Friday, January 31, 2020

Network Design for the 2012 London Olympics Essay Example for Free

Network Design for the 2012 London Olympics Essay This report is a step by step analysis of the requirements planning and implementation of a network based on the infrastructure of an office environment. Throughout this report, the reader will see how the requirements planning is broken down into detailed sections to illustrate how each requirement has been identified for the stages of planning to implementation. In the first part of the report, we will be identifying what hardware is required for the scale of the network, taking into consideration a room for future expansion and devices to be added at a later date. The second part of the report will be the identification of software that will be needed to run all services on the network including set-up and configuration of the software. Network Planning Why is a network required? Before actually planning the set-up of a network, the use of a network has to be justified. There are many uses to a network, some of the basic uses are †¢ Sensitive information exchange – information is shared only between departments and/or specific users and not to other people, e. g. customer account information that contains bank information and/or other personal information. †¢ Internal digital mail requests and communication between departments in a business may be increased and messages can be saved for later use. †¢ Resource sharing – information updated constantly is shared from one location and is referenced by other departments and/or users within the same network, e. g. a database of customer details and orders for a company. †¢ File Backup Services – information is backed up or stored in a secure location in the event of future problems and to maintain records of information. There are other uses of networks as well but mainly they are used as a means of security. Within a company, when a network is utilised correctly, the flow of information across a network can be monitored and tracked back to the user. This is essential to ensure no information used within the company is accessed from an outside source or is used in an unlawful manner by a company employee. Scope of the network Since the network is being made for the London 2012 Olympics, we can assume that the network will be of large scale (roughly 500-2,000 users). This means that each service, such as email and DHCP services, will require its own dedicated hardware in order for the resources to be adequately shared without any network latency or slow access experience. If the network is used on a much smaller scale, then the services could run from using only a few pieces of dedicated hardware such as the domain and email services sharing hardware. A site survey should always be performed before installation a network to ensure that wireless signals can be transmitted throughout the building or buildings and to see how the network can be modelled based on the environment it is going to be installed in. Identifying Network Hardware In this section, we will identify different hardware and its uses on a network, how a network is connected and what devices are used to connect a network throughout a company building. Servers and Services There are many different types of services that can be hosted from a server on a network. Many of these services usually have their own dedicated hardware but depending on the scale of the network, the services can easily be bunched together on the same hardware to cut down on overall equipment usage. Domain Server The domain server is used to authenticate users and computers included on the network. It is considered the main access control to a network because it stores all user account information used in authentication. Email Server The email server is used to direct messages to the correct recipient once the message has been processed by the server. Many companies today use a private internal mail system as a way of faster communication within departments. File Server A file server is used to provide users access to information and data across the network. This helps reduce file duplication across different computers on the network. Permissions can be set for file access so that important documentation can be read but not written to or deleted. DNS Server A DNS server is a kind of server that translates DNS names into an I. P address that is used for communication on the internet. DHCP Server A DHCP server is used by hosts to retrieve I. P addresses and other information. Firewall Server A firewall server is used for monitoring the network for vulnerabilities and intrusions and detecting viruses in the event of an attack from the internet. Application Server An application server is used to host applications and make them a part of the network’s resources. The servers are commonly used to save on costs for multiple software licenses compared to a site license. Database Server A database server is used to host a database for access by users. These servers can be updated and viewed. These are commonly used in finance departments or companies that host customer records that needs to be accessed and amended constantly. Network Devices This section will better explain the other devices that make up a network such as the network equipment itself and other devices which can be considered essential to a networked environment. Modem A modem is used to connect an outside line (usually from an internet service provider) via telephone communication to the network enabling internet access or access to another site’s resources. Router A router is a device that forwards data packets between devices on a network and can manage which network node receives certain data rather than sending the same data to each node. Routers can also have their own firewalls. Switch A switch is used to connect segments of a network together. Switches are an important part of a network as they are used to connect multiple devices at once. These switches come in all shapes and sizes, ranging from a simple 2 port switch to a 48 port switch which fits into a server rack. Wireless Access Point The wireless access point is a device that adds wireless connectivity to your network. This type of network device is often used to connect portable devices such as laptops, PDA and Smartphones to the network. It is also used for wireless printers and installing hardware devices to computers where network cabling is not applicable. Network Printer Network printers are printers made available on the network as a resource so that many users can print from one location. This cuts down multiple hardware usage per computer which saves hardware costs and maintenance. Aside from users, all of these services and devices are what make up a network. Connecting your Network: Cabling and Access Points Now that we have outlined what services and devices make up a network, there is the matter of how a network will be connected. There are a few methods of connecting a network, each with its own pro’s and con’s. The standard method of connecting a network is via cable. Cable Connection Cable connection for a network is one of the most trusted methods of connecting users to resources. The reason for this being that wired connections were the first standard and constant communication to be used with computers. Wireless connection is still a fairly new method of communication and is therefore still changing. Types of Network Cables There are quite a few types of network cables that are used today in business, each suited for different purposes. Twisted Pair is a type of copper cabling that is used for telecommunications and most Ethernet networks. There are two types of twisted pair cabling. †¢ Unshielded twisted pair (UTP) – UTP cables have a range of 100 meters and rely solely on the cancellation effect produced by the twisted-wire pairs that limits signal degradation. †¢ Shielded twisted pair (STP) – STP cables reduce electrical noise from within the cable since each pair of wires is wrapped in metallic foil to better shield the wires from noise. Four pairs of wires are then wrapped in a metallic braid or foil. Coaxial cable is a copper-cored cable that is surrounded by heavy shielding. There are several types of coaxial cable. †¢ Thicknet or 10BASE5 – used in networks and operated at 10mbps, maximum length of 500 meters. †¢ Thinnet or 10BASE2 – used in networks and operated at 10mbps, maximum length of 185 meters. †¢ RG-59 – Most commonly used with cable television. †¢ RG-6 – Higher quality than RG-59, with more bandwidth and less susceptibility to interference. A fibre optic cable is either a glass or a plastic fibre that carries light along its length. Fibre optic cable can reach distances of several miles before the signal needs to be regenerated. Fibre optic is more expensive than copper cable and connectors are more expensive and harder to assemble than other connections. Wireless Connection Wireless technology is also a greatly utilised technology in business today even though the reliability of wireless connection does not compare to that of a cable connection. Security There are a few different ways to apply security in a network. Some security protocols may be placed during network design and some protocols when the network is running. Network security during the design During the designing of the network, avoid giving anyone outside the implementation team or network designer any information, such as work plans about the network design or the materials that will be used for the network, which will help Vandals infiltrate or use the network inappropriately. Basic security that should be present in a network 1. Firewall will offer a tougher barrier between the private network and the Internet. Firewalls will prevent unwanted users or hackers from accessing the network. 2. Proxy can be used to provide users a way to connect to the proxy server by requesting authentication from the security service during the exchange of files in the network. 3. Antivirus – is used to prevent viruses from penetrating the network and the computers connected to it. It also eliminates the counter-espionage potential within a network. Since there are many antivirus softwares available, the network has the freedom to choose the appropriate antivirus for the network. 4. Strong password encourages all network an   web users to use a password that contains letters, numbers and symbols so as to increase the difficulty of breaking or cracking the password and steal any information from the network. 5. Packaging – cables used to make sure no unauthorized person have access to data and change it. Disaster Planning and Recovery Before setting a network, the manager of the project requires designers and developers of the network to take into account unforeseen circumstances, such as natural disasters and hardware failure, to reduce their impact. Earthquakes, floods, fires and such disasters may be given a solution using the following points †¢ The proximity of cables to main electrical wirings must be significantly distant to avoid fire. †¢ As much as possible, servers must be placed outside the building. Extra security protocols must be applied to avoid losing information. †¢ If a building has multiple servers, it is advised that all servers be placed on an isolated location and away from public gathering places. This will require the development of additional security precautions. †¢ Different types of cables should be considered in setting up a network to maximize its us †¢ Do not put cables near bodies of water or water discharge sa this may damage the cables †¢ Provide rooms with electric generators in case a power outage occurs. Make sure that these rooms are close to their central control devices to avoid technical problems in connecting the machines to the generator. †¢ Provide fire-preventing equipment such as fire extinguishers near the whereabouts of control systems †¢ Provide water and fire alarms to inform personnel if water or fire gets near the data storage devices †¢ The network team should provide a spare or backup server to perform full back up planning after disaster With the increase in number of intrusions and attacks on networks trying to take data and information, a way of protecting these data should be prioritized in a network. Since the data are, most of the time, secret and important to companies, detection and control of intrusions must be strictly implemented. Through the latest presentations that we have done in class, we have learned new techniques and OSI Models that should be taken into account to provide the highest standards of security and quality. Some of these techniques are firewalls, proxies, encryptions, IP security, data authenticity, communications type and satellites.

Thursday, January 23, 2020

Happiness in Nicomachean Ethics and Living the Rule of St. Benedict Tod

Essay written by Elizabeth Sippel From pursuing pleasure to avoiding pain, life seems to ultimately be about achieving happiness. However, how to define and obtain happiness has and continues to be a widely debated issue. In Nicomachean Ethics, Aristotle gives his view on happiness. According to Aristotle, different types of people pursue different ends. â€Å"The many,† or ordinary people, pursue pleasure, whereas politicians seek glory. However, people of superior refinement seek happiness. Happiness is the highest goal because it is an end desired entirely for its own sake, and it is selfsufficient. In order to define happiness, the function of man must be considered. Aristotle says that what makes man unique is his ability to reason. Thus reason must be connected to happiness in some way. Aristotle further argues that virtue is also tied to happiness. Virtue can be categorized as either intellectual or moral. Intellectual virtue, as the name suggests, corresponds to the reasoning self. Moral virtue, on the other hand, corresponds to the desiring self. Thus moral vi...

Wednesday, January 15, 2020

Analysis of ‘Drops of Jupiter’ with Thesis

No two journeys are alike, because the knowledge and experiences gained differ for each person. One of the texts I have chosen to study is the song Drops of Jupiter written my Pat Nonhuman, performed by Train. The song is about a dream that the writer had about his mother who had recently passed. The line ‘She's back in the atmosphere' was the first line written, and led to him writing the song as an extended metaphor of his mothers journey in the afterlife, and the return of her spirit to him. The inner journey is his own in the way of his journey to deal with grief.He is challenges the notion that the afterlife is a different adventure with his belief that the passed never truly leave us, and that they remain with us in spirit. The lyrics feature an extended metaphor, where the universe is the afterlife, and he is asking his mother about her visit. The verse ‘Now that she back in the atmosphere, with drops of Jupiter in her hair,' shows the metaphor of his mothers death being a temporary journey to the heavens, and has returned with ‘drops of Jupiter in her hair,' as proof of where she has been. The simile used is also comparing her to the beauty of nature. She acts like summer and walks like rain.. ‘ Since the return of her spirit, he can feel her in the air and the nature. He can sense her everywhere around him. Another technique that Monahan used to express the concept of journey was repetition. The constant repetition of the words ‘Tell me' helps to embed the idea of his mother returning to his life as a spirit, and she is sharing her experiences with him. In the text, it is evident that he is worried his mother has forgotten about him, and moved on. This is expressed using poetic devices in the line ‘I'm afraid she might think of me as plain old Jane,'.Plain old Jane is an idiom which means someone boring and ordinary. He admits his fear of his mother forgetting him. Through the song, he realized that the best thing yo u can do about loss of love is find yourself through it. His personal experience was finding a way to deal with death, and that separates him from others facing similar losses. Through his inner journey of dealing with grief, he has learnt a new perspective on death and the afterlife, which is unique to his voyage of self-discovery. No two journeys are alike, because the knowledge and experiences gained differ for each person.

Monday, January 6, 2020

Manchester DBQ - 1490 Words

When Manchester first built its big mechanized cotton machine, it became the leading textile manufacturing city in the whole world. Much of its population in 1850s was made up with the working class and immigrants from parts of Britain and even Europe. In 1851, it was granted a royal charter after Queen Victorias visit. The Reform Bill granted Manchester representation in parliament and middle-classmen the right to vote. All this was due to the exponential growth of Manchester during the Industrial Revolution. According to the Encarta World English Dictionary, Industrial Revolution was the period when U.K. went through social and economic changes that involved widespread adoption of industrial methods of production. The specialization of†¦show more content†¦They spend 12 to 14 hours each day shut up in a low-ceiling rooms they are all sickly and emaciated, their bodies thin and frail, their limbs feeble, their complexions pale, their eyes dead. This is the horror that Flora Tristan witnessed; people were working more than half a day with no food, clothes, and the working conditions were full of toxic air and other harmful substances. Her standpoint in this statement can be said as being non-biased as she is a socialist and thus, she cares (Doc. 7). People reacted violently to these conditions, which forced the government to pass the Ten Hours Act, which limited the number of hours a worker could work to ten hours a day. This resulted in better condition of the workers. William Abram, a journalist and historian, noticed, the condition of the factory laborers has been vastly improved (Doc. 10). This shows the result of the reaction of the people. The point of view of William Abram is factual and accurate as he is a journalist and a historian, and his work is to provide people with the truth. As witnessed by Frances Kemble, actress, poet, and dramatist, people were [s]houting No Corn Laws when she arrived in Manchester during the inaugural of railway. Th is shows the reaction to the wages that workers got before some reforms in Manchester (Doc. 4). Document 10 also states that the [w]ages thanksShow MoreRelated2002 Ap Euro Dbq: Manchester Essay1067 Words   |  5 PagesThe Effects of Industrialization on Manchester, England 1750-1850 England in the 18th and 19th centuries changed dramatically as a result of the Industrial Revolution, which had many effects on the social structure of England and increased the gap between the rich and the poor. Because of this, industrialized English towns such as Manchester were both criticized and admired by poets, politicians, journalists, and outsiders, who were particularly from France. The most powerful points of view wereRead MoreEssay about Manchester Dbq Ap Euro908 Words   |  4 PagesDuring the nineteenth century, Manchester became one of the most industrialized cities in the world. Although the industrialization of Manchester was very efficient and successful for the modernization of man, the city’s growth also raised many issues in society. The growth of the city had negative and positive effects. Although the huge population growth in Manchester in the 1800s, delighted many people, for they though this had led to advances in manufacturing and other industries -the increaseRead Moreindustrialization dbq1447 Words   |  6 Pages Industrialization DBQ Q: Identify the issues raised by the growth of Manchester and analyze the various reactions to those issues over the course of the nineteenth century. __________________________________________________ The spread of industrialization rapidly altered and changed the city of Manchester during the nineteenth century. Of course there were positive effects that stemmed from this, but negative effects due to the growth of industrializationRead MoreJust Whatever1974 Words   |  8 PagesA P European History Test Prep DBQ Free Response Questions For DBQ’s Always: 1. Provide an appropriate, explicitly stated thesis that directly addresses all parts of the question and does NOT simply restate the question. 2. Discuss a majority of the documents individually and specifically. 3. Demonstrate understanding of the basic meaning of a majority of the documents. 4. Support the thesis with appropriate interpretations of a majority of the documents. 5. Analyze point of view or bias in atRead MorePositive and Negative Effects of Industrial Revolution Essay1043 Words   |  5 PagesDBQ- Positive and Negative Effects of Industrial Revolution The Industrial Revolution began in England in the late 1700’s. The Industrial Revolution was a time of new inventions, products, and methods of work. The results of the Industrial Revolution led to many short and long-term positive and negative effects. These results have been assessed from many viewpoints such as the factory workers, the factory owners, the government, and other people who observed the conditions in industrial cities