network Topology
Technical Requirements
In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).
Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that students and faculty health, wellbeing, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).
Proposed Topology
Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. .
Netflix’s strategy of moving to a streaming service has been widely .docxdohertyjoetta
Netflix’s strategy of moving to a streaming service has been widely discussed in a number of articles that can be found online. What are the basic objectives of Netflix’s strategy now? What are some of the major assumptions underlying the strategy? Given what you know about discovery-driven planning, do these assumptions seem reasonable?
.
Network DesignScenarioThe Corporation Techs’ current network.docxdohertyjoetta
Network Design
Scenario
The Corporation Techs’ current network consists of 1 webserver (accessible by the public), 2 application servers, 2 database servers, 2file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
§ Current infrastructure elements
§ A logical topology that separates the Accounting and Sales departments
§ Redundant communications
§ Justification for continuing with IPv4 or upgrading to IPv6
Tasks
For this part of the project, perform the following tasks:
1. Conduct research to determine the best network design to ensure the security of internal access while retaining public website availability.
2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3. Include a high-level plan that ensures communications are available 24/7.
4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6. Create a draft report detailing all information as supportive documentation.
7. Cite sources, where appropriate.
Submission Requirements
Format: Microsoft Word
Citation style: APA
Length of report: 3pages
The above submission should be three pages in length and adhere to APA formatting standards along with proper references
.
Netflix is glowing. We had a beautiful Q4,” the company preen.docxdohertyjoetta
Netflix is glowing. “We had a beautiful Q4,” the company preened in its letter to
shareholders. It isn’t wrong.
The streaming service reported earnings per share of 41 cents, up from 15 cents a year ago, and
revenue of $3.29 billion, slightly beating analysts’ estimates of $3.28 billion. Most impressively,
it added 8.3 million subscribers globally—the highest in the company’s history—even as it
raised its subscription price to $11 a month. That is an 18% year-over-year increase, exceeding
the company’s own forecast of 6.3 million subscribers. Shares shot up 9% in after hours trading.
Legacy media, says Rich Greenfield of BTIG Research, should “be afraid, be very afraid.” With
hit content like “Stranger Things” and “The Crown,” Netflix has created a virtuous cycle:
Subscribers keep joining at higher price points, allowing the company to spend more on
content, which in turn allows them to draw in and retain more subscribers.
Of the over 8 million new subscribers, 6.36 million came from international markets. They have
finally made Netflix’s global segments profitable, delivering earnings of $227 million in 2017.
With an eye on competition, the company is accelerating its investments for 2018. It will raise
marketing spending to $2 billion and spend $7.5 billion to $8 billion on new content, including
30 international original series in places like Poland, India, and Japan.
DOW JONES, A NEWS CORP COMPANY
Stoxx 600 369.07 -0.49% ▼ Nikkei 21319.55 0.13% ▲ U.S. 10 Yr 1/32 Yield 2.776% ▲ Crude Oil 63.26 -0.39% ▼ Euro 1.2264 -0.06% ▼ DJIA
MARKETS HEARD ON THE STREET
Netflix Says Catch Me if You Can
Of the over 8 million new subscribers in its latest quarter, 6.36 million came from international markets
|
Netflix added 8.3 million global subscribers in its latest period. PHOTO: MIKE BLAKE/REUTERS
Jan. 22, 2018 7:26 p.m. ET
By Elizabeth Winkler
NFLX 1.21% ▲
http://quotes.wsj.com/NFLX
http://quotes.wsj.com/index/XX/SXXP
http://quotes.wsj.com/index/JP/NIK
http://quotes.wsj.com/bond/BX/TMUBMUSD10Y
http://quotes.wsj.com/futures/Crude%20Oil%20-%20Electronic
http://quotes.wsj.com/fx/EURUSD
http://quotes.wsj.com/index/DJIA
https://www.wsj.com/news/markets
https://www.wsj.com/news/heard-on-the-street
http://quotes.wsj.com/NFLX?mod=chiclets
“This is a land grab opportunity,” says Mr. Greenfield. “They see Disney , Apple , Amazon
coming, and they’re trying to extend their lead as far as possible before the competition gets
going.”
Netflix is slated to have a long lead indeed. Disney, which hopes to break into international
markets with its acquisition of assets from 21st Century Fox , will find that Netflix has already
beaten them there. It also plans to launch its own Disney-branded streaming service. Yet this
likely won’t happen before late 2019. Meanwhile, Hulu, in which Disney will have a 60% stake
after the Fox deal, has added far fewer subscribers than Netflix even though it maintains a
lower price.
Hit shows from HBO and Amazon will dr.
Netflix is an American media service provider founded by Reed Hastin.docxdohertyjoetta
Netflix is an American media service provider founded by Reed Hastings and Marc Randolph in 1997. By 2013, it was the best performing stock on the S&P 500. But by 2011, with shares at their all-time low, Netflix faced challenges that could ultimately lead to its demise.
In this case study, assume that Netflix hired you as the new chief information officer (CIO) to help the company reclaim its place in the market as a leading global e-commerce media services and production company.
Create a PowerPoint presentation containing the IT strategic plan that will address Netflix's e-commerce initiatives. The following information should be covered in the presentation.
1. Introduction or catchy Netflix stories
2. History of Netflix
5. How would IT deliver value to the business?
6. Proposed the IT infrastructure required to support global e-commerce.
.
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013).docxdohertyjoetta
Nelson v. James H. Knight DDS, P.C., 834 N.W.2d 64 (Iowa 2013)
-1-
834 N.W.2d 64
Melissa NELSON, Appellant,
v.
JAMES H. KNIGHT DDS, P.C. and
James Knight, Appellees.
No. 11–1857.
Supreme Court of Iowa.
July 12, 2013.
Rehearing Denied July 19, 2013.
Appeal from the Iowa District Court for
Webster County, Thomas J. Bice, Judge.
A former employee appeals from the district
court's grant of summary judgment to an
employer in a sex discrimination case.
AFFIRMED.
Paige E. Fiedler and Emily E. McCarty of
Fiedler & Timmer, P.L.L.C., Urbandale, for
appellant.
[834 N.W.2d 65]
Stuart J. Cochrane and James L. Kramer of
Johnson, Kramer, Good, Mulholland,
Cochrane & Driscoll, P.L.C., Fort Dodge, for
appellees.
MANSFIELD, Justice.1
Can a male employer terminate a long-
time female employee because the employer's
wife, due to no fault of the employee, is
concerned about the nature of the
relationship between the employer and the
employee? This is the question we are
required to answer today. For the reasons
stated herein, we ultimately conclude the
conduct does not amount to unlawful sex
discrimination in violation of the Iowa Civil
Rights Act.
We emphasize the limits of our decision.
The employee did not bring a sexual
harassment or hostile work environment
claim; we are not deciding how such a claim
would have been resolved in this or any other
case. Also, when an employer takes an
adverse employment action against a person
or persons because of a gender-specific
characteristic, that can violate the civil rights
laws. The record in this case, however, does
not support such an allegation.
I. Facts and Procedural Background.
Because this case was decided on
summary judgment, we set forth the facts in
the light most favorable to the plaintiff,
Melissa Nelson.
In 1999, Dr. Knight 2 hired Nelson to
work as a dental assistant in his dental office.
At that time, Nelson had just received her
community college degree and was twenty
years old.
Over the next ten-and-a-half years,
Nelson worked as a dental assistant for Dr.
Knight. Dr. Knight admits that Nelson was a
good dental assistant. Nelson in turn
acknowledges that Dr. Knight generally
treated her with respect, and she believed him
to be a person of high integrity.
On several occasions during the last year
and a half when Nelson worked in the office,
Dr. Knight complained to Nelson that her
clothing was too tight and revealing and
“distracting.” Dr. Knight at times asked
Nelson to put on her lab coat. Dr. Knight later
testified that he made these statements to
Nelson because “I don't think it's good for me
to see her wearing things that accentuate her
body.” Nelson denies that her clothing was
tight or in any way inappropriate.3
During the last six months or so of
Nelson's employment, Dr. Knig.
Negrin 1Negrin 5Claudia NegrinProfessor Oscar GonzalezENC1.docxdohertyjoetta
Negrin 1
Negrin 5
Claudia Negrin
Professor Oscar Gonzalez
ENC1101
28 April 2020The Coming Age of Ecological Medicine Article and The Economic Injustice of Plastic Ted Talk
How have environmental health issues influenced our daily health? Environmental and health issues have been major concerns in the global world, and waste disposal has been a potential threat to human health. In “TheEconomic Injustice of Plastic” Ted Talk, TV spokesperson Van Jones talks of waste disposal as the key component that contributes to the contemporary problems experienced by human beings. In “The Coming Age of Ecological Medicine” article, writer and environmentalist Kenny Ausubel also inform readers about how the environmental issues affect human health. Their concerns are influenced by the increased environmental pollution issues and the diseases found in human communities. *REPHRASE THIS FOR THE CONCLUSION* => Ultimately, Ausubel and Jones agree that environmental issues are a factor in healthy living. Jones and Ausubel make it clear that person’s level of health is dependent on the environment. *THIS IS THE DIFFERENCE BETWEEN CLAIMS* => However, while Jones’ believes that ___________, Ausubel believes that______________. I agree with Jones’ assertions regarding how plastic waste creates environmental injustices, but I feel that he fails to provide a guidance and data regarding the best way to manage plastic disposables. On other hand, Ausubel provides ideas on how improving the environment is a factor in promoting good health. Ausubel’s point of argument is convincing as it is clear that most environmental pollution issues results in diseases and illnesses. Although they approach this issue from different contacts, their message for readers is clear. (TELL WHAT MESSAGE IS IN CONCLUSION.)
In “The Economic Injustice of Plastic” TED Talk article, Van Jones focuses on different issues relating to waste disposal in our environment. In his talk, Jones gives explanations about how the disposal of plastic wastes in the Earth’s environment results in environmental pollution and also affect the entire ecosystem. The speaker in this talk can be viewed as a supporter of green energy utilization, and he focuses on how disposable materials impact the environment and living organisms, with an emphasis on human beings who are living in lower socioeconomic societies. In Jones’ discussion, he discusses how waste disposal issues has been given more attention in big cities, even while some communities neglect the health issues of the poor who are living in regions such as Cancer Alley. According to Jones, the Green Energy Movement is passionate about having no disposable materials and waste in California while it accepts the existence of disposables in societies and communities residing in the Cancer Alley region (Jones 11:01). It is understood that the pollution from plastic waste can be traced from the production process, usage and elimination of plastic waste. In Jones’ view, .
Needs to be 2 pages. APA format. Tie the three interpersonal concept.docxdohertyjoetta
Needs to be 2 pages. APA format. Tie the three interpersonal concepts to the film, through the character/ characters actions, words, etc. 1 body paragraph for each interpersonal aspect. Introduction needs to include the three concepts. The concepts are: Relational turbulence, moral commitment, and nonverbal communication.
.
need two pages in the uploaded documents they ask about the team.docxdohertyjoetta
need two pages
in the uploaded documents they ask about the team diversity, our there are 4 people in our group and two boys and two girls, all of them are in around their mid or early 20s.
also one of the topic is about group norm in module one I will be uploading that document as well
.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
1. NETWORKING SYSTEMS
1
NETWORKING SYSTEMS
5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be
discussed and demonstrated in detail. The planning to design
the network layout will be made according to the scenario given
in the requirements. The plan will be implemented by the
2. evaluation of the aspects that are important to design the
network and other necessary things to design and implement the
network. After implementing the network, the network will be
tested by secure communication, WAN communication Channel,
Wireless network, and PAN network. The troubleshooting of the
network will also be discussed and elaborated in detail. The
protocols used in this network will also be taken into
consideration.
Introduction
Designing a network is not a simple task for someone.
There are different phases to design the network. Each phase
has a very important role to design the network. The first phase
is to collect all the requirements to design the network. The
second phase is to evaluate the requirements to make sure that
either requirement is enough to design the network or not. After
evaluating the requirements, the third phase is to implement all
the aspects that are gathered in requirements. The fourth and
last phase after implementing the network design is to optimize
the network by performance.
Network Layout
The physical arrangement of the network is called network
layout. The network layout of the given is scenario is shown
below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is
headquarter which is the main point of this network and another
place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest
office, and accounting office’s host are connected with one
3. switch. Twisted pair cable is used in this part of the network.
Each device directly connected with the headquarter switch.
8P8C (Actually, RJ-45 is the more common term) jack is used in
this part of the network and it is located in the reception area.
Bus topology is used in this part of the network. (I think that
what you have in your diagram is a bus-star hybrid. The switch
is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and
reception area’s host are connected with the switch. Twisted
pair cable is used in this part of the network. Each device
directly connected with the headquarter switch. 8P8C jack is
used in this part of the network and it is located in the reception
area. Bus topology is used in this part of the network.
For both 1 and 2: type of cable, where do you map the runs and
place the jacks (I gave you a building layout), and what is in the
telecom room, e.g., server, patch panel, demarc, router, etc?
7 points each.
Secure Communication
Communication through this network is secure because it is a
private network and has less vulnerability. An unauthorized
person cannot reach this network. The transmission control
protocol is used in this network
Sarju, this is not secure from building to building (server to
server, or really, network to network) or from an employee
home to the server (host to network). A man in the middle
attack with a packet sniffer would eat your lunch. You are still
thinking like a computer person and not like a network person.
While what you say is true, it really doesn’t secure a network.
The only way to really do what I asked is with a VPN using PPP
and either PPtP or L2TP as the security wrapper. 5 points.
T3 WAN channel helps to transmit data over the network is a
secure and reliable way. The transmission of data in this
channel is fast and accurate. The bandwidth of this network is
4. 1000 Mbps. For long-distance, TCP/IP protocol is used.
What is a T3 WAN provide for bandwidth and speed? How is it
formed and terminated. In other words, what is a T3 and how
does it work. And, it is not secure.
Wireless network
The wireless network is set up by radio signal frequency. It
used this frequency to connect two different devices. It is very
easy to set up and configure in the network. It is fast and easy
to understand and establish. Sarju, this was supposed to be
about the wireless networks? Devices, placement, bandwidth,
discussion of 802.11, etc. I think you missed something here.
PAN
PAN stands for Personal area network. PAN is used in personal
devices and is normally connected with the higher-level network
it is normally used to provide communication between devices
like computers, mobile, and laptop. The range of the PAN
network is very small. The range is10 meters. Its frequency for
Bluetooth is between 2.4 GHz to 2.48 GHz.
You didn’t really explain your network…just told me what a
PAN is. I would have liked you to discuss ICS with DCS and
maybe PLCs. A quick bite of SCADA would be good, too.
Troubleshooting
It is a very complex task to troubleshoot the network because
sometimes the fault is a miner and does not found easily. In the
given scenario, the network will be troubleshot by check the
wired connection and by checking the router configuration.
Where would you start? Probably at the demarcs and work in. If
that was okay, you should call the ISP. Need more detail. 4
points.
OSI model
OSI stands for open system interconnection. There are seven
layers in the OSI model. Each layer is used for a specific task.
The 7 layers of OSI are described below:
5. · Application layer
· Presentation layer
· Session layer
· Transport layer
· Network layer
· Datalink layer
· Physical layer
What about the TCP/IP Model and encapsulation /De-
encapsulation? What is that all about? And what about using the
example of a web page to explain the process? 2 points.
Overall, a lot more detail is needed…31/100
Conclusion
In this report, the planning to design the network layout
according to the given scenario is discussed and demonstrated
in detail. Different phases to design the network are also
discussed in detail. Some optimization of the network by testing
the network are also discussed. We also implement the project
plan to design this network. We also studied and implement the
different cases on this network.
Sources:
J. K. a. K. Ross. “Computer Networking: A Top-Down
Approach Using the Internet” Addison-Wesley, 2013.
L.L. Peterson and B.S. Davie. “ Computer Networks a system
approach, Morgan Kaufmann, 2012.
B.A. Forouzan, Data Communications and Networking”, 4rd
Edition, McGraw Hill, 2007.
A.S. Tanenbaum. “Computer Networks” 4th Edition, Prentice
Hall: 2003.
6. 2
Dr. Steve Gardner, SP2020, April 22, 2020
BONUS QUESTION SP20 MIS3613 DATA
COMMUNICATION AND COMPUTER NETWORKS
You are an electrical engineer and the IT Director of Therall
Industries, a small company that makes a very intricate high
technology device, the metapolar refractive pilfrometer for
Rockwell Industries Turboencabulator. If you wish to know
more about the device, you may watch the video at
https://www.youtube.com/watch?v=2fjcJp_Nwvk .
Your company works out of two small locations in two different
cities. The two offices, almost identical on the outside to be
easily recognizable as a Therall facility (an icon featuring the
buildings is on the company logo), are approximately 600 feet
long and 400 feet wide. The first location, Headquarters, houses
Executive Management and Research and Development
Engineering. The second, Remote, is where other engineering
and production takes place.
Therall Industries
Your boss, Tom Frantype, has asked you to, 1) develop an
internal network leading to a secure wired communication
system between the two offices, and, 2) install a wireless
network in each facility.
7. The facility layouts are available on the accompanying
Powerpoint Presentation and reproduced above.
Here are the exact tasks.
1. Discuss your intrabuilding networks. At Headquarters, you
will need:
a. Two hosts in the Executive offices
b. Four hosts in R&D
c. One host in Reception
d. Four hosts in Guest Offices
e. Two hosts in Accounting
f. VoIP service to each area
Layout your hosts on the diagram, being sure to discuss what
type and grade of structured cabling you will use, where the
runs will map, what jacks you will use and where they will be
located, and the physical and logical topology to be used. Also
discuss your building connection to the ISP through your
telecom room, including type of patch panels and what your
demarc looks like and where it is connected. (10 Points)
2. At Therall Remote, you will need:
a. Sixteen hosts in Engineering
b. Four hosts in each production area
c. One host in Reception
d. POTS service throughout
Layout your hosts on the diagram, being sure to discuss what
type and grade of structured cabling you will use, where the
runs will map, what jacks you will use and where they will be
located, and the physical and logical topology to be used. Also
discuss your building connection to the ISP through your
telecom room, including type of patch panels and what your
demarc looks like and where it is connected. (10 Points)
3. The secure communications channel should allow the
employees of both offices to communicate securely with each
other and the servers located at Headquarters. It should also
8. allow employees to work remotely using the network at either
Headquarters or Remote. What is this secure network, how it is
formed, what protocol(s)does it use, etc? Convince Tom
Frantype that you can secure it by explaining how it works. (10
points).
4. The WAN communication channel from both ISPs to the
facilities is a T3. Explain how a T3 WAN channel works, what
the available bandwidth is, what sort of communication protocol
it uses, how it might communicate over long distances
(Headquarters is in Houston, Remote is in Ada), and how it is
terminated at the demarc. (10 points).
5. Now it is time to setup the wireless network in each facility.
Explain how you will set it up, what type of communication
device you will use, what band it operates in, where the
device(s) will be positioned, and how fast the connection will
probably be and why. Don’t forget your most important wireless
connection will be at Headquarters between the receptionist and
the CEO in the Executive Suite. To make the CEO happy, that
connection needs to be fast and certain to make. (10 points).
6. At Remote, there are 6 dapoplar presserstops in Production 1,
and 7 in Production 2. These machines are controlled from a
central control booth in each room. The machines are monitored
via a PAN in each room. Explain how this PAN works,
including the communication method, the frequency, the range
of the devices, and anything else Tom Frantype may ask about
these smaller networks. Try to anticipate his questions. (10
points).
7. Oh no! Interbuilding comms are down and R&D in
Headquarters cannot talk to Engineering at Remote. Explain the
steps you would go through to troubleshoot this problem. (10
points).
9. 8. While one of your engineers was on a chat line discussing
one of the dapoplar presserstops that was acting up with a
representative from Shadrach (the company that makes the
machine), his monitor went blank. After a few moments, a
message popped up that said, “If you want your data back, you
must send a certified check for £500,000 to Cayman National
Bank, Peter A. Tomkins Building, 200 Elgin Ave, George Town
KY1-1102, Cayman Islands”. No matter how he tried, the
engineer was unable to access the secure data folder on the
server where the Therall company proprietary manufacturing
data is kept. What has happened? Is there a way to fix this? (10
Points).
9. Wow, you have done a great job on your system! In fact, Tom
(was MISTER Frantype, but now you are on a first name basis)
was so impressed he gave you a raise and a part of the profit-
sharing bonus pool. This almost doubled your salary. Last
Friday night when you were at a barbeque at Tom and Marie’s
house in the Woodlands outside of Dallas, Tom told you, “You
know, I have heard a lot about this networking thing but I really
don’t understand how a computer forms a message, asks for a
webpage and gets the correct one, or really anything about it. It
all seems like magic to me. I said something to Fred over in
R&D and he said, ‘It’s simple, it’s all about the OSI model and
encapsulation and de-encapsulation. That explains everything.’
I must admit I felt a bit foolish asking anymore because Fred
said it was so simple. Can you explain to me what he was
talking about? What does he mean, ‘Seven layers?’, and
‘Headers and Footers’? And then he said something about
another model, the TCP/IP? Can you help me here?”
It appears staying in Frantype’s good graces is going to require
you to explain what the two models are, what they do, and how
they work. You should do that by, 1) explaining the OSI model,
and, 2) explaining the TCP/IP model by helping him understand
how a web page is requested and received, including protocols,
10. etc. Your new salary, in fact, your entire job, may depend on
this. Good luck. (10 points).
10. Please ensure your submission is neat and easily readable.
Do your best work. (10 points)
Thank you.
If you want a full explanation of the Turboencabulator,
including history, uses, and companies that employ it, visit
https://www.youtube.com/watch?v=kkH20fNavoI or reference
the Wikipedia article on this amazing invention.
Therall Industries
Therall Industries Headquarters
Executive Suite
Accounting
Reception
R & D Engineering
Guest Offices
Storage
Telecom Room
Brick Firewall
Therall Industries Remote
Production 2