Friday, September 4, 2020

DuPont Essays - Chemical Companies, DuPont, Bronfman Family, Seagram

DuPont Essays - Chemical Companies, DuPont, Bronfman Family, Seagram DuPont A venture investigation DuPont makes an assortment of high-esteem items for industry today, including polymers, synthetic substances, filaments, and oil products...products for agribusiness, hardware, transportation, clothing, food, aviation, development, and medicinal services. DuPont serves clients in these and different ventures each day, offering better things for better living as the organization gets ready to start its third century of logical, innovative, business, and social accomplishment. DuPont is an examination and innovation based compound and vitality organization with its yearly income surpassing $39 billion. Eleuth?re Ir?n?e du Pont de Nemours, a French foreigner, set up DuPont in 1802 of every a little Delaware town. E.I. du Pont was an understudy of Antoine Lavoisier, the father of present day science, and when he came to America he brought some of the new thoughts regarding the assembling of reliably dependable explosive. His item lighted at the point when it should, in a way reliable with desires. This was extraordinarily increased in value by the residents of the developing country, including Thomas Jefferson, who composed saying thanks to du Pont for the nature of his powder, which was being utilized to clear the land at Monticello. Numerous different legends of early America owed their prosperity, and their lives, to the trustworthy nature of DuPont's first item. This speaks to a decent, solid beginning for an organization. DuPont, which is traveling through the most recent decade of the twentieth century and toward its third century, underlines a few things; contending internationally; honing its business center; expanding profitability; focusing on wellbeing, wellbeing, and ecological greatness; and proceeding to broaden its huge science and innovative accomplishment. One of DuPont's significant methodologies is to concentrate on organizations in which DuPont has center skills, where DuPont can construct upper hand. The most prominent case of this center was the 1993 exchange where DuPont procured ICI's nylon business and ICI gained DuPont's acrylics business. This reinforced the organization's position in the worldwide nylon business while stripping a business that no longer fit its portfolio. Another main consideration in the change of the organization in the1990s was the concentrate on decreasing expenses and improving efficiency. This was important to give the organization the adaptability for serious valuing and to develop piece of the overall industry and income. DuPont had solid plants in a few nations around the globe for some a long time, furthermore, their globalization pattern proceeded during the 1990s. New plants opened in Spain, Singapore, Korea, Taiwan, and China, and a significant specialized help place opened in Japan. In 1994, a Conoco joint endeavor started delivering oil from the Ardalin Field in the Russian Arcticthe first significant oil field brought into creation by a Russian/Western association since downfall of the Soviet Union. A further significant advancement was the recovery of 156 million DuPont shares from Seagram for $8.8 billion in real money and warrants - one of the biggest stock reclamations ever. This enormous square of offers was recovered at a 13 percent rebate to showcase cost. While DuPont later sold some new offers, there are 18 percent less shares as of now extraordinary than only preceding the reclamation. This came about in a noteworthy open door for riches creation for our investors. The offer recovery was made conceivable by four years of cost decrease, efficiency improvement also, authoritative change that have made DuPont solid monetarily and permitted them to move definitively and rapidly. The DuPont that rose up out of the organization's change during the 1990s has regularly been depicted by individuals inside and outside the organization as the new DuPont. This portrayal is just halfway fitting, on the grounds that while DuPont has changed, there are numerous things that continue as before. The center competency in science and innovation, the duty to security, the worry for individuals, the sentiment of network, the accentuation on close to home and corporate respectability, the future center, and in fact the ability to change. DuPont is an organization out for their own advantage, yet in addition generally advantageous enthusiasm of the world. What has consistently set DuPont separated is the nature of the individuals, individuals submitted to making life simpler and better for everyone, glad to be a piece of an venture making better things for better living. That was valid in 1802. What's more, it is similarly as genuine today. In the second quarter of 1995 DuPont announced profit for each portion of $1.70, up 47 percent from the $1.16 earned in the second quarter 1994. Overall gain totaled $938 million, contrasted with $792 million earned in 1994. Both profit per share also, net salary expanded 27 percent.These remarkable outcomes keep on reflecting solid income gains and progressing profitability upgrades, said DuPont Chairman Edgar S.Woolard Jr. Deals for the subsequent quarter were $11.1 billion, up 9 percent from earlier year. The second from last quarter of the 1995 business year drove DuPont to a $1.38 per share acquiring. This number surpassed the $.95 earned in the second from last quarter of 1994 by more than 45%. Overall gain totaled $769 million contrasted with $647 million earned

Tuesday, August 25, 2020

International Trade Regression Analysis

Question: Talk about the International Trade for Regression Analysis. Answer: Presentation: Result transparency is the fundamental kind of estimation for the part of exchange receptiveness. This measure chiefly incorporates sends out in addition to imports that is partitioned by the GDP. The information has just been inferred for two nations that are as far as the level of GDP. Countless investigations that help to locate a solid and positive relationship with development use it. The information are gotten from the World Bank Open Data (Blonigen and Piger 2014). Figure: Trade receptiveness of Australia (Source: As made by creator) The above diagram shows the exchange transparency of Australia from the year 1985-2005. According to the information, the exchange force of Australia had multiplied in the course of recent years. Figure: Trade receptiveness of Japan (Source: As made by creator) As indicated by the diagram, between the year 1985 and the primary quarter of 1989, the volume of the fabricated imports of merchandise has been multiplied in Japan. Figure: Trade receptiveness of Japan and Australia (Source: As made by creator) Thecorrelation coefficientmeasures the quality of the connection between two factors. The Correlation Coefficient of Australia is 0.53 and The Correlation Coefficient of Japan is - 0.100. The receptiveness and the monetary advancement have positive relationship in Australia and negative relationship in Japan. The connection coefficientin Australia demonstrates that there is moderate-solid connection among receptiveness and the monetary turn of events.. That implies that the markers or the elements are working pair (Cohen et al. 2013). Then again, the connection coefficientin Japan shows that the connection among transparency and the financial advancement demonstrates that both the factors move the other way. The relationship is completely negative associated. The finding that the GDP per capita has a negative relationship with transparency is surprising somewhat (Chatterjee and Hadi 2015). The elements that you think drive receptiveness in Australia are as per the following: The number of inhabitants in the nation is one of the most significant elements that drive receptiveness. The lower the populace, the higher will be the degree of outer exchange. Accordingly, the nation with a less number of populaces has less chance to exchange inside their own outskirts. The second most significant factor is the area of the nation that drives receptiveness. Australia is least well found and therefore, they are less open. The exchange strategy of the nation likewise drives transparency in the nation. A liberal system of exchange animates exchange. Australia has a higher per capita GDP and progressively receptive system of exchange. The degree of the monetary improvement likewise drives receptiveness in Australia (Kaufman et al. 2015). The variables that you think drive receptiveness in Japan are as per the following: Japan is moderately low when contrasted with different nations as far as exchange receptiveness. The remote direct speculation drives receptiveness in Japan. Thus, it tends to be inferred that the situation of Japan is blended. Japan additionally comes up short on the liberal exchange system. The intra-business in Japan contains half of all exchange. References Blonigen, B.A. what's more, Piger, J., 2014. Determinants of outside direct investment.Canadian Journal of Economics/Revue canadienne d'conomique,47(3), pp.775-812. Chatterjee, S. what's more, Hadi, A.S., 2015.Regression investigation by model. John Wiley Sons. Cohen, J., Cohen, P., West, S.G. what's more, Aiken, L.S., 2013.Applied numerous relapse/connection examination for the social sciences. Routledge. Kaufman, S.B., Quilty, L.C., Grazioplene, R.G., Hirsh, J.B., Gray, J.R., Peterson, J.B. what's more, DeYoung, C.G., 2015. Receptiveness to experience and insight differentially anticipate innovative accomplishment in expressions of the human experience and sciences.Journal of personality,82, pp.248-258.

Saturday, August 22, 2020

Illustrations Improve Retention and Understanding

Representations Improve Retention and Understanding Its as simple as tumbling off a log, he was quicker than lubed lightning, she was more slow than molasses.All of these announcements share something for all intents and purpose. They are for the most part approaches to delineate a nature of somebody or something.Its been said that words usually can't do a picture justice. In the event that youve ever attempted to amass something that you bought in pieces, for example, a shelf or other household item, you can value the honesty of that announcement. Regardless of whether the headings are in Japanese, seeing an image or basic drawing can make the vital advances understood (or possibly more clear). Similarly, pictures make an important expansion to basically any type of composing. Be that as it may, much of the time, pictures are simply impossible. At these occasions youll need to depend on another asset, your expertise as an author. Would you be able to paint an image with your words? Would you be able to cause your peruser to feel the snowstorm? Smell the newly prepared bread? Or on the other hand observe the daylight shining on the frigid sputtering water of a mountain stream? In your true to life composing, would you be able to enable your crowd to comprehend and welcome the importance of the point you are attempting to pass on? Word delineations are a significant instrument to assist you with achieving these goals.Illustrations are interesting expressions, genuine encounters, or stories that help your peruser picture what you are attempting to state. They make your composing all the more intriguing, yet they can likewise help in maintenance and comprehension. For instance, think about The Boy Who Cried Wolf or The Tortoise and the Hare, both piece of Aesops Fables. Every one of these accounts shows a thing or two or contains a good. The tales delineate the standards being educated such that makes them evident and simple to recall. Indeed, the articulation falsely sounding the alarm has become an English idiom. Real-beneficial encounters, or genuine stories, can be much progressively powerful at delineating a point. For instance, to delineate the possibility of never surrendering, you could highlight Thomas Edison. His educators thought he was too inept to even think about learning anything and he was terminated from his initial two employments for being non-profitable. In spite of the fact that he is acclaimed for imagining the light, did you realize that he flopped in his initial 1,000 endeavors? For a less complex model, you could make reference to that Henry Ford fizzled and became penniless multiple times before he succeeded.Of course, in numerous types of composing, there is no space for a long story, regardless of whether valid or not. This kind of outline would be strange. It would resemble seeing a gold nose ring in the nose of a pig, or about as welcome as ants at a cookout. Be that as it may, dont stress! The easiest, and once in a while best, method of painting an image with wo rds is to utilize a metaphor. The least difficult of these is the likeness. As you would figure, the word comparison originates from a similar Latin word as comparative, a word that implies like. At the point when you utilize a metaphor you are stating that one thing resembles another, or as another (see the two analogies toward the start of the passage). The vast majority of us use analogies all the time in customary discussion, maybe without considering it. In the event that youve ever said that somebody was as large as a house, as fat as a pig, or as imbecilic as a stump, youre not decent. Be that as it may, congrats! You realize how to utilize similes.Metaphors are like likenesses, yet similitudes make a more grounded examination. Rather than saying that one thing resembles another, a representation says that they are the equivalent. At the point when Shakespeare said that all the universes a phase and all the people only players (As You Like It Act 2 Scene VII), he was utilizin g a ground-breaking allegory. You also can utilize illustrations to give a ground-breaking impression or make a solid point, maybe changing a decent likeness into a superior analogy. For instance, you may state that somebody is as gallant as a lion. This is utilizing an analogy to give them a decent pat on the back. You could make it a more pleasant commendation by saying that the individual has the core of a lion.However, with the two likenesses and analogies, you must be cautious that your perusers dont misunderstand the importance. For instance, in the event that you express the above representation in an alternate manner, the importance changes. On the off chance that you simply state that the individual is a lion, would you say you are as yet giving them a pat on the back? Or on the other hand would you say you are stating that they are furious, or go after the frail, or alarm little kids? Similarly, to be as wary as a snake is acceptable; to be a snake may not be so acceptable . So at that point, analogies can be utilized to make solid focuses, however to be viable you need to ensure that they are unambiguous with the goal that your perusers unmistakably comprehend what you mean.You may likewise utilize exaggerations in your composition. These are intentional embellishments. For example, on the off chance that you said that your wifes espresso was solid to the point that you could drift a horseshoe in it, you would utilize overstatement or distortion (ideally). Like similitudes, overstatements are exceptionally compelling at making solid focuses yet can be effectively misunderstood.This carries us to our last point. Whatever word picture we paint, regardless of whether using a story, analogy, illustration, or overstatement, its valueless if not comprehended. Indeed, it might be more regrettable than valueless; it might reduce your story or confound your peruser. How would you ensure that this doesnt occur? To start with, think about your crowd. Utilizing a clever story dependent on quantum mechanics (I know its enticing) as a delineation might be entirely satisfactory when composing for a gathering of hypothetical physicists; for other people, it might be less viable. Similarly as with numerous everyday issues, its typically best to keep it basic. Attempt to discover metaphors or stories that most of individuals can promptly comprehend and relate to. For the most part, this implies utilizing examinations that include normal things that influence people groups every day lives, for example, the climate, family life, the workplace, basic nourishments, etc.Like pictures, graphs, or diagrams, word representations can be utilized to change up your composition. However they likewise do significantly more. Utilized appropriately in an anecdotal story, they can include extravagance, profundity, and surface to the image youre painting in the perusers mind. In different types of composing, they can improve your perusers maintenance and compreh ension of the focuses you are attempting to pass on.

Facility Planning Part 1 Essay Example

Office Planning Part 1 Essay Example Office Planning Part 1 Essay Office Planning Part 1 Essay Office Planning Part 1 Facility Planning Part One Dwan Chatman HCS/446 July 26, 2011 Ruth Ann Vaughn Facility Planning Part One The United States is confronting an emergency with the ascent in medicinal services cost and the maturing populace experiencing incessant and terminal ailments. Accordingly, clinic directors are forgotten about to look for techniques to address these patients’ needs. The emergency clinics are taking a stab at systems administration, designing with new doctors, and building extra outpatient treatment offices to address the requirements of the network, and the segment territory. In this paper the subject is to clarify the network and office requirement for Penn Medicine Rittenhouse to build up another outpatient treatment center. Moreover, this paper will depict the populace the center will support and will finish up with a portrayal of the office. Office Need Physicians and emergency clinic executives at the office have started to see an ascent in knee, spinal rope, and neurological conditions in the medical clinic (UPENN, 2011). They realized that huge numbers of their patients were either old or competitors who both can't help contradicting long remains in an emergency clinic. For the old patients, constrained livelihoods were their essential reasons and the competitors just don't have the opportunity to be limited to a medical clinic for restoration. A significant number of them felt that having an outpatient recovery and treatment focus would profit them over the long haul. Penn Medicine led an examination and saw this data as obvious. They thusly collaborated with Good Shepherd Penn Partners and started building up an arrangement to battle these issues (UPENN, 2011). The accomplices needed this office to be close in goal and give the entirety of the administrations a completely useful in tolerant office would have. When building up the arrangement for their office they needed to do an investigation on the populace and socioeconomics of the region encompassing the assigned site so as to guarantee the office would address the issues of the network. Kind of Population The territory encompassing the new office is a notable region in the city of Philadelphia. William Penn planned Rittenhouse Square Park in the seventeenth century which is the thing that made the territory memorable (Philadelphia Facts, 2011). Throughout the years the socioeconomics changed as inhabitants populated the region; it got known as a Victorian noble neighborhood with townhouses. Around the twentieth century, elevated structures were worked to replace the town houses, very good quality shopping regions, and the best upscale eateries were worked to imply the extension of the way of life of its inhabitants (Philadelphia Facts, 2011). This zone has pulled in a different gathering of inhabitants from park goers; families with atlethtic youngsters; underground rockers, and old individuals hoping to complete their brilliant years in quality, this zone is ideal for another recovery place. Situated close to Center City, this zone can be gotten to various ways from open transportation and is additionally available from interstates 76 and 676 (Philadelphia Facts, 2011). Moreover, there is likewise a bicycle path which is another extraordinary explanation behind the area. Inhabitants around there like to bicycle ride due to traffic clog and Limited Street stopping adding another motivation to this being a decent area for the new office. Putting the office here was a vital proceed onward the piece of Penn Medicines organization on the grounds that patients’ can get to the office on mid-day break or practically from anyplace inside the city. Portrayal of Facility Penn Medicine Rittenhouse was intended to help the University of Pennsylvania Hospital in battling the developing games and spinal rope wounds that require long and broad medications to address. The office is 12,000 square feet which is devoted to the new Outpatient Therapy Clinic. The office has strength highlights for neurological conditions; sports/orthopedic wounds, and sports medication wounds (UPENN, 2011). They offer three new administrations that were the main impetus in the choice to open the office. The new administrations housed in the office are Comprehensive Brain Injury Program, Spinal Cord Injury Program, and a first rate Gait Lab. These administrations incorporate weight touchy floors, PC examination, and various camcorders to break down patients’ developments and normal strolling cycles (UPENN, 2011). The primary floor of the office houses Good Shepherd Penn Partners treatment and Fitness site, the offices Department of Physical Medicine and Rehabilitation organization workplaces, and space for quiet consideration. The essential objective of this office is to give a continuum of care in one spot. Patients get inpatient and outpatient post intense consideration in one office. This will make it simpler for patients as of now intellectually battling with tolerating their physical issue at any rate have a problem free approach to get care. Taking everything into account, Good Shepherd Penn Partners and Penn Medicine saw a requirement for another office in their locale and acted in like manner. By deciding the requirement for the office; finding an appropriate area to fit the focused on populace, they had the option to construct a best in class modernized office to battle all recovery issues in a single stop. The achievement of the office will rely significantly upon how well directors created, planned and executed their arrangement. References Philadelphia Facts. 2011. Recovered July 19, 2011. From www. about. com/Philadelphia UPENN. Penn Medicine Rittenhouse. 2011. Recovered July 19, 2011. From www. usphs. upenn. edu

Friday, August 21, 2020

Jeffersonian Democratic Republicans :: History

     The Jeffersonian Democratic Republicans were portrayed as severe constructionists. Which clarifies why they needed the United States to be constrained by the states, not a focal government.      On August thirteenth eighteen hundred, Thomas Jefferson tended to the country to tell person that The United States was excessively huge to have a focal government to coordinate the issues of the country. Implying that we have the need of state authorities and not simply the national heads. In this way, we have free states to deal with the occasions and laws inside the limits of each state. In spite of the fact that at the global level we are as one United Nation.      On January twenty-third eighteen o eight, Jefferson educated Samuel Miller, who was a Presbyterian serve that the United States government couldn't meddle with a citizen’s strict convictions. As indicated by what was written in the principal Amendment of the Bill of Rights â€Å" Congress will make no law regarding a foundation of religion.† This got compelling on December fifteenth seventeen ninety-one. There was nothing that can cause one to take an interest in strict activities.      The animation outlines the ban of eighteen o eight and was befuddling to the residents. Since it was expressed as the â€Å"Ograbme†      On December ninth eighteen fourteen, Daniel Webster a federalist from New Hampshire, gave a discourse to the House of Representatives. His discourse tended to the draft. Webster contended that it was wrong to â€Å"take youngsters from their folks, and guardians from their kids. Jeffersonian Democratic Republicans :: History      The Jeffersonian Democratic Republicans were portrayed as exacting constructionists. Which clarifies why they needed the United States to be constrained by the states, not a focal government.      On August thirteenth eighteen hundred, Thomas Jefferson tended to the country to tell person that The United States was excessively huge to have a focal government to coordinate the undertakings of the country. Implying that we have the need of state authorities and not simply the national chiefs. Subsequently, we have autonomous states to deal with the occasions and laws inside the limits of each state. In spite of the fact that at the worldwide level we are as one United Nation.      On January twenty-third eighteen o eight, Jefferson educated Samuel Miller, who was a Presbyterian serve that the United States government couldn't meddle with a citizen’s strict convictions. As indicated by what was written in the primary Amendment of the Bill of Rights â€Å" Congress will make no law regarding a foundation of religion.† This got compelling on December fifteenth seventeen ninety-one. There was nothing that can cause one to take an interest in strict activities.      The animation represents the ban of eighteen o eight and was confounding to the residents. Since it was expressed as the â€Å"Ograbme†      On December ninth eighteen fourteen, Daniel Webster a federalist from New Hampshire, gave a discourse to the House of Representatives. His discourse tended to the draft. Webster contended that it was wrong to â€Å"take kids from their folks, and guardians from their youngsters.

Saturday, August 8, 2020

Questions Answers.

Questions Answers. Thanks to the miracles of modern transportation, Im wringing out this weeks MIT roundup from the wrong side of the Mississippi. (Internal aside: The previous sentence sounds like it was written by a cattle rancher. This distresses me. I own no cattle.) Tucked away in the American prairies and folded under a blanket of metropolitan sprawl, Saint Louis is best known for the transformation of the hyperbolic cosine function into a national symbol of westward expansion, Barack Obamas favorite pizza, Yan Z., frequent superiority in the World Series, frequent superiority in the cooking of ravioli, frequent superiority in being more dangerous than other cities, Yan Z., frequent superiority in jazz, Yan Z., and frequent superiority in being the hometown of exactly seven early action acceptees to MIT this year. Congratulations! In order to ready the potential 13ers for the ceaseless rounds of free food that will be slung at them as soon as they bare their unfed faces on campus, the local alumni association sponsored a luncheon today for the acceptees and their genetic prototypes (a.k.a. parents). I was in attendance to take pictures of food- I mean, answer questions. All in all, the afternoon was filled with nutritious discussion worthy of repost on the blogs, which inspired in me the idea of reposting the discussion on the blogs (marvelous logic!). Thus, I present these following questions of great import, as well as answers of great export: How accessible is campus dining? In my realm of discussion, campus dining is a porcupine in a petting zoo of tamer subjects (like the arts at MIT or eating desserts at MIT) : its difficult to approach, prickly to handle, and hasnt evolved significantly in the last 30 million years. Also, I prefer to avoid it completely by (1) grocery shopping on a weekly basis and (2) occasionally reverting to a hunter/gatherer lifestyle (hunting down leftovers from special events and gathering victuals from study breaks and group dinners, that is). Sadly, such glamorous dining habits are not universally feasible on campus. In four of the twelve dorms, residents are required to pay $300 per semester for a 50% discount in any of the four residential dining halls, which are only open during dinner hours. Breaking even with the dining system is about as easy as breaking through a wooden door, which is why I chose to live in one of the non-dining dorms and carry the key to my room door. Common alternatives to residential dining: 1. Buying groceries and cooking for yourself or in a group. All the dorms have microwaves, stoves, and fridges, as well as at least one member who knows how to prevent the fire alarms from going off. 2. Buying food at the Student Center, home to Subway, Dunkin Donuts, Cafe Spice (Indian), Sepal (Middle Eastern), Shinkansen (Japanese), Cambridge Grill, and Annas Taqueria. Additionally, the campus is peppered with soup-salad-sandwich cafes and food trucks. 3. Joining a fraternity/sorority/independent living group that provides a full meal plan (dinners and access to breakfast/lunch supplies for a set price per semester). Convenient details can be found here. Currently, the campus dining system is a breeding ground for complaints and receives quite a bit of coverage in the Tech. Having said this, everyone gets fed one way or another, even when Im not around to take pictures. What will AP tests do for me? AP tests will help you achieve physical and spiritual separation with your money. As for achievements that are slightly less Zen, 5s on the AP Calc. BC exam and the AP Physics C exam will get you out of corresponding introductory classes at MIT. A 5 on one of the AP English tests will grant you exemption from the Freshman Essay Evaluation (FEE), which is a pain in the collective neck of the freshmen class. Exemption from the FEE gives you the sweet freedom to take any writing class that you want. Other AP scores are like raisins in cookies: nice to have around, but mostly useless. At the beginning of the year, MIT offers Advanced Standing Exams for students who wish to pass out of introductory biology or chemistry. This year, the biology exam had a 31% passing rate, while chemistry boasted a whopping 7% (figures courtesy of The Tech). I offer this as evidence that MIT freshman subjects require a deeper level of understanding than do most advanced high school classes. How did you like your classes this semester? Viewed from the flip side of finals week, my classes look great, like Oprah Winfrey these days. Sure I complained about biology once in a while and was consistently asleep for about 10 minutes of every linguistics lecture, but Ive learned how to cure cancer (theoretically) and rewrite Dave Barry jokes using the International Phonetic Alphabet, so Im a better person now. Academic highlight of the semester? I say with no hesitation and thus no punctuation even when needed such as right here that Introduction to Solid State Chemistry was the greatest class I have ever beheld in my brief academic career. Professor Sadoway fully deserves his five-star ratings on his YouTube lectures. (Amusing story: I was feebly attempting to conceal my camera while taking this shot, but it turns out that the video camera in the lecture hall was pointed directly at me. As a result, everyone in 3.091 who watches the online video lectures witnessed my tourist-esque behavior.) Coming to MIT with a paltry years worth of non-AP, non-honors high school chemistry just a shade above the difficulty level of baking-soda-and-vinegar vocanoes, I should have been grossly underprepared for a class that covered everything from Schrodingers wave equation to zwitterionic properties to polymer engineering (not to mention the sheer intimidation factor of a class of over 500 students). As it happened, inexperience worked to my advantage. Unjaded by the confidence of prior knowledge, I ended up working harder and studying longer than basically everyone I knew. Never before had I found chemistry to be even vaguely fascinating, so my newfound enjoyment of the material was mildly mind-shattering. In the end, I got the 3rd highest grade in the class* and landed a paid research project with Professor Sadoways research group next semester. Empirical evidence shows that, on occasion, effort pays off even at MIT. (*Information obtained from TA informally. Generally, MIT doesnt rank students; in fact, this semester Ive only received exact, numerical grades in one class so far.) I mentioned this anecdote for two reasons: 1. To invalidate the assumption that having minimal prior knowledge in a subject will necessarily prevent you from succeeding in it. (In other words, dont worry if you feel as if your high school classes are like Bambi to MITs Godzilla. (In other other words, its okay if your high school science classes sucked.)) 2. To suggest that MIT introductory classes can be immensely worthwhile and challenging even if you learned the same subjects in high school. What are your plans for IAP? IAP, or “Independent Activities Period” in unzipped form, is the temporal broom closet in which you cram all the hopes and dreams and wildly ambitious schemes (hey, that rhymes!) that you never had time for during the regular semester. Want to learn how to speak in Tagalog while spinning a Chinese yo-yo at the same time? Save it for IAP. Planning to visit your friend in Random Hall that you havent talked to since Orientation? Make an IAP date. Trying to dip into Java programming, amateur orienteering, or chocolate tasting? Take an IAP class. Need to atone for your past cynicism by helping prefrosh see the bright side of MIT life? Save that one for CPW, actually. A quick rummage through my junkyard of IAP plans produces the following: 1. Working on a paid research project with Group Sadoway. Along with Ambrose 12, Ill be investigating the design of solid-state polymer batteries for performance in high temperatures, which is useful because liquid electrolytes tend to randomly explode. 2. A 6-unit class in Mechanics II, because double the mechanics is double the fun! However, Ive always been wary of having fun in excess, so I might end up dropping the class if it turns out to be too hefty of a time investment. 3. Hummus taste-off. Enough said. Should I have to describe this in more detail, I may start weeping tears of joy. 4. Mystery hunt, MITs epic-scale, campus-wide, interactive puzzle challenge. Ill probably be a devoted spectator on the Random Hall team, which is usually one of the more formidable contenders. 5. Weekly Dim Sum runs. My personal goal is to introduce at least three new people to the gutteral, gristly gourmet experience on each trip. 6. A pilgrimage to Pour House, an MIT favorite in Boston that serves half-priced burgers on Saturday nights. 7. Taking a Sport Taekwondo class. 8. Helping Katelyn 12 move into my room (yep, thats Roommate #3) since my former roommate decided to ditch our hovel and live a monastic life of solitude in a single down the hall. Katelyn, if you are reading this, I propose we celebrate your moving-in (inmoving?) by preparing a homemade dumpling feast with turkey meatloaf and carrots and oyster sauce and vinegar and tamarind chutney. Also, you should grate up some confetti. 9. Helping Abby 12 decide on a mural to paint on the wall outside my room. So far, Im gunning for one of M.C. Eschers scroll-sized prints. Any thoughts from the blogosphere? 10. Collaborating with Aviv 09 on the Random Hall History Project. Earlier this year, Aviv contacted me about collecting photos and anecdotes for an online database of the long and illustrious history of our beloved dorm, a proposal that immediately went onto my mounting heap of IAP tasks. 11. Starting a website with Donald Guy 12 in which we empirically prove that everything in existence is the Stata Center (at least from a visual/artistic standpoint). This sweepingly ambitious vision was inspired on a cold December evening as Donald and I were leaving Simmons Hall. My attention was snagged by some object or another that resembled MITs famous wonder of Seussical architecture, and I remarked on this aloud, to which Donald responded: “Everything is Stata.” A proverb was born. 12. Blogging, reading, sitting in on the occasional programming class, and generally reacquainting myself with effective methods of chillaxing. In actuality, Ill probably end up doing half of the above and sleeping through the rest. Back to the MIT Prefrosh Luncheon: How was your salad? Was it bigger than your head? Truly, this is a question of extraordinary relevance. I opted for an unbalanced pot-pourri of spinach leaves, fried shrimp, mango, and strawberry, with emphasis on the spinach. Carrot and onion served as nothing more than charming footnotes of vinegary flavor. The sheer breadth of the bowl dwarfed my cranium, but the salad was underwhelming. Dang, sorry that salad didnt work out for you. How was the other food? Unexpectedly, the bread basket was a tour-de-force of texture and warmth, seamlessly integrated into a soft, crusty lesson in The American Bread Experience. I was fortunate to have seated myself next to Max 13s mom, who brimmed with excellent motherly questions and also allowed me to photograph her main course. If memory serves me faithfully, this is grilled salmon with rice and asparagus stalks. For the dessert course, I rotated myself to another table and chatted with Julia 13, who stunned my lens with a bright ruby sorbet. Derailing unabashedly from the track of MIT admissions relevancy, I had a pulled-chicken Banh Mi sub for dinner five hours later and nearly decided to scrap my IAP plans and book a flight to Vietnam. (New Years Resolution: 12.1 megapixels.) Next time, Ill try to cover Bizarre Questions That You Wonder About But Rarely Ask, so feel free to vent your curiosities via comment or email. In the meantime, happy calendar reset!

Tuesday, June 23, 2020

Computer Network Data

Networking and Management Introduction A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include devices like printers and other resources like electronic mail, internet access, and file sharing. A computer network can also be seen as a collection of Personal computers and other related devices which are connected together, either with cables or wirelessly, so that they can share information and communicate with one another. Computer networks vary in size. Some networks are needed for areas within a single office, while others are vast or even span the globe. Network management has grown as a career that requires specialized training, and comes with management of important responsibilities, thus creating future opportunities for employment. The resulting expected increase in opportunities should be a determining and persuasive factor for graduates to consider going into network management. Computer networking is a discipline of engineering that involves communication between various computer devices and systems. In computer networking, protocols, routers, routing, and networking across the public internet have specifications that are defined in RFC documents. Computer networking can be seen as a sub-category of computer science, telecommunications, IT and/or computer engineering. Computer networks also depend largely upon the practical and theoretical applications of these engineering and scientifi c disciplines. In the vastly technological environment of today, most organisations have some kind of network that is used every day. It is essential that the day-to-day operations in such a company or organisation are carried out on a network that runs smoothly. Most companies employ a network administrator or manager to oversee this very important aspect of the company’s business. This is a significant position, as it comes with great responsibilities because an organisation will experience significant operational losses if problems arise within its network. Computer networking also involves the setting up of any set of computers or computer devices and enabling them to exchange information and data. Some examples of computer networks include: Local area networks (LANs) that are made up of small networks which are constrained to a relatively small geographic area. Wide area networks (WANs) which are usually bigger than local area networks, and cover a large geographic area. Wireless LANs and WANs (WLAN WWAN). These represent the wireless equivalent of the Local Area Network and Wide Area Networks Networks involve interconnection to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet. (https://en.wikipedia.org/wiki/Computer_networking) TASK 1 TCP connection congestion control Every application, whether it is a small or large application, should perform adaptive congestion control because applications that perform congestion control use a network more efficiently and are generally of better performance. Congestion control algorithms prevent the network from entering Congestive Collapse. Congestive Collapse is a situation where, although the network links are being heavily utilized, very little useful work is being done. The network will soon begin to require applications to perform congestion control, and those applications which do not perform congestion control will be harshly penalized by the network, probably in the form of preferentially dropping their packets during times of congestion (https://www.psc.edu/networking/projects/tcpfriendly/) Principles of Congestion Control Informally, congestion entails that too many sources are sending too much data, and sending them too fast for the network to handle. TCP Congestion Control is not the same as flow control, as there are several differences between TCP Congestion Control and flow control. Other principles of congestion control include Global versus point-2-point, and orthogonal issues. Congestion manifests itself by causing loss of packets (buffer overflow at routers), and long delays (queuing in router buffers). Also, during congestion, there is no explicit feedback from network routers, and there is congestion inferred from end-system observed loss. In network-assisted congestion control, routers provide feedback to end systems, and the explicit rate sender sends at –Choke Packet. Below are some other characteristics and principles of congestion control: When CongWin is below Threshold, sender in slow-start phase, window grows exponentially. When CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold. When timeout occurs, Threshold set to CongWin/2 and CongWin is set to 1 MSS. Avoidance of Congestion It is necessary for the TCP sender to use congestion avoidance and slow start algorithms in controlling the amount of outstanding data that is injected into a network. In order to implement these algorithms, two variables are added to the TCP per-connection state. The congestion window (cwnd) is a sender-side limit on the amount of data the sender can transmit into the network before receiving an acknowledgment (ACK), while the receivers advertised window (rwnd) is a receiver-side limit on the amount of outstanding data. The minimum of cwnd and rwnd governs data transmission. (Stevens, W. and Allman, M. 1998) TCP Flow Control In TCP flow control, the receiving side of the TCP connection possesses a receive buffer, and a speed-matching service which matches the send rate to the receiving application’s drain rate. During flow control, Rcvr advertises any spare room by including value of RcvWindow in segments, and the sender limits unACKed data to RcvWindow. TCP flow control also ensures that there is no overflow of the receive buffer. Round-trip Time Estimation and Timeout TCP Round Trip Time and Timeout are usually longer than RTT, but RTT varies, and has a slow reaction to segment loss. SampleRTT is measured time from segment transmission until ACK receipt, ignore retransmissions, and will vary, want estimated RTT â€Å"smoother† Round-trip time samples arrive with new ACKs. The RTT sample is computed as the difference between the current time and a time echo field in the ACK packet. When the first sample is taken, its value is used as the initial value for srtt. Half the first sample is used as the initial value for rttvar. (Round-Trip Time Estimation and RTO Timeout Selection) There are often problems due to timeouts, including the restriction of the sender that is compelled to wait until a timeout, and is able to do nothing during this period. Also, the first segment in the sliding window is often not acked, and retransmission becomes necessary, waiting again one RTT before the segment flow continues. It should be noted that on rece iving the later segments, the receiver sends back ACKs. Estimated RTT EstimatedRTT = 0.875 * EstimatedRTT + 0.125 * SampleRTT DevRTT DevRTT = (1 0.25) * DevRTT + | SampleRTT – EstimatedRTT Timeout interval TimeoutInterval = EstimatedRTT + 4 * DevRTT The integrated services (IntServ) and DiffServ (Differentiated Services) architecture are two architectures that have been proposed for the provision of and guaranteeing of quality of service (QoS) over the internet. Whereas the Intserv framework is developed within the IETF to provide individualized QoS guarantees to individual application sessions, Diffserv is geared towards enabling the handling of different classes of traffic in various ways on the internet. These two architectures represent the IETF’s current standards for provision of QoS guarantees, although neither Intserv nor Diffserv have taken off or found widespread acceptance on the web. (a) Integrated Service Architecture In compute r networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network. For instance, IntServ can be used to allow sound and video to be sent over a network to the receiver without getting interrupted. IntServ specifies a fine-grained Quality of service system, in contrast to DiffServs coarse-grained system of control. In the IntServ architecture, the idea is that each router inside a system implements IntServ, and applications which require various types of guarantees have to make individual reservations. Flow Specs are used to describe the purpose of the reservation, and the underlying mechanism that signals it across the network is called RSVP. TSPECs include token bucket algorithm parameters. The idea is that there is a token bucket which slowly fills up with tokens, arriving at a constant rate. Every packet which is sent requires a token, and if there are no tokens, then i t cannot be sent. Thus, the rate at which tokens arrive dictates the average rate of traffic flow, while the depth of the bucket dictates how large the traffic is allowed to be. TSPECs typically just specify the token rate and the bucket depth. For example, a video with a refresh rate of 75 frames per second, with each frame taking 10 packets, might specify a token rate of 750Hz, and a bucket depth of only 10. The bucket depth would be sufficient to accommodate the burst associated with sending an entire frame all at once. On the other hand, a conversation would need a lower token rate, but a much higher bucket depth. This is because there are often pauses in conversations, so they can make do with fewer tokens by not sending the gaps between words and sentences. However, this means the bucket depth needs to be increased to compensate for the traffic being larger. (https://en.wikipedia.org/wiki/Integrated_services) (b) Differentiated Service Architecture The RFC 2475 (An Architecture for Differentiated Services) was published In 1998, by the IETF. Presently, DiffServ has widely replaced other Layer 3 Quality of Service mechanisms (such as IntServ), as the basic protocol that routers use to provide different service levels. DiffServ (Differentiated Services) architecture is a computer networking architecture which specifies a scalable, less complex, coarse-grained mechanism for the classification, management of network traffic and for provision of QoS (Quality of Service) guarantees on modern IP networks. For instance, DiffServ can be used for providing low-latency, guaranteed service (GS) to video, voice or other critical network traffic, while ensuring simple best-effort traffic guarantees to non-critical network services like file transfers and web traffic. Most of the proposed Quality of Service mechanisms which allowed these services to co-exist were complicated and did not adequately meet the demands Internet users because modern data ne tworks carry various kinds of services like streaming music, video, voice, email and also web pages. It would probably be difficult to implement Intserv in the core of the internet because most of the communication between computers connected to the Internet is based on a client/server structural design. This Client/server describes a structure involving the connection of one computer to another for the purpose of giving work instructions or asking it questions. In an arrangement like this, the particular computer that questions and gives out instructions is the client, while the computer that provides answers to the asked questions and responds to the work instructions is the server. The same terms are used to describe the software programs that facilitate the asking and answering. A client application, for instance, presents an on-screen interface for the user to work with at the client computer; the server application welcomes the client and knows how to respond correctly t o the clients commands. Any file server or PC can be adapted for use as an Internet server, however a dedicated computer should be chosen. Anyone with a computer and modem can join this network by using a standard phone. Dedicating the server that is, using a computer as a server only helps avoid some security and basic problems that result from sharing the functions of the server. To gain access to the Internet you will require an engineer to install the broadband modem. Then you will be able to use the server to network the Internet on all machines on a network. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) TASK 5 Network security These days, computers are used for everything from shopping and communication to banking and investment. Intruders into a network system (or hackers) do not care about the privacy or identity of network users. Their aim is to gain control of computers on the network so that they can use these systems to launch attacks on other computer systems. Therefore people who use the network for these purposes must be protected from unknown strangers who try to read their sensitive documents, or use their computer to attack other systems, and send forged email, or access their personal information (such as their bank or other financial statements) Security Clauses The International Organisation for Standardizations (ISOs) 17799: 2005 Standard is a code of practice for information security management which provides a broad, non-technical framework for establishing efficient IT controls. The ISO 17799 Standard consists of 11 clauses that are divided into one or more security categories for a total of 39 security categories The security clauses of the ISO standard 17799:2005- code of practice for Information Security Management include: The security Policy clause Organizing Information Security Asset Management. Human Resources Security. Physical and Environmental Security. Communications and Operations. Access Control. Information Systems Acquisition, Development, and Maintenance. Information Security Incident Management. Business Continuity Management. Compliance. (https://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.printiiid=467aid=2209) Here is a brief description of the more recent version of these security clauses: Security Policy: Security policies are the foundation of the security framework and provide direction and information on the companys security posture. This clause states that support for information security should be done in accordance with the companys security policy. Organizing Information Security: This clause addresses the establishment and organizational structure of the security program, including the appropriate management framework for security policy, how information assets should be secured from third parties, and how information security is maintained when processing is outsourced. Asset Management: This clause describes best practices for classifying and protecting assets, including data, software, hardware, and utilities. The clause also provides information on how to classify data, how data should be handled, and how to protect data assets adequately. Human Resources Secur ity: This clause describes best practices for personnel management, including hiring practices, termination procedures, employee training on security controls, dissemination of security policies, and use of incident response procedures. Physical and Environmental Security: As the name implies, this clause addresses the different physical and environmental aspects of security, including best practices organizations can use to mitigate service interruptions, prevent unauthorized physical access, or minimize theft of corporate resources. Communications and Operations: This clause discusses the requirements pertaining to the management and operation of systems and electronic information. Examples of controls to audit in this area include system planning, network management, and e-mail and e-commerce security. Access Control: This security clause describes how access to corporate assets should be managed, including access to digital and nondigital information, as well as network resources. Information Systems Acquisitions, Development, and Maintenance: This section discusses the development of IT systems, including applications created by third-parties, and how security should be incorporated during the development phase. Information Security Incident Management: This clause identifies best practices for communicating information security issues and weaknesses, such as reporting and escalation procedures. Once established, auditors can review existing controls to determine if the company has adequate procedures in place to handle security incidents. Business Continuity Management: The 10th security clause provides information on disaster recovery and business continuity planning. Actions auditors should review include how plans are developed, maintained, tested, and validated, and whether or not the plans address critical business operation components. Compliance: The final clause provides valuable information auditors can use when identifying the compliance level of systems and controls with internal security policies, industry-specific regulations, and government legislation. (Edmead, M. T. 2006 retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) The standard, which was updated in June 2005 to reflect changes in the field of information security, provides a high-level view of information security from different angles and a comprehensive set of information security best practices. More specifically, ISO 17799 is designed for companies that wish to develop effective information security management practices and enhance their IT security efforts. Control Objectives The ISO 17799 Standard contains 11 clauses which are split into security categories, with each category having a clear control objective. There are a total of 39 security categories in the standard. The control objectives in the clauses are designed to meet the risk assessment requirements and they can serve as a practical guideline or common basis for development of effective security management practices and organisational security standards. Therefore, if a company is compliant with the ISO/IEC 17799 Standard, it will most likely meet IT management requirements found in other laws and regulations. However, because different standards strive for different overall objectives, auditors should point out that compliance with 17799 alone will not meet all of the requirements needed for compliance with other laws and regulations. Establishing an ISO/IEC 17799 compliance program could enhance a companys information security controls and IT environment greatly. Conducting an audit evaluation of the standard provides organizations with a quick snapshot of the security infrastructure. Based on this snapshot, senior managers can obtain a high-level view of how well information security is being implemented across the IT environment. In fact, the evaluation can highlight gaps present in security controls and identify areas for improvement. In addition, organizations looking to enhance their IT and security controls could keep in mind other ISO standards, especially current and future standards from the 27000 series, which the ISO has set aside for guidance on security best practices. (Edmead, M. T. 2006 retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) Tree Topology Tree topologies bind multiple star topologies together onto a bus. In its most simple form, only hub devices are directly connected to the tree bus and the hubs function as the root of the device tree. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub ports) alone. Topologies remain an important part of network design theory. It is very simple to build a home or small business network without understanding the difference between a bus design and a star design, but understanding the concepts behind these gives you a deeper understanding of important elements like hubs, broadcasts, ports, and routes. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Use of the ring topology should be considered for use in medium sized companies, and the ring topology would also be the best topology for small companies because it is ensures ease of data transfer. Ring Topology In a ring network, there are two neighbors for each device, so as to enable communication. Messages are passed in the same direction, through a ring which is effectively either counterclockwise or clockwise. If any cable or device fails, this will break the loop and could disable the entire network. Bus Topology Bus networks utilize a common backbone to connect various devices. This backbone, which is a single cable, functions as a shared medium of communication which the devices tap into or attach to, with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Star Topology The star topology is used in a lot of home networks. A star network consists of a central connection point or hub that can be in the form of an actual hub, or a switch. Usually, devices will connect to the switch or hub by an Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computers network access and not the entire LAN. If the hub fails, however, the entire network also fails. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Relating the security clauses and control objectives to an organisation In an organisation like the Nurht’s Institute of Information Technology (NIIT), the above mentioned security clauses and control objectives provide a high-level view of information security from different angles and a comprehensive set of information best security practices. Also, the ISO 17799 is designed for companies like NIIT, which aim to enhance their IT security, and to develop effective information security management practices. At NIIT, the local network relies to a considerable degree, on the correct implementation of these security practices and other algorithms so as to avoid congestion collapse, and preserve network stability. An attacker or hacker on the network can cause TCP endpoints to react in a more aggressive way in the face of congestion, by the forging of excessive data acknowledgments, or excess duplicate acknowledgments. Such an attack could possibly cause a portion of the network to go into congestion collapse. The Security Policy clause states that â€Å"support for information security should be done in accordance with the companys security policy.† (Edmead, M. T. 2006). This provides a foundation of the security framework at NIIT, and also provides information and direction on the organisation’s security posture. For instance, this clause helps the company auditors to determine whether the security policy of the company is properly maintained, and also if indeed it is to be disseminated to every employee. The Organizing Information Security clause stipulates that there should be appropriate management framework for the organisation’s security policy. This takes care of the organizational structure of NIIT’s security program, including the right security policy management framework, the securing of information assets from third parties, and the maintenance of information security during outsourced processing. At NIIT, the Security clauses and control objectives define the companyâ€℠¢s stand on security and also help to identify the vital areas considered when implementing IT controls. The ISO/IEC 17799s 11 security clauses enable NIIT to accomplish its security objectives by providing a comprehensive set of information security best practices for the company to utilize for enhancement of its IT infrastructure. Conclusion Different businesses require different computer networks, because the type of network utilized in an organisation must be suitable for the organisation. It is advisable for smaller businesses to use the LAN type of network because it is more reliable. The WAN and MAN would be ideal for larger companies, but if an organisation decides to expand, they can then change the type of network they have in use. If an organisation decides to go international, then a Wireless Area Network can be very useful Also, small companies should endeavor to set up their network by using a client/server approach. This would help the company to be more secure and enable them to keep in touch with the activities of others are doing. The client/server would be much better than a peer-to-peer network, it would be more cost-effective. On the average, most organisations have to spend a good amount of money and resources to procure and maintain a reliable and successful network that will be and easy to m aintain in the long run. For TCP Congestion Control, when CongWin is below Threshold, sender in slow-start phase, window grows exponentially. If CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold, and threshold set to CongWin/2 and CongWin is set to 1 MSS when a timeout occurs. For a Small Office/Home Office (SOHO), networks such as wireless networks are very suitable. In such a network, there won’t be any need to run wires through walls and under carpets for connectivity. The SOHO user need not worry about plugging their laptop into docking stations every time they come into the office or fumble for clumsy and unattractive network cabling. Wireless networking provides connectivity without the hassle and cost of wiring and expensive docking stations. Also, as the business or home office grows or shrinks, the need for wiring new computer s to the network is nonexistent. If the business moves, the network is ready for use as soon as the computers are moved. For the wired impossible networks such as those that might be found in warehouses, wireless will always be the only attractive alternative. As wireless speeds increase, these users have only brighter days in their future. (https://www.nextstep.ir/network.shtml) It is essential to note that the computer network installed in an organisation represents more than just a simple change in the method by which employees communicate. The impact of a particular computer network may dramatically affect the way employees in an organisation work and also affect the way they think. Bibliography Business Editors High-Tech Writers. (2003, July 22). International VoIP Council Launches Fax-Over-IP Working Group. Business Wire. Retrieved July 28, 2003 from ProQuest database. Career Directions (2001 October). Tech Directions, 61(3), 28 Retrieved July 21, 2003 from EBSCOhost database Edmead, M. T. (2006) Are You Familiar with the Most Recent ISO/IEC 17799 Changes? (Retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) FitzGerald, J. (1999), Business Data Communications And Networking Pub: John Wiley Sons Forouzan, B. (1998), Introduction To Data Communications And Networking Pub: Mc- Graw Hill https://www.theiia.org/itaudit https://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.printiiid=467aid=2209 https://www.psc.edu/networking/projects/tcpfriendly/ ISO/IEC 17799:2000 – Code of practice for information security management Published by ISO and the British Standards Institute [https://www.iso.org/] I SO/IEC 17799:2005, Information technology – Security techniques – Code of practice for information security management. Published by ISO [https://www.iso.org/iso/en/prods-services/popstds/informationsecurity.html] Kurose, J. F. Ross, K. W. 2002. Computer Networking A Top-Down Approach Featuring the Internet, 2nd Edition, ISBN: 0-321-17644-8 (the international edition), ISBN: 0-201-97699-4, published by Addison-Wesley, 2002 www.awl.com/cs Ming, D. R. Sudama (1992) NETWORK MONITORING EXPLAINED: DESIGN AND APPLICATION Pub: Ellis Horwood Rigney, S. (1995) NETWORK PLANNING AND MANAGMENT YOUR PERSONAL CONSALTANT Round-Trip Time Estimation and RTO Timeout Selection (retrieved from https://netlab.cse.yzu.edu.tw/ns2/html/doc/node368.html) Shafer, M. (2001, June 11). Careers not so secure? Network Computing, 12(12), 130- Retrieved July 22, 2003 from EBSCOhost database Stevens, W. and Allman, M. (1998) TCP Implementation Working Group (retrieved from https://www.ietf.org/proceedings/98aug/I-D/draft-ietf-tcpimpl-cong-control-00.txt) Watson, S (2002). The Network Troubleshooters. Computerworld 36(38), 54. (Retrieved July 21, 2003 from EBSCOhost database) Wesley, A. (2000), Internet Users Guide to Network Resource Tools 1st Ed, Pub: Netskils www.microsoft.co.uk www.apple.com www.apple.co.uk www.bized.com https://www.nextstep.ir/network.shtml www.novell.com www.apple.com/business www.microsoft.com/networking/e-mails www.engin.umich.edu www.microsoft.com