Tuesday, January 28, 2020

Advantages And Disadvantages Of Using Networks Computer Science Essay

Advantages And Disadvantages Of Using Networks Computer Science Essay Introduction to network Computer network or network is collection of computers, printers and other devices connected with each other through a connection medium and other suitable peripherals. The purpose of the connection is mainly transfer or share data, share of resources such as printers, applications etc. The connected computers and devices may be in the same building or can be Located in different part of the city, country or world. Appropriate connection medium, peripherals, software enable computers to transfer, and receive data such as text, pictures, video, sound through email, file transfer (ftp-file transfer protocol), web pages(http -hyper text transfer protocol) etc from one computer to another computer in the network securely. History of networking The first idea of computer networking was developed by J.C.R Licklider, a computer scientist in 1962. He was later appointed by U.S. Department of Defence at their research project called ARPA (Advanced Research projects agency). ARPA was funding research for developing computer network to MIT. In 1966 first ARPAnet plan for packet switched network unveiled and in 1969 first official computer network was built between University of California Lon Angels (UCLA), Stanford Research Institute (SRA), University of California Santa Barbara (UCSB) and University of Utah. The first message was sent from UCLA to SRI. In 1973 Arpanet goes global; University College London and few other European organizations joined the network. In 1982 standardized Internet technology protocols TCP/IP (transmission control protocol and Internet protocol) were developed which enable internetworking among single sets of networks efficiently and commercial Internet services started to evolve. In 1991 World Wide W eb was developed and Internet became popular and expanded rapidly including dramatic rise of email users, text based discussion forum etc. Advantages and Disadvantages of using networks Advantages Disadvantages Share of Expensive Resources: Printer, fax machines, modem and other connected resources can be shared. File and application sharing: Major advantage of network. User can access any file remotely from his computer to another computer with appropriate security measures. Applications also can be used without having installed in every computers of the network. Cost saving: Sharing application by installing its network version saves cost of many copies of individual application. Sharing devices such as printer, fax etc saves cost. Secured: Files and application are password protected in network, which means only authorised person can access it. It is more secured than traditional file system. Speed: Message, Data, file can be transferred almost instantly to any part of the world. Easy management: Software can be installed in server, also managing and troubleshooting can be performed in server. This eliminates the need of installing and managing software in hundreds of computers in an organization. System failure: Servers or connection faults stop accessing files or data. This can lead to loss of data and resources. Security issue: data and file can be theft by hacker. This is the main drawback of computer networking. Computer viruses, spyware attack can lead to system failure, data and resources loss. Expensive Equipment: Networking equipments are expensive compare to traditional file system and communication method. Answer of criterion P1 (b) Remote Access Remote access means accessing and using any file or application from a computer to another computer connected in the network. Both computers may located in same building or thousands miles away. Generally files or applications are accessed over Internet, intranet or LAN with an authentication process which determine the level of access of the user. For example, a sales staff of Barclays bank accessing loan authorisation database from his home through Internet. Intranets Intranet is a private computer network between an organization using Internet protocol and tools such and HTTP, file transfer application to share information or application within the organizations. Typically, authorised users of an organization gain access files or applications in Intranet through a web page with their user name and password. Staffs of the organizations also maintain internal communication in Intranet via email. Email is accessed via an email client such as Microsoft outlook, Eudora etc. this email clients use POP3 (post office protocol) and SMTP (simple mail transfer protocol) for receiving and sending mail. When an email is sent, the email client connect to the server after providing valid user name and password and verify the address of the recipient, if the address is correct it leaves the email on the server. When recipient checks his email, his email client connects to the POP3 server. POP3 server also requires a user name and password. After logging in email client bring the copy of email message to users computer and generally delete the message from the server. User than read or search email message in his computer. Internet Internet is the largest network in the world. It interconnects world wide networks of organisations, billions of computer users in one single network using Internet protocol (TCP/IP). Internet is a global data communication system with the largest resources of information and services such as World Wide Web, Email, file transfer protocol etc. Email in Internet works using SMTP, POP3, and IMAP. Users use email software or web page email program such as yahoo, hotmail etc for sending and receiving mail. This program connect user to the server for sending and receiving email similarly discussed in Intranet section. In Internet SMTP server has communication between other SMTP servers in Internet. When an email sent SMTP server check the address and send the mail to recipient email server. Similarly when recipient checks the email using POP3 it does the same as discussed earlier. IMAP (Internet mail access protocol) is more advanced protocol which provides better features than POP3. In IMAP email is kept in the server. User can organise email in different folders and they stays in the server. It enables users accessing mail from any computer any time as email resides in the server. LANs (Local Area Networks) Network in a limited geographical area such a home, office, school in same building or in different building within short distance. Each connected computer or devices are called node. Currently most wired LAN connects using Ethernet technology. Fig: LAN WAN (Wide Area Network) WAN connects networks over a large geographical area such city, state or over countries. It uses routers and combination of communication channels such as public communication link, air waves, etc. Fig: WAN MANs (Metropolitan area network) MANs connect two or more LAN within a same city or town. It normally connects two or more branch of an organisation within the same city using routers, switch, and hub. It often connects through public communication link. Fig: MANs Networked application An application software which can be shared on a network from connected computer by an authorise user. Networked application is normally installed on server of a network, and authorise users of that network (LAN/WAN) can access and work with that application from their workstation. This application utilizes Internet or other network hardware infrastructure to perform useful functions. Answer of Criterion P2 Description of Devices/ Hardware/ software Number of unit and unit price Price Performance Security Utility Workstation: COMPAQ Presario CQ5305UK-m Desktop PC with Monitor CPU- Intel Core2 Duo 2.1 GHz OS; Windows 7.0 15  £359  £5385 20 work station is connected using netgear switch provides a full duplex very high 100 mbps data transmission speed over a 100baseTX connection with UTP CAT6 cable. Dell powerEdge server with Windows server 2008 R2 standard edition gives efficient and secured file sharing and print server functions, remote access, application sharing. Windows server 2008 R2 edition has an increased efficiency and service with windows 7.0 clients operating system. Microsoft Windows 2008 server R2 edition network OS have enhanced security features to prevent server form hackers, and gives a solid dependable environment for networking. Kaspersky Business space security software provides real time protection to the server and work stations against harmful virus, spyware, and other harmful internet treats. its constantly monitor and scan all open or modified files and application. It isolate any infected workstation on the network to prevent the server from being infected and clean the workstation. This LAN will enable the users of this organization share file and information whenever they needed from their work station. They are able to print any document from their printer using network printer. Sharing printers and applications saves companys cost and increased productivity. Server: DELLâ„ ¢ PowerEdgeâ„ ¢ T110   CPU: Intel Core i3 2.93 GHz Net OS: Windows Server 2008 R2 standard edition + 20 CALs (client access license) 1  £1359 Switch: NETGEAR JGS524 Gigabit Switch -24 ports 1  £237 Cables: 200 m UTP ( CAT 6 )    £42 Connector: Network connector RJ-45 2 pack ( 25 in a pack)  £4 each  £8 UPS: (UPS provides uninterrupted power supply to the server and prevent server failure due to an event of power cut). APC Smart-UPS 2200VA 1  £588 Security Software: Kaspersky Business Space Security for 20 workstation and 1 windows 2008 server. 1 year subscribtion  £587 Answer of Criterion P3 Overview of network Operating system A network operation system is a set of software that control and manages computers, printers and other devices connected in a network. it allows computers to share file and devices connected in the network. It is installed on a computer called server which centrally maintain the network. There are many Net OS from different vendors in the market. Among them most popular are Windows NT, Windows Server from Microsoft, Unix Novel Netware from Novel Inc. Apple Share from Apple Regardless of vendors all Net OS works by providing following functions and services to the client and server File and print sharing Accounts administrations for users Security Some basic features of a network operating system are- Add , remove and modify users, workstations, devices in the network Add, Remove and configure application software to be used and shared by the users on the network Control and manage users and their access Allow and control users to share data, application and devices such as printer, fax etc. Allows users to transfer data from one computer to another computer in the network Mange security and privilege. Security Implications of network use The computer connected in a network is vulnerable to intruder such as hackers and intrusion programs. Also virus, malware, spyware, worms on the network attack the system. Those attacks may results valuable information theft, system failure and data loss or even irrecoverable damages to the system. Intruder gain access and control of the system by using some methods as described below- Back door and remote administered program Spam email Email virus Trojan Horse program Hidden files To keep the system secure there are some security measure should be taken. System needs to be password protected, password should be changed regularly and shouldnt be disclosed to anyone System should have latest software update. Antivirus, firewall, anti spyware should be installed and should be updated regularly. Suspicious email shouldnt be opened. File or program shouldnt be opened from unknown sources Disable hidden file extension Disconnect from network when pc is not in use. Software Licensing Issues Software licensing is an agreement between user and software manufacturer. software using conditions and distribution limitations. Software is intellectual property and protected by copyright laws. When a software is obtained from any sources users enters into some legal bindings set out by the manufacturer or distributor on how this software may be used. These includes but not limited to numbers of users, distribution rights and limitation, resale rights and limitations, reproduction and modification limitations etc. Most of the commercial software comes with license when purchased off the selves. Some software license is bundled with specific hardware or new system, call OEM License. There are different categories of software license- Propitiatory: Software own by a company or individuals and not free or open sourced. Redistribution or reproduction is generally not allowed or limited Freeware and Open source software: Generally free and permits user to modify, reproduce and distribute according to their own preference Shareware, Trial ware: is propitiatory software but provided free to user to use for a limited period of time for testing. Reproduction is not permitted but distribution may be permitted with certain conditions Constrains on Capacity and performance Every Network has limited capacity of transferring and receiving data. this capacity (bandwidth) depends on the several factors such as device and medium used, price etc. each users of a network share the bandwidth and everyone is effecting the performance of the network. For example, if user sends a very large video or animation file to another computer in the network which most likely to use most of the capacity of the network, which will make the network very slow to other users. Thus performance is affected, in some cases packet or data losses may occur due to overloading of network. When a packet is lost, retransmission of packets attempted and this cause delay of receiving and sending data. Answer of Criterion P5 Relationship of Various Protocols, devices of network with OSI-7 layered model Application (Layer 7) Http-Hyper text Transfer Protocol Telnet FTP- File transfer protocol Presentation (Layer 6 Jpeg, Gif, avi, mov, mpeg etc Session (Layer 5) NetBios Names, RPC, AppleTalk, Winsock Transport (Layer 4) TCP, UDP,SPX Network (Layer 3) IP, IPX, AppleTalk DDP Router Data link (Layer 2) Frame Relay, HDLC, ATM, IEEE 802.3/802.2/802.5 Ethernet Switch, Bridge Physical layer (Layer 1) Ethernet, 802.3, 802.5, Token ring Repeater, Hub Ethernet: Most commonly used protocol for LAN. Ethernet fits into the Data link layer and Physical layer of OSI model and deal with the hardware of the network. it define about the type of media, connectors, characteristics, use of wires, shape of connectors etc. HDLC: High-level Data link Control used for point-to-point WAN link. TCP/IP: Transmission Control Protocol/ Internet protocol. These pair of protocol allows one network to communicate with another by creating logical address, segmentation of large data into small packets, data encapsulation, error recovery etc. UDP: User datagram Protocol. Transmit data from one host to another without establishing a prior connection. It simply transmits data without knowing if the data is transmitted correctly thus unreliable. ICMP: Internet Control Message Protocol carry error recovery data, control data such as destination unreachable, echo request, etc between two host Http: Hyper text transfer protocol, FTP: File transfer protocol SMTP: Simple mail transfer protocol

Monday, January 20, 2020

Health Care System Essay -- Comparative, Finland, Germany, Tukmenistan

Turkmenistan is located in central Asia As a consequence of the collapse of former Soviet Union Turkmenistan declared its independency in 1991. It occupies an area of 491 200 km2 and has an estimated population of 4 611 700. Turkmenistan has five administrative regions, called velayat. Each velayat is subdivided in number of districts called etrap. In 1997 life expectancy was for male 57.9, and for females 65.3 years.[3,5] 2.2 Finland Finland is located in north-east of the Baltic Sea. It has been independent republic since 1917. It has an area of 338 145 km2 and had 2005 a population of 5 260 000. Finland can be divided in three parts, state, province and municipality. 2005 there were 415 municipalities. The life expectancy for men was in 2005 75.8, and for female 82.7 years.[6] 2.3 Germany The Federal Republic of Germany is located in central Europe and it has an area of approximately 357 000 km2. The Germany, as we know it today, exists since 1990 as the former German Democratic Republic accessed the Federal Republic of Germany. It consists 16 states, each of them have a constitution which is consistent with the principles of national constitution. 2004 Germany had 82 500 000 inhabitants. Life expectancy at birth was in 2003 for male 75.6, and for female 81.6 years.[1] 3 How do the public and the private sectors function to provide health services? 3.1 Turkmenistan The basic organizational structure of health care system follows the standard model set down in soviet times. However, the organization and management of health services in urban area differs from those in rural area. There are two levels in health care, primary and secondary care. Primary care facilities are often very dilapidated; they need investment for e... ...od and new patients keep on coming to them for treatment. This results in my opinion lots of redundant diagnostic interventions, which are made just because the patient wants them to be done, even though there would not be a medical indication. In some cases the line between an inpatient treatment and a â€Å"wellness vacation† is fading away. It is an extremely expensive health care system with the result of the first health insurance company went bankrupt this summer. In the future there are further bankrupts to be expected, if new powerful reforms are not going to be executed or the benefits of this current statutory health insurance are not going to be prioritized. In my opinion the funding of German health care system, in the way it is at the time, will lead to bigger problems as they already have, which implies unnecessary misery for the weakest in their society.

Saturday, January 11, 2020

Go Green Speech Essay

Introduction: According to the U.S Census Bureau, the world population is growing at a mindboggling rate. The world reached 1 billion people in 1800, 2 billion by 1922, and over 6 billion by 2000. It is estimated that the population will swell to over 9 billion by 2050. This means that if the world’s natural recourses were evenly distributed, people in 2050 will only have 25% of the resources per capita that people in 1950 had. Thesis: People need to start making changes to their lifestyles by making environmentally friendly choices to help save our planet. Body 1) The slogan â€Å"going green† is seen and heard everywhere, but so many people don’t understand why go green. A) There are only so many natural resources and with the population to reach 9 billion by 2050, there’s going to be a lot less to go around. B) Burning of fossil fuels and other emissions causes increase in Carbon dioxide that leads to global warming. C) Landfills are a rising cause because they are filled with trash that can take millions of years to decompose. D) Even such things as deforestation have taken a huge impact on our rain forests. E) Also we ruin animal’s habitats for our benefits causing many animals to become endangered. Transition: Although all these reasons are scary results of what could happen, many people still don’t make the changes to help our planet. 2) There are so many easy changes everyone can do either large or small that will make a significant impact on helping our planet. A) Recycling is such an easy option that everyone can do to help preserve our natural resources. B) There are also many ways to save energy which can be very helpful to our environment. C) Can send less fossil fuel into the environment by not using your car as much or even buying a hybrid car. D) We can save more water and even say goodbye to bottled water! E) Start reusing things instead of buying more unnecessary things we don’t need, even just using reusable bags instead of plastic is so helpful. F) Also things like start planting trees to help contribute to a greener environment. Conclusion: Those are just a few things you can do to help make an impact on our planet. Going green can be as simple as recycling or making sure to turn off lights when you leave. Or it can be as big as turning in your car for a new hybrid model that burns less fossil fuel. No matter how large or small the changes you are doing will make an impact on the plant. I challenge all of you to make one change today because as I mentioned before it is estimated that in 2050 people will only have 25% of resources per capita that people in 1950 had, do you really want this to be your future?

Friday, January 3, 2020

My Target Student Needs Program - 983 Words

It is clear that all lessons were created to accommodate all my target student needs. She was provided with the opportunity to develop self-efficacy and encourage critical thinking. During the semester in creating my lessons for my class my main focus was to accommodate all students and ensured that all students’ are an active participant in the lesson. All activities and tasks provided equal opportunity for every student to participate. The students were ready and become excited about learning time. They were very intrigued and excited to use the clock manipulative. The enjoyed manipulating the clock by moving the hour and minute hand clues for their essay. I was happy for the support from my cooperating teacher during the instruction so I could focus on my target student by providing all necessary support to help her enhance her IEP goals (see lesson plan). During the instruction I used the various strategies to monitor my student such as verbally asking her to clarify understanding and higher order questions to get her involved and evaluate if I need to ret-teach at each step or move forward. This allowed me to identify directly which concept or skills my student needed help with before I move forward in the lesson. I ensured that I scaffold the lessons as well as the activities so that my students can make a connection and used prior knowledge. For example, skip counting by 5’s throughout all lessons. Then reinforcing what was taught previously before moving forwardShow MoreRelatedEvaluation Of A School Entry Vehicle1429 Words   |  6 Pagesworking in for my yearly mission. In this market analysis paper I will discuss demographics, different school programs I will administer in my local area, and different quartile objectives that result in a full year plan as a whole. I will discuss plans I have for a school entry vehicle that will allow me to get into my biggest high school. The unit I am responsible for recruiting in is B- 1-186 Infantry, located in Klamath Falls OR and it is an Infantry Company. Demographics My assignedRead MoreAnalyzing a School Literacy Program854 Words   |  4 PagesFor this assignment, I completed a survey to assess my school’s literacy program by using a survey that was adapted from by Patty, Maschoff, Ransom (1996) to analyze the instructional program and the school’s infrastructure. To be able to answer my survey, I needed to go colleagues of mine in the English Department and to my administration to help with these questions. Being a math teacher, we hardly ever discuss the literacy and the students’ acquisition of it in our department meeting duringRead MoreSelf Directed Behavior And Students844 Words   |  4 Pagesto look at self-directed behavior in students. I feel like this is something that students are not taught to do enough of. Any time that I have changed my behavior, it wasn’t because I wanted to change. Many times it was because my parents got tired of the way that I behaved. Every time that I would attempt to chan ge, making pointless, vague New Year’s Resolutions, I failed. Even right now, while we are working on our behavior projects, I am rethinking what my goal should be because I am having aRead MoreA Brief Note On System And Sub Systems1340 Words   |  6 Pageswith is the S.P.A.N. program. The main system of the student while he’s at the agency is the team coordinator/team leader, who is an adult or middle age African-American male. Another sub-system of the client is the two counselors/behavior coordinators. This student’s assigned behavior coordinator is a middle age African-American female. The other behavior coordinator is a 30-year-old Caucasian male. The next sub-system the client is involved with is his teachers. The student has a middle age RussianRead MoreEvaluation Of A Student Profile Report Essay1687 Words   |  7 PagesAssessment Items – Week 6 ROBIN L. ELLINGTON – CURRICULUM 245 – CAM WONG For the objective of this assignment I will be reflecting from three student profile reports; â€Å"Sample A, Sample B, Sample C† (attached) generated through a program called i-Ready from Curriculum Associates along with my personal experiences and personal internet research of the i-Ready program and developers; Curriculum Associates, in addition to alignment with the California Frameworks for Mathematics; Assessments. The attachedRead MoreBenefits Of A User Friendly Software1418 Words   |  6 PagesAfter learning about so many amazing firms published on Fortune’s list, Ultimate Software particularly stood out in my mind as a great possibility for my future career. Being a user of accounting software on a daily basis, I understand the importance of having a user friendly software that can be utilized easily from anywhere, that works for me not the other way around. Having spent one to many hours on hold with technical support to resolve issues that still persist t oday, a usable software is critical;Read MoreThe Needs And Interests For My Program1182 Words   |  5 PagesWhen focusing on the needs and interests for my program I have to consider adolescents and adults. I am expecting to have sessions with the adolescents and a subsequent session involving their caregivers. These two groups are going to have more differences than similarities when it comes to what they expect out of a program and incentives to participate or even show up. I expect that all needs will not be met, but I plan on addressing most of them. Because of their age group, the adolescents mightRead MoreMotivation Is Not Always Present For The Classroom At Milby High School1642 Words   |  7 Pagesis not always present in the classroom, for example in Mrs. Garcia’s classroom at Milby High School. For me, knowing Spanish was a given since most of my family speaks it. Although this is the case, I never used Spanish with them because they can understand English. For this reason, I only knew the basics and couldn’t hold a conversation with it. My parents always wanted me to learn more Spanish and perfect it in order to have a better future. I never saw the point of it until I was placed Mrs. Garcia’sRead MoreEducation Programs For Children And Their Children965 Words   |  4 PagesWhen my daughter was in school, it seemed she was always coming home with a printed handout from the school advertising a fundraising campaign of some sort. Doing our good parental duties, we often took the list or catalogue o f items for sale into our offices for coworkers to purchase, if they wished. Though my daughter is grown and now has school-aged children of her own, schools are still pitching fundraising ideas through the students and their families. Children are often the primary, or initialRead MoreBuilding A Sound Foundation For Lifelong Learning1392 Words   |  6 Pagesorder to build a sound foundation for lifelong learning, we need to develop literacy skills so our students will read, write, speak, and view literature and informational text critically, analytically, and comprehensively. Our school goal is to provide differentiated instruction that promotes phonics, fluency, and comprehension skills and strategies to our students to read at or above grade-level to prepare for College and Career. Our student goal is to build a schema of skills and strategies to enhance