...Strayer University Week 10 Assignment 3: Business Intelligence and Data Warehouses CIS175008VA016-1154-001 Intro to Networking Professor Obi Ndubuisi June 14, 2015 For the company DesignIT, I would use a LAN type of network (for local-area network). This networks several computers, a mail (exchange) server, a database server and a file share server in one building and interconnects with each switch or backbone. I chose this for this small space because it is less than 100 square feet and is all within a single dwelling. This way the employees can all share their resources with one another, an intranet, database and printers. This network only needs a single modem with wireless capabilities and an optional access point located at the opposite end. I would recommend the wireless access-point to serve the conference room in case the client wants to set up teleconferences. We can even create an interface that when their computer finds the wireless network, a page would come up asking for their employee ID and password. This would also provide access for vendors and customers so they can have temporary access in order to have access to their files on Cloud or DropBox in order to contribute to DesignIT during their visit. Most businesses have these similar services and use ring topology or mesh topology. With ring topology there is an extra layer created, if one device fails you can pin-point the failure but the entire network would go down. DesignIT would only need...
Words: 2878 - Pages: 12
...EECE 350/450 Computer Networks Spring 2013 Course information Catalogue Description A course that outlines data communications; wide area networks; circuit and packet switching; routing; congestion control; local area networks; communications architecture and protocols; internetworking. Pre-requisites By topic: • Programming language (such as C++) • Basic understanding of probability theory and data structures • Basic understanding of the internal operations of computers By course: • STAT 230 Probability and Random Variables, and EECE 330 Data Structures and Algorithms. Instructor Ayman Kayssi Office: 404, Raymond Ghosn Building (RGB) Office Hours: Monday 2 – 3:30 pm and by appointment Extension: 3499 Email: ayman@aub.edu.lb Web: aub.edu/~ayman Messaging: +961 3 965 258 LinkedIn: lb.linkedin.com/in/aymankayssi Twitter: akayssi Facebook: akayssi Course objectives The objectives of this course are to give students: An understanding of the basic principles of computer networking An overview of the main technologies used in computer networks An overview of internetworking principles and how the Internet protocols, routing, and applications operate The basic background in computer networks that will allow them to practice in this field, and that will form the foundation for more advanced courses in networking The basic skills needed to write network applications. Topics covered in this course ...
Words: 1522 - Pages: 7
...Communication Kathryn toliver-Jackson HCA/230 April 28, 2013 Jennifer Brumm Communication The two main types of communication are verbal and non-verbal. Verbal communication is the use of sound and language that is used to relay a message. It expresses ideas, desires, and concepts. According to “Non-verbal Communication” (n.d), “non-verbal communication is the process of communication through sending and receiving wordless cues between people”. Along with non-verbal communication, verbal communication acts as the primary tool for expression. In this paper I will be writing about the importance of verbal and non-verbal communication. The difference in verbal and non-verbal communication is that verbal communication includes thing like volume, rate, and pronunciation. Non-verbal communication includes things like posture, eye contact, and hand movements and hand gestures. Non-verbal communication is one of the biggest parts of communication. Non-verbal communication is a natural form of communication that speaks the truth. Verbal communication is spoken and written words. Verbal communication is a natural way of life. There are many different forms of verbal communication. For example, different people speak different languages and have accents. There are many principles of communication, but the three that I think make communication effective are to successfully give the message, make the other person interested in what you are saying, and give them a...
Words: 763 - Pages: 4
...ISSN: 2186-8492, ISSN: 2186-8484 Print エシアン ゾロナル オフ ソシルサエニセズ アンドヒオメニテズ Vol. 2 No. 3 August 2013 EFFECT OF SOCIAL NETWORKING SITES ON ACADEMIC ACHIEVEMENT AMONG INTROVERTS AND EXTROVERTS Raj Kumari Kalra1, Preeti Manani2 Faculty of Education, Dayalbagh Educational Institute (Deemed University), Agra, Uttar Pradesh, INDIA. 2 preetimanani.1708@gmail.com ABSTRACT The present study investigated the effect of use of Social Networking sites on academic achievement among Introverts and Extroverts. The sample of the study was comprised of 150 students of class XI of C.B.S.E. English medium schools of Agra City. Selection of the sample was done by using ‘Simple Random Sampling Method’. The age range of the students was 16-18 years. The Introversion-Extroversion Inventory (2009) developed by Aziz & Gupta was used to identify the type of personality in terms of introversion and extroversion. Grades obtained in the previous class served as the indicator of academic achievement of the students. Results revealed that there was no significant difference between academic achievement of users and non users of Social Networking Sites (SNS). It was also found that even with personality differences among the students there was no significant difference found among extroverts and introvert students using and not using SNS with reference to their academic achievement. Keywords: SNS, Introversion, Extroversion and Academic Achievement INTRODUCTION Man is a social animal. He needs...
Words: 2538 - Pages: 11
...RESEARCH ESSAY “SOCIAL NETWORKING IS BENEFICIAL FOR SOCIETY” Social Networking is beneficial for society Presently, online activity becomes lifestyle on society, particularly accessing social networking sites. Cameron (2013) states that the digital analytics company Experian published a report in April 2013, that 27% people in United States, United Kingdom, and Australia spent online time on social networking sites. Social networking refers to the platforms of interactions between people where they create, share, exchange information and thoughts in cyberspace or online communities (Digital Communications 2014). The utilization of social networking sites to connect with family, relatives, friends and also to meet new people has massive impact on how people do interaction in society (Australian Psychological Society 2102, p. 2). According to Nations (n.d.) explain that social networking has the open-ended characteristic that makes it can be popular at the moment, so that easy to used by the new users. This research essay will explain there are three reasons why social networking is beneficial for society: social networking can improve relationships, it can be used for study aims, and also social networking is utilized for sharing information. To begin with, social networking can improve relationships. Nowadays, teenagers and adults are using social network to get relations in their society, such as make new friends, connect to their family or friends. They may feel...
Words: 1293 - Pages: 6
...LAN / WAN Research Project 1) You have just begun working as a networking consultant with MTI Technologies Inc. One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office in the city of Chicago. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance? I would inform them that they might have a NIC card that is not capable of 100baseT, this would make all the other NIC cards run on 10baseT regardless of it’s capability. I would suggest that they purchase a new NIC card and I would inform them that they need to update their drivers whenever they do upgrades. 2) The network managers at the tax preparation office have followed your advice on reconfiguring the network, and as a result, the network is now running more smoothly. However, they have realized that their Internet connection is too slow. They have been using a dial-up BRI ISDN connection. They want to spend no more than $250 per month on an Internet connection (not including installation fees). They also need a transmission...
Words: 583 - Pages: 3
...7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that data received from the network is acceptable to the receiving software. Layer 5 manages the connections between computers. Connection management includes establishing, maintaining and terminating the links between network systems. This layer provides for full-duplex, half-duplex, and simple communications (i.e. two-way simultaneous, two-way one-way-at-a-time, and one direction only). This layer...
Words: 2317 - Pages: 10
...2011 IEEE/ACM International Conference on Green Computing and Communications The Survey and Future Evolution of Green Computing Qilin Li Production and Technology Department Sichuan Electric Power Science and Research Institute Chengdu, Sichuan, P.R.China li_qi_lin@163.com Mingtian Zhou School of Computer Science and Technologies University of Electronic Science and Technology Chengdu, Sichuan, P.R.China mtzhou@uestc.edu.cn Although green computing is becoming increasingly important in IT systems, it presents challenging problems to system designers. Designers need to take into account energy consumption during the phase of system design and to find solutions to reduce it. Green computing involves all aspects of IT systems, such as chips, system architectures, compilers, operating systems, communication networks and application services, and so on[1]. Further, these aspects are interdependent and complicated. As a result, building lowcost and low-power-consumption systems is a challenging and important activity. Such a new computing paradigm introduces new technical challenges to system designers. In light of today’s requirements for green computing, we present latest research efforts that attempt to deal with them and indicate still open issues. We thus discuss the connotation of green computing and sketch our view on the next generation of IT systems for green computing. We further identify key issues relevant to green computing and evaluate different approaches to...
Words: 2936 - Pages: 12
...Officer. ➢ Diversified technical knowledge in Data Processing Center operations, Information’s Security, COMSEC Security, administration and maintenance of Microsoft & Ubuntu 9.10 Linux client server computer networking. ➢ Retired from the U.S. Navy - Senior Chief Petty Officer Information Systems Technician. ➢ MICROSOFT CERTIFIED SYSTEMS ENGINEER (MCSE) . SPECIALTY COURSES/ TRAINING/ EDUCATION ➢ San Diego State University - Telecommunication Certification program. ➢ Navy's Telecommunication School. (Radioman “A” School} ➢ Communication Security Material System (CMS) School- INFOSEC/ISSM training courses. ➢ Microsoft Networking Engineer Courses, Middlesex County College ➢ ViaSat Linkway and LinkStar – Comprehensive Network Operations Training. ➢ Project Management Training courses. PROFESSIONAL EXPERIENCES Organization: DRS Technical Services, INC, Ft Monmouth, NJ (Deployed Kandahar, Afghanistan/ Baghdad/Tikrit, Iraq) Dates: 05/2005– 06/2009 Position: Network System Analyst (Contractor) Primary Duties / Responsibilities / Experience: Provided network administration services in support LAN/WAN Fly-Away Satellite Terminal package to AMC, Logistical Support Element-Forward Commander as part of Operation “Iraqi Freedom”. Maintain communications I.E. 230 Voice over IP (VOIP) Phones, 270 NIPR lines, 3 SIPR lines, Secure & Non Secure Fax lines,...
Words: 766 - Pages: 4
...growing business use of “big data,” and 3) the growth in “cloud computing,” where more and more business software runs over the internet. Change & Business Impact TECHNOLOGY * Cloud computing platform emerges as a major business area of innovation- A flexible collection of computers on the Internet begins to perform tasks traditionally performed on corporate computers. Major business applications are delivered online as an Internet service (Software as a Service, or SaaS). * Big data- Businesses look for insights from huge volumes of data from Web traffic, e-mail messages, social media content, and machines (sensors) that require new data management tools to capture, store, and analyze. * A mobile digital platform emerges to compete with the PC as a business system- the Apple iPhone and Android mobile devices are able to download hundreds of thousands of applications to support collaboration, location-based services, and communication with colleagues. Small tablet computers, including the iPad, Google Nexus, and Kindle Fire, challenge conventional laptops as platforms for consumer and corporate computing. MANAGEMENT * Managers adopt online collaboration and social networking software to improve coordination, collaboration, and knowledge sharing- Google Apps, Google Sites, Microsoft Windows SharePoint Services, and IBM Lotus Connections are used by over 100...
Words: 1977 - Pages: 8
...Phenomenon of Facebook One of the most significant current discussions in facebook is a part of social network that connects millions of people around the world. The controversy about facebook is that it joins people from different cultures and different religions. Facebook users share knowledge, pictures, videos, audio and opinions with each other worldwide. The purpose for this research is almost everyone has accounts on facebook even teenager. However, there are advantage and disadvantage to have a facebook accounts. This paper has been divided in to three parts. The first section will provide the definition of social networks and background. The second part begins with the origins of facebook and the designer Mark Zuckerberg who's created the idea. The final part deals with the effect facebook has on people. Following the work of Boyd and Ellison, which demonstrates that the social network is a specific system that allows people to establish public, personal information and shows a list of others registered who share a relation in that web (Boyd & Ellison, 2007). Facebook, the largest social network in the world, has 250 million users (Epstein, 2009). People can benefit from facebook professional as Epstein 's point is that facebook has many groups that allow users to keep in touch with others professional benefits and participating with them. For example there are parts that include; hot news about subjects gives attention to people, inserts links that...
Words: 786 - Pages: 4
...Social networking sites (SNSs) are increasingly used by young people. Critically evaluate claims that their use can have negative effects on users. Recent years have witnessed the exponential increase of web-based social networks, also known as social networking sites (SNSs). By the end of 2011, there were approximately 2.3 billion people (around one third of the global population) using the Internet, and 1.03 billion (about 45%) of which have reported using a social networking site at least once a day (International Telecommunications Union, 2011:1). According to Papacharissi (2009:199), the increasing popularity and the growth of the leading SNSs such as Facebook, My Space, Twitter and LinkedIn are due to the fact that they offer users various platforms to create their own profiles to represent themselves to interact with each other through emails, instant messages and many other integrated communication tools. While a variety of definitions of the term SNS have been suggested, this essay will use the one first suggested by Boyd and Ellison (2007:210) who saw it as: “web-based services that allow individuals to construct a public or semi-public profile, communicate with other users with whom they share a connection and view and navigate through their own list of connections as well as those of others.” As more people are becoming SNS users, it could be argued that more negative than positive impacts on society and human relationships can be seen in daily life (Ybarra...
Words: 2745 - Pages: 11
...and female on the average spend equal time on internet. Though female users spend more time on Facebook than their counterparts but male users have more Facebook friends. Facebook use, in general, adversely affecting the academic performance of students but this adverse effect is observed greater for male students. The social interaction with the existing friends is found the most common use of the Facebook among students. Keywords: Facebook; Academic performance; Social networking. * Corresponding Author Pattern of Facebook Usage and its Impact on Academic Performance 20 Introduction Among the vast variety of online tools which are available for communication, social networking sites have become the most modern and attractive tools for connecting people throughout the world (Aghazamani, 2010). The first social networking site was created in 1997 in the name of Sixdegree.com, and now there are hundreds of social networking sites across the world (Boyd & Ellison, 2007). One of the largest social networking sites like Facebook have become so popular, especially among students that it reflected many other traditional features of society. Facebook users share ideas and pictures with friends and family members. Facebook is also to keep in touch with previous high school classmates...
Words: 2859 - Pages: 12
...Ethernet The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps. Ethernet is a physical and data link layer technology for local area networks (LANs). Ethernet was invented by engineer Robert Metcalfe. It uses wires (meaning it is not a wireless technology). The wires used for a LAN are mostly those headed by an RJ-45 jack, which is similar to the jack plugged into your telephone set, but twice as big. Some Ethernet networks use coaxial cables, but that’s rarer, and present in rather large LANs, which span over areas between buildings. Ethernet is by far...
Words: 2787 - Pages: 12
...Portada Management information systems managing the digital firm Part One. Organizations, Management, and the Networked Enterprise ....1 Chapter 1. Managing the Digital Firm ....2 Opening Case: DaimlerChrysler's Agile Supply Chain ....3 1.1 Why Information Systems? ....4 Why Information Systems Matter 4 • How Much Does IT Matter? 6 • Why IT Now? Digital Convergence and the Changing Business Environment ....7 1.2 Perspectives on Information Systems ....13 What Is an Information System? ....13 Windows on Organizations: Cemex: A Digital Firm in the Making ....14 Window on Technology: UPS Competes Globally with Information Technology ....17 It Isn't Just Technology: A Business Perspective on Information Systems 18 • Dimensions of Information Systems ....20 1.3 Contemporary Approaches to Information Systems ....25 Technical Approach 26 • Behavioral Approach 26 • Approach of This Text: Sociotechnical Systems ....27 1.4 Learning to Use Information Systems: New Opportunities with Technology ....27 The Challenge of Information Systems: Key Management Issues 28 • Integrating Text with Technology: New Opportunities for Learning ....30 Make IT Your Business ....31 Summary, 31 • Key Terms, 32 • Review Questions, 32 • Discussion Questions, 33 • Application Software Exercise: Database Exercise: Adding Value to Information for Management Decision Making, 33 • Dirt Bikes USA: Preparing a Management Overview of the Company, 33 • Electronic Commerce Project: Analyzing...
Words: 3823 - Pages: 16