Friday, May 8, 2020

Digital Intellectual Property Essay Example | Topics and Well Written Essays - 750 words - 1

Advanced Intellectual Property - Essay Example In the event that that source codeâ€or the thought behind the softwareâ€is not accessible to the general population, at that point the product is â€Å"closed source† (Anderson, 2004). On account of open source programming, the inverse is valid. The source code is accessible to people in general and can be changed by the general population without an infringement of the permit. In this manner, programming can go between having its source code totally closed off from people in general, to programming where the source code is perused uniquely to the general population, to programming where the source code is available to the world and alterable (Richard, 2003). This issue of making programming â€Å"open source† and unreservedly accessible to all to change makes some moral issues in the period of fast exchange of documents over the web. There are various roads to utilize while breaking down any moral issue. Maybe the most well-known technique in scholarly way of thi nking is an utilitarian point of view. Based on the worry that any activity ought to augment the bliss of society in general, utilitarianism would not have the option to respond to the subject of whether open source programming is moral. A considerable lot of those inquiries, for example, â€Å"is human information progressed by full and free access to all information?†, are unanswered and reflect bigger conversations about licensed innovation insurance (Ravitch, 2010). ... As for rights, the issue pivots upon the presence of individuals’ rights to their protected innovation, which is an ensured offered under United States government law. As indicated by the way of thinking of the GNU Operating System wholesalers, â€Å"‘Free software’ involves freedom, not cost. To comprehend the idea, you should consider ‘free’ in ‘free speech,’ not as in ‘free beer.’† (GNU Webmasters, 2009). When contrasted with the option to free discourse, the examination welcomes further inquiries concerning whether the two are really practically identical, or even comparative, in nature. Past the rights issue, there is likewise the ideals point of view, in which some have contended that open source assists individuals with intuition and learn as they share valuable information, in this way adding to the prosperity and human thriving of all. Sharing this information is, to a few, â€Å"a essential demonstration of friendship† (Ravitch, 2010). Be that as it may, to other people, this information just happened through exertion and time, which hence gives it some money related worth. In this manner, the contention could be made that open source programming is empowering the ideals of hoodlums, not companions. Once more, another point of view on morals brings up a bigger number of issues than it answers. At long last, the benefit of all viewpoint on open source is idealistic about the potential for good done to the entire of mankind. As per the Catholic Church, â€Å"cyberspace should be an asset of complete data and administrations accessible without charge to all, and in a wide scope of languages† (Foley and Pastore, 2002).

Cyber Bullying in Schools Term Paper Example | Topics and Well Written Essays - 3000 words

Digital Bullying in Schools - Term Paper Example The paper likewise looks to fundamentally break down the legitimate system and approaches that are set up to battle the issue of digital harassing. To this end, the paper has depended on data from different bits of enactment. The paper will focus on usage of enactment and school projects to forestall and stop digital tormenting in schools. The examination will accordingly not investigate in detail different methods for fighting digital tormenting; like revealing digital harassing to guardians, not reacting to messages that are intended for tormenting, among others. The paper perceives that digital harassing isn't just a bad habit found among youngsters yet in addition grown-ups. The investigation anyway doesn't investigate the issue of digital harassing among grown-ups. Diagram The paper is separated into three significant parts. The initial segment is a presentation of the paper. This part plots the idea of digital tormenting giving the different definitions that have been given by different creators. The presentation gives the different strategies utilized in digital harassing including utilization of the web just as cell phones. This part additionally presents the ideas of execution of enactment and school projects to battle digital harassing. These are the significant activity plans recognized by the paper as answers for the issue of digital harassing. The presentation likewise distinguishes the different partners who are the key players in the proposed arrangements. These are additionally the crowd of the paper, and these are recognized as legislators, school heads, guardians and understudies. The second piece of the paper gives a foundation and a recorded point of view of digital harassing. In this part, digital harassing is distinguished as a type of tormenting that developed because of the... This exploration will start with the meaning of tormenting as a demonstration of alarming or badgering an individual who is probably more fragile or littler. This conduct is activated by different angles. For example an individual can be harassed in light of their race, their sex, their sexual direction, religion, weight, handicap or even ability. Tormenting can take numerous structures including physical harassing where an individual can be kicked, hit or pushed. Harassing can likewise be verbal or through innovation, which is alluded to as digital tormenting. Harassing generally happens in schools and is for the most part physical and verbal yet digital tormenting is quick developing as the favored method for tormenting. Tormenting has two players included, specifically the domineering jerk and the person in question. The casualties of tormenting shift contingent upon the type of harassing. For example tormenting can occur as ahead of schedule as kindergarten; this is particularly for physical and for the most part verbal harassing. At this stage anyway it is uncommon to have digital tormenting for instance. Digital tormenting is generally normal among young people, who are the regular clients of innovation and all the more so the internet. Canadian educator Bill Belsey is perceived for having begat the word digital harassing. Belsey portrayed digital harassing as the utilization of innovation for over and over conveying unsafe and antagonistic messages to other people. In comprehension digital harassing, one must understand that there are different types of digital tormenting and there are devices that are utilized to submit digital tormenting.

Wednesday, May 6, 2020

A Defense Of Abortion, By Judith Thomson And John Noonan

When it comes to ethical issues in the world, there are not many more controversial issues outside of the topic of abortion. Abortion brings in emotion, religion and ethics all at once, which is why it is such a polarizing topic. This leads to having many on each side of the debate, such as Judith Thomson and John Noonan. Thomson makes many valid analogies in support of abortion in comparison to Noonan who just refutes basic arguments for abortion, and it is for this reason that Thomson is more persuasive. While Thomson makes many different analogies in his essay â€Å"A Defense of Abortion†, none were as persuasive as the famous violinist analogy. In the analogy, Thomas paints the picture of someone being kidnapped and their kidneys being used to support the life of the violinist. Thomson uses this argument to represent the idea of a woman supporting the life of a child or fetus at the expense of their own. Thomson goes on to show the reader that the idea of unplugging yourself is not unjust, therefore â€Å"unplugging† yourself from a fetus is not unjust as well. The question of rape is also addressed with this analogy as the violinist is violating the victim’s body just as the rapist does. Thomson goes on to modify the analogy throughout the essay. The first modification to the analogy is that the act of supporting the violinist will kill you, just as sometimes birth may kill a woman. In either case, it is widely accepted that unplugging yourself or aborting the baby is withinShow MoreRelatedThe Argument Of Defending Abortion850 Words   |  4 PagesDefending abortion is always controversial. But, in some circumstances it can be justified. In the case of Clare Macwurter, her mental state questions if abortion is permissible. Judith Thomson’s article â€Å"A Defense of Abortion† argues analogies defending her reasoning for justifiable abortion. In some cases, Thomson reasons that abortion is sometimes justifiable. Munson states, â€Å"When the reasons for having an abortion are trivial, then abortion is not legitimate. When the reasons are serious andRead MoreA Defense Of Abortion By Judith Thomson965 Words   |  4 PagesPhilosopher Judith Thomson, in her article â€Å"A Defense of Abortion,† presents a hypothetical case of a famous violinist who has a health condition that can only be healed by getting â€Å"connected† to someone compatible and use his kidneys for 9 months to clean his contaminated blood. A compatible person is then kidnapped, rendered unconscious, and connected without permission to the dying violinist. When the victim wakes up, he gets an explanation and is presented with two options: he stays connectedRead MoreMorality and Social Policy1205 Words   |  5 Pages(1970)7057055John T. NoonanJohn T. Noonan, JrAn Almost Absolute Value in HistoryThe Morality of Abortion: Legal and Historica l Perspectives51-591970CambridgeHarvard University Press HYPERLINK l _ENREF_2 o Noonan, 1970 #705 Noonan (1970), anyone conceived by a man and a woman is human and by recognizing this fact, it is inhuman to kill the fetus despite its imperfections. He also presents the argument that by limiting humanity to exclude certain groups which comes from allowing abortion as a result of imperfectionsRead MoreShould Abortion Be Legal?1448 Words   |  6 Pagesstudying the debate on whether or not abortion should be illegal, you are approached by many different writers with interesting arguments, filled with their opinions and reasons for why abortion should or should not be allowed. Two essays that have caught my attention while reading about the debate of abortion are: â€Å"A Defense of Abortion† by Judith Jarvis Thomson, and â€Å"An Almost Absolute Value in History†, by John T. Noonan Jr. Thomson argues that abortion is permissible in cases where the mother’sRead M oreThe Argument Of Abortion On Abortion1692 Words   |  7 PagesThe argument of abortion is largely circumstanced around whether or not a fetus should be considered as a human person and, if indeed it is, when exactly in the stages of development can a person agree with the aforementioned statement. Most pro-life supporters firmly believe that a fetus is a human at the instance of conception and use this as a sole basis to argue that abortion is therefore immoral. Judith Jarvis Thomson is not convinced that this basis is a sufficient defense and approaches theRead More The Debate Over Abortion Essay2024 Words   |  9 Pagesa fetus, abortion, the ending of a pregnancy by removing a fertilized egg, has become increasingly controversial. The morality of abortion has caused many to separate into opposite sides of the spectrum, pro-life and pro-choice. The arguments over abortion has stirred a continuous debate between a pro-choice stance such as that presented by the analogical reas oning of Thomson or Glover’s examination of social context and a pro-life position argued by a moral view of personhood by Noonan. The ethicalRead MoreAbortion Matters of Life and Death Casts Dispersions on Both Pro-Abortion and Anti-Abortion Debates1980 Words   |  8 PagesAbortion A. Jonathan Glover, in his article Matters of Life and Death casts dispersions on both pro-abortion and anti-abortion debates citing them as too knee-jerk emotional reactions diminishing the inherent complexity of the other side (1. Glover, CC2006, p. 0110). Glover comprehensively addresses the key points of both sides of the abortion debate and evaluates their inherent virtues, especially for those who hold these opinions, then methodically points out its flaws. Ultimately, Glover comesRead MorePermitting Abortion and Prohibiting Prenatal Harm Essay2987 Words   |  12 Pagesis a basic contradiction involved in permitting abortion while at the same time prohibiting prenatal harm. (1) This contradiction can be stated in personhood terms and in terms of the womans rights. Id like to elucidate that contradiction and examine three solutions which rise out of current literature; Id like then to propose a somewhat new, fourth solution. The Contradiction Stated in terms of personhood, the contradiction is this: abortion is permitted or condoned because the fetus (2)Read MoreA Defense of Abortion: Most Opposition to Abortion Relies on the Premise That the Fetus Is a Human Being9495 Words   |  38 PagesA Defense of Abortion Author(s): Judith Jarvis Thomson Source: Philosophy and Public Affairs, Vol. 1, No. 1 (Autumn, 1971), pp. 47-66 Published by: Blackwell Publishing Stable URL: http://www.jstor.org/stable/2265091 Accessed: 10/01/2010 00:54 Your use of the JSTOR archive indicates your acceptance of JSTORs Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTORs Terms and Conditions of Use provides, in part, that unless you have obtained prior

Bel Air Chair Free Essays

Bel Air Chair Peter Shire has many interesting works of art. The artwork that stuck out to me was the Bel Air Chair. Its interesting physic really caught my eye. We will write a custom essay sample on Bel Air Chair or any similar topic only for you Order Now The colors and shapes were so bright and different; it just jumped out at me. It was so unique and diverse from any of his other artwork; I had never seen anything like it before. With further research I discovered that this amazing work of art was created in 1982. This chair was one of the most important contributions to a design group called Memphis. The chair became a signature object for the Memphis Collection and was used on many book covers and posters. Shire got a lot of his inspiration from Los Angeles while creating this piece of post modern art. To me, the main part of the chair is obviously the colors. The vibrancy and brightness are the first things that catch the eyes of admirers. He didn’t stick to one color. He used a dark, maroon, red color for the back of the chair as well as a green, yellow color for the cylindrical arm which establishes a contrast. He used an orange for the sphere on the back part of the chair. My favorite color of the chair was the semi-pastel green on the bottom front of the chair. This color, along with the semi-pastel pink, makes it look classy and elegant. The materials used on this chair were wool and cotton. It brings the sense of warmth and comfort that makes you want to sit and curl up on the chair. Its inviting with the look of its bigness and comfort that makes it more attractive. Being an art teacher’s daughter, i’m drawn to this type of colorful extravagant art. It brings a spice and jazzy look to art. This chair was made of many different geometric shapes and materials. A sphere was used for the bottom back of the chair to add some diversity to the chair and make it Peter Shire’s own creation. A cylinder was used for the arm rest which is only on one side of the chair which creates a distinct look while the other side of the chair is half of a cylinder which helps to create a sense of uniqueness. A square was used as the seat of the artwork which exaggerates the look of it being a chair. The back of the chair is a different and difficult shape to explain. This shape makes you think and really admire the artwork. Trying to figure out what kind of creative mind could come up with such an extraordinary work of art puzzles me. Peter Shires inspirations came from many different objects. The sphere was inspired by a beach ball which he had used for the bottom back of the chair. The best part about the chair is the part where you lay your back when you sit. He got his inspiration from a beach wave or even a shark fin. An interesting part of this work of art is that it was named after a five-star luxury hotel in Beverly Hills California. The title that is on the Bel Air Chair was taken from the hotel and placed on his piece. At first glance, the work of art is not perceived as wood. It looked like shiny plastic glazed in bright colors. With a closer look it was clear that it was wood. This extravagant work of art looked difficult to carve yet so perfected. His use of the variety of colors was complimenting both to the objects and the other colors. His chair has been duplicated into a special limited edition which is shown at museums all around. His work of art would have not nearly gained the popularity it accomplished if it weren’t for the colors. The pop of the chair made it a hit. How to cite Bel Air Chair, Essay examples

Tuesday, May 5, 2020

Corporate Finance Notes free essay sample

Need to be familiar with exchange rates and political risk. D. Beneficial to understand the customs of other countries; speaking a foreign language. Business Finance: (Corporate Finance) Some important questions that are answered using finance: What long-term investments should be taken on by the firm? Where will we (the firm) get the long-term financing to pay for the investments? How will we manage the everyday financial activities of the firm? Financial Manager: They try to answer some or all of the business finance questions. The top financial manager within a firm is usually the Chief Financial Officer (GOOF)Treasurer oversees cash management, credit management, etc. Controller oversees taxes, cost accounting, etc. ** Corporate Organization Chart, Figure 1. 1 ** Goals of Financial Management: What should the goal of a corporation be? Getting money back to shareholders, investors, etc. Making a profit is important. Minimize costs. Maximize market share Maximize the current value per share of the companys existing stock. We will write a custom essay sample on Corporate Finance Notes or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Maximize the market value of the existing owners equity. Does this mean we should do anything and everything to maximize owner wealth? Outsourcing? Off-shoring? Corporate support of charities?

Food and Beverage Services free essay sample

Then the service is done a laid cover on the table. Following are the type of service come under this category: English Service: Often referred to as the Host Service because the host plays an active role in the service. Food is brought on platters by the waiter and is shown to either portions the food into the guest plates directly or portions the food and allows the waiter to serve. For replenishment of guest food the waiter may then take the dishes around for guests to help themselves or be served by the waiter. French Services: It is a very personalized service. Food is brought from the kitchen in dishes nd salvers, which are placed directly on the table. The plates are kept near the dish and the guests help themselves. Silver Service: The table is set for hors doeuvres, soup, main courses and sweet dish in sterling silverware. We will write a custom essay sample on Food and Beverage Services or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The food is portioned into silver platters at the kitchen itself, which are placed at the sideboard with burners or hot plates to keep the food warm in the restaurant. Plates are placed before the guest. The waiter then picks the platter from the hot plate and presents the dish to the host for approval. He serves each guest using a service spoon and fork. All food is presented in silver dishes with laborate dressing. American/Plate Service: The American service is a pre-plated service, which means that the food is served into the guests plate in the kitchen itself and brought to the guest. The kitchen predetermines the portion and the accompaniments served with the dish balance the entire presentation in terms of nutrition and color. This type of service is commonly used in a coffee shop where service is required to be fast. Russian Service: An elaborate silver service much on the lines of French service except that the food is portioned and carved by the waiter at the gueridon trolley in he restaurant in full view of the guests. Display and presentation are a major part of this service. The principle involved is to have whole Joints, poultry, game and fish elaborately dressed and garnished, presented to guests and carved and portioned by the waiter. Gueridon Service: This is a service where a dish comes partially prepared from the kitchen to be completed in the restaurant by the waiter or, when a complete meal is cooked at the tableside in the restaurant. The cooking is done on a gueridon trolley, which is a mobile trolley with a gas cylinder and burners. The waiter plays a rominent part, as he is required to fillet, carve, flamb © and prepare the food with showmanship. The waiter has to have considerable dexterity and skill. Snack-bar Service: Tall stools are placed along a counter so that the guest may eat the food at the counter itself. In better establishments, the covers are laid out on the counter its

Friday, April 24, 2020

What is a Router Essay Example

What is a Router? Paper The computer is comprised of an overall system architecture eased on the designers needs and design constraints much like the network. Specific comparisons are that the signal and data busses comprise the physical network with the Operating System analogous to the router and route-policy systems in the network. As the network is equipped with ports in locations necessary for user and device access, the computer is equipped with interfaces and interface devices that enhance the ability of users to interact with the computer mouse, keyboard, monitor, etc. 2. Given the existing configuration a total link-weight of 22 between Network A doe) and Network B (Sandy) is errantly in place. Given the option to adding an additional link with a weighting of IS to the architecture the link could he added between Network C and Network 8 to arrive at a total link weighting to 20, or the link could be directly implemented between Networks A and d, The exact location for improving the interconnectedness between the networks should be determined by studying the communication flow between Networks A and B as well as Network C and B. A CDC is a WAN service that is specifically optimized for the distribution of either static or streaming content to Internet users. There are two functions that preferential a CDC from most traditional public IP-based networks namely the function to look at the source of a connection request and determine the best resource to assign to the data request based on geographic localization and server utilization Mannerly that the closest server With the lightest loading will be the proper device to route a connection request to. We will write a custom essay sample on What is a Router? specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on What is a Router? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on What is a Router? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer More directly a CDC attempts to optimize traffic flows to the most local answer possible rather than following strict hierarchical routing rules. The challenge for the CDC architect is to constantly review source requests and to place data sources in the right areas s traffic patterns grow and change. 4. The end points of the service are defined as the physical hand off between the WAN provider and the client network equipment (router or switch), A. Metrics that may be applicable to the end to end service connection between client endpoints are: i. Availability based on reliability, contracted throughput, and error rate. Ii. Quality of service as measured by droppedlost packets or frames as a percentage to overall traffic presented to the WAN. Iii. Specific So measurements by protocol -? for example traffic may be contracted for a higher availability than ESMTP traffic. In the case of an ATM WAN where ATM So metrics are used the granularity can be very finely defined to jitter (maintenance of a strict time relationships between ATM cells), cell loss, and differentiation of traffic contracts between Constant Bit Rate and Unassigned Bit Rate streams. The simplest metrics that are representative of overall system delay are components that affect the network specifically: traffic loading and any data loss that might be caused by discarded frames on a WAN, the physical distance between the source and sink (a rule Of thumb is Aims delay per 100 miles Of injection distance), capacity of the embedded switches and routers on the WAN network if they are overloaded at any one point then frame discard and loss are directly impacted as TCP attempts to resend the frames which are then seen by the user as an increase in latency on the link. At the server end metrics that contribute to overall delay can include the quality of connectivity been the server and the network, the capacity of the server to fulfill data requests based on the type of data the users are requesting (streaming versus static content, or short bank type ATM transaction messages), disk resources and verbal user traffic demands on the server(s). 6, Before Firewall: uses uses Gee Switch Router alms POS CO-48 Total Latency: moms (PC to Server) Servers 1 ms uses 1 souse Gee switch Router User PCs B. After Firewall: 1 souse Gee Switch uses Router alms POS COCO Inns Router uses Gee Switch uses Total Latency: 2. Ms (PC to Server) uses User PCs Fastest Switch Security Firewall 7. High-quality (phone company-grade) voice calls: Guaranteed service Required because the calls are very sensitive to dropped data in order to retain legibility and identity Of the calling party A. Voice over IP (Poi): Predictable arrive Given the user expectations and the nature of public IP networks, the POI connection needs to be predictable, but does not require the end-end guarantee of a traditional phone call. B. FTP File Transfers: Best Effort Best effort is adequate to provide the connection between user and source with TCP ensuring delivery off all data frames C. Audio File Downloads: Best Effort As with FTP, this is a non real-time application that can make use of TCP to ensure delivery over a variable time. D. Video on demand: Guaranteed Service Required to ensure that the video data stream maintains a fixed loss and titer tolerance across a heterogeneous network to avoid loss of video signal or unsatisfactory picture quality. E. Server access: Best effort As with other non time sensitive applications, Server access can be accomplished over a best effort service that best accommodates the variable bandwidth and user demands for the data link, 8, perform-nuance Boundaries and Thresholds A. The MS (network Management System) could be programmed to route specific traffic types over different routes depending on So needs if a specific threshold was exceeded, In this case, time-sensitive traffic could take the most direct route that could purport the sub-moms requirement while less important traffic could take longer-delay routes. B. Setting up a monitor package to trap packet throughput between the user and their local router Or Ethernet switch port will allow the network administrator to ensure that any one user does not use more network resources than they are allotted. Chapter 2 Exercises: I. Why is requirements analysis important to network architecture and design? Give three reasons. A: Analysis provides a number of widely researched data points that help to filter out specific user or group needs that may not be reflective of the organization as a whole. Specifically, three reasons for performing requirements analysis are: To develop a more objective, organization-wide view of system requirements and services needed. To ensure the interconnection architecture (how meshed the network is and where the interconnect points are) matches the information flow within and between groups in the organization Network capacity planning and link sizing. 2. Categorize each of the following requirements as core (fundamental), feature, or informational. A, Network must support Fast Ethernet and Gee interfaces for all devices on the network. i. This is a fundamental requirement. This defines the base technology and technical capabilities and constraints that the network must provide to end users. B. Network backbone should be upgradeable in capacity to Gob/s within 2 years of deployment. i. This is a feature. This requirements speaks to a technology enhancement (Gobs Ethernet) that is not currently available but which is actively in development by the relevant industry standards organizations. His was not a requirement set forth as part of the overall system design but avgas offered by the hardware vendors, then this would be an informational requirement. C. Finance department requires firewall retention for their server. i. This is fundamental. This requirement may have been discovered via requirements analysis or it may have just been a fixed design point specified by the relevant group. D. Existing network consists of Scabies Ethernet and EDDIE segments. i. This is informational. The fundamental requirement for the new newborn to support BassettGee has already been set. This is merely informational to the designer, possibly implying some reuse of facilities (copper or fiber) from the existing network. E. Newborn personnel would like to be able to bill users for network service. i. This has tuft answers: If the requirements analysis drew out that the network had to directly recoup its costs and operational expenses, or that billing was a requirement to support transient users then this would be a fundamental requirement. IF the billing option was merely a desire by the IT etwork support group and was not a requirement identified throughout the organization ,then this would be classed as a feature given that a complete network accounting and billing system implies much more infrastructure than just the physical and logical interconnectivity the network provider* Network core must not enervate or terminate any user traffic. i. As may be logically inferred from the Statement this is a fundamental design requirement Of the network. G. Network must support digital video traffic from remote video cameras and may additionally support sound from these cameras. i. As With item (P) above, part of this statement is a fundamental requirement (the need for digital video traffic support) and part is feature-driven (the desire to have audio along With the video). Please note that this requirement does NOT specify the technology used to deliver the requirement in other words, the fundamental requirement or the network to support Bassett and Gee does not imply that the digital video must run over Ethernet. In this case, the digital video is a fundamental requirement, but the methodology to provide the digital video may be a feature of a manufacturer to do so over Ethernet, or may be on a completely separate and parallel nonvoter infrastructure to the Ethernet backbone. 3. Categorize each of the following requirements as user, application, device, or network. A Database servers must run Brand EX. software. i. This is a straightforward user requirement based on factors external to the network requirements analysis. Reasons for this may be embedded base of developed applications based on the EX. software, business relationships, or other, no- technical reasons. 8. Teleconferencing requires at least Kbpss capacity. i. This can be a combination of two factors -? application and device. Since there is no additional information provided here for the Kbpss stated requirement it will be the analysts job to determine if the bandwidth figure is based on the device needs of the teleconferencing equipment or is there an associated application that defines a frame rate or resolution that is satisfied with the cookbooks stated need. As with all other areas of the requirements analysis, the person doing the data gathering and analysis must separate the device and application needs from the pre-conceived needs that the users may hold. This is one of the fundamental jobs expected in doing a thorough analysis separation Of the imagined need from the actual requirement. C. Users must be able to submit print jobs up to MOB in size. i. This is an application requirement. Presumably with data gathering the architect will come to quantify the application that is generating such large print files and accommodate them in the overall design. Properly answering his application requirement speaks to the needs to understand information flows (where are the users versus the print-server or printing system and what impact does that have on the network architecture from bandwidth needed between user, server and print system and where is it most efficient to place the printing system. D. Each access network should be able to serve up to 200 users. i. This is a network requirement. The type of users and applications are not stated here, 50 the current information only supplies a design need for network capacity per access network. 4. Give an example of a requirement as it lows from user to application to device to network. Show how it becomes more technical at each component. User: must have assetsGee connectivity Application: Requires Spooks-sustained throughput Requires access to servers located in two separate areas of company. Network: Must support TCP, FTP and NAPS along faith firewall in front Of each application server and RADIUS user authentication. SUMP required to monitor and control network attached devices. 5. Which Of the following customer requirements could be categorized as misconstruction? As rate-critical? As real-time? As none of these? Give reasons for each choice. A. Processing telemetry data from a space shuttle launch and providing that data to mission control during launch (Customer: NASA). i. This fulfills all three requirements as defined above. It can be assumed from the information provided here that the telemetry information is (literally) mission critical since it is being collected and disseminated real-time during the launch versus being analyzed post-launch, The information is rate critical because the activity is happening in real time and the need is to monitor conditions as they occur during the launch. And finally it is real time since the action related to the tat (Shuttle launch) is intrinsically required as the launch occurs there may be postulation data analysis and processing but that would come under a different set to requirements tort analysis and network support. B. Processing requests from automated teller machines throughout a city, (Customer: Bank) i, The data is mission-critical to the Bank because it is core to their business needs during the day, The network needs to be very reliable and not provide a single point of failure path normally ATM networks for Banks use a network topology where the ATM machines in a small geographical area are spread out on different recruits taking different physical routes so that any one network failure will not incapacitate all the Tams (and the Banks ability to conduct business) in a specific area of town . There is no erratically nature to this traffic since the inquiry response messages that are sent between the ATM and the Banks hosts are relatively short and large-bandwidth connections will not improve transaction-processing times. Tee requirement is also not real- time since the Bank computers are operating on a inquiry esponse model and do not have to interact with the customers in real-time (as we define real-time). C Processing requires for Web pages from your servers. (Customer: Internet Service Provider) i. Without knowing the nature of the web pages we Will make the assumption that this is not a mission. Critical application since the public Internet is being used for server access. This assumption is based on the highly non-deterministic nature and reliability of the public Internet versus a private network, Again, the rate-critical nature is not applicable because no streaming application (video being served on a web page from the corporate server), was defined so we may assume these are static web pages. Ghastly, since the public Internet is the media, there is no real-time component possible so we can summarize that this application does not require any of the specified customer requirements. 6. Give an example of a mission-critical application tort each of these three environments: government, military, commercial. Why would each application be considered mission-critical? A Government: The fire department is a mission critical government applications The requirement is to monitor in real-time all the fire alarm sensors throughout a cubby and then to dispatch the closest fire-fighting equipment to that location. Reliability, real-time and mission critical are all factors in this application need. 8. Military: Actions during a military engagement are mission critical the need is to have real-time access to data from many different sources in order to provide relevant command information to the army. C. Commercial: Commodity trading floor. The mission critical nature here is that the brokerage houses need to have extremely accurate, realties information Of actions in money markets and trading floors in order to make real-time decisions for their business needs and the needs of their clients. A loss of communication here could mean huge financial losses or business failure for the brokerage house. 7. Section 2. 5. 1 describes several types of delay (real-time, interactive. Burst, interactive bulk, and asynchronous). Give an example of applications or traffic types that have each type of delay. A. Real-Time: These can either be a traditional real-time source such as a camera or broadcaster using a local or wide-area network for content distribution (01 ERECT/s local channels are one example). Another example is in the fly-by-wire networks found in most modern airliners -? the pilot inputs to the controls are acted on in real time by the flight computer and passed over copper and fiber networks within the airlines to move control surfaces and control the engines, Not only is this real time, but also it is a duplex path where the effects the flight control movements have on the airliner must be passed back to the pilot in real time B. Interactive-Bulk: A commercial example of this would be in the ATM example referenced earlier. The key factor in this delay model is that the network is not providing the relevant time delay factor in getting a response to input -rather is the processing of he input commands or instructions that is the source of the predominance of the delay. The user inputs a request (get money) and the commands travel the network and cause a large number Of actions to occur at the host end (validating password, adequate money in the account, and then authorizing payment back to the ATM). In most networks, the ratio Of delay between the network and the host processing time is usually an order of magnitude or more. C. Interactive Burst: A delay factor that is characteristic Of a high network latency and a low processing latency For example, any application with minimal host processing mime would fall into this category most directly a telnet or terminal connection to a device over a network. The vast amount of delay that the user sees is from the network component since most actions in this application require little to no host processing time and the delay is chiefly a factor of network throughput and delay characteristics. D. Asynchronous: Here there is no connection between the newborn latency and the host-processing time. Messages are created and sent without regard to time synchronization between sender and receiver. One modern application would be Instant Messaging (AIM, Yahoo IM, etc. , where the network is applying a variable latency to embedded hosts (the IM servers) that have a variable processing time. From the user view each person can type messages back and forth to the receiver without having to wait for a response to the last message. 8_ Delay performance is increasingly important in support of user and application requirements. Describe why delay is important for the following applications: A. Voice over P: Unlike the IM example discussed above, Poi requires the same degree of sender-receiver delay consistency that a traditional phone call provides. Prom the users view, their brains are expecting a message to be received and then they can immediately issue a response 3 variable delay factor in this application Will cause users to issue longer back- off timers (they will wait longer periods after the receipt of message before responding. An example Of poor delay performance lies in the satellite and extreme long distance phone calls where the propagation delay based on network length (thousands of miles) creates an extremely long elastic delay that users have to consciously account for. B. Unfettered (real-time) video or audio lullaby: In this application, the interactive component that could be affected by delay is not present, but the effect of a variable delay on the application is seen because of the compression schema used tort these traffic types. With a variable delay a real- time video signal may see some portions of the message arrive out of sequence to the receiver. Since this is compressed material, the receiver has no mechanism to cope with inputs that are not time-sequential and that data is normally thrown out by the receiver. The user(s) see this as video or audio dropouts as material s lost by the viable delay component that the network is introducing. C. Teleconferencing: As with Poi and real-time video, the users are presented with an input signal that does not follow the real-time format they are expecting. Pending on the ability of the equipment on each end of the connection to accommodate this variable delay, users may begin to talk over each other and then back off in order to get the conversation back in sync, or a video conference may be interrupted as the image being received on each end is out of sync with the audio that is presented as part of the teleconference. Based on the following applications locations, develop an applications map using the template provided in Figure 2. 17. A. There is a distributed computing application between all compute servers. B. There is a data storage/access application between all compute servers and the storage servers in Main Engineering. C. There is a data migration application between Main Engineering, External Access Building, and Off-Site Data Archival. Campus LANA Building A Internet External Access Building B Main Engineering Building Application A Application C Off-Site Data Archival Building C Application B 10. Which devices below can be considered generic computing devices? Servers? Specialized devices? A. An ATM machine: A specialized device a single-purpose intelligent terminal designed for one specialized task. B. Laptops running Linux 05: generic computing device. In spite of being loaded with the Linux SO, both the laptop and Linux are Off the shelf, generic general computing devices. C. IBM computing cluster of 128 PCs: This is a server of course, and depending on the SO configuration and network design, they may also be considered specialized devices if the application makes them unsuitable for any general purpose work. D. Sun Enterprise 450 database server: This is a general-purpose server and SO (Solaris), that is running a database application. Depending on how specialized the database is, this may also be a specialized device.. but for our purposes it is merely a general purpose server. E. Desktop PC running Windows 2000: As generic as they can possibly be. I l, Add the following devices to the application map developed in problem 4 A Compute servers are located in buildings A, B, and C (l server each), and S compute servers are located in Main Engineering. 8. Storage Servers are located in Main Engineering (2 servers), External Access Building (I server), and at the Off-site Data Archival location (l server). 12. List the Top 10 applications that you expect to use in your work (or your customers) network or that you currently use in the existing List the actual or estimated performance characteristics for each application and try to place them into groups, You can also try to map them to the application groups listed in Section 25. 2. Credit Verification (LOOT) i. Interactive application ii. TelemetryCommand and Control Application E-Mail i. Asynchronous ii Non-real-time Videoconferencing i. Tell-service application ii. Real-time Distributed server database update (Supermarket code-scanner database update) i. Bulk data transport ii. Interactive-bulk Self-Service Web Sales (Product sales via Corp.. Web site) i. Interactive Bulk ii. Client-servers-access Software downloadupgrade (FTP i. Interactive Bulk ii. Bulk data transport Remote terminal access (telnet) i. Interactive-burst ii. AM Security Camera monitoring i. Real time ii. Tell-service Broadcasting (Television Network programming) i, Real-time ii, Tell-service Airline Reservation (Agent) i. Client Server ii. Interactive Chapter 3 Exercises: 1. Initial conditions for your network project consist of the following categories: type of network project, scope of network project, and architecture/design goals. Develop 3 sets of initial conditions (each containing I element from each category), and give an example network project for each set. A. Condition A: New network; Single Site; Support New Application: This network example is the ideal of any network architect an clean sheet of paper design that can make use of new technologies that are available since any in- place networks were implemented. Additionally, this is a single-site network so o WAN considerations, firewall, or other intrusion detection concerns need to be addressed as new issues. An example Of this would include a new company or new division setting up in an empty building. B. Condition B: Analysis of N.B.,pork problems; distance between sites; improve performance to all or part Of the network. Here we are dealing with a set of criteria where an annual (or first time) review of the infrastructure of the corporate WAN is being taken. In this case, the issues are focusing on performance, cost and technology deployed as the current solution been corporate locations and whether the current answer s still correct in the face of current user and application needs. C. Consolidation; network size; upgrade technologyvendor.