...Current Date: 1/11/14 Lab 1: OPNET LAN Modeling Tutorial ------------------------------------------------- ------------------------------------------------- Week 1 iLab Report The first objective in the LAN Modeling tutorial is Setting Up the Scenario. The final step in setting up your scenario appears below. 1. (30 points) Once your project is created (after Step 6 above), your workspace will contain a map of the United States. Your project and scenario name can be seen in ITGuru’s top window border in the form of Project: <project name> Scenario: <scenario name>. Capture a screenshot of your new project workspace that clearly shows your project and scenario name, and paste it below. 2. (40 points) In college-level paragraph(s), describe how background traffic affects both e-mail data and VoIP data. In this week’s lab exercise, we had the opportunity to create a network simulation from the ground up using OpNet IT Guru. The purpose of the exercise was to gain familiarity with OpNet functions along with network objects and associated behavior based on the configuration of network variables. Some of these objects include Application Definitions, Profile Definitions, Subnets, and the various means of connecting these components in a topology. The lab exercise itself provided a foundation for creating a simulated environment that was focused on evaluating the impact of background link load on FTP traffic. After creating the initial simulation...
Words: 681 - Pages: 3
...in your OPNET lab instructions, downloaded in Step 3 of the Week 7 iLab page. Please use the template starting on Page 2 and submit it to the Week 7 iLab Dropbox by the due date. Have fun while learning. NETW410, Professor’s Name Current Date Lab 7: Traffic Modeling Lab Report 1. Capture a screen shot of the results screen and paste it into your answer sheet. (7 points) 2. What do the stats show about the traffic entering the cloud? (7 points) It show that it have a high starting packet send to each other to establish communication. 3. Paste a shot of this screen into your worksheet. (7 points) 4. What do you observe about the packet delay related to the ToS we assigned? (7 points) That they have multiple different delays in the three interface queuing. The three could be use depend on the need. 5. Why does this simulation run so much quicker than the first one? (7 points) Because its only tracking the background traffic so it make it a little bit faster. 6. What do you observe about the queuing delays in both scenarios? (7 points) They both average out to be the same kind of startup. Although the background seem to have a smaller delay at the startup compare to the other one. 7. The first panel compares the queuing delays between the three scenarios. Paste a shot of this panel in your answer sheet. (7 points) 8. How do you compare these results? (7 points) The result is kind of similar to before. The explicit traffic stay pretty even...
Words: 386 - Pages: 2
...Embedded Systems Design Scott DeCota Modern Operating Systems Embedded systems are all around us. They run the engine, brakes, seatbelt, airbag, and audio system in your car. They digitally encode your voice and construct a radio signal to send it from your cell phone to a base station. They control your microwave, dishwasher, and DVD player. They command robots on a factory floor, power generation in a plant, processes in a chemical plant, and the traffic lights in the city. Embedded operating systems are growing increasingly common in everyday appliances and other devices. These operating systems provide application interfaces for a wide range of different applications. The challenge for developers is to determine which operating system or programming language to use in a particular device or project, and how to utilize the parallelism and concurrency capabilities of the hardware and programming language chosen for a project to design a system of adequate timing precision and efficiency. Developers working with embedded systems need to be extremely diligent in regards to timing and optimization. Embedded systems are frequently interacting with the physical environment in which multiple sources of data may be interacting with the system simultaneously. Developers should have a solid understanding of the parallelism and concurrency capabilities of the hardware for a selected project. These features can occur in different forms that can greatly affect the timing of the...
Words: 995 - Pages: 4
...Social cognitive theory From Wikipedia, the free encyclopedia |[pic] |This article needs additional citations for verification. Please help improve this article by adding citations to | | |reliable sources. Unsourced material may be challenged and removed. (March 2010) | |Psychology | |[pic] | |Outline | |History | |Subfields | |Basic types | |Abnormal | |Biological | |Cognitive | |Comparative | |Cultural | |Differential | |Developmental | |Evolutionary | |Experimental ...
Words: 2723 - Pages: 11
...computer system hardware components include devices that perform input, processing, date, and output. - Central processing unit (CPU) consists of three associated elements : the arithmetic/logic unit, the control unit, and the register areas. - Primary storage, also called main memory or memory, is closely associated with the CPU. Memory holds program instructions and data immediately before or after the registers. Hardwar components in Action : instruction and execution Instruction time : Step 1) fetch instruction, step 2) decode instruction Execution time : step 3) execute instruction, step 4) store result Completing the instruction phase followed by the execution phase is called a machine cycle. Some processing units can speed processing by using pipelining, whereby the processing unit gets one instruction, decodes another, and executes a third at the same time. Processing and memory devices : Power, Speed, and Capacity The components responsible for processing – the CPU and memory – are housed together in the same box or cabinet, called the system unit. MIPS : millions of instructions per second, a measure of machine cycle time Clock Speed : A series of electronic pulses produced at a...
Words: 1317 - Pages: 6
...Should The Drinking Age Be Lowered To 18? Every teenager anticipates the day that they will finally be eighteen years old. This is the day they are finally seen as being an adult in the eyes of our government. Eighteen year olds are now free to make their own life choices and be held accountable for them. At the age of eighteen, you are free to put your life on the line and fight for your country, if you commit a crime you can be tried as an adult in court, and you are also give the right to vote in your country. So, why should the drinking age be twenty-one years old when you are considered an adult at the age of eighteen? At the age of eighteen you are not mature and responsible enough to purchase and consume alcohol. Alcohol has been around for centuries, showcased at parties, bars, sports events and just about everywhere. For these very reasons every day in our country the drinking age is being ignored and violated by young adults, teenagers, and even children all under the age of twenty-one. “On average ninety-five percent of those who will be alcohol consumers in their lifetime take their first drink before the age twenty one. Fifty percent of eighteen to twenty year olds consume alcohol on a regular basis” (McCardell 1). Based on these statistics we can conclude that the enforcement of the legal drinking age has fallen short. The most commonly known place where alcohol is consumed very heavily is on our college campuses. Many college students participate in binge...
Words: 1636 - Pages: 7
...Stopping Malicious Behavior What is the problem? Can the field of fraud detection (and cyber security in general) be improved by new technology and approaches? If companies develop a program that searches for unusual activity by looking at risk factors then they could improve how they detect fraud. Since a lot of fraud detection is rule based, they have to develop a system that addresses the gray areas of their rules. For instance if a bank is looking for someone who transfers over $10,000 for one transaction in a day as an alert, then what happens if they separate the $10,000 into smaller payments? What happens if the malicious person makes sure to deposit just under $10,000 to avoid having alerts for their illegal actions? Addressing different patterns of new gray flavors of activity can help address management issues, overlapping issues and detection issues. Also developing better anomaly, link and predictive analysis can help guide fraud detection into greater improvements. Anomaly analysis consists of being able to identify risk using certain behaviors when someone doesn’t do things the normal way. The main issue with anomaly detection is there is a great challenge on managing the detection systems, certain behavior that you think is odd may be normal to a certain group of people, and that it is hard to make generalizations on new data. Link analysis develops relationships between different kinds of entities. Links can be made with how entities relate to...
Words: 2974 - Pages: 12
...is the next step An Organizational Analysis should be used to first examine the environment strategies and resources of an organization and next to use that information to determine where training emphasis should be placed. A task analysis should then be conducted to help determined the content of the training program based on the duties of the job. which principles of learning do you see demonstrated in your own classes? In what ways might you bring other principles into them? Goal setting is often the first class during the syllabus also each chapter has goals of what you should know by the end of it. Meaningfulness of Presentation in the way that most of the course material buildings on top of each other as the course goes on. Modeling weather it be education videos or websites key note speakers are all models in the classroom setting, Individual differences is definitely a factor as far as presentation of material whether it be handout, powerpoint, lecture,...
Words: 1713 - Pages: 7
...Azarkan Hind In partial fulfillment of INT 4300 – Internship School of Business Administration Optimization of the Trucks Transit in Marsa Maroc Terminal Dr. Youssef Boulaksil Fall Term 2013 Executive Summary The container terminal is a flat modal form that binds the ship to truck, train or to another vessel in the case of transshipment. This connection is done via interfaces: truck / area inter exchange, train / buffer zone, ship / dock. Thus, the major container flows are channeled to or from this system are the result or the source of a multitude of internal flow system (sorting, inspection, shifting, connection, full containers, empty containers). These flows are treated with different tools and different locations around the terminal. That means, the container terminal is to optimize the processing of massive volumes of containers in order to achieve economies of scale (749,000 TEUs'' 20-foot equivalent'' per year), improving the use of resources and more special equipments that are expensive. In fact, responsible for handling division have the prospect of having a solution to balancing and optimization of the supply chain through the design of equipment used (tractors) to import and export in delivery to the end customer. My final project study is in the heart of this approach. It has as an objective, the study of solutions that meet the diverse needs. To do this, I had some operational research to minimize the process of delivery of containers...
Words: 11589 - Pages: 47
...Why the Drinking Age should be lowered Why the drinking age should be lowered It is a Friday night, after a grueling week of studying, students are excited to go downtown and have a good time with their friends at the bar. One person gets to the bar and the bouncer sees his ID, takes a long look at him and says he can’t let him in. This situation happens to millions of college students all over the United States! The drinking age in the United States is 21 and it is somewhat of a controversy for many people. The drinking age should be lowered because people will engage in more responsible drinking, people in their teens will get in less trouble with the law and most importantly it will be the last step towards fully making 18 year olds a part of the adult community. It is well known that college students like to drink. It is no secret, but where they buy and consume their alcohol is a secret. The president of Middlebury College, John Mcardell says, “kids find ways to get around the 21 year old limit. This law has been an abysmal failure. It hasn't reduced or eliminated drinking. It has simply driven it underground, behind closed doors, into the most risky and least manageable of settings." Since most college freshmen and sophomores are under the legal drinking age they are not able to buy their own alcohol and much less go into a bar and have a drink. In a survey I made out of my class all 11 students said that they have consumed an alcoholic beverage...
Words: 1810 - Pages: 8
...[pic] [pic] By XXXX IP Telephony/VOIP Instructor: xxxx Date: 08/18/2010 Table of Content Company History------------------------------------------------------------------------------------3 Technology-------------------------------------------------------------------------------------------4 Technical Objective---------------------------------------------------------------------------------5 Background-------------------------------------------------------------------------------------------6 Advantages and Disadvantages--------------------------------------------------------------------7 Why should I use it in my business----------------------------------------------------------------9 Key to Successful Business VoIP Implementation --------------------------------------------11 • Planning and assessment • Design, testing and implementation • Operations and Optimization Predicted reasons why UPS should implement VoIP -----------------------------------------15 VoIP Security Intrusion Prevention -------------------------------------------------------------16 Conclusion-------------------------------------------------------------------------------------------17 Bibliography-----------------------------------------------------------------------------------------19 Company History: UPS was founded in 1907 as a messenger company in the United States. It has grown into a $49.7 billion...
Words: 2768 - Pages: 12
... STEP 3 Plan a solution How do I get out of this? STEP 4 Execute the plan Let's get an answer STEP 5 Evaluate the solution Can this be true? Kenneth Heller Patricia Heller University of Minnesota With support from the National Science Foundation, University of Minnesota, and U.S. Department of Education © Kenneth & Patricia Heller, 2010 Acknowledgments In reaching this stage in this work, we gratefully acknowledge the support of the University of Minnesota, the U.S. Department of Education FIPSE program, and the National Science Foundation. This work would not have existed without the close cooperation of the University of Minnesota School of Physics and Astronomy and Department of Curriculum and Instruction. We have incorporated the suggestions of many faculty members from both Physics and Education at the University of Minnesota and other institutions that have communicated with us at workshops, meetings, and by e-mail. This work has depended on the efforts and feedback of many graduate student teaching assistants in the School of Physics and Astronomy over the years. Much of this development is directly based on the research of the graduate students in the University of Minnesota Physics Education Program: Jennifer Blue, Tom Foster, Charles Henderson, Mark Hollabough, Ron Keith (deceased), and Laura McCullough. We are indebted to our colleagues in the Physics Education community for their ideas, insights, and research. Finally...
Words: 40122 - Pages: 161
...Expert systems are computer applications that combine computer equipment, software, and specialized information to imitate expert human reasoning and advice. As a branch of artificial intelligence, expert systems provide discipline-specific advice and explanation to their users. While artificial intelligence is a broad field covering many aspects of computer-generated thought, expert systems are more narrowly focused. Typically, expert systems function best with specific activities or problems and a discrete database of digitized facts, rules, cases, and models. Expert systems are used widely in commercial and industrial settings, including medicine, finance, manufacturing, and sales. As a software program, the expert system integrates a searching and sorting program with a knowledge database. The specific searching and sorting program for an expert system is known as the inference engine. The inference engine contains all the systematic processing rules and logic associated with the problem or task at hand. Mathematical probabilities often serve as the basis for many expert systems. The second component—the knowledge database—stores necessary factual, procedural, and experiential information representing expert knowledge. Through a procedure known as knowledge transfer, expertise (or those skills and knowledge that sustain a much better than average performance) passes from human expert to knowledge engineer. The knowledge engineer actually creates and structures the knowledge...
Words: 2272 - Pages: 10
...Ch. 5. Moore's Law and More: Fast, Cheap Computing, Disruptive Innovation, and What This Moore's Law definition: Chip performance per dollar doubles every eighteen months. Moore’s Law applies to chips—broadly speaking, to processors and chip-based storage. Microprocessor is the brain of a computing device. It’s the part of the computer that executes the instructions of a computer program. For processors, Moore’s Law means that next generation chips should be twice as fast in about eighteen months, but cost the same as today’s models. Random-access memory (RAM ) Fast, chip-based volatile storage in a computing device Flash memory Nonvolatile, chip-based storage Volatile memory: Storage that is wiped clean when power is cut off from a device Nonvolatile memory: Storage that retains data even when powered down. Solid state electronics: Semiconductor-based devices Semiconductors: Substance such as silicon dioxide used inside most computer chips that is capable of enabling and inhibiting the flow of electricity Optical fiber line: High-speed glass or plastic-lined networking cable used in telecommunications ...
Words: 2104 - Pages: 9
...NATIONAL UNIVERSITY OF RWANDA FACULTY OF APPLIED SCIENCES DEPARTMENT OF COMPUTER SCIENCE ACADEMIC YEAR 2011 Performance analysis of Encryption/Decryption algorithms using SimpleScalar By: MANIRIHO Malachie and NIZEYIMANA Jean-Paul Supervisor: Dr.-Ing. NIYONKURU Adronis Huye, 2011 CHAPTER ONE: GENERAL INTRODUCTION 1.1. BACKGROUND TO THE STUDY There are various security measures that can be imposed in order to secure the information stored. As more and more technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be...
Words: 7475 - Pages: 30