Wednesday, July 31, 2019

Wireless network routing on linux

1. IntroductionIn this portion of the topic, we are traveling to look at the introductory facets of sphere name waiters and its construction and its functionality facets. In which we are traveling to larn about several distinguishable routing mechanisms that helps us to implement dynamic routing with its organisation. In this we are besides traveling to larn about how to get down the routing between the terminuss and routing between groups and so on. In this portion we will show about the chief thought on smaller way routing and multicasting in routing so on.1.1 AIM AND OBJECTIVEThe chief facet that lie beneath the debut of webs operation inside the house by Unix Router is studied, at the same time with the adversities that occur during development and constellation of router for the house and when all the workers uses the Unix OS. The chief facet that lie beneath the debut of webs operation inside the house by Linux Virtual LANS is studied, at the same time with the adversities that occur during development and constellation of router for the house and when all the workers uses the Mac OS. This technique besides concerns about the presentation mechanisms for doing certain a grow able and resilient web group development using the Unix Router. [ 1 ] Coming to the routing in Linux from local system to remote nodes within the web there are two distinguishable types of attacks and they are based on use of routing statically or dynamically. Each type of the attack that the router follows has some benefits and drawbacks besides in it, but when a web increases its capacity so dynamic routing is the most low-cost manner of keeping the web in Linux. Taking this facet into consideration we have to happen out the use of dynamic routing protocols in the topographic point of the use of inactive waies in all terminuss of a web2. Introduction ON SUBJECTIn this portion of the topic, we are traveling to look at the introductory facets of sphere name waiters and its construction and its functionality facets. In which we are traveling to larn about several distinguishable routing mechanisms that helps us to implement dynamic routing with its organisation. In this we are besides traveling to larn about how to get down the routing between the termi nuss and routing between groups and so on. In this portion we will show about the chief thought on smaller way routing and multicasting in routing so on.2.1 DOMAIN NAME SERVERThe Domain name waiter construction on the cyberspace really works like this: There are machines that work on petition of IP Numberss of these itself. These machines are known as waiters on sphere Name Server, and a petition is known as a Domain Name Server Lookup. Every Domain Name Server merely has inside informations about a specific entity of the universe broad web, and they often contact each other. [ 2 ]2.2 DIFFERENT ROUTING TECHNIQUESThere are several different attacks that exist and which help us to implement dynamic routing inside the IT organisation.Zebra is a codification for Linux machines which can keep several of the protocols demonstrated in this thesis. It is TCP/IP routing package that works with, OSPFVS RIPv1 and RIPv2.Gated is one more functionality plan for Linux, but it works merely in its binary province. This attack has a higher period of heritage than zebra and could be much faster. High terminal version of this attack works, but merely with proper licences in the market. Educational establishments works with this attack in different ma nner.Routed is a basic attack that is best available attack based on its cost restraints on Linux platforms. It is restricted merely to utilize a RIP protocol, which non a best option to travel on in a large webs, particularly when the web grows invariably. This is significantly advantageous for little webs. Merely thing we have take into consideration is the suited version of routing which works with RIP.2 and therefore we can work with class-less webs.The use of dynamic routing protocols is non that of import, but it is optional. A inactive Linux way can be another suited option to fall in the web to different node.2.3 ROUTING AMONG NODESWhen we join nodes combined with a distinguishable assortment of IP references will be used to those of set ‘s client web in Linux. The connection can be established between merely two-terminals as a point-to-point connections between the terminuss, but in instances where many terminuss can pass on with each other the terminuss can be config ured to be inside a basic country web, hence giving permission to them to pass on information in much better manner and forestall the hops. [ 2 ] The IP references used for the inter-terminal connection will be from the set 192.168.1xx.y, get downing with 172.168.64.0 and traveling on with 172.168.64.4, 172.168.64.8, depending on the measure of connections used. This could be the instance in point-to-point connections. In this instance 255.255.255.252 will be the net mask and will include two good IP addresses one for every terminal of the terminus. For bigger webs a bigger web will be marked for utilizing the suited net mask in Unix Router. To the several figure of webs which will, which may be predicted to be within a routing set the routing between the terminuss can be a hard undertaking. To decide this restraint it will be more frequently be necessary to use a interior gateway protocol, like RIP-Routing information Protocol or OSPF-open shortest way foremost, the protocol will be a much hard attack but confronting a adversity job. If the set ‘s web comprises of a less figure of terminuss inactive routing can be adjustable option, although it is non a coveted one. The use of dynamic routing in Linux prevents manual changes and makes certain that the connection to the new terminuss on the web commences automatically in a normal manner. For these peculiar facets its benefits are demonstrated whenever possible. Due to these facets antecedently the client IP addresses, and the use of the IP references choose for fall ining the terminuss within a Wi-Fi set must non be against with the references used by other Wi-Fi sets. Chiefly based on this aspect each set should hold to register the IP which has to be used for inter-terminal connections if they are distinguishable to the IP references used by their clients. If this is non made, it may non back up the routing between client terminuss on both webs joined to the Linux router, but it will do rectifying routing troubles ne'er possible which taking opportunities to larn about flow from one web to the other, and this is non at wholly opted to utilize. It is easier to unite protocols on the same web this is non a best suitable attack as the routing traffic will maximise and besides there will more hard adversities in the machines which should reassign the routing related informations from one protocol to another protocol within the web. Therefore every router sets must seek to judge on the routing and take a opportunity and must be certain that all routing inside the web between terminuss utilizes this similar protocol in Linux. As it could non be a desirable option to swear each one inside the web it may be compulsory for the terminuss admin to maintain some preventative confirmation techniques to do certain that incorrect informations related to routing is non inserted into the web.2.4 ROUTING WITH OTHER GROUPSEach clip a connection occurs by a web set to an outside machine is stated, in other territories, states or countries it is high precedence to do certain that there are no job between the different IP references used by the sets, and that no other high precedence restraints are traveling to be taken topographic point. [ 6 ] A web set an utilize the similar ways of interior gateway protocols to reassign routing related informations with other set as it happens within the nodes, but is more frequently desirable to use an exterior gateway protocol. Routing with another web sets must more frequently be made utilizing the boundary line gateway protocol and this is a peculiar 1 for which it is necessary to heighten more acquisition. The benefit of this technique is that every machine or set of machines in the web is termed as an chief machine which operates automatically and there is necessity to hold the inside informations of group ‘s internal paths, merely the places of entree to the set, the webs it comprises and the connection it has to other groups. [ 7 ] The assortment of IP references used for the inter-set interlinking is described antecedently and the references used must be made public to forestall IP reference jobs inside the web by the router. Taking into consideration of this, T may non be possible to wholly swear all the related informations gained by another set ‘s in the web and at the same clip to forestall erroneous informations being inserted into the web it may be of import for the web admin to maintain necessary confirmation techniques to do certain that false routing related informations will non oppositely affect the set ‘s web right methodological analysis. In a web set in the Linux we are said that a machine which operates automatically is necessary to give a figure utilizing some peculiar codification which specifically makes it out. In several state of affairss the set will non hold its single AS figure. It is said that when a set requires a new AS figure that it meets the Wi-Fi sets and it must be given with a figure inside the private AS group referred by RFC 1940. This set of Numberss is from 6441.2-65564. It will be good if a record of the given AS Numberss used by the Wi-Fi sets is placed in a public location web site such that it can be viewed and taken as mention by the distinguishable web sets. The existent AS figure is non that necessary, it is fundamentally an AS figure which is used for designation. In the similar mode that it is of high precedence that the IP references used by united work sets are non made extra transcripts, it is besides necessary to look into that a new set does n't utilize a As figure given to other work set, due to which the routers may be falsely communicated up to a certain extent.2.5 OPEN SHORTEST PATH FIRSTOpen shortest way foremost is a non important link- province routing protocol. Open shortest way foremost can be used as an unfastened beginning and is said to be robust attack because it works on a broad scope of platforms independently which may be supplying this sort of support to the web and as it is a link-state protocol it can be distinguished from RIP or IGRP which are distance-vector protocols. Open shortest way foremost will non ever reassign a record of all its paths to its environing 1s, but merely transfers the alterations it finds out in the web construction, hence forestalling the non needed use of webs bandwidth. This is extremely more good than distance-vector algorithms which rely on the given timers to reassign sometimes local routing related informations to the staying web. Using the unfastened shortest way foremost the junction clip when a web alters may be every bit little as five or six seconds, which in the instance of RIP is hundred and ninety seconds. The naming of the routers which make an unfastened shortest way first web are given a peculiar name base on some facets like topographic point and necessity of them inside the web. About which it is demonstrated below briefly:Internal Router:Internal Router is a router in which all the webs are joined inside the same country in a direct manner. In the Internal Router merely one transcript of routing algorithm will be continued.Area Border Router:Area boundary line Router is a router in which it joins country to an country. It makes ideas between the two countries and maintains the webs which are utilized between them.Back Bone Routers:Back Bone Routers are routers which are the related to country O and are the necessary 1s for the broadcast medium through webs between several distinguishable countries.AUTONOMOUS SYSTEM BOUNDARY Routers:Autonomous system boundary routers are routers which are joined to the other AS or to the worldwide web. These are specifically routers which broadcas t routing related informations with other IGP and EGP routers which need non utilize the unfastened shortest way foremost. There are several distinguishable ways in which we can fall in the countries or terminuss at eh routing phase in web. A VPN manner has besides been introduced which can be extremely advantageous, specifically while fall ining distinguishable webs among territories or while the two terminuss are fare separated and it is mandatory to set up a nexus over the universe broad web. In this attack we can propose the country O is been placed as the chief terminus and more likely to a big bandwidth cyberspace connexion and to which other webs may be joined. In the instance where the terminuss many non be joined in direct contact to country O utilizing a direct contact or by VPN a practical connection to fall in it to country O will be necessary.2.6 OPEN SHORTEST PATH FIRST COMPARED TO OTHER PROTOCOLSThere will be peculiar instances in which peculiar machines will non assist out unfastened shortest way foremost and in this state of affairs another protocol such as RIP can be used, till it is RIP version 2, or lake herrings EIGRP two of which helps instance less webs. On a whole, the ABR will necessitate to assist open shortest way foremost to do certain that it need non give out the entire web related informations. It is required at the clip the entire web are joined to use protocols which can exemplify brief versions of the webs within an independent system as this will minimise up to a certain extent the use of the sum of routing related informations which is necessary to be exchanged between several distinguishable routers.2.7 BORDER GATEWAY PROTOCOLThe of import facets of the boundary line Gateway Protocol is same to that of an IGP router like unfastened shortest way foremost which surveies the minimal paths to entree the remaining of the terminuss and webs inside a machine which operates automatically. This differentiation is because of the Border Gateway Protocol works with webs of several distinguishable machines, exemplifying its ain web and happening out the ways by which the staying independent machines can be attained. BGP besides has several filtrating techniques which gives entree to us to take a determination to give a presentment to each of its bordering webs or non to inform related to the several distinguishable webs to which they are joined Because of the above facet, the benefits of BGP is considered as significantly advantageous to bury joint distinguishable Wi-Fi webs, as another option of utilizing an IGP type unfastened shortest way foremost.2.8 SUPPORT FOR MULTICAST ROUTINGSupport for multicast references must be involved in the terminuss routers, as this will give entree for systems which utilize the bandwidth of the web to a maximal extent. It keeps it conformity with multicast references that it is used to a maximal extent by several runing systems, but package sweetenings are compulsory for support multicast routing. For building a inactive routing tabular array, even we have an optional routing tabular array which maps to link hosts merely on the physical webs which are connected straight. The paths by the outside gateways must be included to the routing tabular array. One types of method to back up this edifice a inactive routing tabular array with path questions. In the routing tabular array, we can utilize manually route question to infix or cancel entries. To explicate the more clearly, if we wanted the path 207.25.98.0 to be added to a Solaris machines routing tabular array with path questions, so types: â€Å" # path add 207.25.98.0 172.16.12.11 add net 207.25.98.0: gateway almond† . As it is considered as a first bid after the path in this illustration is the cardinal guard ‘s add-on. The keyword on a interpolation or omission, commanding path to infix a new path or to cancel a present one. On the other manus, other value must be derived as finish references, which has to be assumed as reference that is attained through the path. At the same clip, Network name from the webs file as an Ip reference the mark reference could be assigned, a host name from the host files or the keyword fundamentally. Several Linux paths are inserted at the beginning degrees, IP addresses which are numeral are used more than the machine names. This is made for back uping that the routing scheme is independent on the degree of the name waiter package. At any clip we must use the entire numeral reference ( all 4 bytes ) . The path enhances the reference if it is made up of smaller than four bytes, and the enhanced reference need non be the one which we desired. If the basic keyword is used for the mark reference, path establishes a basic path. The basic path to a finish and it is fundamentally the one router we need in the web, if the web of ours has merely a individual gateway, and so use a basic path to convey all the traffic that is related to the distant webs through that gateway. The path question twine is the gateway reference for the web. It utilizes the IP reference of the outside gateway by which information is transmitted to the mark reference inside the web. The reference should hold gateway reference which is joined through a direct nexus in the web. The following hop must be available to the local host through a direct nexus. Therefore, it should be on a web which is joined straight. The metric bid is non used when routers are removed, but assorted machines need it when a path is inserted. Although its demand is necessary, path utilizes the metric merely to judge if this is a path which is attained by an interface through a direct nexus or a path that is achieved by a outside gateway. If the metric is O, the path is implemented as a path by a local interface, and the G flag. However, the gateway reference has to be considered with the aid of G flag set If the metric is more than zero, the reference should be assigned address of outside gateway.2.9 ADDING STATIC ROUTESTo infix inactive router in Linux atmosphere the subnet value 172.16.12.0. There are fundamentally two gateways on this subnet that can be handled, and they are almond and pecan. Almond type of gateway is utilized to several of the webs on the cyberspace used in Linux. Whereas the pecan gives entree to the different subnets on nuts-net therefore, We can use Prunus dulcis as our basic gateway due to i ts use of several 1000s of the paths. The lesser figure of paths that can be accessed with a easiness clearly by the pecan. The figure of paths that are accessed by a gateway waiter is non the measure of traffic it maintains, but Judgess which gateway to take as a basic one.To put in the default path on peanut, we enter:# path -n add default 172.16.12.1 1, add net default: gateway 172.16.12.1The mark is usually set as default ; Prunus dulcis ‘s reference is nil but the gateway reference ( 172.16.12.1 ) . The -n keyword is non a necessary option in Linux. It is merely to give the informations related to the path to demo numeral references in its informations messages. When we insert router questions to a startup file, use the -n keyword to avoid way from dissipate clip frame from commanding name waiter package that might non be put to deathing. After implementing the default way, measure the routing tabular array to guarantee that path has been inserted:% netstat -rnRouting Tables:FinishGatewayFlagsHoloceneUseInterface127.0.0.1127.0.0.1UH1132LionDefault172.16.12.1UG00Lion172.16.12.0172.16.12.2Uracil2649041LionBeginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm Attempt ping one time to look into the peanut is now ready to interchange informations with distant hosts. If we are fortunate, the distant host will reply and which will wish this: It is likely that the distant host is crashed or dropped. If it is, the Ping does non react. If it is like this we should non lose our hopes ; we need to seek another waiter.% ping 207.25.98.2 Ping 207.25.98.2: 56 informations bytes 64 bytes from the ruby.ora.com ( 207.25.98.2 ) : icmp_seq=0. time=110. MS 64 bytes from ruby.ora.com ( 207.25.98.2 ) : icmp_seq=1. time=100. Ms— — 207.25.98.2 Ping Statisticss — — 2 packages transmitted, 2 packages received, 0 % package loss round-trip ( MS ) min/avg/max = 100/105/110Beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm This consequence is desirable which states that we are pass oning with the remote host which is a good mark ; this implies we got a important path to hosts on the cyberspace. On the other manus, now besides we have non implemented paths to the left over nuts-net. If we ping a host on different subnet, something exiting occurs:— – % ping 172.16.1.2 — – Ping 172.16.1.2: 56 informations bytes ICMP Host redirect from gateway almond.nuts.com ( 172.16.12.1 ) to pecan.nuts.com ( 172.16.12.3 ) for filbert.nuts.com ( 172.16.1.2 ) 64 bytes from filbert.nuts.com ( 172.16.1.2 ) : icmp_seq=1. time=30. Ms — — 172.16.1.2 Ping Statisticss — — 1 packages transmitted, 1 packages received, 0 % package loss round-trip ( MS ) min/avg/max = 30/30/30 beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htmPeanut trusts that all marks are come-at-able through its default way. Hence, even information meant for some other subnets is transmitted to almond. If insignificant transmits information to almond that must travel through the pecan, almond transmits an ICMP Redirect to peanut desiring it to utilize pecan Ping illustrations the ICMP Redirect in action. Netstat shows the consequence the redirect has on the routing tabular array:% netstat -nrRouting TablesFinishGatewayFlagsRefcntUseInterface127.0.0.1127.0.0.1UH11604lo0172.16.1.2172.16.1.3UGHD0514le0Default172.16.1.1UG3373964Lion172.16.1.0172.16.12.1Uracil686547686547le0 Beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm The path with the D flag set was installed by the ICMP Redirect. Some of the web directors take the benefit of ICMP Redirects while intriguing and developing a web. All hosts are implemented with a default way, even those on webs with more than one gateway. The gateways swap routing informations through routing protocols and readdress hosts to the finest gateway for a specific path. This sort of routing, which is necessary on ICMP Redirects, has been a important attack due to personal systems ( Personal computers ) . Assorted Personal computers does non put to death a routing protocol ; some does non hold a path question and are restricted to a lone default way. Obviously, ICMP Redirects are delighting to keep up these users. Along with this, this sort of routing is simple to implement and best appropriate for execution by a constellation waiter, as the similar default way is used on each host. Based on these facets, some web directors support confidence on repeating ICMP Redirects. [ 6 ] Additional web decision makers want to forestall ICMP Redirects and to continue direct bid of above the topics of the routing tabular array. To remain off from redirects, specific paths can be setup for each subnet, utilizing independent path statements:# path -n add 172.16.1.0 172.16.12.3 1, add net 172.16.1.0: gateway 172.16.12.3 # path -n add 172.16.6.0 172.16.12.3 1 add net 172.16.6.0: gateway 172.16.12.3 # path -n add 172.16.3.0 172.16.12.3 1 add net 172.16.3.0: gateway 172.16.12.3 # path -n add 172.16.9.0 172.16.12.3 1 add net 172.16.9.0: gateway 172.16.12.3 Netstat shows what the completed routing table expressions like. % netstat -rnhypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm Routing tabular arraiesFinishGatewayFlagsRefcntUseInterface127.0.0.1127.0.0.1UH1132Loe172.16.12.0172.16.12.2Uracil2649041Lion172.16.1.3172.16.12.3UGHD1514LionDefault172.16.12.1UG00Lion172.16.1.0172.16.12.3UG14904Lion172.16.6.0172.16.12.3UG00Lion172.16.3.0172.16.12.3UG00Lion00LionBeginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm The routing tabular array we have created utilizes the default way i.e. by Prunus dulcis to achieve outside webs, and specific waies by pecan to achieve other subnets inside nuts-net. Re-executing the Ping options facilitates regular most achieving end products. On the other manus, if any subnets are excess to the web, the waies to these new subnets should be manually inserted to the routing tabular array. On a whole, if the machine is restarted, all routing tabular arraies which are inactive will lose its entries. Hence, to use inactive routing, we should guarantee that the waies are re-introduced every clip our machine restarts.Installing inactive paths at startupIf we make a determination to use inactive routing, we need to make two changes to our startup files: Insert the wanted path statements to a startup file. Delete any statements from startup file that execute a routing protocol. Linux offers an inspiring illustration, due to its demand of inactive paths to build the optimum routing tabular array. The Linux debut of ifconfig will non change the routing tabular array when a new interface is implemented. The way for a new interface is inserted form outside with a path question. These interface paths are stocked up in the startup book. The chief path statements in rc.inet1 utilize book variables. We altered these to references for the intent of ambiguity./sbin/route add -net 127.0.0.0 /sbin/route add -net 172.16.5.0 netmask 255.255.255.0beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm The first statement installs the path for the loopback interface. Taking into consideration of this brief sentence structure of this codification: it find out a mark but no gateway. This is due to Linux has a specific sentence structure merely for including a path to an interface. We must hold stated the bid as: /sbin/route add -net 127.0.0.0 dev lo0 If dev is non mentioned on the codification line, the way codification finds out the right interface from the mark reference. The 2nd statement from /etc/rc.d/rc.inet1 book implements the way for the Ethernet interface. This statement comprises of a subnet mask. If nil provided, it would default to 255.255.0.0, which is the criterion for category B reference 172.16.0.0. Implementing waies for straight presenting interfaces is specific to Linux. On a Solaris system, edit /etc/init.d/inetinit to add the path statements:path -n add default 172.16.12.1 1 & gt ; /dev/consolepath -n add 172.16.1.0 172.16.12.3 1 & gt ; /dev/consolepath -n add 172.16.3.0 172.16.12.3 1 & gt ; /dev/consoleBeginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm3 INFORMATION SECURITIESNetwork security and informations security are largely used as the security mechanisms which are maintained one or the other. On a whole web security is usually taken in to consideration for security mechanisms at the terminals of a house, seting out the unauthenticated entries, for illustration Data Loss Prevention-DLP. In the instance of the two manner attack of hallmark, the things which we utilize are the things which are in usage, coming to the three manner attack of hallmark the things which we have used are besides used. A important survey of basic techniques and inside informations in web security is demonstrated in the signifier of a non sum topology of web security onslaughts. [ 14 ]3.1 SECURITY MANAGEMENTSecurity direction for webs is varied for all types of scenarios. Manageability enhances package and hardware to forestall boisterous charges from speaking entree of the web and spamming. A switch works as a several-port span and to larn the topographic point of each systems Mac reference by maintaining an oculus on the current traffic. For each clip period it switches, it will merely travel in front traffic to the port that contain the finish Mac reference. Developing switched LAN internet maps for the 30 five staff several of which are included in the papers development, interaction with clients and disposal of office.3.2 PERSONAL LEGAL TEAMPreviously, the web developers and router had merely a minimal ways of taking the hardware tools at the clip of purchasing a engineering for their organisation webs. Hubs are by and large used for wiring cupboards and routers which are responsible for information centre or important communications operation.3.3 BUSINESS LEGAL TEAMIn the instance of concern legal squad staff and legal workers, maestro in marketing Torahs. Function of LAN exchanging and UNIX router engineering in organisation web Several web developers are get downing to present shift tools into their present running shared-media webs to achieve the illustrated aims: Involve the maintainability of VLANs by structuring web clients into logical work sets that are non dependent of the physical topology of wiring cupboard hubs. This could cut down the disbursals of alterations, interpolations and alterations while maximising the easiness of usage of the webs. Shared-media LANs separates the clients into two or more independent LAN units, minimising the figure of clients that are in conflict for bandwidth. LAN exchanging technique, which constructs this attack, involves micro divider, which besides partitions the LAN to lesser clients and eventually a lone client with a changeless regular LAN unit. Switch overing technique is the best opted coveted solution for heightening LAN traffic for the so called facets.Not like hubs and repeaters, a switch provides many informations watercourses to reassign at a clip.Switchs by the micro divider ways, have the capacity to manage maximized gait and bandwidth of turning engineeringsSwitched cyberspace and UNIX router solutionsNetwork developers have observed that assorted systems which facilitate switched cyberspace and UNIX router work solutions are really few. Some provide a restricted figure of hardware platforms back uping little or no machine execution with the present substructure. To be signifi cantly advantageous, a switched cyberspace work solution should achieve the followers:Control strategic influxs in the present communicating substructure which maximising come-at-able bandwidth.Reduce the disbursals of keeping web operations.Provide ways to assist multimedia plans and other most-demanded traffic in between a broad scope of platforms.Attain scalability, traffic ordinance and security to minimum extent up to the present twenty-four hours ‘s router-related internetworks.Achieve a assisting manus for built-in distant monitoring- RMON entity.The chief attack to achieving these is to recognize the functionality of interworking package mechanism inside the switched inter webs. Though LAN and ATM switches are demoing good sweetenings in the functionality facets, they give manner to the new internetworking challenges. Therefore a existent switched internetwork in more important than a group of boxes. It comprises of a machine of devices follow and worked by an internet working package technique. With the innovation of switched interworks, the expertness will be displayed on the whole of the web, demoing out the non centered facet of exchanging systems. The necessity for an internetworking substructure will be in a similar manner.4. COMPONETS OF SWTICHED INTERNETWORKING MODELA switched internetwork is comprised of chiefly three important tools which are: physical shift platforms, a common package substructure, web direction tools and applications, web developers with a entire terminal-to-terminal solution for presenting and keeping sweetening belongingss, robust, switched internetworks4.1 SCALABLE Switch PLATFORMS4.1.1 EVALUATE IPV4 AND IPV6 FOR THE STAFFIPv6 security is similar to that IPv4 security in assorted attacks. In truth the similar adversities that occur IPv6 1Psec execution IPv6 is usually implemented without the necessity of cryptanalytic security of any type. Along with this, due to several security restraints that are faced at the application degree, even the important execution of 1Psec with IPv6 will non supply any farther security sweetening for those onslaughts Inspite of the advantageous capableness of happening out the ground of the onslaught. There are some of import differentiations between IPv4 and IPv6, out of the authorization of 1Psec. These distinguishable facets will change the sorts of onslaughts which IPv6 webs are largely to face. It is besides non normal that the optimum house will alter wholly to IPv6 in a little clip period ; it will largely pull off IPv4 fall ining for the whole of multiyear migration to IPv6. At present, this has non a proper solution for the onslaughts which those type webs will confront and the development alterations necessary to turn to those onslaughts. This gives a brief of several of the basic onslaughts towards IPv4 and so evaluates and contradicts how these onslaughts or 1s that resemble like these might impact an IPv6 web.4.1.2 THIS DOCUMENT BENEFITS THE FOLLOWING GROUP OF INDIVIDUALSNetwork and security designers: – This broad association of people are the chief behind the building of the universe broad web at present and has restrictions for peculiar states, chiefly which are non involved in the IPv6 protocol and its alterations.Security research workers: – By taking into consideration of this thesis they must expertise with solutions for research in IPv6 security.IETF members: – The IETF, this association is the necessary 1 for the growing and sweetening of the IP Protocol, must be advantageous from a comparative survey of the deficiencies in IPv4 as in contrast to IPv6.Government Policy shapers: – The US section of defence has made out its thoughts a complete displacement to IPv6 by 2008, confused a spot by its aim for security. This purpose is appreciatable, but IPv6 is non a solution for all security concerns on a whole, a valid portion of influxs in the growing of new research stuffs for authorities workers is necessary demand to necessitate the end with in 2008.Other associations within the authorities have concerned on IPv6 as a manner of sweetening in worldwide wed security. This thesis is considered to be a helpful reso urce for such association for indicating out instances where there is a demand of attending. This engineering, IPv6 geographic expedition is varied from the IPv6 in two chief facets. The first is that the ping expanse or port scan, when used to measure the hosts on a subnet, are considerable difficult to carry through in IPv6 web. The 2nd, new multicast references in IPv6 gives out a manner to pick out specific set of cardinal machines with easiness. Additionally, go forthing these separating characteristics, geographic expedition methods in IPv6 are the similar 1s when compared with IPv4. IPv6 are besides more dependent on ICMPv6 to work decently. Strong filtering of ICMPv6 may go forth sick effects on web methods.5.1 NETWORK MANAGEMENT TOOLS AND APPLICATIONSThe units of a switched internetworking theoretical account is comprised of web maintain tools and applications. A important switched internetworking method should include the advantages of routers and switches together in each portion of the web, along with this it should supply a easiness of usage mechanism from shared-media networking to exchange internetworks. In normal switches which are non collaborating in the organisation web development gives out the undermentioned advantages: Large bandwidth, quality of service, less expensive, Time frame, Ease of constellation is high precedence facet and appraisal disbursals.5.2 comparings of LAN switches and routers:Routers provide the undermentioned maps:Conveying firewall, Communication between distinguishable LANs, Convergence in less clip, Policy routing, Security, Load rating and Idleness, Traffic transportation care and multimedia association rank.5.2.1SUBNETWORKINGEasy to entree switched internet maps are comprised of physically distinguishable dividers, but are logically taught to be as a one individual web. This facet is included to the me thod that LAN switches operate- they regulate at OSI layer2 and must supply connectivity to hosts as if every host is located on a individual overseas telegram. Layer 2 turn toing considers a level reference infinite with broad assortment and scope of particular references. Routers regulate at bed 3, evaluate and stick to a hierarchal addressing construction. Route webs can associate a logical addressing method to a physical substructure so every web divider substructure so every web divider has a TCP/IP subnet or IPX web. Traffic transmittal on routed webs is distinguishable from that is on switched webs. Routed webs have more flexible traffic transmittal as they utilize the hierarchy to indicate out minimum paths based on dynamic facet Such as web concern. Datas can be gained by the staff to routers and switches that can be used to set up maximal unafraid webs. LAN switches may use created filters to supply entree control depending on mark reference, beginning reference, protocol sort, package size, and inside the clip frame. Routers can filtrate on logical web references and supply a regulative depending on facets accessible in layer 3 or halt traffic depending on specific TCP/IP socket related informations for a set web references.5.3 BENEFITS OF LAN SWITCHESAn independent bed 2 switch may supply some or all of the illustrated advantages:Bandwidth: – Local area network switches provide important growing and sweetenings for single clients by giving specific bandwidth to each switch port ( for illustration, each web divider ) . This method of allotment is called Micro divider.VLANs- LAN switches can organize a set of independent ports into logical switched work sets termed as VLANs hence ; by this they restrict the transmission sphere to valid VLAN member ports. VLANs are besides called as switched spheres and independent shift spheres. Transmission between VLANs needs a router.5.4 NETWORK DESIGN PRINCIPLESSignificant web development is dependent on assorted surveies that are illustrated in brief based on the chief facets described below:Examine individual points of failure carefully: There must be a minimizing manner in the web so that a lone malfunction will non halt any portion of the web. There are two cardinal characteristics of minimising that are load equilibrating. In the instance of a malfunction in the web, there must be a alternate path. Load equilibrating happens when two more paths to a mark are present and can be used based on the web burden. The degree of minimising technique required in a specific web differs from web to web.Characterize application and protocol traffic: Taking into consideration, the transmittal of plan information will sketch the client-server exchange of informations and is of import facet for important resource allotment, like the figure of users utilizing a specific waiter or the figure of user a specific waiter or the figure of user workgroups on a divider.Analyze bandwidth handiness: – Taking into consideration, the must non be order of measure differentiation between the several distinguishable sorts of the hierarchal theoretical account. It is critical to take a note that the hierarchal theoretical account relates to knowledge beds that provide functionality. The bandwidth return provide functionality. The bandwidth takes important part in the topology where a big figure of Stationss are at that place. The beds need non hold to be a physical connection it can be the anchor of a specific device.Build webs using a hierarchal or modular theoretical account:The hierarchy gives manner to independent dividers to go the yesteryear of cyberspace and map together. In the individual router layout, the chief and distribution beds are included in a individual unit. The router chief functionality is shown by the backplane of the router and distribution is shown by the router. Permission allowing for terminal clients is achieved by independent or chassis-based hubs. The distributed anchor construction utilizes a really fast anchor media, usually FDDI to convey routing engineering between several routers. This besides makes the anchor to go across floors, a flat or an organisation. Switched LAN web design rules: When developing switched LAN organisation webs, the assorted facets that are to taken into history are described below:Accessible bandwidth to entree routing functionality: Inter-VLAN traffic should be routed, by which the web development will give sufficient bandwidth to several inter-VLAN traffic from the beginning, by the machine that affords routing methodological analysis and to the mark.Appropriate arrangement of administrative boundaries: Switch has the possibility of agony of multiport webs and the execution of exchanging external of our administrative bounds can oppositely had to enduring the webs inside our administrative bounds. Organization web development are heightening significantly with the execution of exchanging at all degrees of the web from desktop to the anchor. Three topologies have been come out as generic web development techniques: scaled shift, big shift, minimum routing, distributed routing, shift, and scaled shift.To mensurate the upper limit switched, min imum routing design, a logical hierarchy should be implemented. The logical hierarchy comprises of VLANs and routers that facilitate inter-VLAN broadcast medium. In this topology, routing is used merely in the distribution bed and the entree bed based on bandwidth by the distribution bed to achieve permission to really fast exchanging methodological analysis in the major bed.Chapter 6The information mentioned in this chapter illustrates us the research techniques that I have used for theUracilnothings based router.6.1 Research Methodology6.1.1 LAN and Router planing for an organisation and scenarioA organisation which have hundred and 50 worker, five staff are related to the betterment of the selling state of affairs. The IP web development series speaks about the concern related with organisation LAN development. The selling technique related on the footing of searchnetworking.com, tells the advantages of concern by Ethernet exchanging in contrast to the traditional hub ambiance. The chief nonsubjective beneath the execution networking inside the house is by practical LANs is seen besides with the facets related to the characteristics like gauging and constellation of router for the house and all the workers are utilizing the MAC OS. This thought besides illustrates for doing certain a adjustable and resilient organisation web development with the usage of UNIX router. [ 14 ] Intranet is a basal set platform, which tells us that merely a individual terminus can convey information onto the platform at merely tome which is specific. Internet hub systems take the restrictions of any entree related issues by development and implementing router for the house and all the workers are utilizing the MAC OS. Ethernet exchanging alternatively of configuring shared Ethernet attains the described functional facets: Every port on a switch is in the sphere which collides of its ain and therefore a workgroup joined to the LAN through a switch port alternatively of a hub port need non hold to fight for entree to the wire by looking for hits prior the information is sent. This maximizes the bandwidth on the LAN.Router switches in a campus anchor6.2 Data Management within the web 1. Datas Administration Data plus, Data administration, Data steward 2. Data Architecture, Analysis and Design Data analysis, Data architecture, Data mold 3. Database Management Data care, Database disposal, Database direction system 4. Data Security Management Data entree, Data erasure, Data privateness, Data security 5. Data Quality Management Data ripening, Data unity, Data quality, Data quality confidence 6. Mention and Master Data Management Data integrating, Master Data Management, Reference information 7. Data Warehousing and Business Intelligence Management Business intelligence, Data mart, Data excavation, Data motion ( extract, transform and burden ) , Data repositing 8. Document, Record and Content Management Document direction system, Records direction 9. Meta Data Management Meta-data direction, Metadata, Metadata find, Metadata publication, Metadata register In the present age direction use, each can merely put out a manner deviated from the cardinal word ‘data ‘ in compound nomenclature to the cardinal word information or may be cognition when saying in non-scientific attack. Therefore there will be informations direction along with the information direction and cognition direction. Even though informations may be present in footings of information or even knowledge they will be every clip in the head of the individual and hence they will be evaluated in the several criterions.6.3 Wireless LANsAdvantages of radio LANs include:The important demand for the radio LANs is clearly seeable because of their cost less expensive nature and simple to execution when compared to staying webs and web devices. The big figure of machines available in present market scenario is largely fitted signifier the beginning with the radio LAN nomenclature.Convenience:The Wi-Fi belongings of these sorts of webs facilitates users to acquire permissio n to use web resources form any suited topographic point inside their basic networking environment either it is a large or a little one.Mobility:With the rapid growing and use of public Wi-Fi webs, users can acquire permission to use the cyberspace even from finish external to their work atmosphere. Mast coffeehouse, for illustration, provide users a wi-fi connexion for acquiring entree to internet at minimal monetary value or even free of charge. With the lessening in the usage of laptop-level machines, this is specifically related.Productiveness:Clients joined to a Wi-Fi web can pull off a about steady relationship with their suited webs as they shift from location to location. For a chance in the concern, this tells us that a worker can significantly be efficient as his or her work can be finished from any suited topographic point. By taking into consideration of this illustration, a infirmary or depot may present voice against WLAN technologies that gives manner to mobility any best monetary values in the market.Deployment:For get downing up of an infrastructure-related Wi-Fi web it is needed to hold little sweetenings to the individual entree point. When compared with the wired webs, they have higher costs and complications of utilizing physical wires that are used for the puting up the connexion to more topographic points.Expandability:Wi-Fi webs can work even in instances with unexpected rise in the figure of users with the tools that are present merely. Whereas, a wired web more the figure of users require increased physical overseas telegrams.Cost:Wi-Fi webs require hardware which is of extremely expensive when compared to wired networks demands. This significantly raised the disbursals which are of really high when taken into consideration of the nest eggs it had made by non utilizing any wiring hardware.Disadvantages:Wi-Fi LAN engineering, by looking at the above mentioned allowances and characteristics which seem to be extremely important there are some drawbacks besides. For a given web topographic point, Wi-Fi LANs need non be the best suited 1s based on several characteristics. Several of these have work on with the built-in limitations of the engineering.Security:Wi-Fi LAN communicators are developed to ease machines on a whole unit without any dungs in the webs by the usage of wireless frequences. As a ground of infinite and disbursals, the signal receiving systems that exist on Wi-Fi networking cards in the finishs machines are largely less quality. In order to acquire proper signals by utilizing those type of receiving systems even in a best location, the Wi-Fi LAN communicator uses a maximal energy while transmittal.Scope:The normal scope of a basic 802.11g web with the common tools and engineering will lie in a scope of 10s of metres.Dependability:Similar to any other wireless frequence broadcast medium, Wi-Fi networking signals are affected to big figure of perturbations, every bit good as hard transmittal troubles like several way, or specifically in this Rican attenuation that are above the custodies of web admin. In the scenario of basic webs, transition is attained by hard stairss of phase-shift keying-PSK, amplitude modulation-QAM, doing engagement and transmittal facets all the maximized attempts.Speed:On several of the Wi-Fi webs usually 1-108Mbits/s gait is well less in contrast to the minimal degree of the basic wired webs 100Mbitsp/s to a tallness of several Gbit/s. there is besides some transmittal concerns raised by the TCP and its built-in obstructor ordinance techniques. For several users, on the other manus this illustration is non related as the velocity restriction point is non in the Wi-Fi web but taken into consideration of the external web connectivity is ensured. Taking the illustration, the highest ASDL end product usually 8Mbits/s or even lesser given by telecommunication industries to normal users is form start onwards is much lesser than the minimal velocity Wi-Fi webs to which it is fundamentally joined. Enhanced attacks such as 802.1 1n are being work outing this restriction and will backup highest end product in the scope of 100-200Mbit/s. Turning concerns that are looking frontward for rise in the web coverage of the Wi-Fi webs and less figure of limitations, needed to make up one's mind new bill of exchange 802.11n Wi-Fi tools. New bill of exchange 802.11n devices are expected to demo high degrees of efficiency and maximal connectivity country.6.4 FEATURES AND ADVANTAGES OF WIRELESS ROUTER NETWORKIn this Earth of advanced engineering, several people opt for non to fall in machines with Ethernet wiring due to maximal extent of wiring is spread around their office or abode is non a coveted one to hold. We can choose to implement a Wi-Fi web to forestall maximal wiring. For a Wi-Fi web, there is no demand to utilize Ethernet wiring to fall in our machines to the DSL or router. Basically, a Wi-Fi web transmits signal utilizes one or more Wi-Fi routers or Wi-Fi entree points. The admittance points or router are gained with an aerial and an Ethernet port. The Ethernet port in the Admission point must be joined to the modern who is provided by our cyberspace service giver, we can besides do a brotherhood of cabled and Wi-Fi connexions with an admittance point or Wi-Fi router. IEEE 802.11 constructs of Wi-Fi transmit is used in a Wi-Fi local country web ( WLAN ) . Particular other Wi-Fi networking constructs like Bluetooth are admirable at present. On the other manus, 802.11 constructs are described as the several efficient networking solutions. By and large, the aim of the interior decorators of this web entree point was to fall in machines through a local country web. On the other manus, at present it was modified and a Wi-Fi web interface is besides used for voice over cyberspace protocol ( VoIP ) and permission to utilize internet depends on the research done up to now, it is apparent that we can remain united in our web for maximal clip frame every twenty-four hours. If we have a laptop with Wi-Fi handiness, we can roll throughout the office premises without laptop while there will be no dropping in the signal or there wo n't be any connexion losingss. At present, specific urgent services are airing their private informations through a Wi-Fi web. We can make up one's mind this as an clear position for information protection which provided by Wi-Fi web. We can reassign and pass on information spontaneously by a Wi-Fi web. This is a valid facet why concern and people opt for this web base for informations sharing. Some of the valid facets which make Wi-Fi web significantly advanced are:Suitable facets like we can use this web at a abode, the office or at any topographic point and with easiness of usage.WLANs are admissible everyplace around the Earth at a minimal cost.While switching to a new topographic point, we can reassign the interface and configure it at our new topographic point with easiness.There is no demand for an Ethernet wiring to fall in machines one another.In a concern point of position, one of the important benefits in implementing a Wi-Fi web is the nest eggs, we can hold permissions for alterations in our concern in minimal clip frame after configuring the Wi-Fi web. There is no demand to sell out hard currency on wiring and other devices. The disbursals of pull offing Wi-Fi web are besides less when taken into contrast to other webs. In the present yearss, we can have Wi-Fi routers at a best coveted monetary value. Besides holding a Wi-Fi web can maximise growing and heighten the operation atmosphere in our organisation. Surely, one of the of import drawbacks of this web is that it may ensue in physical wellness conditions and atmosphere related concerns. [ 22 ]AN IDENTIFICATION OF THE SECURITY THREATSNow yearss, a mail was posted to the editor asking about the security characteristics of Wi-Fi webs and how to protect them. All Wi-Fi systems have certain sort of security issues based on how they are implemented or used. The different sorts of Wi-Fi connexion provide distinguishable methods of linking conditions on the corporate web or the cyberspace. Before stoping up the treatment and enter into the research treatment let us one time once more guarantee weather the definitions and methodological analysiss based on the subject are up to day of the month.7.1 IntroductionMany of us in the public funding occupation need to travel from office for a considerable clip frame to ease our users or travel to the events. Whole traveling from topographic point to topographic point, we trust on the user or the no cabled or wireless connexion in the accommodating topographic points to link back to the organisation to look for electronic mail updates or update the proceeding of the concern or to entree informations of the organisation or sometimes work separately by a terminal waiter.7.2 LIMITATIONSThere are several drawbacks of client-server design. Those are illustrated below:Security: In immense plan implementing security facets is a minor undertaking. But in a client-server depended design is provided with a great extent of flexibleness and a client can fall in anyplace in the web. This turns out to be a chance for interlopers to come in into the web. Hence, doing certain about the client-server engineerings is really important.Waiters can be constrictions: Waiters can move as the restricting points d ues to assorted users may fight to fall in to a waiter at the same time. This restraint occurs because of the easiness of entree provided to any client to fall in the web at any specific clip.Compatibility: Client and waiters might non to be in good footings with each other. Because of distinguishable industry may plan the client and waiter devices, they might non be suited to each other because of facets like informations types, linguistic communication and so on.Incompatibility: Cloning of waiters is a serious concern as it can originate the job of informations incompatibility.7.3 RESEARCH SCOPE7.3.1 WIRELESS OFFICE NETWORKS:Many of the funding organisations have been taught of Wi-Fi networking in their organisations but taking into consideration about the security concerns it decides. We have all known sing the WEP and intelligence in the media universe above how it had been attacked by the interlopers. In malice this is right and is a issue for Wi-Fi WEP- encoded webs, WPA-secur ed webs does non hold the similar issue, provided a rigorous security key is used. A rigorous security key could be termed as a large twine of characters taken at random from the 95 accessible keys. Taking into consideration, the lamb which Mary had spent 20 yearss in the forests is a better encoded key when compared to ABTY1386. It may necessitate several old ages to brute force Rhine wine the lamb phrase, but merely a few hours clip to chop the AB phrase. If used in good manner, WPA can supply a secure Wi-Fi web connexion for a funding organization.WEP must non be used at anytime as the encryption has been easy attacked. Using WPA is a obviously a easy technique of configuring the device for WPA connexions and so edifice that protocol on all the different Wi-Fi machines in the organisation. Provided a rigorous pre-shared key is used, the chance of the Wi-Fi web being attacked is really less. WPA can be used provided best methods are used. If WEP is being used in our Wi-Fi web, it is the state of affairs to alter to WPA.7.3.2 THE TRAVELLING WIRELESS OFFICEIn instance the client web is predicted to be to the full protected, the hotel or other Wi-Fi topographic point is estimated to be unafraid. This widens our machines and our information to be show cased to other who wanted to measure the topics of our machine. Using a package firewall does non give entree to ports which are non in usage, but there are assorted ports free to see on a machine that can give entree to person to hold a expression at informations. Some of these ports may be given entree by the package, and we may non even know that the ports are free to be entree. For illustration, in instance of horsepower pressman package this gives entree to ports on the machine that grants permission for wired web connexi ons to be granted with the machine. In laptops the cards will be installed and while fall ining the laptop in direct contact to the cyberspace through the

Important Choice in of Mice and Men

Choices are made by everyone at some point in life. Choices can be complicated or as simple as yes or no. Decisions can be difficult or easy to make. Some choices are impulsive while some require a lot of premeditation to make. In the novella, Of Mice and Men, written by George Steinbeck, George chose to kill his best friend Lennie. Lennie and George were friends for a long time. They both worked at a farm together. Lennie was retarded and George took care of him and watched over him. Throughout the book Lennie displays blind loyalty to George and their hope of a better life.George is a very dynamic character through the book while Lennie is constant displaying incredible amounts of physical strength and being dim witted. Killing Lennie was no easy task for George. This important choice was a choice that affected others, affected George, and had to be motivated to be made. George was motivated to kill his friend, Lennie. Lennie had always loved to pet soft things. He would often kill mice just by petting them. Lennie had also killed a puppy on accident. These incidents occurred out of his innocence.He was unaware of his own strength and killed animals because of it. Lennie killed Curley’s wife in an effort to simply pet her soft hair. A mob of people from the farm chased Lennie and George from the farm in an effort to kill Lennie. Curley said he wanted to kill Lennie in the most painful way possible. George and Lennie effectively escaped their pursuit for a brief minute. In this moment George tried to calm Lennie down by reminding him of their shared dream of a better life. This involved them owning their own farm and tending rabbits for Lennie to pet.This undoubtedly brought Lennie to a calm place. In that moment when people began to close in, George killed Lennie by shooting him in the back of the head. This act was influenced by the impending doom Lennie had coming. The other men from the farm that had chased Lennie would have killed him much less pea cefully. If George did not do it, Curley would have done it much less humanely. While this reason for killing Lennie may seem to be merciful, what if George had killed him for selfish gain? George was held back by Lennie as long as he had been accompanying him.This was not the first time they had gotten in trouble with the law. Lennie also kept George from getting any type of romantic relationship or even a stable job. Is it possible George was motivated by his own selfish inclinations? Several factors influenced George to kill Lennie. George’s choice to kill Lennie was motivated by others but also affected him. It is reasonable to believe that George looked out for both Lennie and his own interest in deciding what how he must confront the situation mentioned earlier. Killing Lennie affected George’s life in depth.In the entire book George and Lennie are depicted as being together. George would have to adjust to being slightly more lonesome for the time being. Lennie w as a companion to George but he was also a hindrance. George had said how Lennie keeps him from doing many things. George was upset at this and said â€Å"If I was alone I could live so easy. I could go get a job an’ work, an’ no trouble. No mess at all, and when the end of the month come I could take my fifty bucks and go into town and get whatever I want. Why, I could stay in a cathouse all night.I could eat any place I want, hotel or any place, and order any damn thing I could think of. An’ I could do all that every damn month. Get a gallon of whisky, or set in a pool room and play cards or shoot pool. † Lennie knelt and looked over the fire at the angry George. And Lennie’s face was drawn in with terror. â€Å"An’ whatta I got,† George went on furiously. â€Å"I got you! You can’t keep a job and you lose me ever’ job I get. Jus’ keep me shovin’ all over the country all the time. † Here George act s as if he doesn’t want Lennie so it would be natural to assume that with Lennie dead George would be happy.On the contrary George is disappointed at the loss of his friend as he does not want to live an isolationist life like the other members of the ranch. The choice George made affected him negatively from his own viewpoint but also allowed him to live a less tethered lifestyle. The adverse effects of this choice affected George the most. In addition to having affected George, this choice also affected others in the ranch. Lennie was the one most affected. Obviously Lennie died because of George's decision to kill him. What could have happened had an alternate ending taken place?Instead of killing Lennie, George could have escaped and found other work. This scenario was spelled out in the beginning of the book when it says how the duo had left a ranch in Weed for undisclosed reasons. There is no reason why Lennie could have been spared in this fashion. Perhaps George reali zed the cycle that could have proceeded where they escape to another ranch only to find Lennie falls into the same pattern where they end up repeating the same steps over and over. In that case George's decision was still the right one. Lennie did not understand what death was in its full sense.When he killed animals he did not care they were dead but wanted them for comfort. In the same way George killed Lennie while he was in a comforted state. Lennie most likely wanted it that way. When Lennie was killed, their dream of the ranch was also killed. This deeply hurt those like Candy and Crooks who emotionally invested in this dream that had become theirs as well. Candy insisted that George goes ahead and buys a farm anyway. The represented freedom and lack of prejudice for Candy and Crooks. When the idea was gone, they were very upset as their dreams of a better life did the same.George's decision to kill Lennie affected others as well as him. The important choice to kill Lennie was a choice that was motivated by others, affected George and affected others. The decision was motivated by Curley’s desire for revenge. George will be forced to live an isolationist life just like the other members of the ranch in the Great Depression. Crooks and Candy’s dream of an improved life was crushed with George’s choice. Everyone has to make important choices in their life and they will usually be for the better and the worse.

Tuesday, July 30, 2019

Operations Decision

Assignment 2 â€Å"Operations Decision† Assume you have been hired as a managing consultant by a company to offer some advice that will help it make a decision as to whether it should shut down completely or continue its operations. It currently uses 100 workers to produce 6,000 units of output per month (working 20 days / month). The daily wage (per worker) is $70, and the price of the firm's output is $32. The cost of other variable inputs is $2,000 per day. You are told that the firm's fixed cost is â€Å"high enough† so that the firm's total costs exceed its total revenue.The marginal cost of the last unit is $30. (Ch 7 & 8 to solve) This assignment allows you to determine the specific details about this fictitious company in order to conduct an environmental scan of this company. Write a three to four (3-4) page paper in which you: 1. Briefly describe the details of the fictitious business that you created for this assignment. 2. Assess the current environmental sc an factors that are relevant to the decision making process.Determine the factors that will have the greatest impact on plant operations and management’s decision to continue or discontinue operations. Provide a rationale for your determination. 3. Evaluate the financial performance of the company using the information provided in the scenario. Consider all the key drivers of performance, such as company profit or loss for both the short term and long term and how each factor influences managerial decisions. Be sure to show the calculations that helped you reach your conclusions. . Recommend how the company can improve its profitability to deliver more value to its stakeholders. Then, develop a brief plan to implement the recommendations. 5. Assess the circumstances in which the company should discontinue operations and how management should react when confronted with these circumstances. Provide a rationale with your response. 6. Use at least three (3) high-quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.

Monday, July 29, 2019

Question and Case Analysis Assignment Example | Topics and Well Written Essays - 1000 words

Question and Case Analysis - Assignment Example ing Aoki is manufacturing to China, Mexico, or Eastern Europe, the company must first carry out thorough scanning to understand the political and economic laws in these countries. China has religious law, which may not affect Aoki firm greatly in its operations. China and Mexico do have a mixed economy where both government intervention and market mechanisms operate. The Chinese government encourages foreign investors as compared to Mexico and Eastern Europe states. In Mexico, businesses are marred with violence thus discouraging investments. Nonetheless, there is socialism system of government in some parts of Eastern Europe such as Russia that controls all economic and political matters. Most of the businesses bribe to acquire important documents such as licenses and there are increased crimes and killings that involve seizing of individual businesses. Russia and some countries in Eastern Europe do not have a strong antipiracy law hence may weaken the business by manufacturing fake glasses as the ones manufactured by Aoki firm. Aoki Company should therefore consider manufacturing in China than in Mexico and Eastern Europe. Aoki’s decision to sell its products to Latin America and Europe is welcomed due to political stability in these regions that comprises deeper application of civil law. There are also good quality infrastructures such as communication that may help in doing business. Furthermore, market forces are left to control trade hence democracy in trade and economic freedom. Aoki will be able to make economic decisions to facilitate its operations thus maximizing its profits. According to the American corporation policy, Aoki will repatriate a given percentage of its taxable profit to the home country. Emerging markets have a large number of middle class that provide a good market for commodities in their countries. The middle-income earners have enough disposable income that enable them purchase electronics. The ability to purchase electronics

Sunday, July 28, 2019

Do women have to suppressed(kept down) Essay Example | Topics and Well Written Essays - 750 words

Do women have to suppressed(kept down) - Essay Example need to be suppressed because they are unwilling to accommodate the idea of an empowered woman and they want women to abide by the stereotypical roles attributed to them. Since ages, women have been stereotyped and expected to be mothers, wives and daughters and nothing more. Thereby, some men today do feel bad when a woman aspires to gain freedom and power as they believe that this mindset does not go well with their â€Å"traditional gender role position (FlorCruz 1).† Thereby such misogynist approach towards women has its basis in the underlying male fear that women may stop catering to the male notions of them, as they get more educated and successful (Sandberg & Chavez 1). People feel that they need to suppress women because their attitudes towards women are actually out dated, conservative and prejudiced. Thereby, any gain made by women in the field of politics or business, stimulates there misogynist assumptions. Even if people know that such fears of female domination happen to be misplaced, faulty and wrong, they still choose to suppress women, going by the force of tradition and outdated beliefs. They bow down before the urge to â₠¬Å"emphasize the gender characteristics recognized by tradition (FlorCruz 1)†. It is time that people do realize the fact that there is no need to suppress women to support male domination. In fact doing so in the current times may prove to be counterproductive. One other reason why many males believe that they need to suppress women is because they are not willing to accept the gains made by women in all areas, in the contemporary society (Sandberg & Chavez 1). Though women had been allowed an active participation in academics, business and politics just a few decades ago, still, in such a short time, they have managed to gain tremendous success through their handwork and dedication. As a result of such developments, the society is required to accommodate women as equals. However, this amazing success registered by women in

Saturday, July 27, 2019

Create my own exam Math Problem Example | Topics and Well Written Essays - 750 words

Create my own exam - Math Problem Example A line passing through the centre of a circle is the diameter of the circle (Mosteller 109). If two or more diameters are in the same circle then all of them are equal in length irrespective of their position. Therefore, if the two sides from both triangles that pass through the middle of the circle were taken as o for Triangle A and x for triangle B, then o will be equal to x. The side will also be the longest on either triangle. In the equation o + p + q = x + y + z we can eliminate o and x since they cancel each other keeping in mind that o = x, hence we will be left to prove that p + q = y + z. To prove this we will first have to identify the angles formed by the two triangles. If triangle A has angles O, P, Q where angle P and Q join sides p and q to side o respectively, then angle O is opposite to side o. On the other hand, triangle B has angles X, Y, Z where by angle X is opposite to side x and angles Y and Z join sides y and z to side x respectively. If we start with both tri angles as isosceles triangles then sides p + q = y + z because for both triangles the longer side is equal (Kac and Ulam 167). In the event that the shape of either triangle changes then the following, changes will also take place. Let us start with triangle A, a change in the shape of the triangle from an isosceles triangle an irregular triangle this will cause angle O to increase. The change will also be associated with change in length of side p and q, where with every increase in side p side q will be subsequently decreasing and vice versa. The total length of the two sides will be maintained that is p + q for all the changes will remain the same. In triangle B the same principle will also apply such that a change in the shape of the triangle from an isosceles triangle to an irregular triangle then angle X will be increasing and an increase in side y will lead to a decrease in side z and vice versa. The total length in this case will be maintained that is to say that y + z will remain the same in whichever shape the triangle changes. Since p + q = y + z for the isosceles triangle then the same principle will apply for a change in shape of the triangles. Theorem 2 If a rectangle is drawn inside a chessboard with its sides parallel to the sides of the chessboard, then the number of complete dark squares will NOT be equal to the number of light squares covered by the rectangle. That is if the rectangle covers m complete dark squares and n complete light squares then m ? n. Taking note that not necessarily that all the squares covered by the rectangle will be complete. Proof: Suppose we take a chessboard (which is square in shape) with sides C and D where C = D and inside the chessboard there are ‘n’ equal squares, which are made of one unit of each side, therefore n = C ? D (Garder 510). The dark squares are denoted by b and the light squares denoted as w. A rectangle with length J and width K is drawn inside the chessboard where the side J is pa rallel to C and K is parallel to D. Further, J should not be equal to C and K should not be equal to D, meaning the rectangle is smaller than the chessboard and there should be no three sides of the rectangle touching the sides of the chessboard. If the rectangle is drawn to fit exactly two units of C and one unit of D then the rectangle will

Friday, July 26, 2019

English as an Additional Language Learning Programs for Multicultural Case Study

English as an Additional Language Learning Programs for Multicultural Students - Case Study Example Before 19th century ends, there are already more than ten states that had implemented this English as an additional language Law. Some localities also had also English as an additional language but without the admission and permission of the state. During the 20th century there are already more than a thousands of students who had already adopt the English as an additional language. At present, there are already millions of people worldwide who are studying English as an additional language.Because of growing global migration, national, and linguistic diversity in different Irish Schools, English as an additional language became more widespread and more evident. In Ireland, different schools had been in need of this English as an additional language. The Department of Education and Science earn funds for the English Language for the different students in Ireland. Today, the growing need for the establishment of English as an additional language around northern Ireland is indeed a pro per distinction as to how the nation tries to provide the necessary indications that are needed to be considered when it comes to educating their visitors of the language that could assure them of a better future in the country and even in the field of modern global approach.The British society at present has the highest rate of having a multicultural society. The advancement of the economic developments that globalization has opened to the British society has made it possible for people from all sections of the world come towards the so called 'dream land', the British territories. Some are coming in the country for the sake of employment, some for education and some for permanent residential. As a result, the students who are coming from different nations around the world meet a challenge of dealing with the difficulty of living and getting used to a the living that is accustomed for the foreign land that they ought to fit into. In this paper, a comprehensive set of lessons shall be discussed that would be directly applicable to any subject in general. The applicability of the said lessons is attested by the fact that in dealing with multicultural classes, there is a certain need of having a variety of approaches as to how the subjects are presented. Problem Statement It has been mentioned earlier that there is a dire need of producing or formulating programs that suits the need of adults and young students as well to learn business English for them to be prepared in facing the real business world later on. Hence, the problem that is to be discussed in this paper is much related on the way that the educators were motivated to make the necessary adjustment for the said program applications. The following are among the questions to be answered: How could the educators be moved to take advantage of the current need of 'producing' students who are able to speak English as their Second Language, thus giving the business industries higher competencies in the future' How should the educators feel about the progressive teaching strategies that the program requires of them' Would there be progress in applying the necessary points of consideration in the said program, especially with regards to teaching strategies' These questions shall serve as guidelines for the author of this paper in completing the required data for this assignment. Purpose of the Study The main reason why this study has been commenced is to be able to show the important factors that motivational procedures contribute to the success of different educational programs offered specifically in Toronto. These programs involve different

Thursday, July 25, 2019

Leadership Essay Example | Topics and Well Written Essays - 4500 words - 1

Leadership - Essay Example So, far we have talked about culture taken in a broader sense, however organization culture is a quite a narrowed down classification of culture and it could differ significantly from organization to organization. For instance the organizational culture of a hospital may differ significantly from that of a not-for-profit organization or a retail firm or even take the example of law firm. The basic Organizational Culture has some characteristics which if an organization can capitalize can pay them off big time for example culture are made up robust values which are almost impossible to change in a brief period of time so if an organization is able to capitalize on such characteristic it could inject ethics from the very outset of its existence. It could make loyalty, efficiency leadership and many different qualities such as these an integral part of it an employee routine. Employees are highly skilled and tend to stay in the organization, while working their way up the ranks. The organization provides a stable environment in which employees can development and exercise their skills. Examples are universities, hospitals, large corporations, etc. Employees are "free agents" who have highly prized skills. They are in high demand and can rather easily get jobs elsewhere. This type of culture exists in fast-paced, high-risk organizations, such as investment banking, advertising, etc. The most important requirement for employees in this culture is to fit into the group. Usually employees start at the bottom and stay with the organization. The organization promotes from within and highly values seniority. Examples are the military, some law firms, etc. Employees dont know if theyll be laid off or not. These organizations often undergo massive reorganization. There are many opportunities for those with timely, specialized skills. Examples are savings and loans, large

Assign 5 mjtjm Assignment Example | Topics and Well Written Essays - 500 words

Assign 5 mjtjm - Assignment Example he author demonstrates the questions remains unanswered by stating that there is the absence of accepted viewpoints as the existing hypothesis were mainly on qualitative considerations that allowed different interpretation. The author chooses to use quantitative factors to answer the questions. The author mentions prior research carried out by Humphreys (1929 and others). The researcher considered that the variation of direct radiation was determined by the change in atmospheric transparency due to dust emitted during volcanic eruptions. However, the author disagrees with the findings arguing that the variation of the radiations could also be caused by increased atmospheric dust emitted by human activities1. The author uses observational images from the meteorological satellites, data from geological investigations on the level of volcanic activity and results of calculations of monthly mean values of radiation. There are no sampling issues involved in the research. The dependent variable in the study is that the changes in Earth’s temperature. The independent variables are the variations in the transparency of the atmosphere that depends on the level of volcanic activity. The hypothesis to be tested is precise as temperature change is related to change in solar radiations2. The author uses inferential statistics which is an appropriate approach based on the data available. The assumption is that the change in temperature and transparency in the atmosphere are linear. The author’s findings are that human activities influence the climate as the activities produce energy that produces heat that is an additional to the heat generated by the solar radiations. The author has an expectation that one of the glaciers expansions could reach the critical latitude that would result in complete glaciations of the Earth setting in. The author borrowed the conceptual definition from a piece of prior research3. The author concludes that human activities should be taken

Wednesday, July 24, 2019

Six Dimensions of Health Essay Example | Topics and Well Written Essays - 1250 words

Six Dimensions of Health - Essay Example Bill Hettler   manufactured a wellness model recognized as the six dimensions of wellness model. According to this model, there are six dimensions of wellness; these include social, physical, emotional, intellectual, occupational and spiritual dimensions (Hales, 2001, p.9). According to Dr. Bill Hettler, all these dimensions contributed to the well being of an individual. Emotional wellbeing According to Hettler, the emotional wellness refers to the degree to which an individual has an optimistic viewpoint about himself and is passionate about his life. A person is said to be emotionally fit if he accepts the availability of different feelings inside him and feelings inside others. This individual does not experience issues while expressing his emotions and is aware of how to control his emotions. This individual has the ability to take decisions in accordance with his feelings, believes, attitudes and behaviors. These people gain awareness about different stressors available in hi s work and personal environment and e even develops ways of managing these stressors. Stressors in an individual’s work environment include time stressors and situational stressors. Time stressors are caused due to less time availability and heavy workload. Situational stressors include changes in the environment. An emotionally fit individual has the ability to manage time and adapt to changes in his environment. An emotionally fit individual has the ability to work on his own and to work as a part of a team. If an individual is not emotionally fit he might experience difficulties in adjusting to a team and he may prefer working alone. Teams are of great importance to any organizations and organizations give more preference to those individuals who can work with teams. A person who is not emotionally fit might not be accepted by organizations because of his inability to cope with teams. An individual is not completely fit if he has attained emotional wellness, individuals ne ed to be fit in other dimensions of wellness to be pronounced as healthy. Intellectual wellbeing Intellectual wellness refers to an individual’s ability to obtain information from various experiences. A person is intellectually fit if he is ready to take new challenges and if he is able to obtain and analyze new information. Organizations give great preference to those who are ready to learn new things and take new challenges. This is because organizations are facing changes very rapidly and only those people are considered fit for an organization that is ready to accept and adapts to those changes. Organizations do not give preference to those who lack these abilities as organizations themselves cannot perform well if they avoid change. A person who is intellectually fit has the ability to learn new things; he uses this ability by implementing newly learned things to his workplace. The activity of learning new things enhances the skills and abilities of an individual. Such a n individual can perform various tasks and can become an important member of any team. Physical wellbeing An individual is referred to as physically fit if he becomes a part of physical activities which helps in the enrichment of his physical existence.

Tuesday, July 23, 2019

Greenhouse effect and global warming Essay Example | Topics and Well Written Essays - 1250 words

Greenhouse effect and global warming - Essay Example There has been a considerable increase in the average temperature of earth in the past century. This rise in temperature is attributed to the effects of global warming brought about by the accumulation of greenhouse gases in the atmosphere. This phenomenon is called Global Warming. (In the news, Global Warming.org).The global warming has happened in the past few years and is evident from the rise in mean temperature of the earth's atmosphere. The main causes for the global warming are attributed to release of green house gases by human activities. The main gases contributing to green house effect are carbon dioxide, water vapor, methane and nitrous oxide. The largest producers of these gases are the thermal power plants, which burn the fossil fuels and produce these gases in large quantities. The second biggest sources of these green house gases are the road vehicles and industries. The global warming has led to increase in mean earth surface temperature and thus melting of polar ice . There are frequent melt down of glaciers that result in floods and other natural calamities. The melting of ice at the poles had led the mean sea level. And further increase in temperature may further melt the ice and lead to further increase in mean sea level, which will engulf low lying countries. (Global Warming facts, Global Warming.org). HOT (or warm) TOPIC as Always! Well, Global warming has always been in news for some time around due to several factors (including comical) and was even referred in the Daryl Cargle cartoon Global chaos-Halloween 2008 as one of the demons in the Halloween night who scare today's population. On the contrary this principle has been exploited so skillfully by ecological scare-mongers that it is now regarded as politically incorrect, even unscientific, to denounce global warming hysteria as unproven speculation. In his latest exciting and provocative techno-thriller State of Fear, Michael Crichton exposes a scintillating revelation, regarding the way ecological groups have twisted data and facts to create mass anxiety. He points out that we know astonishingly little about the environment. All sides make exaggerated claims. "We know that atmospheric carbon is increasing. We are also in the midst of a natural warming trend that started in 1850 at the end of what is called the Little Ice Age. It is scientifically impossi ble to prove whether the subsequent warming is natural or man-made." Greens say, rightly, that the best scientific assessment today is that global warming is occurring. Yet never in history have scientists accurately predicted what will happen 100 years later. A century ago no scientists predicted the internet, microwave ovens, TV, nuclear explosions or antibiotics. It is impossible, even stupid, to predict the distant future. That scientific truth is rarely mentioned. Why Because the global warming movement has now become a multi-billion dollar business with thousands of jobs and millions in funding for NGOs and think-tanks, top jobs and prizes for scientists, and huge media coverage for predictions of disaster. Something worth a laugh! The "Discovery" channel recently produced a documentary on Greenland's alleged "melting glaciers." Oh boy! Here we go again with Global Warming. It's

Monday, July 22, 2019

The Great Gatsby in the American Dream Essay Example for Free

The Great Gatsby in the American Dream Essay The 1920s and 1930s represent two decades in our countrys history that were very much connected to one another but extremely different in the economy. The Great Gatsby takes place during the roaring 20s, a time of extravagant parties and attempts at finding happiness after World War I. On the other hand, The Grapes of Wrath takes place during the 30s while America is suffering from the Great Depression and people are leaving their homes and lives to find success and work in California. Although the times were very different economically, both were taken over by people striving for the American Dream of wealth and social status in an attempt of getting happiness, success, and a better life. During the 20s, people wanted to escape the terrors of the war and during the 30s they were attempting to survive during the devastation of the Great Depression. Both The Great Gatsby and The Grapes of Wrath do an amazing job of representing peoples desires for the American Dream and more specifically the failure rather than success that came as a result of their efforts. The American Dream depicted by The Grapes of Wrath is very different from the dream of the 20s and The Great Gatsby. For one, money and wealth is much scarcer and extravagant parties are far from peoples minds. In The Grapes of Wrath there is a very distinct line between the rich and the poor and this separation increases as those who are rich go to all lengths to ensure that they remain in the upper class. Many of the upper class seem to live in California where there is land and opportunity, while much of the lower class consists of dust-bowl farmers who have been forced to leave their land and travel to California in search of work. The land owners in California are afraid that these dust-bowl farmers will eventually take over their property and make it their own, so they are doing everything in their power to ensure that the poor farmers are not successful. Even still, they hire them for their dirty work and treat them poorly as there are many more to take their place. Many of the poor farmers begin turning their backs on their families and friends in an attempt at succeeding as individuals. This selfish attitude is the same attitude held by the California land owners who are unwilling to share their fortune with anyone else due to fear and lack of trust. The Grapes of Wrath builds up several different dreams for the American depending on their background. The California land owners dreams consist of eagerness for wealth and greed to remain in a position of power over the dust bowl farmers that are working their land. On the other hand, many of the poor farmers have simple dreams of just keeping their dignity and not allowing themselves to give up on their families. In the end, it is the Joad familys ability to keep their dignity and hold together as a family that helps them to rise above all of the tragedies they encounter. The Grapes of Wrath concludes with a much more hopeful tone than The Great Gatsby and passes on to the reader the importance of men joining together and doing what is right for all of mankind as opposed to what is most beneficial to the individual. Jim Casys death in Chapter 26 is a perfect example of how the California land owners are threatened by the idea of the poor farmers joining together and revolting. His death is also an example of how a man or woman can make an unselfish decision and risk what is best for them individually to do what is best for all of mankind. Tom is very struck by Casys bravery and finds the power within himself to follow in Casys footsteps and help unite people to fight the injustices of their current situation. His own dream becomes an attempt to do all he can to better life for the common American man. The American Dream was not only different in the 20s than it was in the 30s, but it has continued to evolve and change up through today. Despite the differences in these dreams, there is a central goal to all of them: the pursuit of happiness. In both of these books and much of the world today, people seek and dream of attaining just utter happiness. For centuries, lots of people have been trying to obtain money, careers, success, and more. Although these dreams are separate from one another, they are all just a means by which people feel they may hopefully obtain their dream of being happy. The question is when will people begin to realize that it is not these materialistic goals that will provide them with happiness, but rather things like humility, love, family, and religion? These are true sources of happiness and real answers to the American Dream.

Sunday, July 21, 2019

E-commerce website

E-commerce website Introduction This document consists of a project designed to construct an E-Commerce website for a mobile phone store. Using different methodologies this report will explain in depth how the website was constructed and whether this project was a success. The website allows users shop online for mobile phones and mobile phone accessories. The website consists of many features, which aid the users in locating their desired item i.e. powerful search engine, language translator and easy to use guided navigation menu. These features facilitate users in pin pointing the exact product they are looking for. The website is based around a mobile phone store located in Victoria Greater London. The store is called E Cell Mobile and is a small PLC, which sells mobile phones and accessories. This website has been constructed for the sole purpose of helping the company expand their business to a vast range of customers and to increase company revenue. In order to achieve this goal there were a couple meetings that were held between the developer (me) and the storeowner. During these meetings it was decided that one of the most efficient ways to accomplish this goal, was to create a website to reach out to customers. This should help increase company revenue as well as, being cost efficient given that it is not very costly to run a website, if compared to opening another store. An administrator account has been created, which is to be used by the storeowner. This account was created to allow simple and efficient maintenance of the website. With the use of this account the administrator has access to the whole website and can easily edit data with use of a simple GUI, no PHP knowledge is needed. This would be a great benefit to the storeowner since he can very easily maintain the site. This account allows the admin to add more products using the CSV Import Function, add/edit/delete customers and/or product data and much more. The payment aspect of the website is dealt by PayPal. Once a user selects an item they wish to buy they are redirected to PayPals SSL page. It is made clear to the user that they do not need a PayPal account in order to purchase an item on the website. Once the user is redirected to PayPals secure payment page, they can select the option to pay by direct debit or credit card. If there are any discrepancies with payment then E Cell cannot be held responsible and the case shall go to PayPals accounts department. Analysis During the stage at which the PID was constructed there were a few aspects, which were overlooked. Throughout the analysis phase of this report there will be a few stages from the PID that will be extended, rearranged and added. This project is based around a mobile phone company that does not have an online system. All transactions, customer details and product information are stored on a database that is located on the shop floor. The system that is used to interact with day-to-day customers is pretty slow and lags most of the time. The system that is currently being used is called Metasys. This particular software is a database system, which stores customer and product information. When the store gets a new customer, a staff member inputs the customers details manually into the database. All products are added to the database through a Point of Sale System (POS). Now after doing a bit of research it was discovered that this company (Metasys) was no longer in business and as a result no upgrades are available for this software. To get an idea of how bad the current system was, a few surveys were designed and given out to staff members on the shop floor (these can be seen in Appendix B). Judging by the results received from this assessment it was clear to see that a new system needed to be put in place. Below is a list that has been devised to show the problems with the current system: System often freezes when taking down customer information The database can be very slow at times when accessing large amounts of data Does not have the latest security updates due to the company no longer being in business Opening and closing the database sometimes leads to corruption of data. The system can be slow to respond to common tasks such as View Customer Info A secondary issue that needs to be discussed is that this particular company (E Cell Mobile) would like to expand their business and reach out to a larger customer base and therefore increasing the businesses revenue. The company does not wish to open a new store since this would require a large sum of money, which the organization cannot afford. This project proposes to replace this old system with a new a modern way of doing business. The new system needs to be faster, easy to maintain and a lot more reliable. Although the current database running on the shop floor has a lot of disadvantages there is one positive aspect that allows new mobile phones that arrive for delivery to be added to the database quickly and easily. This is the POS (Point of Sale) system currently used by the employees at E Cell. When a bunch of mobile phones arrive for delivery, a staff member uses an electronic laser to scan the bar codes; these are displayed on the packaging of all the mobile phones. After a particular product has been scanned it will automatically be added to the companys database. E Cell also receives an electronic spreadsheet from their supplier, which consists of all the items that have been delivered to them on that specific date. The point of sale system is a great method for populating information into database. It is fast, simple and requires minimal effort. In order for this project to be a success it is important that this particular method for adding information to the companys database is either improved upon or kept the same. If for any reason the POS system is removed and another system is put into place, then this new system must be able to perform tasks, which are faster and much simpler then the point of sale system. Aims Objectives Every project consists of a number of goals, which need to be achieved. These goals decipher whether the project will be a success or a failure. A successful project would have met and accomplished each target. The main aim of this project is to create a product, which resolves the problems that are encountered by the current system. Below is a list of aims and objectives for this particular project. Some of these aims and objectives that were looked at during the project initiation stage have been changed and modified. There has been an addition of some new goals to the list. The list below has been based around, how appalling the current system is and if a new system was to be created what would it need in order to be successful. Aims: The system should be easy to navigate around Buying an item should be fast and efficient The system must be user friendly The system must be faster and more reliable than the old system The admin should be able to add/delete/edit customer and product information Objectives: To provide a mobile system that allows users to purchase mobile phones and accessories. Allow users to create their own customer account online. To provide an interface usable by less literate computer users. Allow users to save any transactions that have been made Provide users with tracking info so they can track their purchase As mentioned in the project initiation document this project will take the DSDM approach. DSDM states that in order to achieve maximum business benefit and a fully working system that is fit for purpose; one must outline the user/business requirements and aim to accomplish them all. DSDM uses an excellent prioritisation method called MoSCoW. This prioritisation method outlines the crucial requirements that need to be achieved in order to get a system fit for purpose. All requirements shown in the Must Have section below have to be completed in order for this project to be successful. MoSCoW Prioritization Must Have Users must be able to buy a mobile phone online (M1) System must contain search parameters to allow ease of use (M2) Site should be user friendly (M3) Admin should be able to add/delete/edit product and customer information (M4) POS system needs to be improved upon or left as it is (M5) Should Have The user is contacted via email once they have made a purchase (S1) The user can email a staff member if they have a question (S2) Could Have Google Maps to display location of shop (C1) An online chat client to answer user queries (C2) Wont Have Selling mobile tariffs (All mobile phones will be pay-as-you-go and not on contract) (W1) All of the requirements of the Moscow prioritization have been tagged e.g. M1, M2, S1, W1 etc. The reason they have been tagged is because they will be referred to as M1, M2, S1 etc during the implementation phase of this report. Requirements There are certain sets of requirements that need to be achieved when creating this new system. These requirements are split into two sections, Functional and Non-Functional. These are outlined below. Functional requirements Multiple transactions can be made at the same time Customers can add items to a shopping basket Customers can view, edit and remove items from shopping basket Customer is notified via email when purchase is complete Non-Functional Guided navigation menu makes browsing easy for the user Transactions can be completed using multiply currencies Availability System will be up 24/7 with minimum down time Accessibility The system can be viewed in other languages other than English Requirements Table A central list of requirements was constructed by the client, these have been listed below. Each of these requirements need to be met otherwise this project will be a failure since the final product will not be fit for purpose. The client gave a larger list of requirements (shown in Appendix D) however the requirements listed in table below is what the client has said to be mandatory prerequisites and thus need to be completed. Feasibility Study In the feasibility study the following areas will be looked at, project risk analysis, cost benefit analysis and stakeholder analysis. Project Risk Analysis Cost Benefit Analysis Since this is a student project there wont be a huge budget. The software that will be used to create this product will either be freeware or already available to the developer. As a result cost will be kept to a minimal. In terms of hardware, a pc/laptop is already available since the University provides this and electrical fees/bills will also be covered by the University. If the system is to be hosted online then these fees will be paid by E Cell Mobile although a free hosting provider will be the first priority. Stakeholder Analysis Managing stakeholders is an important factor in order for this project to be successful. Below is a list of all the stakeholders involved in this project i.e. people that are affected by the work that is done, who influence or have power over it or have an interest in its successful or unsuccessful conclusion. Vishal Verma (Project Manager/Developer) The developers role will be to manage the project, make sure all milestones are met and that the final product is produced within the set deadline. Jim Johnston (Client/General Manager) Jim will be the first point of contact. He manages most of the staff and deals with all sales related aspects. Dean Forster (Store Manager/Company Owner) Dean is the owner of the store and will be the second point of contact. Project Method Approach There is one main objective, which needs to be fulfilled in order for this project to be a success. The new E Cell Mobile system needs to be fit for purpose. A system that is fit for purpose will ideally meet all user/business requirements of this project. Below is a quote from Harvey and Green (1993) that explains what fit for purpose actually is. Quality is thus judged in terms of the extent to which the product or service fits its purpose. This notion is quite remote from the idea of quality as something special, distinctive, elitist, conferring status, or difficult to attain. It is a functional definition of quality rather than an exceptional one. If something does the job it is designed for then it is a quality product or service. (p.16) Every product and service has the potential to fit its purpose and thus be a quality product or service. Fitness for purpose has emerged as the fashionable way to harness the drive for perfection. The ultimate measure of perfection, zero defects, may be excellent as a definition of quality but runs the fatal risk of being perfectly useless. If the product does not fit its purpose then its perfection is irrelevant. (p.17) This specific project will be using the DSDM approach, this is because by using the DSDM approach the project itself will be carefully planned e.g. MoSCoW, timeboxing, facilitated workshops etc. At times it can be very easy for a project manager to become unorganized especially if the project has not been planned and as result, the final results may be below satisfactory. Due to this reason MoSCoW prioritisation has been discussed earlier on in this report so that the project manager/developer and the client know what exactly the final product will contain. In conjunction to the management of this project, DSDM Atern will be the main forefront. This technique mainly focuses on Time, Cost and Quality. Figure 1 below (Atern Approach) states that Time, Cost, Quality is fixed and will not be changed throughout the projects life cycle, whereas features can be manipulated since it is a variable. The traditional approach to this is the complete opposite and will be avoided since quality should never be compromised. Facilitated Workshops Facilitated workshops are part of the DSDM Atern development approach. Since this project uses the Atern management method it was vital to incorporate the facilitated workshop technique into this project. By using an interactive environment, effective group dynamics and visual aids, facilitated workshops are designed to extract high quality of information in a compressed time frame in order to meet the predetermined set of deliverables. By constructing these workshops it will make it easier to achieve the targets that have been set from the beginning. The project manager will act as the facilitator and arrange these meetings. Information that maybe be discussed in the workshops is as follows: Who is the target audience? How can the business reach out to customers? Advertising Sponsorship The list is just a small number of topics that maybe be discussed during the workshops. It is vital that all the project stakeholders attend these meetings. Facilitated workshops will give the project manager an overview of what needs to be done and the time everything needs to be completed in. Design During the design phase of this project there were a number of solutions that came to mind. The new system that is to be created must overcome the problems faced by the old outdated/system. Below is a list of solutions that could be implemented to solve the problems discussed during the analysis phase. Rebuild the system on the shop floor. Install new database software and get faster and more reliable hardware to cater for the new database. Build a website to cater for customers, this will also have an online database Open a new branch in order expand the business Two of the solutions shown above (Rebuilding the system and opening a new branch) just do not seem feasibly. Opening a new branch would just to be too costly and would require a lot more man power, effort and time which the company does not have. In terms of rebuilding the new system, the cost of installing a new database and installing new hardware was just too high and above the companys budget. The only measurable idea was to create a website; this would be cost efficient and require minimal effort. The final solution was to create an E-Commerce website. This website will be online 24/7, and as a result can be accessed by staff members anytime of the day/night. Employees will no longer need to go to the shop floor to access the database. The website will contain an administrator account that will only be able to be accessed by staff members. This account will give access to the companys database, which will include access to product details, customer information and any transactions that have taken place. Users will be able to go onto this website buy a mobile phone (or any mobile accessories), add the item to a basket and then pay for it. PayPal will handle the payment system so the business will have the peace of mind that their money is safe and secure and so will the customers. The way the payment system will work is once the user has added an item to their shopping basket they will have the option to checkout. The checkout page will give the user a brief description (preliminary invoice) of the transaction, this will include; item description and total price. On this page it will be made clear to the user that they will be paying via PayPal and that a PayPal account is not necessary need in order to make a payment. Once the user accepts these conditions they will be redirected to PayPals payment page, this is where account details such as bank account number, sort code are entered. PayPal will verify this information and send out two emails. The first email will be sent to the customer verifying payment and the second email will be sent to the administrator of the site which will contain an invoice of that particular transaction. Once payment has been confirmed by PayPal the administrator can deliver the item to the customers address. Tracking of all delivered items will be provided to all customers. There will be a Tracking section on the website which will give a detailed explanation on how customers can track their purchased products. The way the tracking system will work is once the payment has been confirmed by PayPal the administrator will post the item via Royal Mail/DHL to the customers address. Royal Mail/DHL will then provide the administrator with a tracking number. This particular number will be posted to the customer via email. The customer can then visit Royal Mails/DHLs website (the link for this is provided in the email) and enter the transaction number to get a rough idea of when their purchased item will be arriving. Organisational Benefits By creating an E-Commerce website it will tackle all the problems the company is currently facing and also, it will be very cheap to run and maintain. Below is a list outlining the benefits of opening an E-Commerce store for E Cell Mobile. Expand business Interact with a larger customer base Increase company revenue Faster and more reliable system Easy to maintain Secure Software Tools To develop the website the following languages/tools/software will be used: PHP/PHP Editor This will be used as the server side code. PHP will be used to communicate with the MySQL database. AJAX AJAX will be helpful since you can update part of a webpage without refreshing the whole content. So in this case the user can enter a search query and instead of refreshing the whole page the results for the search are shown instantly Jscript/jQuery Guided navigation menu MySQL All customer/product data will be stored on a MySQL database. Adobe Flash Flash player will be used on the home page in order attract the audience to the website. Swish This program will be used to create a flash video. Although this program is not freeware it is still possible to use the 30 day trial period. phpMyAdmin By using the easy to use GUI provided by phpMyAdmin it will make it a lot easier to manage the MySQL database. CSS/HTML/XML Designing the website (Aesthetics) Adobe Photoshop Constructing the company logo Quick n Easy FTP Uploading files to the server Apache v2.5 To enable local host a web server needs to be initialised ergo Apache will be utilised. Prototyping Since this project will use an agile approach it was important to build a horizontal prototype. This allows the developer to construct the product in an iterative cycle and therefore achieving better functionality. The horizontal prototype is the man-machine interface (MMI). At first a quick sketch is drawn on a piece of paper in order to get an idea of what is to be done. To make a prototype for the E Cell Mobile system, the website www.gomockingbird.com was utilised. These prototype models can be seen on page 15 (Figure 4, 4.1, 4.2 etc) During the horizontal prototyping surface interface software functionalities were not working but by creating a sketch (using the go mockingbird website) it allowed the developer to achieve a perception test. This helped to evaluate how easily other users could understand the interface. During the perception test users were just shown a bunch of windows and buttons, on a piece of paper. The users were then asked to explain what they understand from the information displayed before them. The results for the perceptions test can be seen in Appendix C Horizontal prototyping allows the developer to check the behavior of the interface and decipher the vital points, where usability inconsistencies are likely to appear. After completing the horizontal prototype, and in order to get a full analysis of the user interface, another set of tests was done. These tests are known as Vertical Prototyping. This helped to implement a consistent set of functionalities in order to allow the user to achieve a typical scenario of usability. These tests were only done after the GUI was 90% complete. At this stage the prototyping consisted of a series of user tests during, which the vital points raised throughout the horizontal prototyping phase are evaluated. Usability Test This specific test allows identifying of usability problems and analysing their cause with the users. The user is given the system and allowed to beta test it in any way they like. Solutions are elaborated and implemented during this stage of the prototype and as a result may change the final look and feel of the system. The results for this particular test can be seen in Appendix E. This test was constructed after the website was completed. If any discrepancies were found during these tests then website was modified accordingly. GUI Design Before the implementation phase a few screen designs were constructed. This gave a rough idea of how the website should be built. These screen designs were shown to a random bunch of users in order to assess the usability of the interface (Perception testing Appendix C) The customer must enter their user name password into these fields in order to login. By using the Forgot Password? link the user can input their email address which they used to register with the website, and a new password will be sent to this email address. By checking the Remember Me? check box a cookie will be added to the users internet explorer folder. This means the user will no longer need to type in their user name and password every time they visit this page. Product Details These are images of the product Breadcrumb trail; the user can use these links to go back and forth. This section of the page displays information regarding the product. The user can use this link to tell a friend about a product listed on this page. Necessary information such as friends name, email etc must be filled out The information in the Captcha must be entered to verify that you are human and not a bot. A message can be written regarding the contents of this email. A short description of the company such as when it started and who is involved in the organisation. Contact information will also be shown in this section e.g. address, email telephone etc. Using the Google Maps API, E Cell Mobiles location will be shown on this interactive map. UML Case Diagram Below is a case diagram for the system that is to be built. It displays two Actors, the User and the Administrator. In the middle is the system where all calculations and processes are made. The user (customer) is able to perform a number of functions, such as searching for an item they wish to buy, adding that specific item to a basket, emailing the site owner etc. The Administrator is able to perform high priority decisions such as viewing all customer transactions, removing or adding customer and product information etc. The ERM diagram shown in figure 6 displays the different types of tables that will be used in order to create the database. Each table has a different number of attributes and each attribute has its own data type. Each table has its own primary key; this is a unique identifier for every table and is not repeated. Some tables include foreign keys; this is a referential constraint between two tables. The entity relationships between each table can clearly be seen by the bold and dotted lines. Certain tables have a one to one relationship whereas some may have a one to zero relationship. This ERM model was constructed using MySQL Workbench. This is a freeware program provided by MySQL. Information is taken from a phpMyAdmin database and then converted into an ERM model automatically. Below is a brief description of each table in the database. Admin Users: This table holds details for all the administrators. Administrators are split into two categories; Super User and User. An administrator classed as a super user will have full control over the website and an administrator classed as user will be able to control certain aspects of the website. Search: This table holds details for all search related queries posed by the user. If a user searches for Apple iPhone then this particular search request will be recorded in to this table. This is mainly for the administrator to view and analyse what the most popular search requests are. As a result the admin can cater for the users needs. For example, a large number of users search for the same mobile phone however, there is no such phone is listed in the database. The administrator can view this particular search query and cater for the users needs by adding that specific handset model to the database and thus increasing sales. Brands: This table will hold details for all the different types of brands of mobile phones and their related images. Order Summary: Once the user has bought a product, the details of that particular transaction will accumulate in this table. This table will hold information such as customer details, product details and the total price of that particular sale. Towards the finalization of a transaction the customer is shown a summary page, this consists of details regarding their purchase. This information is taken from the Oder Summary table. Inventory: This table holds details of all the products in the database; this will include attributes such as price, description, name etc. Order Inventory: All transactions that are made will be stored in this table. Customer: This table holds customer details such address, phone number, postcode etc. Activity Diagram The Activity diagram (Figure 7), displays how the new system will work. The current system works in a similar way however orders are not shipped to the customer, since the customer is already in store when making the purchase. The new system will be online and therefore when a customer makes a purchase their item will be delivered to their specified destination. An invoice will also be sent to the customer via email. The invoice will be sent to the users registered email address. Once payment has been made through PayPal, they administrator will be notified by PayPal, via an email outlining the transaction details and confirmation of payment. Dataflow Diagram (New/Improved User Interface) The dataflow diagram below shows a brief outline of how the user interface will look like for the new E Cell Mobile system. The diagram explains some user interactions such as, the user can search or browse for a product, items can be added to a shopping basket etc. From the flowchart we can clearly see that it is not obligatory for the user to login in order to search or browse the site however, in order to purchase an item it is mandatory that all users register and login. Hosting When building a website it is crucial to setup a web server. This can either be hosted on your own personal computer or hosting can be bought. There are a number of advantages/disadvantages for hosting online and from your pc. As the developer of this project it is important to choose the correct hosting method so that it does not affect the development of the system. Below is a list of two hosting methods that can be used, each method has its pros and cons. Localhost Localhost means this computer and is donated by an IP address of 127.0.0.1. It can be used to host content to the World Wide Web. There is no charge for this since content is hosted from you own computer. In order for localhost to wor,k a web server needs to be installed. Since this website will be using a large database, MySQL and PHP also need to be installed. The two main web servers out there today are Apache and IIS. As the developer of this project it is important to decipher which one of these is the best web server to use for this project. After doing a bit of research the following results were obtained. IIS and Apache operate very differently and thus have a variety of advantages of disadvantages. IIS is designed and available to work only within the Windows environment. With IIS 6.0, the only platform currently supported is Windows Server 2003. Although this limits the deployment platf