IFSM 310 – Stage 4 Assignment – Due Sunday - Information Systems
Please see attached the assignment details/rubric, case study, and course resources. This is the 4th stage of the 4-part assignment. I have attached the first 3 assignments because they are connected. It is important that you understand IT or Information Systems because this assignment asks for technical and specific IT-related answers. The paper must be in APA format and you MUST incorporate course materials. THIS IS DUE SUNDAY! Please do not accept this assignment if you cannot meet this short time constraint.
IFSM 310 3D Printing Stage 4 Assignment
Before you begin this assignment, be sure you:
· Have completed all previously assigned readings.
· Read the “3D Printing Case Study.
· Reviewed the feedback on your 3D Printing Stage 1, 2 and 3 Assignments.
It is now a year later, and Mark has opened his two new facilities in Memphis, Tennessee and Phoenix, Arizona. All three locations are operating almost around the clock to create 3D printed accessibility and assistive devices. Mark and his father are planning to open several more facilities, also located near Veterans Administration Hospitals and rehab facilities.
Mark does not want to continue to increase his IT infrastructure at the original location and has decided to move all of his systems and files to a cloud service provider. You have recommended that since he has everything set up the way he wants it and the systems are performing well for him, that he just move what he has to an Infrastructure as a Service (IaaS) cloud provider. Before Mark agrees to this, he wants to understand more about just how that would work, using his current systems and locations. He also has a lot of questions about how the communications systems work, and he wants to understand the protocols, the architecture and the four layer TCP model.
Use the following outline for your paper:
1. Provide an opening paragraph as an introduction that explains what is contained in the paper. (You might write this after you develop the rest of your paper.)
2. Explain what IT infrastructure changes will occur at the original location by telling Mark which components will be located at the IaaS cloud providers location and what will remain at his facility. Explain any changes that are needed at the two remote locations in order to use the IaaS cloud services. Provide a list of which components will be located at the cloud location, at Marks primary facility, and at the two remote locations.
3. Create an original graphical representation showing the cloud provider and the three current locations. Show which components will be located at the cloud providers site and which will remain at the three locations. Label each component and the locations.
4. List the protocol involved for each communication link in the design, including internet connectivity, wired connections, and wireless connections. Be sure to include security protocols, as appropriate to the infrastructure design you created and the components you identified.
5. Explain the concept of a layered systems architecture to aid in communications and the benefit of a layered architecture such as the TCP or OSI model.
6. Using the four layer TCP model, explain what each layers function is and how it will apply when Mark uses his ERP information system that will be located at the cloud service providers location.
7. Using the four layer TCP model, explain what happens when a packet of information travels from the server at the cloud provider to a tablet device at Marks facility. Be sure to identify the points at which each of the layers of the model are the primary enabler of the communication.
Formatting:
· All parts of the assignment except for the graphic should be about 3-4 single spaced pages in length, and be in Microsoft Word format, or a format that can be read in Word.
· Part 3 is an original graphic diagram that should be included in the same document.
· Compare your work to the Grading Rubric below to be sure you have met content and quality criteria.
· Your submission should include
your last name first in the filename: Lastname_firstname_Stage_4
GRADING RUBRIC:
The right and wrong answers have to do with whether or not you correctly incorporated the course vocabulary and concepts from the textbook to support your choices and have addressed all parts of the assignment.
Criteria
90-100\%
Far Above Standards
80-89\%
Above Standards
70-79\%
Meets Standards
60-69\%
Below Standards
< 60\%
Well Below Standards
Possible Points
Introduction
5 Points
A clear and effective introduction is provided.
4 Points
An appropriate introduction is included.
3.5 Points
An introduction is provided.
3 Points
The introduction may be incomplete or inaccurate.
0-2 Points
No introduction provided.
5
Changes in Existing IT Infrastructure to Use IaaS
14-15 Points
Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is clear, complete, derived from the Case Study, and demonstrates sophisticated level of analysis and critical thinking.
12-13 Points
Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is accurate, derived from the Case Study, and demonstrates analysis and critical thinking.
10-11 Points
Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is derived from the Case Study, and demonstrates adequate level of analysis and critical thinking.
9 Points
Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is incomplete or not related to Case Study.
0-8 Points
Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is not included, or is very incomplete or incorrect.
15
Graphical Representa-tion
14-15 Points
The graphical diagram is complete, clear, logical, labeled, and appropriate to the Case Study, includes the components and locations listed in step 2, and demonstrates sophisticated analysis and critical thinking.
12-13 Points
The graphical diagram is clear, logical, labeled, and appropriate to the Case Study and includes the components and locations listed in step 2, and demonstrates a clear understanding of the course concepts.
10-11 Points
The graphical diagram is labeled and appropriate to the Case Study and includes most of the components and locations listed in step 2.
.
9 Points
The graphical diagram may be lacking in completeness and/or clarity and/or logic; may not be labeled or appropriate to the Case Study and may not include the components or locations listed in step 2.
0-8 Points
No graphical diagram is included, or minimal effort demonstrated.
15
List of Communica-tions Protocols
14-15 Points
List of communica-tions protocols is complete, accurate, appropriate to the diagram, and demonstrates sophisticated level of analysis and critical thinking.
12-13 Points
List of communications protocols is accurate, appropriate to the diagram, and demonstrates analysis and critical thinking.
10-11 Points
List of communications protocols is provided, relates to the diagram, and demonstrates adequate level of analysis and critical thinking.
9 Points
List of communications protocols is incomplete or not related to the diagram.
0-8 Points
List of communications protocols is not included, or is very incomplete or incorrect.
15
Explanation of Layered Architecture and Its Benefits
14-15 Points
Explanation of a layered architecture and its benefits is clear, complete, and demonstrates sophisticated level of analysis and critical thinking.
12-13 Points
Explanation of a layered architecture and its benefits is clear and demonstrates analysis and critical thinking.
10-11 Points
Explanation of a layered architecture and its benefits is provided and demonstrates adequate level of analysis and critical thinking.
9 Points
Explanation of a layered architecture and its benefits is incomplete or inaccurate.
0-8 Points
Explanation of a layered architecture and its benefits is not included, or is very incomplete or incorrect.
15
Explanation of TCP Model
14-15 Points
Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is clear, complete, and demonstrates sophisticated level of analysis and critical thinking.
12-13 Points
Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is clear and demonstrates analysis and critical thinking.
10-11 Points
Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is provided and demonstrates adequate level of analysis and critical thinking.
9 Points
Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is incomplete or inaccurate.
0-8 Points
Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is not included, or is very incomplete or incorrect.
15
Applying the TCP Model to a Packet
14-15 Points
The application of the TCP model to a packet is clear, complete, and demonstrates sophisticated level of analysis and critical thinking.
12-13 Points
The application of the TCP model to a packet is clear and demonstrates analysis and critical thinking.
10-11 Points
The application of the TCP model to a packet is provided and demonstrates adequate level of analysis and critical thinking.
9 Points
The application of the TCP model to a packet is incomplete or inaccurate.
0-8 Points
The application of the TCP model to a packet is not included, or is very incomplete or incorrect.
15
Format
5 Points
Submission reflects effective organization and sophisticated writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references are incorporated and cited using APA format.
4 Points
Submission reflects effective organization and clear writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references are properly incorporated and cited using APA format.
3.5 Points
Submission is adequate, is somewhat organized, follows instructions provided; contains minimal grammar and/or spelling errors; is in Word format; any references are incorporated and cited using APA format.
3 Points
Submission is not well organized, and/or does not follow instructions provided; and/or contains grammar and/or spelling errors; and/or is not in Word; references may not be properly cited using APA format.
0-2 Points
Document is extremely poorly written and does not convey the information.
5
TOTAL Points Possible
100
3D Printing Stage 4 1
Stage 4
Course: IFSM 310 6980 Software and Hardware Infrastructure Concepts (2215)
/ 5
/ 15
Criteria
Far Above
Standards
Above
Standards
Meets
Standards
Below
Standards
Well Below
Standards
Criterion
Score
Introduction
Changes in
Existing IT
Infrastructur
e to Use
IaaS
5 points
5 Points
A clear and
effective
introduction is
provided.
4 points
4 Points
An
appropriate
introduction is
included.
3.5 points
3.5 Points
An
introduction is
provided.
3 points
3 Points
The
introduction
may be
incomplete or
inaccurate.
0 points
0-2 Points
No
introduction
provided.
15 points
13-15 Points
Explanation of
changes in
existing
infrastructure
at the original
and two
remote
locations to
use the IaaS is
clear,
complete,
derived from
the Case
Study, and
demonstrates
sophisticated
level of
analysis and
critical
thinking.
13 points
12-13 Points
Explanation of
changes in
existing
infrastructure
at the original
and two
remote
locations to
use the IaaS is
accurate,
derived from
the Case
Study, and
demonstrates
analysis and
critical
thinking.
11 points
10-11 Points
Explanation of
changes in
existing
infrastructure
at the original
and two
remote
locations to
use the IaaS is
derived from
the Case
Study, and
demonstrates
adequate level
of analysis and
critical
thinking.
9 points
9 Points
Explanation of
changes in
existing
infrastructure
at the original
and two
remote
locations to
use the IaaS is
incomplete or
not related to
Case Study.
0 points
0-8 Points
Explanation of
changes in
existing
infrastructure
at the original
and two
remote
locations to
use the IaaS is
not included,
or is very
incomplete or
incorrect.
Paragraph
Lato (Recom…
19px
/ 15
/ 15
Criteria
Far Above
Standards
Above
Standards
Meets
Standards
Below
Standards
Well Below
Standards
Criterion
Score
Graphical
Representati
on
List of
Communicat
ions
Protocols
15 points
13-15 Points
The graphical
diagram is
complete,
clear, logical,
labeled, and
appropriate to
the Case
Study,
includes the
components
and locations
listed in step
2, and
demonstrates
sophisticated
analysis and
critical
thinking.
13 points
12-13 Points
The graphical
diagram is
clear, logical,
labeled, and
appropriate to
the Case
Study and
includes the
components
and locations
listed in step
2, and
demonstrates
a clear
understanding
of the course
concepts.
11 points
10-11 Points
The graphical
diagram is
labeled and
appropriate to
the Case
Study and
includes most
of the
components
and locations
listed in step
2.
9 points
9 Points
The graphical
diagram may
be lacking in
completeness
and/or clarity
and/or logic;
may not be
labeled or
appropriate to
the Case
Study and may
not include
the
components
or locations
listed in step
2.
0 points
0-8 Points
No graphical
diagram is
included, or
minimal effort
demonstrated.
15 points
13-15 Points
List of
communicatio
ns protocols is
complete,
accurate,
appropriate to
the diagram,
and
demonstrates
sophisticated
level of
analysis and
critical
thinking.
13 points
12-13 Points
List of
communicatio
ns protocols is
accurate,
appropriate to
the diagram,
and
demonstrates
analysis and
critical
thinking.
11 points
10-11 Points
List of
communicatio
ns protocols is
provided,
relates to the
diagram, and
demonstrates
adequate level
of analysis and
critical
thinking.
9 points
9 Points
List of
communicatio
ns protocols is
incomplete or
not related to
the diagram.
0 points
0-8 Points
List of
communicatio
ns protocols is
not included,
or is very
incomplete or
incorrect.
/ 15
/ 15
Criteria
Far Above
Standards
Above
Standards
Meets
Standards
Below
Standards
Well Below
Standards
Criterion
Score
Explanation
of Layered
Architecture
and Its
Benefits
Explanation
of TCP
Model
15 points
13-15 Points
Explanation of
a layered
architecture
and its
benefits is
clear,
complete, and
demonstrates
sophisticated
level of
analysis and
critical
thinking.
13 points
12-13 Points
Explanation of
a layered
architecture
and its
benefits is
clear and
demonstrates
analysis and
critical
thinking.
11 points
10-11 Points
Explanation of
a layered
architecture
and its
benefits is
provided and
demonstrates
adequate level
of analysis and
critical
thinking.
9 points
9 Points
Explanation of
a layered
architecture
and its
benefits is
incomplete or
inaccurate.
0 points
0-8 Points
Explanation of
a layered
architecture
and its
benefits is not
included, or is
very
incomplete or
incorrect.
15 points
13-15 Points
Explanation of
the 4 layer
TCP model
and how it
applies to the
ERP and IaaS
is clear,
complete, and
demonstrates
sophisticated
level of
analysis and
critical
thinking.
13 points
12-13 Points
Explanation of
the 4 layer
TCP model
and how it
applies to the
ERP and IaaS
is clear and
demonstrates
analysis and
critical
thinking.
11 points
10-11 Points
Explanation of
the 4 layer
TCP model
and how it
applies to the
ERP and IaaS
is provided
and
demonstrates
adequate level
of analysis and
critical
thinking.
9 points
9 Points
Explanation of
the 4 layer
TCP model
and how it
applies to the
ERP and IaaS
is incomplete
or inaccurate.
0 points
0-8 Points
Explanation of
the 4 layer
TCP model
and how it
applies to the
ERP and IaaS
is not
included, or is
very
incomplete or
incorrect.
/ 15
/ 5
Criteria
Far Above
Standards
Above
Standards
Meets
Standards
Below
Standards
Well Below
Standards
Criterion
Score
Applying
the TCP
Model to a
Packet
Format
15 points
13-15 Points
The
application of
the TCP model
to a packet is
clear,
complete, and
demonstrates
sophisticated
level of
analysis and
critical
thinking.
13 points
12-13 Points
The
application of
the TCP model
to a packet is
clear and
demonstrates
analysis and
critical
thinking.
11 points
10-11 Points
The
application of
the TCP model
to a packet is
provided and
demonstrates
adequate level
of analysis and
critical
thinking.
9 points
9 Points
The
application of
the TCP model
to a packet is
incomplete or
inaccurate.
0 points
0-8 Points
The
application of
the TCP model
to a packet is
not included,
or is very
incomplete or
incorrect.
5 points
5 Points
Submission
reflects
effective
organization
and
sophisticated
writing;
follows
instructions
provided; uses
correct
structure,
grammar, and
spelling;
presented in a
professional
format using
Word; any
references are
incorporated
and cited
using APA
format.
4 points
4 Points
Submission
reflects
effective
organization
and clear
writing;
follows
instructions
provided; uses
correct
structure,
grammar, and
spelling;
presented in a
professional
format using
Word; any
references are
properly
incorporated
and cited
using APA
format.
3.5 points
3.5 Points
Submission is
adequate, is
somewhat
organized,
follows
instructions
provided; cont
ains minimal
grammar
and/or spelling
errors; is in
Word format;
any references
are
incorporated
and cited
using APA
format.
3 points
3 Points
Submission is
not well
organized,
and/or does
not follow
instructions
provided;
and/or
contains
grammar
and/or spelling
errors; and/or
is not in Word;
references
may not be
properly cited
using APA
format.
0 points
0-2 Points
Document is
extremely
poorly written
and does not
convey the
information.
Total / 100
Overall Score
Far Above
Standards
90 points minimum
Above
Standards
80 points
minimum
Meets
Standards
70 points
minimum
Below
Standards
60 points
minimum
Well Below
Standards
0 points minimum
3D Printing Case Study – IFSM 310 10/28/2016
3D Printing Case Study
In late 2015, Mark Peterson acquired a 3D printer from Best Buy for $500. As he began to play around
with it, he discovered that he could use designs he downloaded from the Internet to create a wide
variety of objects. One day as he was exploring designs on the website MyMiniFactory.com
(https://www.myminifactory.com/), he came across a category of accessibility items. He was very
excited to discover such things as an umbrella holder for a wheelchair, because his brother Peter uses a
wheelchair for mobility. He downloaded the umbrella holder design and made one for Peter. The first
time Peter used the umbrella holder, several people came up and asked him where he had gotten it. Of
course, he was proud to say his brother had made it, but he had no idea how much it would cost for
Mark to make one for a customer. Peter took the names and phone numbers of two people he
encountered and promised to get back to them. When Peter approached Mark with the requests, Mark
knew that he had found the start of something good. He figured out what the time and material cost
would be to make the holders, called the interested parties, and made his first two sales.
As he continued exploring, Mark ran across an article describing ten 3D printable assistive and
accessibility devices (https://3dprint.com/126214/103dp-devices-for-the-disabled/). After investing in a
heavy duty 3D printer, Mark used his Facebook page to advertise his growing business in 3D printing
assistive and accessibility devices. He soon had many orders and his 3D printing hobby became his
fulltime occupation.
Mark rented space in an industrial park, bought two more wireless 3D printers, and hired two part-time
assistants. He brought his PC from home to control the 3D printers, and set up an Internet connection
using Verizon FiOS. His PC is connected to a FiOS modem which has a built-in wireless router. Mark
obtains his 3D printing designs from sources on the internet. He uses Google email and keeps track of
his orders on a spreadsheet on his PC.
Marks Expansion Plan: Now, just three months later, he is ready to add seven more 3D printers and a
3D scanner, and hire five fulltime employees. Before he grows that much, he needs to set up his IT
infrastructure to manage not only the additional 3D printers, but also to manage his business. He wants
to implement a small business enterprise resource management (ERP) information system in his facility
to help him manage his business (customer orders, invoices, supply ordering, employees, etc.) more
effectively. He realizes he will also need a document printer to print invoices, etc. In addition, he wants
each of his employees to have mobile access to the ERP system and the 3D design files and printers from
anywhere in the facility, and he wants as much flexibility in which computers control which 3D printers
as possible. He has a large collection of 3D print design files and has downloaded some training videos
that he will use to train his new employees. Mark has already decided that he wants to store all of his
3D production files and his business management information locally in his facility, and to use cloud
storage for his backup files.
Your assignment, which will be done in four stages, is to assist Mark in understanding what kind of
infrastructure he needs; how it would be configured; how it will change when his business grows into a
much larger, multi-location operation; and how the various devices communicate with each other.
Specific instructions for each of the four staged assignments may be found under the Assignments tab.
https://www.myminifactory.com/
https://3dprint.com/126214/103dp-devices-for-the-disabled/
�������� ����
��
���
��
��
�
�
����
���
����
�����
��
��
�
���
��
����
���������
����� ��
!���#
�
$�\%�
&�
����
�
�
��(���
�)���(
*�� �+��,�
��-�(��-������,�,(����� �.��������,���/����/0��/����
��-��,1� 2�������3�� �2�3� �023 2�3��2���� ���
4556789:;<=>;[email protected];B
CDEFGHHGIJKLMMNEOPQ
RSMTOUUKLMMNEOPQ
VWWXYZW[YW\Y]̂_Ỳ]ab_YcYd_efgh_i_\]
jaklbhWf\XYa\XYmfhh_\]Yn\ohap]hfk]fh_YqYh_efgh_i_\]Yi_]
rgs_Yd_efgh_i_\]pYqYthWsgX_XuYbWWXYZW[YqYh_efgh_i_\]pYi_]
vWwYh_efgh_i_\]pYwgxxY[_Yi_]YqybWWXYZW[YW\YX_pkhg[g\bYa\XYX_]agxg\bYWf]Yn
wWfxXYh_kWii_\XYgX_\]gozg\bYpt_kgogkYappWkga]_XYkWp]pYa\XY\ai_pYoWhYaxx
X_sgk_p{p_hsgk_pYapYgoYzWfYw_h_Y|ahlŶgip_xoYpg\k_YkWp]pYah_YaYkW\k_h\Y]W
axxYpiaxxY[fpg\_ppYWw\_hpYqYbWWXYZW[YW\YgX_\]gozg\bY]̂_Y\ai_YWoYpWi_
h_kWii_\X_XYp_hsgk_pYa\X{WhYX_sgk_p
}a]aYh_th_p_\]a]gW\Ya\XYp]Whab_YqYkWfxXY[_YiWh_Yg\~X_t]̂YapY]WYŵ _h_
pWi_YWoY]̂_p_Yogx_p{Xa]aYwgxxY[_Yp]Wh_X
}gbg]axuY�fXgWuY�gX_WuYVhat̂gkpYqYigppg\bYbhat̂gkY_�]_\pgW\pYqYpfk̂Yapu
�Zt_b
d_o_h_\k_pYWoY]wWYWhYiWh_YqYh_efgh_i_\]Yi_]
rWhia]YqYt_ho_k]
r__xYoh__Y]WYkW\]ak]Yi_YgoYzWfŶas_Ya\zYef_p]gW\p�
�̂a\lpu
yyyyyyyyyyyyyyY�gi
�������� ����
��
���
��
��
�
�
����
���
����
�����
��
��
�
���
��
����
���������
����� ��
!���#
�
$�\%�
&�
����
�
�
��(���
�)���(
*�� �+��,�
��-�(��-������,�,(����� �.��������,���/����/0��/����
��-��,1� 2�������3�� �2�3� �023 2�3��2���� ��
456789:
;<5=>[email protected]:
[email protected]:J9KLMJ94BN5O6D896PQ9R6DQO6D89FPND6E5DC<5CD89ABP<8S5E9TUU:VW
[email protected]?6Y=9A[6D\8
AD=58D=6
]̂_̀abcde
fĝhî_ij
abcdèfĝhî_ij keegj̀fĝhî_ij lemcǹfĝhî_ij
oemm̀lemcn
fĝhî_ij
p_qge_qch̀frc_e
s6<\7DBCPQ96PQ
ACDD8P59Ft
FPND6E5DC<5CD8
:u9v9UJ
w8xC=D8Y8P5E :u9v9UJ
RBO
w8xC=D8Y8P5E
O=[[9y89H85
:V9v9UJ
UJ9SB=P5E
z{|}~̀�cqhgj
t�89y6<\7DBCPQ
Q8E<D=S5=BP9=E9<[86D�
[B7=<6[�9Q8D=>8Q
NDBY95�89A6E8
45CQ?�96PQ
Q8YBPE5D658E96
EBS�=E5=<658Q9[8>8[
BN9OD=5=P7�9F5
SDB>=Q8E96
<BYS[8589[=E59BN
�6DQO6D8�9EBN5O6D8
6PQ9P85OBD\
<BYSBP8P5E
<CDD8P5[?9=P9S[6<8�
:V9SB=P5E
z�|z�̀�cqhgj
t�89y6<\7DBCPQ
Q8E<D=S5=BP9=E
6Q8xC658�96PQ9=E
Q8D=>8Q9NDBY95�8
A6E8945CQ?�9F5
SDB>=Q8E969[=E59BN
�6DQO6D8�9EBN5O6D8
6PQ9P85OBD\
<BYSBP8P5E
<CDD8P5[?9=P9S[6<8�
:I9SB=P5E
z}|z�̀�cqhgj
t�89y6<\7DBCPQ
Q8E<D=S5=BP9=E9PB5
<[86D�9[B7=<6[96PQvBD
Q8D=>8Q9NDBY95�8
A6E8945CQ?�9t�89[=E5
BN9<CDD8P5[?9=P�
S[6<89<BYSBP8P5E
=E9=P<BYS[858�
J9SB=P5E
~|zz̀�cqhgj
s6<\7DBCPQ
48<5=BP9PB5
ECyY=558Q�9BD
Q8YBPE5D658E9[=55[8
8NNBD5�99;PQvBD9[=E5
BN9<CDD8P5[?9=P�
S[6<89<BYSBP8P5E
=E9>8D?9=P<BYS[858
BD9Y=EE=P7�
UJ9SB=P5E
z{|}~̀�cqhgj
G=>89D8xC=D8Y8P5E
6D89[=E58Q96PQ96D8
<[86D�9[B7=<6[�
Q8D=>8Q9NDBY95�8
A6E8945CQ?�
Q8YBPE5D658E96
EBS�=E5=<658Q9[8>8[
BN96P6[?E=E96PQ
OD=5=P7
:V9SB=P5E
z�|z�̀�cqhgj
G=>89D8xC=D8Y8P5E
6D89[=E58Q96PQ96D8
Q8D=>8Q9NDBY95�8
A6E8945CQ?�
:I9SB=P5E
z}|z�̀�cqhgj
G8O8D95�6P9N=>8
D8xC=D8Y8P5E9Y6?
y89[=E58Q96PQvBD96D8
PB59Q8D=>8Q9NDBY
5�89A6E8945CQ?�
J9SB=P5E
~|zz̀�cqhgj
�=E59BN
D8xC=D8Y8P5E9=E
>8D?9=P<BYS[8589BD
Y=EE=P7�
UJ9SB=P5E
z{|}~̀�cqhgj
��S[6P65=BP9BN9�BO
5�89N=>8
D8xC=D8Y8P5E9[=E58Q
O=[[9y89Y859O=5�95�8
<BYSBP8P5E9=E
<[86D�9[B7=<6[96PQ
Q8D=>8Q9NDBY95�8
A6E8945CQ?�
Q8YBPE5D658E96
EBS�=E5=<658Q9[8>8[
BN96P6[?E=E96PQ
OD=5=P7�
:u9SB=P5E
z�|z�̀�cqhgj
��S[6P65=BP9BN9�BO
5�89N=>8
D8xC=D8Y8P5E9[=E58Q
O=[[9y89Y859O=5�95�8
<BYSBP8P5E9=E
<[86D�9[B7=<6[�
Q8D=>8Q9NDBY95�8
A6E8945CQ?�
Q8YBPE5D658E96
<[86D9CPQ8DE56PQ=P7
BN95�89<BCDE8
<BP<8S5E�
:I9SB=P5E
z}|z�̀�cqhgj
��S[6P65=BP
6QQD8EE8E9�BO
EBY89BN95�89N=>8
D8xC=D8Y8P5E9O=[[
y89Y859O=5�95�8
<BYSBP8P5E�
6PQvBD9Y6?9y8
=P6<<CD6589BD
=P<BYS[858�
J9SB=P5E
~|zz̀�cqhgj
��S[6P65=BP9BN9�BO
5�89N=>8
D8xC=D8Y8P5E9O=[[
y89Y859O=5�95�8
<BYSBP8P5E9=E9>8D?
=P<BYS[858�9>8D?
=P6<<CD658�9BD
Y=EE=P7�
:u9SB=P5E
z�|z�̀�cqhgj
t�89y6<\7DBCPQ
Q8E<D=S5=BP9=E9<[86D�
[B7=<6[�9Q8D=>8Q
NDBY95�89A6E8
45CQ?�96PQ
Q8YBPE5D658E96
<[86D9CPQ8DE56PQ=P7
BN95�89<BCDE8
<BP<8S5E�9F5
SDB>=Q8E969N6=D[?
<BYS[8589[=E59BN
�6DQO6D8�9EBN5O6D8
6PQ9P85OBD\
<BYSBP8P5E
<CDD8P5[?9=P9S[6<8�
:u9SB=P5E
z�|z�̀�cqhgj
G=>89D8xC=D8Y8P5E
6D89[=E58Q96PQ96D8
<[86D�9[B7=<6[�
Q8D=>8Q9NDBY95�8
A6E8945CQ?�
Q8YBPE5D658E96
<[86D9CPQ8DE56PQ=P7
BN95�89<BCDE8
<BP<8S5E
:V9SB=P5E
z�|z�̀�cqhgj
��S[6P65=BP
=P<[CQ8E9�BO95�8
N=>89D8xC=D8Y8P5E
O=[[9y89Y859O=5�
5�89<BYSBP8P5E�
�������� ����
��
���
��
��
�
�
����
���
����
�����
��
��
�
���
��
����
���������
����� ��
!���#
�
$�\%�
&�
����
�
�
��(���
�)���(
*�� �+��,�
��-�(��-������,�,(����� �.��������,���/����/0��/����
��-��,1� 2�������3�� �2�3� �023 2�3��2���� ��
45678 9:;<;=>>
[email protected]@A7
CDEFGHIJK
LMDNODEOP
GHIJKFLMDNODEOP QKKMPFLMDNODEOP RKSITFLMDNODEOP
UKSSFRKSIT
LMDNODEOP
VEWMKEWINFLXIEK
Y767
ZB[@B\B]676A5]
7]̂;[email protected]̀B
=a;<;b>
ZB\[email protected] =>;<;=>
[email protected] =>;<;=>
b>;[5A]6\
ghijkFlIWNMP
mn[87]76A5]
A]c8ôB\
@B[@B\B]676A5]p
\[email protected]̀B;7]̂;̂BqAcB\
[email protected];788;[email protected];6s[B\;5r
7̂67t;A\;[email protected]
85̀Ac78p;̂[email protected]̂
[email protected];6dB;?7\B
_6ôst
B̂f5]\[email protected]\;7
\5[dA\6Ac76B̂;8BqB8
5r;7]78s\A\;7]̂
[email protected]]̀v
=w;[5A]6\
gxigyFlIWNMP
mn[87]76A5]
A]c8ôB\
@B[@B\B]676A5]p
\[email protected]̀B;7]̂;̂BqAcB\
[email protected];788;[email protected];6s[B\;5r
7̂67t;A\;[email protected]
85̀Ac78p;̂[email protected]̂
[email protected];6dB;?7\B
_6ôst
B̂f5]\[email protected]\;7
[email protected];o]̂[email protected]\67]̂A]̀
5r;6dB;[email protected]\B
c5]cB[6\v
=z;[5A]6\
gjig{FlIWNMP
_5fB;[[email protected]]\;5r
6dB;Bn[87]76A5];[email protected]
A]c5f[8B6B;[email protected]
A][email protected];[email protected];[email protected]
fA\\A]̀p;7]̂<[email protected];[email protected]
]56;̂[email protected]̂;[email protected]
6dB;?7\B;_6ôsv
>;[5A]6\
kiggFlIWNMP
mn[87]76A5];5r;̂767
@B[@B\B]676A5];7]̂
\[email protected]̀B;A\
A]c5f[8B6B;[email protected]
fA\\A]̀v
9va;[5A]6\
h|}FlIWNMP
4u5;\[email protected]\;[email protected]
A][email protected][[email protected]̂;7]̂
o\B̂;BrrBc6AqB8sv
[email protected]\;[email protected]
@B8Bq7]6;7]̂
c5][email protected]~o6B;65;6dB
7]78s\A\v
[email protected]]cB\;[email protected]
7[[@5[@A76B8s
A][email protected][[email protected]̂;7]̂
cA6B̂;o\A]̀;���
\6s8Bv
wva;[5A]6\
y|}FlIWNMP
4u5;\[email protected]\;[email protected]
o\B̂;7]̂;[@5[[email protected]
A][email protected][[email protected]̂;A]65
6dB;6Bn6v;[email protected]]cB
A\;cA6B̂;o\A]̀;���
\6s8Bv
�va;[5A]6\
x|}FlIWNMP
�6;8B7\6;5]B
@[email protected]]cB;\[email protected];A\
A]c8ôB̂p;~o6;f7s
]56;~B;[@5[[email protected]
A][email protected][[email protected]̂;[email protected]
o\B̂;7]̂<[email protected];A\;]56
@B8Bq7]6;[email protected];6AfB8st
7]̂<[email protected];̂5B\;]56
r5885u;���;\6s8B
[email protected];@[email protected]]cB\;7]̂
cA676A5]\v
>;[5A]6\
ki}FlIWNMP
�5;@B\[email protected];A\
A][email protected][[email protected]̂;[email protected]
@[email protected]]cB;8A\6B̂;A\
]56;cA6B̂;uA6dA]
6Bn6v
9va;[5A]6\
h|}FlIWNMP
_o~fA\\A5];@Br8Bc6\
BrrBc6AqB
[email protected]̀7]A�76A5];7]̂
[email protected];[email protected]]̀t
r5885u\;A]\[email protected]]\
[@5qÂB̂t;o\B\
[email protected]@Bc6;\[email protected]@Bp
@̀[email protected];7]̂
\[B88A]̀t;[@B\B]6B̂
A];7;[@5rB\\A5]78
[email protected];o\A]̀;�[email protected]̂v
wva;[5A]6\
y|}FlIWNMP
_o~fA\\A5];A\
7̂B�o76Bp;A\
\5fBud76
[email protected]̀7]A�B̂p;r5885u\
A]\[email protected]]\
[@5qÂB̂t;c5]67A]\
fA]Af78;̀@[email protected]
7]̂<[email protected];\[B88A]̀
[email protected]@[email protected]\t;A\;A];�[email protected]̂
[email protected]
�va;[5A]6\
x|}FlIWNMP
_o~fA\\A5];A\;]56
uB88;[email protected]̀7]A�B̂p
7]̂<[email protected];̂5B\;]56
r5885u;A]\[email protected]]\
[@5qÂB̂t;7]̂<[email protected]
c5]67A]\;̀@[email protected]
7]̂<[email protected];\[B88A]̀
[email protected]@[email protected]\t;7]̂<[email protected];A\
]56;A];�[email protected]̂v
>;[5A]6\
ki}FlIWNMP
Y5cofB]6;A\
[email protected];[[email protected]
[email protected]];7]̂;̂5B\
]56;c5]qBs;6dB
A][email protected]]v
=a;[5A]6\
g�ig}FlIWNMP
mn[87]76A5]
\5fBud76;A]c8ôB\
@B[@B\B]676A5]p
\[email protected]̀B;7]̂;̂BqAcB\
[email protected];6dB;[email protected];6s[B\
5r;̂767;7]̂;A\
@B876B̂;65;6dB;?7\B
_6ôsv
=>;[5A]6\
�igkFlIWNMP
4u5;[email protected];[email protected]
\[email protected]\��5]B
\[email protected];[email protected];uA6dA]
6dB;�e_�;z=>
[email protected]\B;c5]6B]6;7]̂
5]B;[email protected]]78;�[email protected]
6d7];6dB;[email protected]\B
[email protected]\���[email protected]
A][email protected][[email protected]̂;7]̂
o\B̂;BrrBc6AqB8sv
[email protected]\;o\B̂;[email protected]
@B8Bq7]6;7]̂;6AfB8s
7]̂;c5][email protected]~o6B;65
6dB;7]78s\A\v;
[email protected]]cB\;[email protected]
7[[@5[@A76B8s
A][email protected][[email protected]̂;7]̂
cA6B̂;o\A]̀;���
\6s8Bv
=>;[5A]6\
�igkFlIWNMP
_o~fA\\A5];@Br8Bc6\
BrrBc6AqB
[email protected]̀7]A�76A5];7]̂
\5[dA\6Ac76B̂
[email protected]]̀t;r5885u\
A]\[email protected]]\
[@5qÂB̂t;o\B\
[email protected]@Bc6;\[email protected]@Bp
@̀[email protected];7]̂
\[B88A]̀t;[@B\B]6B̂
A];7;[@5rB\\A5]78
[email protected];o\A]̀;�[email protected]̂v
�������� ����
��
���
��
��
�
�
����
���
����
�����
��
��
�
���
��
����
���������
����� ��
!���#
�
$�\%�
&�
����
�
�
��(���
�)���(
*�� �+��,�
��-�(��-������,�,(����� �.��������,���/����/0��/����
��-��,1� 2�������3�� �2�3� �02�3 2�3��2���� ���
4556789:;<=>;[email protected];B
CDEFGHHGIJKLMMNEOPQ
RSMTOUUKLMMNEOPQ
VW8XYZ
[==6;\=7;=];@̂5;[email protected];B;̂=X5_=>:;8̀ ỲA]X5]@a
bỲ@;8]6;65̀9>Y75;@̂5;9=Xc=]5]@̀;d̂8>6_8>5Z;̀=<@_8>5Z;̀59e>[email protected];65fY95̀Z
][email protected]_=>:;65fY95̀Z;_Y>56g_Y>5h5̀ ;̀65fY95̀Z;Y]@5>][email protected];8]6;[email protected]̀5̀Z;8̀
8cc>=c>[email protected];]55656;<=>;@̂5;[email protected]>;̀Ẁ@5Xd̀i;@=;75;è56;@=;9>[email protected];@̂5
jk;c>Y]@56;[email protected] àll;m;>59=XX5]6;Y65]@Y<WY]A;@̂5;X8:5̀gX=65h̀;8]6
8̀ =̀[email protected];c>Y95̀;̀=;n8>:;98];@8:5;@̂Ỳ;Y]@=;9=]̀Y65>[email protected]=];8]6;8]W
8̀ =̀[email protected];̀5>fY95;<55̀;o;̀=X5;Y65]@Y<Y56
bỲ@;8]6;65̀9>Y75;@̂5;9=Xc=]5]@̀;d̂8>6_8>5Z;̀=<@_8>5Z;̀59e>[email protected];65fY95̀Z
][email protected]_=>:;65fY95̀Z;_Y>56g_Y>5h5̀ ;̀65fY95̀Z;Y]@5>][email protected];8]6;[email protected]̀5̀Z;8̀
8cc>=c>[email protected];n8>:;_Yhh;]556;@=;YXch5X5]@;8;̀X8hh;7èY]5̀ ;̀5]@5>c>Ỳ5
>5̀=e>95;X8]8A5X5]@;dpqri;Y]<=>[email protected]=];̀Ẁ@5X;Y];̂Ỳ;<[email protected];@=;̂5hc;̂YX
X8]8A5;̂Ỳ;7èY]5̀ ;̀5<<[email protected];?=X5;=<;@̂5̀5;_Yhh;75;@̂5;̀8X5;8̀;̀=X5
9=Xc=]5]@̀;hỲ@56;<=>;@̂5;jk;̀Ẁ@5Xa;m;pqr;̀[email protected]=];_Yhh;866>5̀ ;̀@̂5
[email protected]̀5;>5seY>5X5]@;e]65>;@̂Ỳ;̀[email protected]=]
ptch8Y];@̂5;>[email protected]=]̀ Ŷc̀;8X=]A;@̂5;jk;[email protected]>;̀Ẁ@5XZ;@̂5;Y]<=>[email protected]=]
Ẁ̀@5XZ;8]6;@̂5;9=XXe][email protected]=];][email protected]_=>:̀;@̂[email protected];̀ecc=>@;[email protected]̂;@Wc5̀;=<
Ẁ̀@5X ;̀8]6;̂=_;@̂5W;<[email protected];@[email protected]̂5>;@=;c>=fY65;n8>:;8hh;@̂5;uv;[email protected];̂5
]556̀;@=;>e];̂Ỳ;7èY]5̀ à;m;A==6;\=7
[>8ĉY98h;q5c>5̀5]@[email protected]=];d<>=X;c8>@;wi;m;5t95hh5]@;6Y8A>8X
4=>[email protected];m>5seY>5X5]@;[email protected]
455h;<>55;@=;9=]@[email protected];X5;Y<;W=e;̂8f5;8]W;se5̀@Y=]̀a
v̂8]:̀Z
�������� ����
��
���
��
��
�
�
����
���
����
�����
��
��
�
���
��
����
���������
����� ��
!���#
�
$�\%�
&�
����
�
�
��(���
�)���(
*�� �+��,�
��-�(��-������,�,(����� �.��������,���/����/0��/����
��-��,1� 2�������3�� �2�3� �02�3 2�3��2���� ���
456789:
;<5=>[email protected]:
[email protected]<5CD89ABQ<8T5E9U::JVW
[email protected]?6Y=9A[6D\8
AD=58D=6
]̂_̀abcde
fĝhî_ij
abcdèfĝhî_ij keegj̀fĝhî_ij lemcǹfĝhî_ij
oemm̀lemcn
fĝhî_ij
p_qge_qch̀frc_e
ABYTBQ8Q5E9OBD
Is9tD=Q5=Q7
4?E58Y
JV9u9:K
ABYTBQ8Q5E9OBD
vwt9FQOBDY65=BQ
4?E58Y
JV9u9:K
SBP95x8
4?E58YE9yBD\
zB785x8D
J{9u9:K
:K9TB=Q5E
|}~��̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9Is9TD=Q5=Q7
E?E58Y9=Q<[CR8E96[[
6TTDBTD=658
x6DRP6D8�9EBO5P6D8�
E8<CD=5?9R8>=<8E�
Q85PBD\9R8>=<8E�
P=D8RuP=D8[8EE
R8>=<8E�9=Q58DQ85�
6QR9R656�6E8E96QR
R8YBQE5D658E
EBTx=E5=<658R9[8>8[
BO96Q6[?E=E96QR
<D=5=<6[95x=Q\=Q7�
J{9TB=Q5E
|�~|�̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9Is9TD=Q5=Q7
E?E58Y9=Q<[CR8E
YBE59BO95x8
Q8<8EE6D?
x6DRP6D8�9EBO5P6D8�
E8<CD=5?9R8>=<8E�
Q85PBD\9R8>=<8E�
P=D8RuP=D8[8EE
R8>=<8E�9=Q58DQ85�
6QR9R656�6E8E�96QR
R8YBQE5D658E
6Q6[?E=E96QR9<D=5=<6[
5x=Q\=Q7�
JI9TB=Q5E
|�~|�̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9Is9TD=Q5=Q7
E?E58Y9=E
=Q<BYT[8589BD9QB5
D8[658R95B9A6E8
45CR?
K9TB=Q5E
�~||̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD95x89Is9TD=Q5=Q7
E?E58Y9=E9QB5
=Q<[CR8R�9BD9=E9>8D?
=Q<BYT[8589BD
=Q<BDD8<5�99
:K9TB=Q5E
|}~��̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9vwt9=QOBDY65=BQ
E?E58Y9=Q<[CR8E96[[
6TTDBTD=658
x6DRP6D8�9EBO5P6D8�
E8<CD=5?9R8>=<8E�
Q85PBD\9R8>=<8E�
P=D8RuP=D8[8EE
R8>=<8E�9=Q58DQ85�
6QR9R656�6E8E96QR
R8YBQE5D658E
EBTx=E5=<658R9[8>8[
BO96Q6[?E=E96QR
<D=5=<6[95x=Q\=Q7�9
J{9TB=Q5E
|�~|�̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9vwt9=QOBDY65=BQ
E?E58Y9=Q<[CR8E
YBE59BO95x8
Q8<8EE6D?
x6DRP6D8�9EBO5P6D8�
E8<CD=5?9R8>=<8E�
Q85PBD\9R8>=<8E�
P=D8RuP=D8[8EE
R8>=<8E�9=Q58DQ85�
6QR9R656�6E8E�96QR
R8YBQE5D658E
6Q6[?E=E96QR9<D=5=<6[
5x=Q\=Q7�9
JI9TB=Q5E
|�~|�̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9vwt9=QOBDY65=BQ
E?E58Y9=E
=Q<BYT[8589BD9QB5
D8[658R95B9A6E8
45CR?�99
K9TB=Q5E
�~||̀�cqhgj
�=E59BO9<BYTBQ8Q5E
5x89vwt
=QOBDY65=BQ9E?E58Y
=E9QB59=Q<[CR8R�9BD
=E9>8D?9=Q<BYT[858
BD9=Q<BDD8<5�
:K9TB=Q5E
|}~��̀�cqhgj
v�T[6Q65=BQ9BO9xBP
5x89Is9E?E58Y�95x8
=QOBDY65=BQ9E?E58Y
6QR95x8
<BYYCQ=<65=BQ
E?E58Y9PBD\
5B785x8D
R8YBQE5D658E
EBTx=E5=<658R9[8>8[
BO96Q6[?E=E96QR
<D=5=<6[95x=Q\=Q7�
JV9TB=Q5E
|�~|�̀�cqhgj
v�T[6Q65=BQ9BO9xBP
5x89Is9E?E58Y�95x8
=QOBDY65=BQ9E?E58Y
6QR95x8
<BYYCQ=<65=BQ
E?E58Y9PBD\
5B785x8D
R8YBQE5D658E
6R8�C6589[8>8[9BO
6Q6[?E=E96QR9<D=5=<6[
5x=Q\=Q7�
JI9TB=Q5E
|�~|�̀�cqhgj
v�T[6Q65=BQ9BO9xBP
5x89Is9E?E58Y�95x8
=QOBDY65=BQ9E?E58Y
6QR95x8
<BYYCQ=<65=BQ
E?E58Y9PBD\
5B785x8D9=E
=Q<BYT[8589BD9QB5
D8[658R95B95x89A6E8
45CR?�
K9TB=Q5E
�~||̀�cqhgj
v�T[6Q65=BQ9BO9xBP
5x89Is9E?E58Y�95x8
=QOBDY65=BQ9E?E58Y
6QR95x8
<BYYCQ=<65=BQ
E?E58Y9PBD\
5B785x8D9=E
=Q<BDD8<5�
=Q6R8�C6589BD
Y=EE=Q7�
JV9TB=Q5E
|�~|�̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9Is9TD=Q5=Q7
E?E58Y9=Q<[CR=Q7
x6DRP6D8�
EBO5P6D8�9E8<CD=5?
R8>=<8E�9Q85PBD\
R8>=<8E�
P=D8RuP=D8[8EE
R8>=<8E�9=Q58DQ85�
6QR9R656�6E8E9=E
TDB>=R8R96QR
R8YBQE5D658E
6R8�C6589[8>8[9BO
6Q6[?E=E96QR9<D=5=<6[
5x=Q\=Q7�
JV9TB=Q5E
|�~|�̀�cqhgj
�=E59BO9<BYTBQ8Q5E
OBD9vwt
=QOBDY65=BQ9E?E58Y
=Q<[CR=Q79x6DRP6D8�
EBO5P6D8�9E8<CD=5?
R8>=<8E�9Q85PBD\
R8>=<8E�
P=D8RuP=D8[8EE
R8>=<8E�9=Q58DQ85�
6QR9R656�6E8E9=E
TDB>=R8R96QR
R8YBQE5D658E
6R8�C6589[8>8[9BO
6Q6[?E=E96QR9<D=5=<6[
5x=Q\=Q7�
J{9TB=Q5E
|�~|�̀�cqhgj
v�T[6Q65=BQ9BO9xBP
5x89Is9E?E58Y�95x8
=QOBDY65=BQ9E?E58Y
6QR95x8
<BYYCQ=<65=BQ
E?E58Y9PBD\
5B785x8D
R8YBQE5D658E
6Q6[?E=E96QR9<D=5=<6[
5x=Q\=Q7�
�������� ����
��
���
��
��
�
�
����
���
����
�����
��
��
�
���
��
����
���������
����� ��
!���#
�
$�\%�
&�
����
�
�
��(���
�)���(
*�� �+��,�
��-�(��-������,�,(����� �.��������,���/����/0��/����
��-��,1� 2�������3�� �2�3� �02�3 2�3��2���� ���
45678 9:;<;=>>
[email protected]
IJK6LJK7
[email protected]
FPCQRCBRS
[email protected] TAAPSEFPCQRCBRS UADHVEFPCQRCBRS
WADDEUADHV
FPCQRCBRS
XBYPABYHQEFGHBA
ZJ7[\K]78
L̂[JL_L̀676K5̀
a>;<;a>
b5Jc76 =>;<;=>
de;[5K̀6_
fghfiEjHYQPS
4\L;kJ7[\K]78
lK7kJ7cm_n;K_;]8L7Jo
85kK]78o;87pL8Llo;7̀l
7[[J5[JK76L;65;6\L
I7_L;q6rls;7̀l
K̀]8rlL_
tu[87̀76K5̀
K̀]8rlL_;6\L
]5c[5̀L̀6_;8K_6Ll
K̀;v7J6;=o;7̀l
lLc5̀_6J76L_;7
]8L7J;r̀lLJ_67̀lK̀k
5w;6\L;]5rJ_L
]5̀]L[6_x
da;[5K̀6_
fyhfzEjHYQPS
4\L;kJ7[\K]78
lK7kJ7cm_n;K_
87pL8Ll;7̀l;K_
7[[J5[JK76L;65;6\L
I7_L;q6rls;7̀l
K̀]8rlL_;c5_6;5w
6\L;]5c[5̀L̀6_
8K_6Ll;K̀;v7J6;=x
d>;[5K̀6_
y{hf|EjHYQPS
4\L;kJ7[\K]78
lK7kJ7cm_n;c7s;pL
87]}K̀k;K̀
]5c[8L6L̀L__
7̀l<5J;]87JK6s
7̀l<5J;85kK]~;c7s
5̀6;pL;87pL8Ll;5J
7[[J5[JK76L;65;6\L
I7_L;q6rls;7̀l
c7s;̀56;K̀]8rlL;6\L
]5c[5̀L̀6_;8K_6Ll
K̀;v7J6;=x
>;[5K̀6_
|hy�EjHYQPS
�5;kJ7[\K]78
lK7kJ7c;K_;K̀]8rlLlo
5J;cK̀Kc78;Lww5J6
lLc5̀_6J76Llx
9x�;[5K̀6_
{��EjHYQPS
qrpcK__K5̀;JLw8L]6_
LwwL]6K�L
5Jk7̀K�76K5̀;7̀l
]8L7J;�JK6K̀k~
w5885�_;K̀_6Jr]6K5̀_
[J5�KlLl~;r_L_
]5JJL]6;_6Jr]6rJLo
kJ7cc7Jo;7̀l
_[L88K̀k~;[JL_L̀6Ll
K̀;7;[J5wL__K5̀78
w5Jc76;r_K̀k;�5Jlx
:x�;[5K̀6_
���EjHYQPS
qrpcK__K5̀;K_
7lL�r76Lo;K_
_5cL�\76
5Jk7̀K�Llo;w5885�_
K̀_6Jr]6K5̀_
[J5�KlLl~;]5̀67K̀_
cK̀Kc78;kJ7cc7J
7̀l<5J;_[L88K̀k
LJJ5J_~;K_;K̀;�5Jl
w5Jc76x
ex�;[5K̀6_
i��EjHYQPS
qrpcK__K5̀;K_;̀56
�L88;5Jk7̀K�Llo
7̀l<5J;l5L_;̀56
w5885�;K̀_6Jr]6K5̀_
[J5�KlLl~;7̀l<5J
]5̀67K̀_;kJ7cc7J
7̀l<5J;_[L88K̀k
LJJ5J_~;7̀l<5J;K_
5̀6;K̀;�5Jlx
>;[5K̀6_
|h�EjHYQPS
�5]rcL̀6;K_
Lu6JLcL8s;[55J8s
�JK66L̀;7̀l;l5L_
5̀6;]5̀�Ls;6\L
K̀w5Jc76K5̀x
[email protected]
�>;[5K̀6_;cK̀Kcrc;
[email protected]
9>;[5K̀6_;cK̀Kcrc;
TAAPSEFPCQRCBRS
:>;[5K̀6_;cK̀Kcrc;
UADHVEFPCQRCBRS
e>;[5K̀6_;cK̀Kcrc;
WADDEUADHVEFPCQRCBRS
>;[5K̀6_;cK̀Kcrc;
a>;[5K̀6_
f�hz|EjHYQPS
4\L;kJ7[\K]78
lK7kJ7cm_n;K_
]5c[8L6Lo;]8L7Jo
85kK]78o;87pL8Ll;7̀l
7[[J5[JK76L;65;6\L
I7_L;q6rlso
K̀]8rlL_;6\L
]5c[5̀L̀6_;8K_6Ll
K̀;v7J6;=o;7̀l
lLc5̀_6J76L_
_5[\K_6K]76Ll
7̀78s_K_;7̀l;]JK6K]78
6\K̀}K̀kx
=>;[5K̀6_
�hy|EjHYQPS
qrpcK__K5̀;JLw8L]6_
LwwL]6K�L
5Jk7̀K�76K5̀;7̀l
_5[\K_6K]76Ll
�JK6K̀k~;w5885�_
K̀_6Jr]6K5̀_
[J5�KlLl~;r_L_
]5JJL]6;_6Jr]6rJLo
kJ7cc7Jo;7̀l
_[L88K̀k~;[JL_L̀6Ll
K̀;7;[J5wL__K5̀78
w5Jc76;r_K̀k;�5Jlx
Feedback for Stage 2 - IFSM 3102
Feedback for Stage 2 - IFSM 310
1
3D Printing – Stage 1 Assignment
Kyami Clarke
IFSM 310 6980 Software and Hardware Infrastructure Concepts
University of Maryland Global Campus
Timothy Robinson
Summer 2021
2
3D Printing – Stage 1 Assignment
1. Background
Six years ago, Mark Peterson unknowingly took a hobby and began his journey into the
3D printing business. It all started with a purchase of a 3D printer for $500 and creating an
umbrella holder. A seedling of an idea germinated and subsequently grew to a whole business.
As the company began to produce a steady profit, Mark realized it was time to expand to
incorporate more employees, space, and equipment (i.e., software, hardware, applications). Due
to the increased business, he must monitor and facilitate operations (3D Printing Case Study,
n.d.).
The new infrastructure will revolve around Marks 3D printing firm and building upon his
current setup. One 3D heavy-duty printer, two 3D wireless printing machines, one PC, and
Verizon FIOS with modem and wireless router. Mark will grow his firm and provide an
additional seven 3D printers. Together with his two present part-time staff, Mark will hire five
additional full-time staff. The company needs a 3D scanner and a document scanner. For Marks
training videos and 3D designs, and production data, cloud storage will be introduced together
with local storage. To keep track of orders, an ERP system is implemented. More systems will be
installed, and the access of all printers must be flexible. All staff must have mobile admittance to
the ERP and all 3D printers and enterprise files (3D Printing Case Study, n.d.).
The business expansion plan must include a stable infrastructure that meets his
requirements. The project needs to ensure that processes, procedures, and tools are necessary,
efficient, and the overhead for these expenses does not overshadow the profit. Marks new IT
infrastructure should provide his organization with a way to manage his workforce and
operations locally and remotely. One of the critical elements is simplicity and consistency. This
3
will lead to consistency in your employee training and your product delivery. As a result, your
customer satisfaction will increase and provide cost savings as the business grows.
2. Current IT Infrastructure
Mark Peterson’s current IT infrastructure includes the following:
• Social Media
• One Wireless Heavy-Duty Printer
• Two Wireless 3D Printers
• Personal Computer
• Verizon FiOS Internet
• Verizon FiOS Modem with Built-in Wireless Router
• Google Gmail Account
• Microsoft Excel
• 3D Printing Design Software
3. Requirements
At some point, every successful small company beginning will have to deal with the
challenge of dealing with business expansion or growth. When a firm is growing, it is entering a
new phase of its existence ripe with both possibilities and risks. While business expansion
frequently results in a rise in financial fortunes for both owners and employees, on the other
hand, business development is not always accompanied by an increase in economic means
(Sadrzadehrafiei, Gholamzadeh Chofreh, Karimi Hosseini, & Sulaiman, 2013).
Implementing a sustainable and forward-thinking plan for scaling IT during a growth
phase may reduce stress in other departments while also saving the business money in the long
term. However, it is not easy to set aside time to deliberately prepare for the future of your
4
information technology systems when there are so many other variables that require your
attention right now.
The following five IT infrastructure requirements have been identified to support Mark’s plans to
expand his business:
1. Small Business Enterprise Resource Management (ERP)
2. Local Network Server Storage
3. Mobile Access - remote access to ERP, printers, and software (i.e., VPN)
4. Cloud Storage
5. Additional Equipment - Seven 3D Printers and One Multifunction Printer.
4. How are Requirements Met
Now that the necessary requirements have been identified, it is critical to establish how
Mark will implement these requirements. The essential requirement is the ERP, which will
address customer orders, payroll, invoicing, financial reporting, and data tracking. Mark will
need the correct network server to assist with the utilization of his ERP. As part of his expansion
plan, he will need the following items to meet the five requirements mentioned above.
• ERP Software –
o Oracle + NetSuite is a cost-effective and effective software solution for his
organization (Sadrzadehrafiei, Gholamzadeh Chofreh, Karimi Hosseini, &
Sulaiman, 2013). It provides business operation assistance and cloud-
based options, which would address three requirements simultaneously. It
is important not to overwhelm with too many varying software or
applications, leading to confusion and user error. It essential to keep the
process clean, efficient, and straightforward.
5
• Wireless Access Point (WAP) –
o Setting up a WAP network will ensure Mark and his team have wireless
access to his local network (LAN – Local Area Network). This means that
the IT infrastructure is interconnected locally and remotely and provides
Marks mobility and flexibility to operate wherever needed. This is
especially important when an organization has multiple locations that need
to be connected or your customer service team is separate from your
manufacturing department.
• Multifunctional Printer (MFP) -
o The MFP will address scanning, faxing, and printing requirements.
However, the MFP needs to have remote access capabilities. Most MFPs
can be connected to the network server and can be used offsite if required.
Using an MFP will provide cost savings since you do not need to buy
separate scanners and printers since it will be all-in-one.
• Computer/Tablet -
o Employees who need to access ERP and 3D printing files and 3D printers
located across the facility would benefit from using Windows Surface
tablets and laptops. Mark had the option of selecting either the Surface 3
or the Surface Pro 4. According to Mark, these gadgets will allow
personnel to access relevant documentation and assist clients while
remaining mobile (Weill, Subramani, & Broadbent, 2002).
• Cloud Storage -
6
o Marks 3D production files and business management information can be
saved locally on his existing PC, and he also has the option of adding an
external hard drive. It is recommended that in addition to storing backups
locally and on an external drive, Mark also keeps backups on the Cloud.
Microsoft Cloud storage is available for purchase by Mark. As a Cloud
storage solution, Microsoft OneDrive may be used, and any work done on
Surfaces can be stored to OneDrive and retrieved from there (OneDrive
QuickStart guide for small businesses, 2021).
5. Data Representation and Storage
The other component of his expansion is data and storage. This is a critical component
because the IT infrastructure must support and house multiple types of data. In addition, all the
equipment and software must be able to speak to each other. The following three data types
necessitate specific storage and computer requirements due to their varying formats and data
size.
a) Digital and Numerical Data - ERP
i. Binary coding is used to enter digital and numerical information into
computers. Binary code is a system of 1s and 0s that are used in computer
programming. Each of the numbers 1 or 0 represents a bit, and bits are the
smallest unit of data that a binary computer can understand (Severance, 2015).
The computers interpretation of data is represented as digital data
representation. Instead of the letters or sentences that the computer user sees,
the computer understands the used coding systems. Consequently, Mark will
7
be able to see the letters he is saving, while the data stored on the computer is
binary code.
b) Audio Data – PC, Tablet, Cloud
i. Audio data is comprehended in segments, not in its entirety. With the use of
an input device such as a microphone, audio data can be recorded. Samples
are used in audio data. Examples are taken from the recording hundreds of
times per second, and when they are played back in the same sequence that
they were recorded, they will produce the original audio file captured. Files
are frequently compressed into formats such as MP3 to take up less space on a
computers hard drive. This also makes songs easy to download or transfer and
save on an MP3 player or other portable media player (Introduction to
Computer Information Systems, 2016).
c) Video and Graphics Data – PC, Tablet, Cloud
i. Frames are used to record video data throughout the recording process. Video
is created by playing a series of frames, which are still shot several times each
second and then played back in succession. Video data contains a great deal of
information, and the files can be compressed to save storage space. It is
possible to store full-length movies, including thousands of frames on optical
discs, after being compressed using this method (Weill, Subramani, &
Broadbent, 2002).
ii. Graphics are multimedia data; these forms of data are images, and they can be
kept in the form of a bitmap image file, which is a bitmap image file is a
bitmap image file. A bitmap image is made up of pixels or a picture element
8
organized in a grid-like arrangement on a computer screen (Introduction to
Computer Information Systems, 2016). Color and intensity are represented by
specific groups of numbers in each pixel, and each pixel is made up of a
particular group of integers. Pixels are critical in determining the overall
quality of an image. An image with a large number of pixels will almost
certainly be of higher quality.
9
References
3D Printing Case Study. (n.d.). Retrieved June 20, 2021, from University of Maryland Global
Campus: https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View
Introduction to Computer Information Systems. (2016). Wikibooks. Retrieved June 28, 2021,
from https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View
OneDrive QuickStart guide for small businesses. (2021, April 22). Retrieved June 29, 2021, from
Microsoft: https://docs.microsoft.com/en-us/onedrive/one-drive-quickstart-small-business
Sadrzadehrafiei, S., Gholamzadeh Chofreh, A., Karimi Hosseini, N., & Sulaiman, R. (2013). The
Benefits of Enterprise Resource Planning (ERP) System Implementation in Dry Food
Packaging Industry. Procedia Technology, 11, 220-226.
doi:https://doi.org/10.1016/j.protcy.2013.12.184
Severance, C. (2015). Introduction to Networking. (S. Blumenberg, Ed.) CreateSpace. Retrieved
June 28, 2021, from http://creativecommons.org/licenses/by-nc/4.0
Weill, P., Subramani, M., & Broadbent, M. (2002, October 15). Building IT Infrastructure for
Strategic Agility. Retrieved June 29, 2021, from MIT Sloan Management Review:
https://sloanreview.mit.edu/article/building-it-infrastructure-for-strategic-agility/
1
3D Printing – Stage 2 Assignment
Kyami Clarke
IFSM 310 6980 Software and Hardware Infrastructure Concepts
University of Maryland Global Campus
Timothy Robinson
Summer 2021
2
3D Printing – Stage 2 Assignment
Background
Mark has analyzed the Phase 1 suggestions and details and has requested that you tell him
what elements he will require to support his Expansion Plan. Mark would like to
concentrate on substituting his worksheet of customer demands with a small-scale business
ERP information management in his warehouse to assist him in maintaining his business
successfully.
Components for 3D Printing System
Software is divided into two parts: Design and Printer integration.
Designing tools
1. Ultimate Cura software creates your model for 3d printers and includes a plug for laptop
design tools.
2. Blender is a well-known computer-aided design program (CAD). Although this powerful
design software is not suitable for beginners, it is easier to use by the availability of
community support and a free software framework.
Hardware Components
1. Various heavy-duty multi-output abilities 3D printers that include metal, carbon,
and nylon. Exone Corporation specializes in custom-built industrial and mid-build
3D printing.
2. Marks 3D printing layouts and documents are stored on a Lenovo ThinkServer
TS140 server with a monitor.
3. The MS Surface Pro 6 tablet gives the development team more flexibility by
allowing them to move about the office.
4. The Verizon Fios Quantum Gateway, with speeds of 300/300 Mbps, is the all
modems and routers that enable wireless mobile internet access.
5. The Linksys Velop Intelligent Mesh WiFi System (3) will increase the range of
the wireless signals.
6. Wireless serial number scanner used to deliver inventory data to tracking
software.
Components for ERP Infrastructure
Local business enterprise resource management (ERP) management software will include
mostly these features, such as accounting, sales, and payment processing.
1. Dynamics 365 Business Core Elements is a simple-to-use and modify all-in-one
business administration tool. Velosio, a global network partner, will handle the
setup, installation, and maintenance.
2. Microsoft Windows 10, the basic OS on which the Microsoft Surface Pro’s will
be loaded.
3. Microsoft Office 365 is a set of word processors and presentation software that
the operational and administrative teams will use.
3
4. Bitdefender Antivirus Plus is a premium antivirus program that is reliable,
affordable and includes privacy features.
5. Users will have the option of paying with PayPal or using a credit/debit card
through PaySafe via Bitdefender.
Hardware components will be the same as used for the 3D production process above:
1. All of Marks 3D printing layouts and documents are stored on a Lenovo ThinkServer
TS140 server with the monitor.
2. The MS Surface Pro 6 tablet gives the development team more flexibility by allowing
them to move about the office.
3. Xerox C505 for Multifunctional printer with mobile printing functionalities.
Overall System Working
Mark began 3D printing as a pastime. Hes discovered his calling and plans to expand his 3D
printing ability. To do so, hell need to be familiar with the commercial side of 3D printing.
Hes into a good start by paying for new heavy-duty printers that acquire their files and folders
from WiFi tablets. As Mark invests in mesh WiFi technology, backboned by Verizon Fios
optical fiber service, these tablets allow Marks production staff to work from wherever in the
warehouses. The tablets are bundled with advanced CAD software to aid artists in creating
new layouts or modifications to existing customers designs.
Mark must also keep track of the materials he is using or what is remaining in his stock.
Marks online business includes implementing inventory software using Microsoft Dynamics
365 Business Core Basics and wirelessly hand-held scanners.
As a result, its critical that both the 3D printing and administrative processes operate in
tandem; otherwise Marks aspirations for a profitable business will remain only that hope and
nothing more.
4
Graphical Representation of Hardware Components
5
Graphical Representation of Software Components
6
References
3D Printing Case Study. (n.d.). Retrieved June 20, 2021, from University of Maryland Global
Campus: https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View
Everythings faster with the new Fios Router. Verizon. (n.d.). https://fios.verizon.com/fios-
routers.html
Introduction to Computer Information Systems. (2016). Wikibooks. Retrieved June 28, 2021,
from https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View
Institute, B. (n.d.). Blender for 3D Printing. Blender Cloud. https://cloud.blender.org/p/3d-
printing
Tims, Morelia, John, Hitemharder, Better, E., Rlmarti, Jocamel, & All, I. T. T. (2017, January
11). Linksys Velop Intelligent Mesh WiFi System, Tri-Band, 3-Pack White (AC6600).
Linksys. https://www.linksys.com/us/p/P-WHW0303/
Surface Pro 7 – Ultra-light and versatile – Microsoft Surface. Microsoft Store. (n.d.).
https://www.microsoft.com/en-us/p/surfacepro-
6/8zcnc665slq5?activetab=pivot\%3Aoverviewtab
Ultimaker Cura: Powerful, easy-to-use 3D printing software. ultimaker.com. (n.d.).
https://ultimaker.com/en/products/ultimaker-cura-software
https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View
https://fios.verizon.com/fios-routers.html
https://fios.verizon.com/fios-routers.html
https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View
https://cloud.blender.org/p/3d-printing
https://cloud.blender.org/p/3d-printing
https://www.linksys.com/us/p/P-WHW0303/
https://www.microsoft.com/en-us/p/surfacepro-6/8zcnc665slq5?activetab=pivot\%3Aoverviewtab
https://www.microsoft.com/en-us/p/surfacepro-6/8zcnc665slq5?activetab=pivot\%3Aoverviewtab
https://ultimaker.com/en/products/ultimaker-cura-software
1
3D Printing – Stage 3 Assignment
Kyami Clarke
IFSM 310 6980 Software and Hardware Infrastructure Concepts
University of Maryland Global Campus
Timothy Robinson
Summer 2021
2
3D Printing – Stage 3 Assignment
Introduction
Mark 3Ds business is booming, and his father wants to add two more facilities to the existing
infrastructure. Mark has previously acquired and integrated some servers in his already founded
business and maintained them. To complete these business requirements, he relies on high-speed
internet services. He wants the new two locations to have the same number of employees and 3D
printers as his current headquarters. The new facilities also require actual coordination with the
3D printing services ERP system. The components implementation of these new facilities is
listed on this page, and the significant changes to the leading 3D printing business create the new
interconnection to the current ERP system and the difference in the primary two offices
infrastructure.
New Integration Components
These components are divided into two categories: main office components and new branch
office elements. The elements in each location and the central office site required for this new,
improved infrastructure are shown in the table below.
Changes to Existing Infrastructure
Establishing a corporate VPN network with distributed networks and applications is the most
significant change. The following are the significant modifications to the existing IT
infrastructure:
3
• They implement an intranet that connects all of the locations to the main office, with the
main office serving as the intranets central management. The businesss primary intranet
connectivity over the Internet is over the VPN public internet. The VPN was created to
allow for quick network communication between the facilities and the main office. The
VPN also allows users to take advantage of the internet infrastructure without incurring
additional costs when connecting workplaces over vast distances.
• The web server is located in the main office, and it is running Windows Server Standard
2014 R2 with group policies installed. This functionality ensures that all apps are
installed in one location and deployed across the network as virtualized application
environments. The group policies provided by Windows Server Standard 2014 R2 allow
a single program to be installed on a workstation clusters virtual machines. This allows
all users to access the expensive programs simultaneously, without any slowdowns.
• The proxy server and web server are located at Marks main office; the proxy server is
responsible for monitoring all system resources and assigning the firm IP address to
network devices. A device with proper authentication can access the intranet and access
any network resource through the proxy server. This serves as both user control and an
efficient key manager for the company.
Difference between New and Existing Infrastructure
The management and allocation of resources among the branch offices is critical in the settings
due to the new infrastructure. The following are the main differences:
• The intranet is managed centrally, with a server room housing the Web server, proxy
server, database server, and printing server. This equipment is only found in the main
office and not in any of the other locations. The other facilities link to the main office in
order to gain access to the apps and hardware specified in the table above.
• VLANs are used to connect the sectors and the new facilities. This is to make use of the
expensive networking hardware and resources that have already been set up. This ensures
that all connections are secure, quick, and consistent to meet the demand for dependable,
fast network access. Additional facilities may download 3D files from the database and
file servers at the main offices. To be assigned to a specific VLAN, a device must be
assigned to a particular department.
• The key distinction between the central office facility and the other storage facilities is
that the central office facility reduces data redundancy and speeds up the rendering of 3D
files. The applications in the new facilities connect the applications in the main office, but
it looks that the job is done on the device on their workstations, with the saved data in the
Components / Location Marks Main Office New
Cisco 2900 series Gateway router
DSL
First
Second
ISP
Proxy
Web
Database
4
central office database. This minimizes the networks data redundancy (Koch, 2006). This
resource distribution aims to make the most of the limited hardware resources available
in order to increase the production speed of the new facilities.
• The workstations also vary in that they are simply virtual remote links to the primary
office assets; they have restricted performance, but they do have access to the primary
office servers resource base and superior quality hardware. Furthermore, no software is
installed on the workstation clusters; instead, all applications are run as single instances
on the central office database server
Proposed Connection Plan for the New Facilities Expansion
Location-Based Connection Setup
5
References
3D Printing Case Study. (n.d.). Retrieved June 20, 2021, from University of Maryland Global
Campus: https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View
Clarke, G. E. (2014). 1,001 CCNA Routing and Switching Practice Questions for Dummies. For
Dummies. Retrieved July 26, 2021, from
https://www.dummies.com/programming/certification/1001-ccna-routing-and-switching-
practice-questions-for-dummies-cheat-sheet/
Coulouris, G., Dollimore, J., Kindberg, T., & Blair, G. (2012). Distributed Systems: Concepts
and Design, 5th edition. Pearson. doi:9780132143011
Introduction to Computer Information Systems. (2016). Wikibooks. Retrieved June 28, 2021,
from https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View
Koch, N., Zhang, G., & Escalona, M. (2006). Model transformations from requirements to Web
system design. ICWE06: The Sixth International Conference on Web Engineering (pp.
281-288). ResearchGate. doi:10.1145/1145581.1145637
Kopetz, H. (2011). Real-Time Systems: Design Principles for Distributed Embedded
Applications (2nd ed.). Boston, MA: Springer. DOI: https://doi.org/10.1007/978-1-4419-
8237-7
Stojanović, D., Predić, B., Antolović, I., & Đorđević-Kajan, S. (2009). Web information system
for transport telematics and fleet management. 2009 9th International Conference on
Telecommunication in Modern Satellite, Cable, and Broadcasting Services (pp. 314-317).
IEEE. doi:10.1109/TELSKS.2009.5339516
https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View
https://www.dummies.com/programming/certification/1001-ccna-routing-and-switching-practice-questions-for-dummies-cheat-sheet/
https://www.dummies.com/programming/certification/1001-ccna-routing-and-switching-practice-questions-for-dummies-cheat-sheet/
https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View
https://doi.org/10.1007/978-1-4419-8237-7
https://doi.org/10.1007/978-1-4419-8237-7
Clarke_Kyami_Stage_1
3D Printing – Stage 1 Assignment
3D Printing – Stage 1 Assignment
1. Background
2. Current IT Infrastructure
3. Requirements
4. How are Requirements Met
5. Data Representation and Storage
References
Clarke_Kyami_Stage_2
3D Printing – Stage 2 Assignment
3D Printing – Stage 2 Assignment
Background
Designing tools
Hardware Components
Clarke_Kyami_Stage_3
3D Printing – Stage 3 Assignment
3D Printing – Stage 3 Assignment
Introduction
The management and allocation of resources among the branch offices is critical in the settings due to the new infrastructure. The following are the main differences:
Chapter 10
Wrap Up
It has been said that building the Internet solved the world’s most
complex engineering problem to date. The design and engineer-
ing of the Internet started well over 50 years ago. It has been
continuously improving and evolving over the past 50 years and
will continue to evolve in the future.
The Internet now connects billions of computers using many thou-
sands of routers and link-level connections. The Internet is so
complex that it is never fully operational, The Internet is less
about being “perfect” and more about adapting to problems, out-
ages, errors, lost data, and many other unforeseen problems. The
Internet is designed to be flexible and adapt to whatever prob-
lems are encountered.
!#$\%&(
)&&*+,#(+$
-$(.$.(/0
1+$0
Figure 10.1: The Four-Layer Model
In order to build an overall solution that works at scale, it was
109
110 CHAPTER 10. WRAP UP
important to break the Internet engineering problems down into
four distinct layers:
• The Link/Physical layer includes all of the complex engineer-
ing required to move data across a single “hop”, whether the
hop is a wireless WiFi, wired Ethernet, fiber optic, or satellite
connection.
• The Internetwork Protocol (IP) layer is how data is routed
across a series of hops to get quickly and efficiently from one
of a billion source computers to any of a billion destination
computers. The IP layer dynamically adjusts and reroutes
data based on network load, link performance, or network
outages. While the IP layer is highly reliable and fast, at
times it loses or even throws away data. The IP layer is not
responsible for insuring the overall reliability of the network.
It just moves the data the best that it can.
• The Transport layer compensates for any imperfections in
the IP or Link layers. The Transport layer makes sure that
any lost packets are retransmitted and packets that arrive
out of order are put back into order before being passed on
to the receiving application. The Transport layer also acts as
flow control between the sending and receiving applications
to make sure that data is moved quickly when the network is
fast and the links are not overloaded, and to slow the trans-
fer of data when using slower or heavily loaded links. The
data flow and rate limitation in the Transport layer allow the
Internet to continue to function smoothly even when it is
heavily loaded.
• The other three layers make the use of the network very
simple for the Application Layer. An application can make a
network connection and send/receive data on that connec-
tion with just a few lines of code. By making the use of the
network simple, applications can focus on solving the end-
user problems they need to solve. Because it is so easy for
applications to use the network in new and different ways,
we have seen the emergence of a wide range of highly inno-
vative applications that work without any changes required
to the Internet protocols.
Without breaking the problem of engineering and building the In-
ternet into these four distinct layers, it would be far more difficult
to build and deploy ever-improving versions of the network. And
111
if every single application needed to be fully aware of all of the
complex details required to use the Internet, it would greatly limit
the richness and diversity of the networked applications that we
have today.
It is amazing to realize what has been accomplished in building
the Internet over the past 50 years. But in a way, we have only
just begun the engineering journey of building networked appli-
cations. It does not take much to imagine an Internet where ev-
ery light switch, lightbulb, refrigerator, table, automobile, road-
way, flying drone, and chair has an Internet address and they all
want to communicate with one another. New engineering issues
will have to be solved, and perhaps even the four-layer network
model will need to evolve to meet these new engineering chal-
lenges.
But just like brilliant engineers designed and evolved network pro-
tocols to move from hundreds of network-connected computers
to billions of network-connected computers, our present and fu-
ture engineers will certainly solve the problems and challenges
we will face as the network evolves to connect trillions of comput-
ers.
Chapter 9
The OSI Model
So far we have spent all of our time describing the four-layer
model used to design and implement the TCP/IP protocols and ap-
plications that make up the Internet. However, the TCP/IP model
is not the only model we can use to help us understand how net-
works work. The other model commonly used to make sense of
network design is called the Open System Interconnection (OSI)
model. While the TCP/IP model was designed and evolved as the
TCP/IP protocols were developed, deployed, and changed, the OSI
model was the result of a careful design process by many net-
working experts who worked to develop a general approach to
network models.
In today’s networked world, the OSI model and the TCP/IP model
serve two different purposes.1 The TCP/IP model is an implemen-
tation model, in that it provides the guidance for those who would
build TCP/IP-compatible network hardware or software. The OSI
model is more of an abstract model that can be used to under-
stand a wide range of network architectures.
While TCP/IP is the most widely used network technology today,
many different types of networks have been implemented and de-
ployed over the past 50 years. And as we continue to improve and
evolve networking, new implementation models may emerge.
The OSI model has seven layers instead of the four layers of the
TCP/IP model. Starting at the bottom (nearest the physical con-
nections) of the OSI model, the layers are: (1) Physical, (2) Data
Link, (3) Network, (4) Transport, (5) Session, (6) Presentation, and
1This, of course, is an oversimplification. Prior to 1990, there were opera-
tional network implementations based on ISO specifications that followed the
OSI network model very closely. But today, those ISO/OSI network implementa-
tions no longer are in broad use.
101
102 CHAPTER 9. THE OSI MODEL
(7) Application. We will look at each layer in the OSI model in turn,
starting with the Physical layer.
9.1 Physical (Layer 1)
The OSI Physical layer deals with the physical attributes of the
actual wired, wireless, fiber optic, or other connection that is used
to transport data across a single link. The Physical layer also
defines the shapes of the connectors and type of media which can
be used. Another problem solved at this layer is how to encode
the bits (0’s and 1’s) that make up the data being sent across the
medium.2 The “bit encoding” (or modulation) determines how
fast data can be sent across the link.
9.2 Data Link (Layer 2)
The OSI Data Link layer is concerned with how the systems using
a physical link cooperate with one another. When data is broken
into packets, the Data Link layer defines special sequences to indi-
cate the beginning and end of each packet. The stations commu-
nicating using the physical connection are assigned addresses to
allow for effective use of the media. Sometimes multiple stations
are sharing the same media (as on a wireless network) and the
Data Link layer defines how those stations will share the connec-
tions with the other systems connected to the network. Most Data
Link layers also have some form of checksum to detect and/or cor-
rect for errors in the transmitted data.
The design problems solved in the Physical and Data Link layers
of the OSI model are addressed by the Link layer of the TCP/IP
model.
9.3 Network (Layer 3)
Like the Internetwork Layer (IP) in the TCP/IP model, the OSI Net-
work layer deals with the global assignment of “routable” ad-
dresses to the various systems connected to the network. The
2“Manchester Encoding” is a common technique for encoding bits for trans-
mission across a wire.
9.4. TRANSPORT (LAYER 4) 103
Network layer governs how routers forward packets across mul-
tiple hops to get from their source to their destination. Like the
IP layer, The OSI Network layer does not attempt to be error free,
as it assumes that lost data will be detected and retransmitted at
the next layer up.
9.4 Transport (Layer 4)
The Transport layer in the OSI model manages packet loss and
retransmission as well as flow control and window size. The rest
of the functionality of the TCP/IP Transport layer is handled in the
Session layer in the OSI model.
9.5 Session (Layer 5)
The OSI Session layer handles establishing connections between
applications. The Session layer deals with “ports” so that a con-
necting client application can “find” the correct server application
on a particular system. Some aspects of secure transmission are
also handled in the OSI Session layer.
9.6 Presentation (Layer 6)
The Presentation layer focuses on how data is represented and
encoded for transmission across the network. As an example, the
Presentation layer would describe how to encode the pixels of an
image so that the receiving application can properly decode the
data. The Presentation layer also handles data encryption and
decryption.
9.7 Application (Layer 7)
The OSI Application Layer is very similar to the Application layer
in the TCP/IP model, in that it contains the applications them-
selves. Some applications are client applications that initiate
connections, and other applications are the server applications
that respond to those connection requests. The various pairs of
applications have protocol standards that define interoperability
104 CHAPTER 9. THE OSI MODEL
between multiple clients and multiple servers from different ven-
dors.
!#$\%&(
)&&*+,#(+$
-$(.$.(/0
1+$0
)&&*+,#(+$
!#$\%&(
5#(#61+$0
278\%+,#*
!#$#\%#&
()\%#*+),-.#/0$
()\%12$+#)3445
!#$
67&+08+&+$1
9**7+),-3-6#:$+),
9**7+),-3-;##*+)0$+#)
<#&$0,7-3-=7>:7)\%+7
4277*-3-;#))7\%$#
Figure 9.1: Comparing the TCP and OSI Models
9.8 Comparing the OSI and TCP/IP Models
We can use the OSI model to provide an alternative “view” of the
TCP/IP model by comparing how the OSI model breaks network
functionality into its layers and how the TCP/IP model breaks its
functionality into layers.
9.9 Link Layer (TCP/IP)
The TCP/IP Link layer combines the Physical and Data Link layers
from the OSI model. The Physical and Data Link layers are usually
implemented in hardware. Products like Ethernet, WiFi, satellite,
or fiber optic often are implemented in a network driver card that
plugs into the back of a computer or router. The network driver
card generally implements both the physical and the data link
9.10. INTERNETWORK LAYER (TCP/IP) 105
aspects of the connection in the hardware on the card. In most
cases, the data link layers are tuned to the limitations and require-
ments of their corresponding physical layers. So in real systems,
it is somewhat rare for a particular data link layer to be arbitrarily
paired with any number of physical layers. Since it can be hard
to separate the physical and data link aspects for a particular link
technology, the TCP model combines them into a single layer for
simplicity.
9.10 Internetwork Layer (TCP/IP)
One place that maps pretty cleanly between the two models is
the OSI Network and TCP/IP Internetwork layers. They perform
the same functions of creating a globally routable address space
and building routers to insure that packets properly find their way
from the source to the destination across multiple hops.
9.11 Transport Layer (TCP/IP)
The features of the Transport layer in TCP/IP are spread across the
Transport and Session layers of the OSI model. The OSI Transport
layer deals with flow control and packet retransmission, while the
OSI Presentation layer deals with multiple applications running on
multiple ports as well as session establishment and teardown.
The Secure Sockets Layer (SSL) in the TCP/IP model corresponds
to parts of the Session and Presentation layers in the OSI model.
9.12 Application Layer (TCP/IP)
The TCP/IP Application Layer combines the non-security aspects
of the OSI Presentation layer and the OSI Application layer. While
many TCP/IP applications deal with issues like encoding and de-
coding various types of data, the TCP/IP model does not see data
formatting as a separate “layer”. Various data encoding and de-
coding technologies are used in TCP/IP applications, but TCP/IP
tends to treat these capabilities as library code that applications
make use of as needed for the application.
106 CHAPTER 9. THE OSI MODEL
9.13 Conclusion
While the TCP/IP model described in this book is widely used to
guide the implementation of TCP/IP networks, hardware, and soft-
ware, the OSI model can help us look at and compare a wide
range of network architectures ranging from openly developed
networks to proprietary vendor-specific networks.
9.14 Glossary
abstract model: A model and set of terminology that is used to
generally understand a problem area and guide the development
of standards and implementations to solve problems.
implementation model: A model and set of terminology that is
used to guide the development of standards and an implementa-
tion to solve a particular problem.
ISO: International Organization for Standardization. A worldwide
body that develops standards in computing, networking, and
many other areas.
OSI: Open System Interconnection. A seven-layer model used to
help organize the design of various approaches to network archi-
tecture.
9.15 Questions
You can take this quiz online at http://www.net-intro.com/quiz/
1. What is the primary value of the OSI network model?
a) OSI networks are used in the southern hemisphere
b) The OSI approach can be use to analyze many different net-
work models
c) OSI networks make better use of limited bandwidth
d) OSI networks are more secure
2. How many layers does the OSI model have?
a) Four
9.15. QUESTIONS 107
b) Six
c) Seven
d) Nine
3. Which of the OSI layers deals with the shape of connectors
for network connections?
a) Physical
b) Data Link
c) Network
d) Transport
4. Which of the layers is most similar between the OSI and TCP
network models?
a) TCP Link Layer and OSI Data Link Layer
b) TCP Internetwork Layer and OSI Network Layer
c) TCP Transport Layer and OSI Transport Layer
d) TCP Application Layer and OSI Session Layer
5. What layer does the TCP/IP Secure Sockets Layer map to in
the OSI network model?
a) Secure Data Link Layer (SDLL)
b) Secure Network Layer (SNL)
c) Secure Transport Layer (STL)
d) Session and Presentation Layers
6. Why does the TCP model combine the OSI Data Link and
Physical layers into a single Link layer?
a) Because the TCP model does not worry about the Physical
layer
b) Because the TCP model designers were ignored at the 1981
OSI meeting in Utrect, Netherlands
c) Because quite often the design of Data Link and Physical
layers are tightly connected for a particular technology
d) To make the TCP model easier to understand by end users
Chapter 8
Secure Transport Layer
In the early days of the Internet, networks were small and all of
the routers were in secure locations. As long as each computer
connected to the Internet protected itself from unwanted incom-
ing connections, it was felt that there was no need to protect data
from prying eyes while it was crossing the network.
So the Link, Internetwork, and Transport layers were focused on
the efficient movement of data and solving the problems of a
large-scale shared distributed network without worrying about
the privacy of that data.
But as the use of the Internet grew rapidly in the late 1980s and
literally exploded when the Web became mainstream in 1994, se-
curity and privacy of network traffic became very important prob-
lems to solve. When we began using the Internet to conduct com-
merce and credit cards and bank account numbers were being
routinely sent across the network, securing data became essen-
tial. And when we started using wireless technologies like WiFi,
security became necessary for even the simplest uses of the In-
ternet.
There are two general approaches to securing network activity.
The first makes sure that all of the network hardware (routers
and links) is in physically secure locations so it is not possible for
someone to sneak in and monitor traffic while it is crossing the
Internet. This approach is not practical for hundreds of thousands
of network routers owned and operated by many different orga-
nizations. While you might be able to ensure that some of the
router operators adhered to strict security procedures and poli-
cies, sooner or later a mistake will be made. And once WiFi was
added to the mix and your packets went over radio waves, a net-
work attacker could just sit in a coffee shop and intercept packets
89
90 CHAPTER 8. SECURE TRANSPORT LAYER
as they passed through the air.
Under these conditions, the only reasonable solution is to encrypt
data in your computer before it is sent across its first physical
link, and then decrypt the data in the destination computer after
it arrives. Using this approach, we assume that an attacker can
see all of the packets that you send, but they cannot decrypt the
data that they have captured. The encryption also guarantees
that there is no way to alter your data while it is crossing the
Internet.
8.1 Encrypting and Decrypting Data
The concept of protecting information so it cannot be read while
it is being transported over an insecure medium is thousands of
years old. The leaders in Roman armies sent coded messages to
each other using a code called the “Caesar Cipher”. The simplest
version of this approach is to take each of the characters of the
actual message (we call this “plain text”) and shift each charac-
ter a fixed distance down the alphabet to produce the scrambled
message or “ciphertext”.
Then we send the ciphertext via the courier or other insecure
transport to the other person. The courier cannot read the mes-
sage because it appears to be random characters unless you
know the technique used to encode the message.
As long as the person receiving the message knew the number
used to shift the message, they could unshift the characters in
the encoded message to reproduce the original message.
Here is a simple example of plain text and ciphertext using a shift
of one:
Plain text: Go to the river
Cipher text: Hp up uif sjwfs
We use the word “encrypt” to describe transforming the plain text
to the ciphertext and “decrypt” to describe the reverse process.
The Caesar Cipher is very simple to defeat, but it was used to
protect important messages until about 150 years ago. Modern
encryption techniques are far more sophisticated than a simple
character shift, but all encryption systems depend on some kind
of a secret key that both parties are aware of so they can decrypt
received data.
8.2. TWO KINDS OF SECRETS 91
8.2 Two Kinds of Secrets
The traditional way to encrypt transmissions is using a shared se-
cret (a password, a sentence, a number) that only the sending
and receiving parties know. With the secret, it is easy to decrypt
the received data, but if you received the data without possess-
ing the secret, it would be effectively impossible to decrypt the
message.
Figure 8.1: Shared Versus Asymmetric Keys
In the early days of the Internet, two people could send encrypted
email to each other by one person first calling the other person
on the phone and giving them the decryption secret. This worked
well when there were only a few users on the network, but could
not scale to situations where a company might have millions of
customers and could not afford to make a phone call to each cus-
tomer to establish a shared secret before they could make a pur-
chase.
It might seem like a good idea to distribute the shared secrets
over the Internet, but if we assume that the attackers are monitor-
ing and capturing all network traffic, they could also capture the
unencrypted message that contained the shared secret. At that
point it would be trivial for the attacker to use the shared secret
to decrypt a message. And even worse, the attacker could inter-
cept a message, delay it, then decrypt it, change and re-encrypt
it, and send the modified message back on its way. The receiving
92 CHAPTER 8. SECURE TRANSPORT LAYER
computer would decrypt the message and never know that it had
been modified by an attacker while in transit.
So shared secrets clearly would not work to solve the problem of
securing network traffic between trillions of pairs of networked
computers.
The solution to this problem came in the 1970s when the con-
cept of asymmetric key encryption was developed. The idea of
asymmetric key encryption is that one key is used to encrypt the
message and another key is used to decrypt it. The computer that
will be receiving the encrypted data chooses both the encryption
key and decryption key. Then the encryption key is sent to the
computer that will be sending the data. The sending computer
encrypts the data and sends it across the network. The receiving
computer uses the decryption key to decrypt the data.
We call the encryption key the “public” key because it can be
widely shared. We call the decryption key the “private” key be-
cause it never leaves the computer where it was created. Another
name for asymmetric keys is public/private keys.
The whole process is designed so that if an attacker has the public
key (which was sent unencrypted) and the encrypted text, it is
virtually impossible to decrypt the encrypted data. There is a lot
of math with large prime numbers that makes it hard to guess the
private key from the public key and encrypted data.
So with the advent of public/private key technology, the only
question left was how to apply it in our network model.
8.3 Secure Sockets Layer (SSL)
Since network engineers decided to add security nearly 20 years
after the Internet protocols were developed, it was important not
to break any existing Internet protocols or architecture. Their so-
lution was to add an optional partial layer between the Transport
layer and the Application layer. They called this partial layer the
Secure Sockets Layer (SSL) or Transport Layer Security (TLS).
When an application requested that the Transport layer make a
connection to a remote host, it could request that the connec-
tion either be encrypted or unencrypted. If an encrypted connec-
tion was requested, the Transport layer encrypted the data before
breaking the stream into packets. This meant that the Transport
layer, Internetwork layer, and physical (link) layers could still per-
form exactly the same way whether the packets were encrypted
8.4. ENCRYPTING WEB BROWSER TRAFFIC 93
Figure 8.2: Where Encryption and Decryption Happens
or non-encrypted. The applications making the connections were
also spared the details of how encryption and decryption worked.
Since encryption was a simple and transparent addition to the
Transport layer, there was no need to change the routers that
operate at the Internetwork and Link layers. There was no need
to change any Link layer hardware to make encryption work. And
applications did not need to be modified except to request that a
connection be encrypted when appropriate.
8.4 Encrypting Web Browser Traffic
Since web browsers and web servers operate at the application
layer, we barely notice whether we are using encrypted or un-
encrypted connections. Web browsers use the URL convention
of replacing “http:” with “https:” to indicate that the browser is
to communicate with the web server using the Secure Transport
Layer instead of the unencrypted Transport layer. Your browser
will usually show a “lock” icon in the address bar to let you know
that you are communicating with a secure web site.
94 CHAPTER 8. SECURE TRANSPORT LAYER
There is a small overhead in setting up the https connections and
a small cost to encrypt and decrypt the data that is being sent.
Since https was slightly more costly, for a while it was used only
for pages that contained passwords, bank account numbers, or
other sensitive data.
But over time as networks have become faster and the https im-
plementations have gotten much more efficient, there is a trend
toward encrypting all web server interactions whenever you are
interacting with a web server where you have an account. The
current trend is towards using https for all web traffic.
8.5 Certificates and Certificate Authorities
While public/private key encryption works to allow the distribution
of encryption keys across insecure networks and the use of those
keys to encrypt transmissions, there is still a problem of knowing
if the public key that you have received when you connected to a
server is really from the organization it claims to be from.
Figure 8.3: Certificate Authorities and Public Keys
Perhaps you think you are connecting to www.amazon.com
but a rogue computer intercepts your traffic, claiming to be
8.6. SUMMARY 95
www.amazon.com and giving you a public key to use for encryp-
tion. If your web browser trusts the key, it will use the rogue
computer’s public key to encrypt your banking information and
send it to the rogue computer. Since the rogue computer gave
you the public key, it also has the corresponding private key and
is able to decrypt and abscond with your banking information.
So your computer needs to know who the key is actually coming
from. This is achieved by sending you a public key that is digi-
tally signed by a Certificate Authority (CA). When your computer
or browser is initially installed, it knows about a number of well-
known certificate authorities. If your browser is given a public
key that is signed by one of the well-known certificate authorities,
it trusts the key and uses it to encrypt and send your data. If
your computer receives a public key that is not signed by one of
its trusted certificate authorities, it will warn you before sending
your data using the key.
If you see a warning message about an untrusted certificate, you
should probably say “no” and figure out why your network traffic
is not being routed to the server that you think it is going to before
sending any sensitive data.
8.6 Summary
Since the Internet was nearly 20 years old before we needed
broadly deployed security, we had to find a way to add security to
the already existing four-layer model. The perfect place to add se-
curity was as an option in the Transport layer. This is why we call
secure connections on the Internet “Secure Sockets Layer” (SSL)
or “Transport Layer Security” (TLS). There are subtle differences
between SSL and TLS but they both encrypt data at the Transport
layer.
The invention of public/private key encryption was well timed in
that it solved the key distribution problem of shared-secret en-
cryption approaches. With public/private keys, the public encryp-
tion key can be routinely shared across insecure media. This
means we can use an unencrypted connection to exchange data
and upgrade the connection to a secure connection.
By inserting the secure layer at the top of the Transport layer, we
were able to avoid changing the Application, Internetwork, and
Link layers while still easily securing any Transport layer connec-
tion. This approach ensures that all data being sent across a con-
nection is encrypted before it leaves your computer. Given that
96 CHAPTER 8. SECURE TRANSPORT LAYER
many of us use wireless connections like WiFi, which are easily
monitored by attackers, it is a good idea to encrypt data before it
is sent across WiFi.
Browsers support secure connections by changing the prefix on
the URL from “http:” to “https:”. By keeping an eye on the URL,
end users can make sure they never send sensitive data across
insecure connections. A series of trusted Certificate Authorities
will sign public keys to give you an assurance that the key you
received is indeed from the organization you expect it to be.
The design of the Secure Transport Layer provides a secure and
yet easy-to-use mechanism for secure communications across
the Internet at a scale of trillions of pairs of interacting comput-
ers.
8.7 Glossary
asymmetric key: An approach to encryption where one (public)
key is used to encrypt data prior to transmission and a different
(private) key is used to decrypt data once it is received.
certificate authority: An organization that digitally signs public
keys after verifying that the name listed in the public key is actu-
ally the person or organization in possession of the public key.
ciphertext: A scrambled version of a message that cannot be
read without knowing the decryption key and technique.
decrypt: The act of transforming a ciphertext message to a plain
text message using a secret or key.
encrypt: The act of transforming a plain text message to a ci-
phertext message using a secret or key.
plain text: A readable message that is about to be encrypted
before being sent.
private key: The portion of a key pair that is used to decrypt
transmissions.
public key: The portion of a key pair that is used to encrypt
transmissions.
shared secret: An approach to encryption that uses the same
key for encryption and decryption.
SSL: Secure Sockets Layer. An approach that allows an appli-
cation to request that a Transport layer connection is to be en-
8.8. QUESTIONS 97
crypted as it crosses the network. Similar to Transport Layer Se-
curity (TLS).
TLS: Transport Layer Security. An approach that allows an ap-
plication to request that a Transport layer connection is to be en-
crypted as it crosses the network. Similar to Secure Sockets Layer
(SSL).
8.8 Questions
You can take this quiz online at http://www.net-intro.com/quiz/
1. How do we indicate that we want a secure connection when
using a web browser?
a) Use https:// in the URL
b) Use a secure web browser
c) Open an incognito window
d) Manually encode the address of the server using SHA1
2. Why is a shared-secret approach not suitable for use on the
Internet?
a) Because people would lose or misplace the secret
b) It is difficult to distribute the secrets
c) Encryption and decryption with shared secrets are too easily
broken
d) Encryption and decryption with shared secrets take too
much compute power
3. What is the underlying mathematical concept that makes
public/private key encryption secure?
a) Continuous functions
b) Taylor series
c) Karnaugh Maps
d) Prime numbers
4. Which of the keys can be sent across the Internet in plain
text without compromising security?
98 CHAPTER 8. SECURE TRANSPORT LAYER
a) Encryption key
b) Decryption Key
c) Shared Secret
d) Univerally Safe Key (USK)
5. Where does the Secure Sockets Layer (SSL) fit in the four-
layer Internet architecture?
a) Below the Link layer
b) Between the Link and Internetworking layers
c) Between the Internetworking and Transport layers
d) Between the Transport and Application layers
6. If you were properly using https in a browser over WiFi in a
cafe, which of the following is the greatest risk to your losing
credit card information when making an online purchase?
a) Someone captured the packets that were sent across the
WiFi
b) Someone captured the packets in the gateway router
c) Someone captured the packets as they passed through a
core Intenet router
d) You have a virus on your computer that is capturing
keystrokes
7. With the Secure Sockets Layer, where are packets encrypted
and decrypted?
a) They are encrypted and decrypted as they pass through the
router
b) Each physical link has its own separate encryption
c) They are encrypted in your computer and decrypted in the
server
d) They are encrypted in the WiFi gateway and decrypted in the
last router before the destination computer
8. What changes to the IP layer were needed to make secure
socket layer (SSL) work?
a) No changes were needed
b) We had to add support for Secure IP (IPSEC)
c) We needed to support longer packets in IP
8.8. QUESTIONS 99
d) The Time-To-Live (TTL) value needed to be encrypted
9. If a rogue element was able to monitor all packets going
through an undersea cable and you were using pub-
lic/private key encryption properly, which of the following
would be the most difficult for them to obtain?
a) What servers you were communicating with
b) How often you used the servers
c) How much data you retrieved from the servers
d) Which documents you retrieved from the servers
10. What is the purpose of a Certificate Authority in pub-
lic/private key encryption?
a) To make sure people do not forge badges for learning activi-
ties
b) To make sure packets get routed to the correct destination
computer
c) To assure us that a public key comes from the organization
it claims to be from
d) To choose when a particular country must switch from IPv4
to IPv6
11. The ARPANET network was in operation starting in the 1960s.
Secure Sockets Layer (SSL) was not invented util the 1980s.
How did the ARPANET insure the security of the data on its
network?
a) By using public/private keys and encrypting all transmis-
sions
b) By using encryption at the Link layer
c) By making sure no one could access the physical links
d) By only using secure WiFi routers
12. Which of these answers is “Security is fun” encrypted with a
Caesar Cipher shift of 1.
a) Ptsjduao rt dii
b) Wentudhs di dju
c) Tfdvsjuz jt gvo
d) Asdfghjk qw zxc
100 CHAPTER 8. SECURE TRANSPORT LAYER
13. What Caesar Cipher shift was used to encrypt “V yvxr fr-
phevgl”?
a) 1
b) 6
c) 13
d) 24
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident