IFSM 310 – Stage 4 Assignment – Due Sunday - Information Systems
Please see attached the assignment details/rubric, case study,  and course resources. This is the 4th stage of the 4-part assignment. I have attached the first 3 assignments because they are connected. It is important that you understand IT or Information Systems because this assignment asks for technical and specific IT-related answers. The paper must be in APA format and you MUST incorporate course materials. THIS IS DUE SUNDAY! Please do not accept this assignment if you cannot meet this short time constraint. IFSM 310 3D Printing Stage 4 Assignment Before you begin this assignment, be sure you: · Have completed all previously assigned readings. · Read the “3D Printing Case Study. · Reviewed the feedback on your 3D Printing Stage 1, 2 and 3 Assignments. It is now a year later, and Mark has opened his two new facilities in Memphis, Tennessee and Phoenix, Arizona. All three locations are operating almost around the clock to create 3D printed accessibility and assistive devices. Mark and his father are planning to open several more facilities, also located near Veterans Administration Hospitals and rehab facilities. Mark does not want to continue to increase his IT infrastructure at the original location and has decided to move all of his systems and files to a cloud service provider. You have recommended that since he has everything set up the way he wants it and the systems are performing well for him, that he just move what he has to an Infrastructure as a Service (IaaS) cloud provider. Before Mark agrees to this, he wants to understand more about just how that would work, using his current systems and locations. He also has a lot of questions about how the communications systems work, and he wants to understand the protocols, the architecture and the four layer TCP model. Use the following outline for your paper: 1. Provide an opening paragraph as an introduction that explains what is contained in the paper. (You might write this after you develop the rest of your paper.) 2. Explain what IT infrastructure changes will occur at the original location by telling Mark which components will be located at the IaaS cloud providers location and what will remain at his facility. Explain any changes that are needed at the two remote locations in order to use the IaaS cloud services. Provide a list of which components will be located at the cloud location, at Marks primary facility, and at the two remote locations. 3. Create an original graphical representation showing the cloud provider and the three current locations. Show which components will be located at the cloud providers site and which will remain at the three locations. Label each component and the locations. 4. List the protocol involved for each communication link in the design, including internet connectivity, wired connections, and wireless connections. Be sure to include security protocols, as appropriate to the infrastructure design you created and the components you identified. 5. Explain the concept of a layered systems architecture to aid in communications and the benefit of a layered architecture such as the TCP or OSI model. 6. Using the four layer TCP model, explain what each layers function is and how it will apply when Mark uses his ERP information system that will be located at the cloud service providers location. 7. Using the four layer TCP model, explain what happens when a packet of information travels from the server at the cloud provider to a tablet device at Marks facility. Be sure to identify the points at which each of the layers of the model are the primary enabler of the communication. Formatting: · All parts of the assignment except for the graphic should be about 3-4 single spaced pages in length, and be in Microsoft Word format, or a format that can be read in Word. · Part 3 is an original graphic diagram that should be included in the same document. · Compare your work to the Grading Rubric below to be sure you have met content and quality criteria. · Your submission should include your last name first in the filename: Lastname_firstname_Stage_4 GRADING RUBRIC: The right and wrong answers have to do with whether or not you correctly incorporated the course vocabulary and concepts from the textbook to support your choices and have addressed all parts of the assignment.  Criteria 90-100\% Far Above Standards 80-89\% Above Standards 70-79\% Meets Standards 60-69\% Below Standards < 60\% Well Below Standards Possible Points Introduction 5 Points A clear and effective introduction is provided. 4 Points An appropriate introduction is included. 3.5 Points An introduction is provided. 3 Points The introduction may be incomplete or inaccurate. 0-2 Points No introduction provided. 5 Changes in Existing IT Infrastructure to Use IaaS 14-15 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is clear, complete, derived from the Case Study, and demonstrates sophisticated level of analysis and critical thinking. 12-13 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is accurate, derived from the Case Study, and demonstrates analysis and critical thinking. 10-11 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is derived from the Case Study, and demonstrates adequate level of analysis and critical thinking. 9 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is incomplete or not related to Case Study. 0-8 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is not included, or is very incomplete or incorrect. 15 Graphical Representa-tion 14-15 Points The graphical diagram is complete, clear, logical, labeled, and appropriate to the Case Study, includes the components and locations listed in step 2, and demonstrates sophisticated analysis and critical thinking. 12-13 Points The graphical diagram is clear, logical, labeled, and appropriate to the Case Study and includes the components and locations listed in step 2, and demonstrates a clear understanding of the course concepts. 10-11 Points The graphical diagram is labeled and appropriate to the Case Study and includes most of the components and locations listed in step 2. . 9 Points The graphical diagram may be lacking in completeness and/or clarity and/or logic; may not be labeled or appropriate to the Case Study and may not include the components or locations listed in step 2. 0-8 Points No graphical diagram is included, or minimal effort demonstrated. 15 List of Communica-tions Protocols 14-15 Points List of communica-tions protocols is complete, accurate, appropriate to the diagram, and demonstrates sophisticated level of analysis and critical thinking. 12-13 Points List of communications protocols is accurate, appropriate to the diagram, and demonstrates analysis and critical thinking. 10-11 Points List of communications protocols is provided, relates to the diagram, and demonstrates adequate level of analysis and critical thinking. 9 Points List of communications protocols is incomplete or not related to the diagram. 0-8 Points List of communications protocols is not included, or is very incomplete or incorrect. 15 Explanation of Layered Architecture and Its Benefits 14-15 Points Explanation of a layered architecture and its benefits is clear, complete, and demonstrates sophisticated level of analysis and critical thinking. 12-13 Points Explanation of a layered architecture and its benefits is clear and demonstrates analysis and critical thinking. 10-11 Points Explanation of a layered architecture and its benefits is provided and demonstrates adequate level of analysis and critical thinking. 9 Points Explanation of a layered architecture and its benefits is incomplete or inaccurate. 0-8 Points Explanation of a layered architecture and its benefits is not included, or is very incomplete or incorrect. 15 Explanation of TCP Model 14-15 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is clear, complete, and demonstrates sophisticated level of analysis and critical thinking. 12-13 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is clear and demonstrates analysis and critical thinking. 10-11 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is provided and demonstrates adequate level of analysis and critical thinking. 9 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is incomplete or inaccurate. 0-8 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is not included, or is very incomplete or incorrect. 15 Applying the TCP Model to a Packet 14-15 Points The application of the TCP model to a packet is clear, complete, and demonstrates sophisticated level of analysis and critical thinking. 12-13 Points The application of the TCP model to a packet is clear and demonstrates analysis and critical thinking. 10-11 Points The application of the TCP model to a packet is provided and demonstrates adequate level of analysis and critical thinking. 9 Points The application of the TCP model to a packet is incomplete or inaccurate. 0-8 Points The application of the TCP model to a packet is not included, or is very incomplete or incorrect. 15 Format 5 Points Submission reflects effective organization and sophisticated writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references are incorporated and cited using APA format. 4 Points Submission reflects effective organization and clear writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references are properly incorporated and cited using APA format. 3.5 Points Submission is adequate, is somewhat organized, follows instructions provided; contains minimal grammar and/or spelling errors; is in Word format; any references are incorporated and cited using APA format. 3 Points Submission is not well organized, and/or does not follow instructions provided; and/or contains grammar and/or spelling errors; and/or is not in Word; references may not be properly cited using APA format. 0-2 Points Document is extremely poorly written and does not convey the information. 5 TOTAL Points Possible 100 3D Printing Stage 4 1 Stage 4 Course: IFSM 310 6980 Software and Hardware Infrastructure Concepts (2215) / 5 / 15 Criteria Far Above Standards Above Standards Meets Standards Below Standards Well Below Standards Criterion Score Introduction Changes in Existing IT Infrastructur e to Use IaaS 5 points 5 Points A clear and effective introduction is provided. 4 points 4 Points An appropriate introduction is included. 3.5 points 3.5 Points An introduction is provided. 3 points 3 Points The introduction may be incomplete or inaccurate. 0 points 0-2 Points No introduction provided. 15 points 13-15 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is clear, complete, derived from the Case Study, and demonstrates sophisticated level of analysis and critical thinking. 13 points 12-13 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is accurate, derived from the Case Study, and demonstrates analysis and critical thinking. 11 points 10-11 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is derived from the Case Study, and demonstrates adequate level of analysis and critical thinking. 9 points 9 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is incomplete or not related to Case Study. 0 points 0-8 Points Explanation of changes in existing infrastructure at the original and two remote locations to use the IaaS is not included, or is very incomplete or incorrect. Paragraph Lato (Recom… 19px / 15 / 15 Criteria Far Above Standards Above Standards Meets Standards Below Standards Well Below Standards Criterion Score Graphical Representati on List of Communicat ions Protocols 15 points 13-15 Points The graphical diagram is complete, clear, logical, labeled, and appropriate to the Case Study, includes the components and locations listed in step 2, and demonstrates sophisticated analysis and critical thinking. 13 points 12-13 Points The graphical diagram is clear, logical, labeled, and appropriate to the Case Study and includes the components and locations listed in step 2, and demonstrates a clear understanding of the course concepts. 11 points 10-11 Points The graphical diagram is labeled and appropriate to the Case Study and includes most of the components and locations listed in step 2. 9 points 9 Points The graphical diagram may be lacking in completeness and/or clarity and/or logic; may not be labeled or appropriate to the Case Study and may not include the components or locations listed in step 2. 0 points 0-8 Points No graphical diagram is included, or minimal effort demonstrated. 15 points 13-15 Points List of communicatio ns protocols is complete, accurate, appropriate to the diagram, and demonstrates sophisticated level of analysis and critical thinking. 13 points 12-13 Points List of communicatio ns protocols is accurate, appropriate to the diagram, and demonstrates analysis and critical thinking. 11 points 10-11 Points List of communicatio ns protocols is provided, relates to the diagram, and demonstrates adequate level of analysis and critical thinking. 9 points 9 Points List of communicatio ns protocols is incomplete or not related to the diagram. 0 points 0-8 Points List of communicatio ns protocols is not included, or is very incomplete or incorrect. / 15 / 15 Criteria Far Above Standards Above Standards Meets Standards Below Standards Well Below Standards Criterion Score Explanation of Layered Architecture and Its Benefits Explanation of TCP Model 15 points 13-15 Points Explanation of a layered architecture and its benefits is clear, complete, and demonstrates sophisticated level of analysis and critical thinking. 13 points 12-13 Points Explanation of a layered architecture and its benefits is clear and demonstrates analysis and critical thinking. 11 points 10-11 Points Explanation of a layered architecture and its benefits is provided and demonstrates adequate level of analysis and critical thinking. 9 points 9 Points Explanation of a layered architecture and its benefits is incomplete or inaccurate. 0 points 0-8 Points Explanation of a layered architecture and its benefits is not included, or is very incomplete or incorrect. 15 points 13-15 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is clear, complete, and demonstrates sophisticated level of analysis and critical thinking. 13 points 12-13 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is clear and demonstrates analysis and critical thinking. 11 points 10-11 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is provided and demonstrates adequate level of analysis and critical thinking. 9 points 9 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is incomplete or inaccurate. 0 points 0-8 Points Explanation of the 4 layer TCP model and how it applies to the ERP and IaaS is not included, or is very incomplete or incorrect. / 15 / 5 Criteria Far Above Standards Above Standards Meets Standards Below Standards Well Below Standards Criterion Score Applying the TCP Model to a Packet Format 15 points 13-15 Points The application of the TCP model to a packet is clear, complete, and demonstrates sophisticated level of analysis and critical thinking. 13 points 12-13 Points The application of the TCP model to a packet is clear and demonstrates analysis and critical thinking. 11 points 10-11 Points The application of the TCP model to a packet is provided and demonstrates adequate level of analysis and critical thinking. 9 points 9 Points The application of the TCP model to a packet is incomplete or inaccurate. 0 points 0-8 Points The application of the TCP model to a packet is not included, or is very incomplete or incorrect. 5 points 5 Points Submission reflects effective organization and sophisticated writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references are incorporated and cited using APA format. 4 points 4 Points Submission reflects effective organization and clear writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references are properly incorporated and cited using APA format. 3.5 points 3.5 Points Submission is adequate, is somewhat organized, follows instructions provided; cont ains minimal grammar and/or spelling errors; is in Word format; any references are incorporated and cited using APA format. 3 points 3 Points Submission is not well organized, and/or does not follow instructions provided; and/or contains grammar and/or spelling errors; and/or is not in Word; references may not be properly cited using APA format. 0 points 0-2 Points Document is extremely poorly written and does not convey the information. Total / 100 Overall Score Far Above Standards 90 points minimum Above Standards 80 points minimum Meets Standards 70 points minimum Below Standards 60 points minimum Well Below Standards 0 points minimum 3D Printing Case Study – IFSM 310 10/28/2016 3D Printing Case Study In late 2015, Mark Peterson acquired a 3D printer from Best Buy for $500. As he began to play around with it, he discovered that he could use designs he downloaded from the Internet to create a wide variety of objects. One day as he was exploring designs on the website MyMiniFactory.com (https://www.myminifactory.com/), he came across a category of accessibility items. He was very excited to discover such things as an umbrella holder for a wheelchair, because his brother Peter uses a wheelchair for mobility. He downloaded the umbrella holder design and made one for Peter. The first time Peter used the umbrella holder, several people came up and asked him where he had gotten it. Of course, he was proud to say his brother had made it, but he had no idea how much it would cost for Mark to make one for a customer. Peter took the names and phone numbers of two people he encountered and promised to get back to them. When Peter approached Mark with the requests, Mark knew that he had found the start of something good. He figured out what the time and material cost would be to make the holders, called the interested parties, and made his first two sales. As he continued exploring, Mark ran across an article describing ten 3D printable assistive and accessibility devices (https://3dprint.com/126214/103dp-devices-for-the-disabled/). After investing in a heavy duty 3D printer, Mark used his Facebook page to advertise his growing business in 3D printing assistive and accessibility devices. He soon had many orders and his 3D printing hobby became his fulltime occupation. Mark rented space in an industrial park, bought two more wireless 3D printers, and hired two part-time assistants. He brought his PC from home to control the 3D printers, and set up an Internet connection using Verizon FiOS. His PC is connected to a FiOS modem which has a built-in wireless router. Mark obtains his 3D printing designs from sources on the internet. He uses Google email and keeps track of his orders on a spreadsheet on his PC. Marks Expansion Plan: Now, just three months later, he is ready to add seven more 3D printers and a 3D scanner, and hire five fulltime employees. Before he grows that much, he needs to set up his IT infrastructure to manage not only the additional 3D printers, but also to manage his business. He wants to implement a small business enterprise resource management (ERP) information system in his facility to help him manage his business (customer orders, invoices, supply ordering, employees, etc.) more effectively. He realizes he will also need a document printer to print invoices, etc. In addition, he wants each of his employees to have mobile access to the ERP system and the 3D design files and printers from anywhere in the facility, and he wants as much flexibility in which computers control which 3D printers as possible. He has a large collection of 3D print design files and has downloaded some training videos that he will use to train his new employees. Mark has already decided that he wants to store all of his 3D production files and his business management information locally in his facility, and to use cloud storage for his backup files. Your assignment, which will be done in four stages, is to assist Mark in understanding what kind of infrastructure he needs; how it would be configured; how it will change when his business grows into a much larger, multi-location operation; and how the various devices communicate with each other. Specific instructions for each of the four staged assignments may be found under the Assignments tab. https://www.myminifactory.com/ https://3dprint.com/126214/103dp-devices-for-the-disabled/ �������� ���� �� ��� �� �� � � ���� ��� ���� ����� �� �� � ��� �� ���� ��������� ����� �� !���# � $�\%� &� ���� � � ��(��� �)���( *�� �+��,� ��-�(��-������,�,(����� �.��������,���/����/0��/���� ��-��,1� 2�������3�� �2�3� �023 2�3��2���� ��� 4556789:;<=>;[email protected];B CDEFGHHGIJKLMMNEOPQ RSMTOUUKLMMNEOPQ VWWXYZW[YW\Y]̂_Ỳ]ab_YcYd_efgh_i_\] jaklbhWf\XYa\XYmfhh_\]Yn\ohap]hfk]fh_YqYh_efgh_i_\]Yi_] rgs_Yd_efgh_i_\]pYqYthWsgX_XuYbWWXYZW[YqYh_efgh_i_\]pYi_] vWwYh_efgh_i_\]pYwgxxY[_Yi_]YqybWWXYZW[YW\YX_pkhg[g\bYa\XYX_]agxg\bYWf]Yn wWfxXYh_kWii_\XYgX_\]gozg\bYpt_kgogkYappWkga]_XYkWp]pYa\XY\ai_pYoWhYaxx X_sgk_p{p_hsgk_pYapYgoYzWfYw_h_Y|ahlŶgip_xoYpg\k_YkWp]pYah_YaYkW\k_h\Y]W axxYpiaxxY[fpg\_ppYWw\_hpYqYbWWXYZW[YW\YgX_\]gozg\bY]̂_Y\ai_YWoYpWi_ h_kWii_\X_XYp_hsgk_pYa\X{WhYX_sgk_p }a]aYh_th_p_\]a]gW\Ya\XYp]Whab_YqYkWfxXY[_YiWh_Yg\~X_t]̂YapY]WYŵ _h_ pWi_YWoY]̂_p_Yogx_p{Xa]aYwgxxY[_Yp]Wh_X }gbg]axuY�fXgWuY�gX_WuYVhat̂gkpYqYigppg\bYbhat̂gkY_�]_\pgW\pYqYpfk̂Yapu �Zt_b d_o_h_\k_pYWoY]wWYWhYiWh_YqYh_efgh_i_\]Yi_] rWhia]YqYt_ho_k] r__xYoh__Y]WYkW\]ak]Yi_YgoYzWfŶas_Ya\zYef_p]gW\p� �̂a\lpu yyyyyyyyyyyyyyY�gi �������� ���� �� ��� �� �� � � ���� ��� ���� ����� �� �� � ��� �� ���� ��������� ����� �� !���# � $�\%� &� ���� � � ��(��� �)���( *�� �+��,� ��-�(��-������,�,(����� �.��������,���/����/0��/���� ��-��,1� 2�������3�� �2�3� �023 2�3��2���� �� 456789: ;<5=>[email protected]: [email protected]:J9KLMJ94BN5O6D896PQ9R6DQO6D89FPND6E5DC<5CD89ABP<8S5E9TUU:VW [email protected]?6Y=9A[6D\8 AD=58D=6 ]̂_̀abcde fĝhî_ij abcdèfĝhî_ij keegj̀fĝhî_ij lemcǹfĝhî_ij oemm̀lemcn fĝhî_ij p_qge_qch̀frc_e s6<\7DBCPQ96PQ ACDD8P59Ft FPND6E5DC<5CD8 :u9v9UJ w8xC=D8Y8P5E :u9v9UJ RBO w8xC=D8Y8P5E O=[[9y89H85 :V9v9UJ UJ9SB=P5E z{|}~̀�cqhgj t�89y6<\7DBCPQ Q8E<D=S5=BP9=E9<[86D� [B7=<6[�9Q8D=>8Q NDBY95�89A6E8 45CQ?�96PQ Q8YBPE5D658E96 EBS�=E5=<658Q9[8>8[ BN9OD=5=P7�9F5 SDB>=Q8E96 <BYS[8589[=E59BN �6DQO6D8�9EBN5O6D8 6PQ9P85OBD\ <BYSBP8P5E <CDD8P5[?9=P9S[6<8� :V9SB=P5E z�|z�̀�cqhgj t�89y6<\7DBCPQ Q8E<D=S5=BP9=E 6Q8xC658�96PQ9=E Q8D=>8Q9NDBY95�8 A6E8945CQ?�9F5 SDB>=Q8E969[=E59BN �6DQO6D8�9EBN5O6D8 6PQ9P85OBD\ <BYSBP8P5E <CDD8P5[?9=P9S[6<8� :I9SB=P5E z}|z�̀�cqhgj t�89y6<\7DBCPQ Q8E<D=S5=BP9=E9PB5 <[86D�9[B7=<6[96PQvBD Q8D=>8Q9NDBY95�8 A6E8945CQ?�9t�89[=E5 BN9<CDD8P5[?9=P� S[6<89<BYSBP8P5E =E9=P<BYS[858� J9SB=P5E ~|zz̀�cqhgj s6<\7DBCPQ 48<5=BP9PB5 ECyY=558Q�9BD Q8YBPE5D658E9[=55[8 8NNBD5�99;PQvBD9[=E5 BN9<CDD8P5[?9=P� S[6<89<BYSBP8P5E =E9>8D?9=P<BYS[858 BD9Y=EE=P7� UJ9SB=P5E z{|}~̀�cqhgj G=>89D8xC=D8Y8P5E 6D89[=E58Q96PQ96D8 <[86D�9[B7=<6[� Q8D=>8Q9NDBY95�8 A6E8945CQ?� Q8YBPE5D658E96 EBS�=E5=<658Q9[8>8[ BN96P6[?E=E96PQ OD=5=P7 :V9SB=P5E z�|z�̀�cqhgj G=>89D8xC=D8Y8P5E 6D89[=E58Q96PQ96D8 Q8D=>8Q9NDBY95�8 A6E8945CQ?� :I9SB=P5E z}|z�̀�cqhgj G8O8D95�6P9N=>8 D8xC=D8Y8P5E9Y6? y89[=E58Q96PQvBD96D8 PB59Q8D=>8Q9NDBY 5�89A6E8945CQ?� J9SB=P5E ~|zz̀�cqhgj �=E59BN D8xC=D8Y8P5E9=E >8D?9=P<BYS[8589BD Y=EE=P7� UJ9SB=P5E z{|}~̀�cqhgj ��S[6P65=BP9BN9�BO 5�89N=>8 D8xC=D8Y8P5E9[=E58Q O=[[9y89Y859O=5�95�8 <BYSBP8P5E9=E <[86D�9[B7=<6[96PQ Q8D=>8Q9NDBY95�8 A6E8945CQ?� Q8YBPE5D658E96 EBS�=E5=<658Q9[8>8[ BN96P6[?E=E96PQ OD=5=P7� :u9SB=P5E z�|z�̀�cqhgj ��S[6P65=BP9BN9�BO 5�89N=>8 D8xC=D8Y8P5E9[=E58Q O=[[9y89Y859O=5�95�8 <BYSBP8P5E9=E <[86D�9[B7=<6[� Q8D=>8Q9NDBY95�8 A6E8945CQ?� Q8YBPE5D658E96 <[86D9CPQ8DE56PQ=P7 BN95�89<BCDE8 <BP<8S5E� :I9SB=P5E z}|z�̀�cqhgj ��S[6P65=BP 6QQD8EE8E9�BO EBY89BN95�89N=>8 D8xC=D8Y8P5E9O=[[ y89Y859O=5�95�8 <BYSBP8P5E� 6PQvBD9Y6?9y8 =P6<<CD6589BD =P<BYS[858� J9SB=P5E ~|zz̀�cqhgj ��S[6P65=BP9BN9�BO 5�89N=>8 D8xC=D8Y8P5E9O=[[ y89Y859O=5�95�8 <BYSBP8P5E9=E9>8D? =P<BYS[858�9>8D? =P6<<CD658�9BD Y=EE=P7� :u9SB=P5E z�|z�̀�cqhgj t�89y6<\7DBCPQ Q8E<D=S5=BP9=E9<[86D� [B7=<6[�9Q8D=>8Q NDBY95�89A6E8 45CQ?�96PQ Q8YBPE5D658E96 <[86D9CPQ8DE56PQ=P7 BN95�89<BCDE8 <BP<8S5E�9F5 SDB>=Q8E969N6=D[? <BYS[8589[=E59BN �6DQO6D8�9EBN5O6D8 6PQ9P85OBD\ <BYSBP8P5E <CDD8P5[?9=P9S[6<8� :u9SB=P5E z�|z�̀�cqhgj G=>89D8xC=D8Y8P5E 6D89[=E58Q96PQ96D8 <[86D�9[B7=<6[� Q8D=>8Q9NDBY95�8 A6E8945CQ?� Q8YBPE5D658E96 <[86D9CPQ8DE56PQ=P7 BN95�89<BCDE8 <BP<8S5E :V9SB=P5E z�|z�̀�cqhgj ��S[6P65=BP =P<[CQ8E9�BO95�8 N=>89D8xC=D8Y8P5E O=[[9y89Y859O=5� 5�89<BYSBP8P5E� �������� ���� �� ��� �� �� � � ���� ��� ���� ����� �� �� � ��� �� ���� ��������� ����� �� !���# � $�\%� &� ���� � � ��(��� �)���( *�� �+��,� ��-�(��-������,�,(����� �.��������,���/����/0��/���� ��-��,1� 2�������3�� �2�3� �023 2�3��2���� �� 45678 9:;<;=>> [email protected]@A7 CDEFGHIJK LMDNODEOP GHIJKFLMDNODEOP QKKMPFLMDNODEOP RKSITFLMDNODEOP UKSSFRKSIT LMDNODEOP VEWMKEWINFLXIEK Y767 ZB[@B\B]676A5] 7]̂;[email protected]̀B =a;<;b> ZB\[email protected] =>;<;=> [email protected] =>;<;=> b>;[5A]6\ ghijkFlIWNMP mn[87]76A5] A]c8ôB\ @B[@B\B]676A5]p \[email protected]̀B;7]̂;̂BqAcB\ [email protected];788;[email protected];6s[B\;5r 7̂67t;A\;[email protected] 85̀Ac78p;̂[email protected]̂ [email protected];6dB;?7\B _6ôst B̂f5]\[email protected]\;7 \5[dA\6Ac76B̂;8BqB8 5r;7]78s\A\;7]̂ [email protected]]̀v =w;[5A]6\ gxigyFlIWNMP mn[87]76A5] A]c8ôB\ @B[@B\B]676A5]p \[email protected]̀B;7]̂;̂BqAcB\ [email protected];788;[email protected];6s[B\;5r 7̂67t;A\;[email protected] 85̀Ac78p;̂[email protected]̂ [email protected];6dB;?7\B _6ôst B̂f5]\[email protected]\;7 [email protected];o]̂[email protected]\67]̂A]̀ 5r;6dB;[email protected]\B c5]cB[6\v =z;[5A]6\ gjig{FlIWNMP _5fB;[[email protected]]\;5r 6dB;Bn[87]76A5];[email protected] A]c5f[8B6B;[email protected] A][email protected];[email protected];[email protected] fA\\A]̀p;7]̂<[email protected];[email protected] ]56;̂[email protected]̂;[email protected] 6dB;?7\B;_6ôsv >;[5A]6\ kiggFlIWNMP mn[87]76A5];5r;̂767 @B[@B\B]676A5];7]̂ \[email protected]̀B;A\ A]c5f[8B6B;[email protected] fA\\A]̀v 9va;[5A]6\ h|}FlIWNMP 4u5;\[email protected]\;[email protected] A][email protected][[email protected]̂;7]̂ o\B̂;BrrBc6AqB8sv [email protected]\;[email protected] @B8Bq7]6;7]̂ c5][email protected]~o6B;65;6dB 7]78s\A\v [email protected]]cB\;[email protected] 7[[@5[@A76B8s A][email protected][[email protected]̂;7]̂ cA6B̂;o\A]̀;��� \6s8Bv wva;[5A]6\ y|}FlIWNMP 4u5;\[email protected]\;[email protected] o\B̂;7]̂;[@5[[email protected] A][email protected][[email protected]̂;A]65 6dB;6Bn6v;[email protected]]cB A\;cA6B̂;o\A]̀;��� \6s8Bv �va;[5A]6\ x|}FlIWNMP �6;8B7\6;5]B @[email protected]]cB;\[email protected];A\ A]c8ôB̂p;~o6;f7s ]56;~B;[@5[[email protected] A][email protected][[email protected]̂;[email protected] o\B̂;7]̂<[email protected];A\;]56 @B8Bq7]6;[email protected];6AfB8st 7]̂<[email protected];̂5B\;]56 r5885u;���;\6s8B [email protected];@[email protected]]cB\;7]̂ cA676A5]\v >;[5A]6\ ki}FlIWNMP �5;@B\[email protected];A\ A][email protected][[email protected]̂;[email protected] @[email protected]]cB;8A\6B̂;A\ ]56;cA6B̂;uA6dA] 6Bn6v 9va;[5A]6\ h|}FlIWNMP _o~fA\\A5];@Br8Bc6\ BrrBc6AqB [email protected]̀7]A�76A5];7]̂ [email protected];[email protected]]̀t r5885u\;A]\[email protected]]\ [@5qÂB̂t;o\B\ [email protected]@Bc6;\[email protected]@Bp @̀[email protected];7]̂ \[B88A]̀t;[@B\B]6B̂ A];7;[@5rB\\A5]78 [email protected];o\A]̀;�[email protected]̂v wva;[5A]6\ y|}FlIWNMP _o~fA\\A5];A\ 7̂B�o76Bp;A\ \5fBud76 [email protected]̀7]A�B̂p;r5885u\ A]\[email protected]]\ [@5qÂB̂t;c5]67A]\ fA]Af78;̀@[email protected] 7]̂<[email protected];\[B88A]̀ [email protected]@[email protected]\t;A\;A];�[email protected]̂ [email protected] �va;[5A]6\ x|}FlIWNMP _o~fA\\A5];A\;]56 uB88;[email protected]̀7]A�B̂p 7]̂<[email protected];̂5B\;]56 r5885u;A]\[email protected]]\ [@5qÂB̂t;7]̂<[email protected] c5]67A]\;̀@[email protected] 7]̂<[email protected];\[B88A]̀ [email protected]@[email protected]\t;7]̂<[email protected];A\ ]56;A];�[email protected]̂v >;[5A]6\ ki}FlIWNMP Y5cofB]6;A\ [email protected];[[email protected] [email protected]];7]̂;̂5B\ ]56;c5]qBs;6dB A][email protected]]v =a;[5A]6\ g�ig}FlIWNMP mn[87]76A5] \5fBud76;A]c8ôB\ @B[@B\B]676A5]p \[email protected]̀B;7]̂;̂BqAcB\ [email protected];6dB;[email protected];6s[B\ 5r;̂767;7]̂;A\ @B876B̂;65;6dB;?7\B _6ôsv =>;[5A]6\ �igkFlIWNMP 4u5;[email protected];[email protected] \[email protected]\��5]B \[email protected];[email protected];uA6dA] 6dB;�e_�;z=> [email protected]\B;c5]6B]6;7]̂ 5]B;[email protected]]78;�[email protected] 6d7];6dB;[email protected]\B [email protected]\���[email protected] A][email protected][[email protected]̂;7]̂ o\B̂;BrrBc6AqB8sv [email protected]\;o\B̂;[email protected] @B8Bq7]6;7]̂;6AfB8s 7]̂;c5][email protected]~o6B;65 6dB;7]78s\A\v; [email protected]]cB\;[email protected] 7[[@5[@A76B8s A][email protected][[email protected]̂;7]̂ cA6B̂;o\A]̀;��� \6s8Bv =>;[5A]6\ �igkFlIWNMP _o~fA\\A5];@Br8Bc6\ BrrBc6AqB [email protected]̀7]A�76A5];7]̂ \5[dA\6Ac76B̂ [email protected]]̀t;r5885u\ A]\[email protected]]\ [@5qÂB̂t;o\B\ [email protected]@Bc6;\[email protected]@Bp @̀[email protected];7]̂ \[B88A]̀t;[@B\B]6B̂ A];7;[@5rB\\A5]78 [email protected];o\A]̀;�[email protected]̂v �������� ���� �� ��� �� �� � � ���� ��� ���� ����� �� �� � ��� �� ���� ��������� ����� �� !���# � $�\%� &� ���� � � ��(��� �)���( *�� �+��,� ��-�(��-������,�,(����� �.��������,���/����/0��/���� ��-��,1� 2�������3�� �2�3� �02�3 2�3��2���� ��� 4556789:;<=>;[email protected];B CDEFGHHGIJKLMMNEOPQ RSMTOUUKLMMNEOPQ VW8XYZ [==6;\=7;=];@̂5;[email protected];B;̂=X5_=>:;8̀ ỲA]X5]@a bỲ@;8]6;65̀9>Y75;@̂5;9=Xc=]5]@̀;d̂8>6_8>5Z;̀=<@_8>5Z;̀59e>[email protected];65fY95̀Z ][email protected]_=>:;65fY95̀Z;_Y>56g_Y>5h5̀ ;̀65fY95̀Z;Y]@5>][email protected];8]6;[email protected]̀5̀Z;8̀ 8cc>=c>[email protected];]55656;<=>;@̂5;[email protected]>;̀Ẁ@5Xd̀i;@=;75;è56;@=;9>[email protected];@̂5 jk;c>Y]@56;[email protected] àll;m;>59=XX5]6;Y65]@Y<WY]A;@̂5;X8:5̀gX=65h̀;8]6 8̀ =̀[email protected];c>Y95̀;̀=;n8>:;98];@8:5;@̂Ỳ;Y]@=;9=]̀Y65>[email protected]=];8]6;8]W 8̀ =̀[email protected];̀5>fY95;<55̀;o;̀=X5;Y65]@Y<Y56 bỲ@;8]6;65̀9>Y75;@̂5;9=Xc=]5]@̀;d̂8>6_8>5Z;̀=<@_8>5Z;̀59e>[email protected];65fY95̀Z ][email protected]_=>:;65fY95̀Z;_Y>56g_Y>5h5̀ ;̀65fY95̀Z;Y]@5>][email protected];8]6;[email protected]̀5̀Z;8̀ 8cc>=c>[email protected];n8>:;_Yhh;]556;@=;YXch5X5]@;8;̀X8hh;7èY]5̀ ;̀5]@5>c>Ỳ5 >5̀=e>95;X8]8A5X5]@;dpqri;Y]<=>[email protected]=];̀Ẁ@5X;Y];̂Ỳ;<[email protected];@=;̂5hc;̂YX X8]8A5;̂Ỳ;7èY]5̀ ;̀5<<[email protected];?=X5;=<;@̂5̀5;_Yhh;75;@̂5;̀8X5;8̀;̀=X5 9=Xc=]5]@̀;hỲ@56;<=>;@̂5;jk;̀Ẁ@5Xa;m;pqr;̀[email protected]=];_Yhh;866>5̀ ;̀@̂5 [email protected]̀5;>5seY>5X5]@;e]65>;@̂Ỳ;̀[email protected]=] ptch8Y];@̂5;>[email protected]=]̀ Ŷc̀;8X=]A;@̂5;jk;[email protected]>;̀Ẁ@5XZ;@̂5;Y]<=>[email protected]=] Ẁ̀@5XZ;8]6;@̂5;9=XXe][email protected]=];][email protected]_=>:̀;@̂[email protected];̀ecc=>@;[email protected]̂;@Wc5̀;=< Ẁ̀@5X ;̀8]6;̂=_;@̂5W;<[email protected];@[email protected]̂5>;@=;c>=fY65;n8>:;8hh;@̂5;uv;[email protected];̂5 ]556̀;@=;>e];̂Ỳ;7èY]5̀ à;m;A==6;\=7 [>8ĉY98h;q5c>5̀5]@[email protected]=];d<>=X;c8>@;wi;m;5t95hh5]@;6Y8A>8X 4=>[email protected];m>5seY>5X5]@;[email protected] 455h;<>55;@=;9=]@[email protected];X5;Y<;W=e;̂8f5;8]W;se5̀@Y=]̀a v̂8]:̀Z �������� ���� �� ��� �� �� � � ���� ��� ���� ����� �� �� � ��� �� ���� ��������� ����� �� !���# � $�\%� &� ���� � � ��(��� �)���( *�� �+��,� ��-�(��-������,�,(����� �.��������,���/����/0��/���� ��-��,1� 2�������3�� �2�3� �02�3 2�3��2���� ��� 456789: ;<5=>[email protected]: [email protected]<5CD89ABQ<8T5E9U::JVW [email protected]?6Y=9A[6D\8 AD=58D=6 ]̂_̀abcde fĝhî_ij abcdèfĝhî_ij keegj̀fĝhî_ij lemcǹfĝhî_ij oemm̀lemcn fĝhî_ij p_qge_qch̀frc_e ABYTBQ8Q5E9OBD Is9tD=Q5=Q7 4?E58Y JV9u9:K ABYTBQ8Q5E9OBD vwt9FQOBDY65=BQ 4?E58Y JV9u9:K SBP95x8 4?E58YE9yBD\ zB785x8D J{9u9:K :K9TB=Q5E |}~��̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9Is9TD=Q5=Q7 E?E58Y9=Q<[CR8E96[[ 6TTDBTD=658 x6DRP6D8�9EBO5P6D8� E8<CD=5?9R8>=<8E� Q85PBD\9R8>=<8E� P=D8RuP=D8[8EE R8>=<8E�9=Q58DQ85� 6QR9R656�6E8E96QR R8YBQE5D658E EBTx=E5=<658R9[8>8[ BO96Q6[?E=E96QR <D=5=<6[95x=Q\=Q7� J{9TB=Q5E |�~|�̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9Is9TD=Q5=Q7 E?E58Y9=Q<[CR8E YBE59BO95x8 Q8<8EE6D? x6DRP6D8�9EBO5P6D8� E8<CD=5?9R8>=<8E� Q85PBD\9R8>=<8E� P=D8RuP=D8[8EE R8>=<8E�9=Q58DQ85� 6QR9R656�6E8E�96QR R8YBQE5D658E 6Q6[?E=E96QR9<D=5=<6[ 5x=Q\=Q7� JI9TB=Q5E |�~|�̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9Is9TD=Q5=Q7 E?E58Y9=E =Q<BYT[8589BD9QB5 D8[658R95B9A6E8 45CR? K9TB=Q5E �~||̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD95x89Is9TD=Q5=Q7 E?E58Y9=E9QB5 =Q<[CR8R�9BD9=E9>8D? =Q<BYT[8589BD =Q<BDD8<5�99 :K9TB=Q5E |}~��̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9vwt9=QOBDY65=BQ E?E58Y9=Q<[CR8E96[[ 6TTDBTD=658 x6DRP6D8�9EBO5P6D8� E8<CD=5?9R8>=<8E� Q85PBD\9R8>=<8E� P=D8RuP=D8[8EE R8>=<8E�9=Q58DQ85� 6QR9R656�6E8E96QR R8YBQE5D658E EBTx=E5=<658R9[8>8[ BO96Q6[?E=E96QR <D=5=<6[95x=Q\=Q7�9 J{9TB=Q5E |�~|�̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9vwt9=QOBDY65=BQ E?E58Y9=Q<[CR8E YBE59BO95x8 Q8<8EE6D? x6DRP6D8�9EBO5P6D8� E8<CD=5?9R8>=<8E� Q85PBD\9R8>=<8E� P=D8RuP=D8[8EE R8>=<8E�9=Q58DQ85� 6QR9R656�6E8E�96QR R8YBQE5D658E 6Q6[?E=E96QR9<D=5=<6[ 5x=Q\=Q7�9 JI9TB=Q5E |�~|�̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9vwt9=QOBDY65=BQ E?E58Y9=E =Q<BYT[8589BD9QB5 D8[658R95B9A6E8 45CR?�99 K9TB=Q5E �~||̀�cqhgj �=E59BO9<BYTBQ8Q5E 5x89vwt =QOBDY65=BQ9E?E58Y =E9QB59=Q<[CR8R�9BD =E9>8D?9=Q<BYT[858 BD9=Q<BDD8<5� :K9TB=Q5E |}~��̀�cqhgj v�T[6Q65=BQ9BO9xBP 5x89Is9E?E58Y�95x8 =QOBDY65=BQ9E?E58Y 6QR95x8 <BYYCQ=<65=BQ E?E58Y9PBD\ 5B785x8D R8YBQE5D658E EBTx=E5=<658R9[8>8[ BO96Q6[?E=E96QR <D=5=<6[95x=Q\=Q7� JV9TB=Q5E |�~|�̀�cqhgj v�T[6Q65=BQ9BO9xBP 5x89Is9E?E58Y�95x8 =QOBDY65=BQ9E?E58Y 6QR95x8 <BYYCQ=<65=BQ E?E58Y9PBD\ 5B785x8D R8YBQE5D658E 6R8�C6589[8>8[9BO 6Q6[?E=E96QR9<D=5=<6[ 5x=Q\=Q7� JI9TB=Q5E |�~|�̀�cqhgj v�T[6Q65=BQ9BO9xBP 5x89Is9E?E58Y�95x8 =QOBDY65=BQ9E?E58Y 6QR95x8 <BYYCQ=<65=BQ E?E58Y9PBD\ 5B785x8D9=E =Q<BYT[8589BD9QB5 D8[658R95B95x89A6E8 45CR?� K9TB=Q5E �~||̀�cqhgj v�T[6Q65=BQ9BO9xBP 5x89Is9E?E58Y�95x8 =QOBDY65=BQ9E?E58Y 6QR95x8 <BYYCQ=<65=BQ E?E58Y9PBD\ 5B785x8D9=E =Q<BDD8<5� =Q6R8�C6589BD Y=EE=Q7� JV9TB=Q5E |�~|�̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9Is9TD=Q5=Q7 E?E58Y9=Q<[CR=Q7 x6DRP6D8� EBO5P6D8�9E8<CD=5? R8>=<8E�9Q85PBD\ R8>=<8E� P=D8RuP=D8[8EE R8>=<8E�9=Q58DQ85� 6QR9R656�6E8E9=E TDB>=R8R96QR R8YBQE5D658E 6R8�C6589[8>8[9BO 6Q6[?E=E96QR9<D=5=<6[ 5x=Q\=Q7� JV9TB=Q5E |�~|�̀�cqhgj �=E59BO9<BYTBQ8Q5E OBD9vwt =QOBDY65=BQ9E?E58Y =Q<[CR=Q79x6DRP6D8� EBO5P6D8�9E8<CD=5? R8>=<8E�9Q85PBD\ R8>=<8E� P=D8RuP=D8[8EE R8>=<8E�9=Q58DQ85� 6QR9R656�6E8E9=E TDB>=R8R96QR R8YBQE5D658E 6R8�C6589[8>8[9BO 6Q6[?E=E96QR9<D=5=<6[ 5x=Q\=Q7� J{9TB=Q5E |�~|�̀�cqhgj v�T[6Q65=BQ9BO9xBP 5x89Is9E?E58Y�95x8 =QOBDY65=BQ9E?E58Y 6QR95x8 <BYYCQ=<65=BQ E?E58Y9PBD\ 5B785x8D R8YBQE5D658E 6Q6[?E=E96QR9<D=5=<6[ 5x=Q\=Q7� �������� ���� �� ��� �� �� � � ���� ��� ���� ����� �� �� � ��� �� ���� ��������� ����� �� !���# � $�\%� &� ���� � � ��(��� �)���( *�� �+��,� ��-�(��-������,�,(����� �.��������,���/����/0��/���� ��-��,1� 2�������3�� �2�3� �02�3 2�3��2���� ��� 45678 9:;<;=>> [email protected] IJK6LJK7 [email protected] FPCQRCBRS [email protected] TAAPSEFPCQRCBRS UADHVEFPCQRCBRS WADDEUADHV FPCQRCBRS XBYPABYHQEFGHBA ZJ7[\K]78 L̂[JL_L̀676K5̀ a>;<;a> b5Jc76 =>;<;=> de;[5K̀6_ fghfiEjHYQPS 4\L;kJ7[\K]78 lK7kJ7cm_n;K_;]8L7Jo 85kK]78o;87pL8Llo;7̀l 7[[J5[JK76L;65;6\L I7_L;q6rls;7̀l K̀]8rlL_ tu[87̀76K5̀ K̀]8rlL_;6\L ]5c[5̀L̀6_;8K_6Ll K̀;v7J6;=o;7̀l lLc5̀_6J76L_;7 ]8L7J;r̀lLJ_67̀lK̀k 5w;6\L;]5rJ_L ]5̀]L[6_x da;[5K̀6_ fyhfzEjHYQPS 4\L;kJ7[\K]78 lK7kJ7cm_n;K_ 87pL8Ll;7̀l;K_ 7[[J5[JK76L;65;6\L I7_L;q6rls;7̀l K̀]8rlL_;c5_6;5w 6\L;]5c[5̀L̀6_ 8K_6Ll;K̀;v7J6;=x d>;[5K̀6_ y{hf|EjHYQPS 4\L;kJ7[\K]78 lK7kJ7cm_n;c7s;pL 87]}K̀k;K̀ ]5c[8L6L̀L__ 7̀l<5J;]87JK6s 7̀l<5J;85kK]~;c7s 5̀6;pL;87pL8Ll;5J 7[[J5[JK76L;65;6\L I7_L;q6rls;7̀l c7s;̀56;K̀]8rlL;6\L ]5c[5̀L̀6_;8K_6Ll K̀;v7J6;=x >;[5K̀6_ |hy�EjHYQPS �5;kJ7[\K]78 lK7kJ7c;K_;K̀]8rlLlo 5J;cK̀Kc78;Lww5J6 lLc5̀_6J76Llx 9x�;[5K̀6_ {��EjHYQPS qrpcK__K5̀;JLw8L]6_ LwwL]6K�L 5Jk7̀K�76K5̀;7̀l ]8L7J;�JK6K̀k~ w5885�_;K̀_6Jr]6K5̀_ [J5�KlLl~;r_L_ ]5JJL]6;_6Jr]6rJLo kJ7cc7Jo;7̀l _[L88K̀k~;[JL_L̀6Ll K̀;7;[J5wL__K5̀78 w5Jc76;r_K̀k;�5Jlx :x�;[5K̀6_ ���EjHYQPS qrpcK__K5̀;K_ 7lL�r76Lo;K_ _5cL�\76 5Jk7̀K�Llo;w5885�_ K̀_6Jr]6K5̀_ [J5�KlLl~;]5̀67K̀_ cK̀Kc78;kJ7cc7J 7̀l<5J;_[L88K̀k LJJ5J_~;K_;K̀;�5Jl w5Jc76x ex�;[5K̀6_ i��EjHYQPS qrpcK__K5̀;K_;̀56 �L88;5Jk7̀K�Llo 7̀l<5J;l5L_;̀56 w5885�;K̀_6Jr]6K5̀_ [J5�KlLl~;7̀l<5J ]5̀67K̀_;kJ7cc7J 7̀l<5J;_[L88K̀k LJJ5J_~;7̀l<5J;K_ 5̀6;K̀;�5Jlx >;[5K̀6_ |h�EjHYQPS �5]rcL̀6;K_ Lu6JLcL8s;[55J8s �JK66L̀;7̀l;l5L_ 5̀6;]5̀�Ls;6\L K̀w5Jc76K5̀x [email protected] �>;[5K̀6_;cK̀Kcrc; [email protected] 9>;[5K̀6_;cK̀Kcrc; TAAPSEFPCQRCBRS :>;[5K̀6_;cK̀Kcrc; UADHVEFPCQRCBRS e>;[5K̀6_;cK̀Kcrc; WADDEUADHVEFPCQRCBRS >;[5K̀6_;cK̀Kcrc; a>;[5K̀6_ f�hz|EjHYQPS 4\L;kJ7[\K]78 lK7kJ7cm_n;K_ ]5c[8L6Lo;]8L7Jo 85kK]78o;87pL8Ll;7̀l 7[[J5[JK76L;65;6\L I7_L;q6rlso K̀]8rlL_;6\L ]5c[5̀L̀6_;8K_6Ll K̀;v7J6;=o;7̀l lLc5̀_6J76L_ _5[\K_6K]76Ll 7̀78s_K_;7̀l;]JK6K]78 6\K̀}K̀kx =>;[5K̀6_ �hy|EjHYQPS qrpcK__K5̀;JLw8L]6_ LwwL]6K�L 5Jk7̀K�76K5̀;7̀l _5[\K_6K]76Ll �JK6K̀k~;w5885�_ K̀_6Jr]6K5̀_ [J5�KlLl~;r_L_ ]5JJL]6;_6Jr]6rJLo kJ7cc7Jo;7̀l _[L88K̀k~;[JL_L̀6Ll K̀;7;[J5wL__K5̀78 w5Jc76;r_K̀k;�5Jlx Feedback for Stage 2 - IFSM 3102 Feedback for Stage 2 - IFSM 310 1 3D Printing – Stage 1 Assignment Kyami Clarke IFSM 310 6980 Software and Hardware Infrastructure Concepts University of Maryland Global Campus Timothy Robinson Summer 2021 2 3D Printing – Stage 1 Assignment 1. Background Six years ago, Mark Peterson unknowingly took a hobby and began his journey into the 3D printing business. It all started with a purchase of a 3D printer for $500 and creating an umbrella holder. A seedling of an idea germinated and subsequently grew to a whole business. As the company began to produce a steady profit, Mark realized it was time to expand to incorporate more employees, space, and equipment (i.e., software, hardware, applications). Due to the increased business, he must monitor and facilitate operations (3D Printing Case Study, n.d.). The new infrastructure will revolve around Marks 3D printing firm and building upon his current setup. One 3D heavy-duty printer, two 3D wireless printing machines, one PC, and Verizon FIOS with modem and wireless router. Mark will grow his firm and provide an additional seven 3D printers. Together with his two present part-time staff, Mark will hire five additional full-time staff. The company needs a 3D scanner and a document scanner. For Marks training videos and 3D designs, and production data, cloud storage will be introduced together with local storage. To keep track of orders, an ERP system is implemented. More systems will be installed, and the access of all printers must be flexible. All staff must have mobile admittance to the ERP and all 3D printers and enterprise files (3D Printing Case Study, n.d.). The business expansion plan must include a stable infrastructure that meets his requirements. The project needs to ensure that processes, procedures, and tools are necessary, efficient, and the overhead for these expenses does not overshadow the profit. Marks new IT infrastructure should provide his organization with a way to manage his workforce and operations locally and remotely. One of the critical elements is simplicity and consistency. This 3 will lead to consistency in your employee training and your product delivery. As a result, your customer satisfaction will increase and provide cost savings as the business grows. 2. Current IT Infrastructure Mark Peterson’s current IT infrastructure includes the following: • Social Media • One Wireless Heavy-Duty Printer • Two Wireless 3D Printers • Personal Computer • Verizon FiOS Internet • Verizon FiOS Modem with Built-in Wireless Router • Google Gmail Account • Microsoft Excel • 3D Printing Design Software 3. Requirements At some point, every successful small company beginning will have to deal with the challenge of dealing with business expansion or growth. When a firm is growing, it is entering a new phase of its existence ripe with both possibilities and risks. While business expansion frequently results in a rise in financial fortunes for both owners and employees, on the other hand, business development is not always accompanied by an increase in economic means (Sadrzadehrafiei, Gholamzadeh Chofreh, Karimi Hosseini, & Sulaiman, 2013). Implementing a sustainable and forward-thinking plan for scaling IT during a growth phase may reduce stress in other departments while also saving the business money in the long term. However, it is not easy to set aside time to deliberately prepare for the future of your 4 information technology systems when there are so many other variables that require your attention right now. The following five IT infrastructure requirements have been identified to support Mark’s plans to expand his business: 1. Small Business Enterprise Resource Management (ERP) 2. Local Network Server Storage 3. Mobile Access - remote access to ERP, printers, and software (i.e., VPN) 4. Cloud Storage 5. Additional Equipment - Seven 3D Printers and One Multifunction Printer. 4. How are Requirements Met Now that the necessary requirements have been identified, it is critical to establish how Mark will implement these requirements. The essential requirement is the ERP, which will address customer orders, payroll, invoicing, financial reporting, and data tracking. Mark will need the correct network server to assist with the utilization of his ERP. As part of his expansion plan, he will need the following items to meet the five requirements mentioned above. • ERP Software – o Oracle + NetSuite is a cost-effective and effective software solution for his organization (Sadrzadehrafiei, Gholamzadeh Chofreh, Karimi Hosseini, & Sulaiman, 2013). It provides business operation assistance and cloud- based options, which would address three requirements simultaneously. It is important not to overwhelm with too many varying software or applications, leading to confusion and user error. It essential to keep the process clean, efficient, and straightforward. 5 • Wireless Access Point (WAP) – o Setting up a WAP network will ensure Mark and his team have wireless access to his local network (LAN – Local Area Network). This means that the IT infrastructure is interconnected locally and remotely and provides Marks mobility and flexibility to operate wherever needed. This is especially important when an organization has multiple locations that need to be connected or your customer service team is separate from your manufacturing department. • Multifunctional Printer (MFP) - o The MFP will address scanning, faxing, and printing requirements. However, the MFP needs to have remote access capabilities. Most MFPs can be connected to the network server and can be used offsite if required. Using an MFP will provide cost savings since you do not need to buy separate scanners and printers since it will be all-in-one. • Computer/Tablet - o Employees who need to access ERP and 3D printing files and 3D printers located across the facility would benefit from using Windows Surface tablets and laptops. Mark had the option of selecting either the Surface 3 or the Surface Pro 4. According to Mark, these gadgets will allow personnel to access relevant documentation and assist clients while remaining mobile (Weill, Subramani, & Broadbent, 2002). • Cloud Storage - 6 o Marks 3D production files and business management information can be saved locally on his existing PC, and he also has the option of adding an external hard drive. It is recommended that in addition to storing backups locally and on an external drive, Mark also keeps backups on the Cloud. Microsoft Cloud storage is available for purchase by Mark. As a Cloud storage solution, Microsoft OneDrive may be used, and any work done on Surfaces can be stored to OneDrive and retrieved from there (OneDrive QuickStart guide for small businesses, 2021). 5. Data Representation and Storage The other component of his expansion is data and storage. This is a critical component because the IT infrastructure must support and house multiple types of data. In addition, all the equipment and software must be able to speak to each other. The following three data types necessitate specific storage and computer requirements due to their varying formats and data size. a) Digital and Numerical Data - ERP i. Binary coding is used to enter digital and numerical information into computers. Binary code is a system of 1s and 0s that are used in computer programming. Each of the numbers 1 or 0 represents a bit, and bits are the smallest unit of data that a binary computer can understand (Severance, 2015). The computers interpretation of data is represented as digital data representation. Instead of the letters or sentences that the computer user sees, the computer understands the used coding systems. Consequently, Mark will 7 be able to see the letters he is saving, while the data stored on the computer is binary code. b) Audio Data – PC, Tablet, Cloud i. Audio data is comprehended in segments, not in its entirety. With the use of an input device such as a microphone, audio data can be recorded. Samples are used in audio data. Examples are taken from the recording hundreds of times per second, and when they are played back in the same sequence that they were recorded, they will produce the original audio file captured. Files are frequently compressed into formats such as MP3 to take up less space on a computers hard drive. This also makes songs easy to download or transfer and save on an MP3 player or other portable media player (Introduction to Computer Information Systems, 2016). c) Video and Graphics Data – PC, Tablet, Cloud i. Frames are used to record video data throughout the recording process. Video is created by playing a series of frames, which are still shot several times each second and then played back in succession. Video data contains a great deal of information, and the files can be compressed to save storage space. It is possible to store full-length movies, including thousands of frames on optical discs, after being compressed using this method (Weill, Subramani, & Broadbent, 2002). ii. Graphics are multimedia data; these forms of data are images, and they can be kept in the form of a bitmap image file, which is a bitmap image file is a bitmap image file. A bitmap image is made up of pixels or a picture element 8 organized in a grid-like arrangement on a computer screen (Introduction to Computer Information Systems, 2016). Color and intensity are represented by specific groups of numbers in each pixel, and each pixel is made up of a particular group of integers. Pixels are critical in determining the overall quality of an image. An image with a large number of pixels will almost certainly be of higher quality. 9 References 3D Printing Case Study. (n.d.). Retrieved June 20, 2021, from University of Maryland Global Campus: https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View Introduction to Computer Information Systems. (2016). Wikibooks. Retrieved June 28, 2021, from https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View OneDrive QuickStart guide for small businesses. (2021, April 22). Retrieved June 29, 2021, from Microsoft: https://docs.microsoft.com/en-us/onedrive/one-drive-quickstart-small-business Sadrzadehrafiei, S., Gholamzadeh Chofreh, A., Karimi Hosseini, N., & Sulaiman, R. (2013). The Benefits of Enterprise Resource Planning (ERP) System Implementation in Dry Food Packaging Industry. Procedia Technology, 11, 220-226. doi:https://doi.org/10.1016/j.protcy.2013.12.184 Severance, C. (2015). Introduction to Networking. (S. Blumenberg, Ed.) CreateSpace. Retrieved June 28, 2021, from http://creativecommons.org/licenses/by-nc/4.0 Weill, P., Subramani, M., & Broadbent, M. (2002, October 15). Building IT Infrastructure for Strategic Agility. Retrieved June 29, 2021, from MIT Sloan Management Review: https://sloanreview.mit.edu/article/building-it-infrastructure-for-strategic-agility/ 1 3D Printing – Stage 2 Assignment Kyami Clarke IFSM 310 6980 Software and Hardware Infrastructure Concepts University of Maryland Global Campus Timothy Robinson Summer 2021 2 3D Printing – Stage 2 Assignment Background Mark has analyzed the Phase 1 suggestions and details and has requested that you tell him what elements he will require to support his Expansion Plan. Mark would like to concentrate on substituting his worksheet of customer demands with a small-scale business ERP information management in his warehouse to assist him in maintaining his business successfully. Components for 3D Printing System Software is divided into two parts: Design and Printer integration. Designing tools 1. Ultimate Cura software creates your model for 3d printers and includes a plug for laptop design tools. 2. Blender is a well-known computer-aided design program (CAD). Although this powerful design software is not suitable for beginners, it is easier to use by the availability of community support and a free software framework. Hardware Components 1. Various heavy-duty multi-output abilities 3D printers that include metal, carbon, and nylon. Exone Corporation specializes in custom-built industrial and mid-build 3D printing. 2. Marks 3D printing layouts and documents are stored on a Lenovo ThinkServer TS140 server with a monitor. 3. The MS Surface Pro 6 tablet gives the development team more flexibility by allowing them to move about the office. 4. The Verizon Fios Quantum Gateway, with speeds of 300/300 Mbps, is the all modems and routers that enable wireless mobile internet access. 5. The Linksys Velop Intelligent Mesh WiFi System (3) will increase the range of the wireless signals. 6. Wireless serial number scanner used to deliver inventory data to tracking software. Components for ERP Infrastructure Local business enterprise resource management (ERP) management software will include mostly these features, such as accounting, sales, and payment processing. 1. Dynamics 365 Business Core Elements is a simple-to-use and modify all-in-one business administration tool. Velosio, a global network partner, will handle the setup, installation, and maintenance. 2. Microsoft Windows 10, the basic OS on which the Microsoft Surface Pro’s will be loaded. 3. Microsoft Office 365 is a set of word processors and presentation software that the operational and administrative teams will use. 3 4. Bitdefender Antivirus Plus is a premium antivirus program that is reliable, affordable and includes privacy features. 5. Users will have the option of paying with PayPal or using a credit/debit card through PaySafe via Bitdefender. Hardware components will be the same as used for the 3D production process above: 1. All of Marks 3D printing layouts and documents are stored on a Lenovo ThinkServer TS140 server with the monitor. 2. The MS Surface Pro 6 tablet gives the development team more flexibility by allowing them to move about the office. 3. Xerox C505 for Multifunctional printer with mobile printing functionalities. Overall System Working Mark began 3D printing as a pastime. Hes discovered his calling and plans to expand his 3D printing ability. To do so, hell need to be familiar with the commercial side of 3D printing. Hes into a good start by paying for new heavy-duty printers that acquire their files and folders from WiFi tablets. As Mark invests in mesh WiFi technology, backboned by Verizon Fios optical fiber service, these tablets allow Marks production staff to work from wherever in the warehouses. The tablets are bundled with advanced CAD software to aid artists in creating new layouts or modifications to existing customers designs. Mark must also keep track of the materials he is using or what is remaining in his stock. Marks online business includes implementing inventory software using Microsoft Dynamics 365 Business Core Basics and wirelessly hand-held scanners. As a result, its critical that both the 3D printing and administrative processes operate in tandem; otherwise Marks aspirations for a profitable business will remain only that hope and nothing more. 4 Graphical Representation of Hardware Components 5 Graphical Representation of Software Components 6 References 3D Printing Case Study. (n.d.). Retrieved June 20, 2021, from University of Maryland Global Campus: https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View Everythings faster with the new Fios Router. Verizon. (n.d.). https://fios.verizon.com/fios- routers.html Introduction to Computer Information Systems. (2016). Wikibooks. Retrieved June 28, 2021, from https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View Institute, B. (n.d.). Blender for 3D Printing. Blender Cloud. https://cloud.blender.org/p/3d- printing Tims, Morelia, John, Hitemharder, Better, E., Rlmarti, Jocamel, & All, I. T. T. (2017, January 11). Linksys Velop Intelligent Mesh WiFi System, Tri-Band, 3-Pack White (AC6600). Linksys. https://www.linksys.com/us/p/P-WHW0303/ Surface Pro 7 – Ultra-light and versatile – Microsoft Surface. Microsoft Store. (n.d.). https://www.microsoft.com/en-us/p/surfacepro- 6/8zcnc665slq5?activetab=pivot\%3Aoverviewtab Ultimaker Cura: Powerful, easy-to-use 3D printing software. ultimaker.com. (n.d.). https://ultimaker.com/en/products/ultimaker-cura-software https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View https://fios.verizon.com/fios-routers.html https://fios.verizon.com/fios-routers.html https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View https://cloud.blender.org/p/3d-printing https://cloud.blender.org/p/3d-printing https://www.linksys.com/us/p/P-WHW0303/ https://www.microsoft.com/en-us/p/surfacepro-6/8zcnc665slq5?activetab=pivot\%3Aoverviewtab https://www.microsoft.com/en-us/p/surfacepro-6/8zcnc665slq5?activetab=pivot\%3Aoverviewtab https://ultimaker.com/en/products/ultimaker-cura-software 1 3D Printing – Stage 3 Assignment Kyami Clarke IFSM 310 6980 Software and Hardware Infrastructure Concepts University of Maryland Global Campus Timothy Robinson Summer 2021 2 3D Printing – Stage 3 Assignment Introduction Mark 3Ds business is booming, and his father wants to add two more facilities to the existing infrastructure. Mark has previously acquired and integrated some servers in his already founded business and maintained them. To complete these business requirements, he relies on high-speed internet services. He wants the new two locations to have the same number of employees and 3D printers as his current headquarters. The new facilities also require actual coordination with the 3D printing services ERP system. The components implementation of these new facilities is listed on this page, and the significant changes to the leading 3D printing business create the new interconnection to the current ERP system and the difference in the primary two offices infrastructure. New Integration Components These components are divided into two categories: main office components and new branch office elements. The elements in each location and the central office site required for this new, improved infrastructure are shown in the table below. Changes to Existing Infrastructure Establishing a corporate VPN network with distributed networks and applications is the most significant change. The following are the significant modifications to the existing IT infrastructure: 3 • They implement an intranet that connects all of the locations to the main office, with the main office serving as the intranets central management. The businesss primary intranet connectivity over the Internet is over the VPN public internet. The VPN was created to allow for quick network communication between the facilities and the main office. The VPN also allows users to take advantage of the internet infrastructure without incurring additional costs when connecting workplaces over vast distances. • The web server is located in the main office, and it is running Windows Server Standard 2014 R2 with group policies installed. This functionality ensures that all apps are installed in one location and deployed across the network as virtualized application environments. The group policies provided by Windows Server Standard 2014 R2 allow a single program to be installed on a workstation clusters virtual machines. This allows all users to access the expensive programs simultaneously, without any slowdowns. • The proxy server and web server are located at Marks main office; the proxy server is responsible for monitoring all system resources and assigning the firm IP address to network devices. A device with proper authentication can access the intranet and access any network resource through the proxy server. This serves as both user control and an efficient key manager for the company. Difference between New and Existing Infrastructure The management and allocation of resources among the branch offices is critical in the settings due to the new infrastructure. The following are the main differences: • The intranet is managed centrally, with a server room housing the Web server, proxy server, database server, and printing server. This equipment is only found in the main office and not in any of the other locations. The other facilities link to the main office in order to gain access to the apps and hardware specified in the table above. • VLANs are used to connect the sectors and the new facilities. This is to make use of the expensive networking hardware and resources that have already been set up. This ensures that all connections are secure, quick, and consistent to meet the demand for dependable, fast network access. Additional facilities may download 3D files from the database and file servers at the main offices. To be assigned to a specific VLAN, a device must be assigned to a particular department. • The key distinction between the central office facility and the other storage facilities is that the central office facility reduces data redundancy and speeds up the rendering of 3D files. The applications in the new facilities connect the applications in the main office, but it looks that the job is done on the device on their workstations, with the saved data in the Components / Location Marks Main Office New Cisco 2900 series Gateway router DSL First Second ISP Proxy Web Database 4 central office database. This minimizes the networks data redundancy (Koch, 2006). This resource distribution aims to make the most of the limited hardware resources available in order to increase the production speed of the new facilities. • The workstations also vary in that they are simply virtual remote links to the primary office assets; they have restricted performance, but they do have access to the primary office servers resource base and superior quality hardware. Furthermore, no software is installed on the workstation clusters; instead, all applications are run as single instances on the central office database server Proposed Connection Plan for the New Facilities Expansion Location-Based Connection Setup 5 References 3D Printing Case Study. (n.d.). Retrieved June 20, 2021, from University of Maryland Global Campus: https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View Clarke, G. E. (2014). 1,001 CCNA Routing and Switching Practice Questions for Dummies. For Dummies. Retrieved July 26, 2021, from https://www.dummies.com/programming/certification/1001-ccna-routing-and-switching- practice-questions-for-dummies-cheat-sheet/ Coulouris, G., Dollimore, J., Kindberg, T., & Blair, G. (2012). Distributed Systems: Concepts and Design, 5th edition. Pearson. doi:9780132143011 Introduction to Computer Information Systems. (2016). Wikibooks. Retrieved June 28, 2021, from https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View Koch, N., Zhang, G., & Escalona, M. (2006). Model transformations from requirements to Web system design. ICWE06: The Sixth International Conference on Web Engineering (pp. 281-288). ResearchGate. doi:10.1145/1145581.1145637 Kopetz, H. (2011). Real-Time Systems: Design Principles for Distributed Embedded Applications (2nd ed.). Boston, MA: Springer. DOI: https://doi.org/10.1007/978-1-4419- 8237-7 Stojanović, D., Predić, B., Antolović, I., & Đorđević-Kajan, S. (2009). Web information system for transport telematics and fleet management. 2009 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services (pp. 314-317). IEEE. doi:10.1109/TELSKS.2009.5339516 https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821578/View https://www.dummies.com/programming/certification/1001-ccna-routing-and-switching-practice-questions-for-dummies-cheat-sheet/ https://www.dummies.com/programming/certification/1001-ccna-routing-and-switching-practice-questions-for-dummies-cheat-sheet/ https://learn.umgc.edu/d2l/le/content/581305/viewContent/21821575/View https://doi.org/10.1007/978-1-4419-8237-7 https://doi.org/10.1007/978-1-4419-8237-7 Clarke_Kyami_Stage_1 3D Printing – Stage 1 Assignment 3D Printing – Stage 1 Assignment 1. Background 2. Current IT Infrastructure 3. Requirements 4. How are Requirements Met 5. Data Representation and Storage References Clarke_Kyami_Stage_2 3D Printing – Stage 2 Assignment 3D Printing – Stage 2 Assignment Background Designing tools Hardware Components Clarke_Kyami_Stage_3 3D Printing – Stage 3 Assignment 3D Printing – Stage 3 Assignment Introduction The management and allocation of resources among the branch offices is critical in the settings due to the new infrastructure. The following are the main differences: Chapter 10 Wrap Up It has been said that building the Internet solved the world’s most complex engineering problem to date. The design and engineer- ing of the Internet started well over 50 years ago. It has been continuously improving and evolving over the past 50 years and will continue to evolve in the future. The Internet now connects billions of computers using many thou- sands of routers and link-level connections. The Internet is so complex that it is never fully operational, The Internet is less about being “perfect” and more about adapting to problems, out- ages, errors, lost data, and many other unforeseen problems. The Internet is designed to be flexible and adapt to whatever prob- lems are encountered. !#$\%&( )&&*+,#(+$ -$(.$.(/0 1+$0 Figure 10.1: The Four-Layer Model In order to build an overall solution that works at scale, it was 109 110 CHAPTER 10. WRAP UP important to break the Internet engineering problems down into four distinct layers: • The Link/Physical layer includes all of the complex engineer- ing required to move data across a single “hop”, whether the hop is a wireless WiFi, wired Ethernet, fiber optic, or satellite connection. • The Internetwork Protocol (IP) layer is how data is routed across a series of hops to get quickly and efficiently from one of a billion source computers to any of a billion destination computers. The IP layer dynamically adjusts and reroutes data based on network load, link performance, or network outages. While the IP layer is highly reliable and fast, at times it loses or even throws away data. The IP layer is not responsible for insuring the overall reliability of the network. It just moves the data the best that it can. • The Transport layer compensates for any imperfections in the IP or Link layers. The Transport layer makes sure that any lost packets are retransmitted and packets that arrive out of order are put back into order before being passed on to the receiving application. The Transport layer also acts as flow control between the sending and receiving applications to make sure that data is moved quickly when the network is fast and the links are not overloaded, and to slow the trans- fer of data when using slower or heavily loaded links. The data flow and rate limitation in the Transport layer allow the Internet to continue to function smoothly even when it is heavily loaded. • The other three layers make the use of the network very simple for the Application Layer. An application can make a network connection and send/receive data on that connec- tion with just a few lines of code. By making the use of the network simple, applications can focus on solving the end- user problems they need to solve. Because it is so easy for applications to use the network in new and different ways, we have seen the emergence of a wide range of highly inno- vative applications that work without any changes required to the Internet protocols. Without breaking the problem of engineering and building the In- ternet into these four distinct layers, it would be far more difficult to build and deploy ever-improving versions of the network. And 111 if every single application needed to be fully aware of all of the complex details required to use the Internet, it would greatly limit the richness and diversity of the networked applications that we have today. It is amazing to realize what has been accomplished in building the Internet over the past 50 years. But in a way, we have only just begun the engineering journey of building networked appli- cations. It does not take much to imagine an Internet where ev- ery light switch, lightbulb, refrigerator, table, automobile, road- way, flying drone, and chair has an Internet address and they all want to communicate with one another. New engineering issues will have to be solved, and perhaps even the four-layer network model will need to evolve to meet these new engineering chal- lenges. But just like brilliant engineers designed and evolved network pro- tocols to move from hundreds of network-connected computers to billions of network-connected computers, our present and fu- ture engineers will certainly solve the problems and challenges we will face as the network evolves to connect trillions of comput- ers. Chapter 9 The OSI Model So far we have spent all of our time describing the four-layer model used to design and implement the TCP/IP protocols and ap- plications that make up the Internet. However, the TCP/IP model is not the only model we can use to help us understand how net- works work. The other model commonly used to make sense of network design is called the Open System Interconnection (OSI) model. While the TCP/IP model was designed and evolved as the TCP/IP protocols were developed, deployed, and changed, the OSI model was the result of a careful design process by many net- working experts who worked to develop a general approach to network models. In today’s networked world, the OSI model and the TCP/IP model serve two different purposes.1 The TCP/IP model is an implemen- tation model, in that it provides the guidance for those who would build TCP/IP-compatible network hardware or software. The OSI model is more of an abstract model that can be used to under- stand a wide range of network architectures. While TCP/IP is the most widely used network technology today, many different types of networks have been implemented and de- ployed over the past 50 years. And as we continue to improve and evolve networking, new implementation models may emerge. The OSI model has seven layers instead of the four layers of the TCP/IP model. Starting at the bottom (nearest the physical con- nections) of the OSI model, the layers are: (1) Physical, (2) Data Link, (3) Network, (4) Transport, (5) Session, (6) Presentation, and 1This, of course, is an oversimplification. Prior to 1990, there were opera- tional network implementations based on ISO specifications that followed the OSI network model very closely. But today, those ISO/OSI network implementa- tions no longer are in broad use. 101 102 CHAPTER 9. THE OSI MODEL (7) Application. We will look at each layer in the OSI model in turn, starting with the Physical layer. 9.1 Physical (Layer 1) The OSI Physical layer deals with the physical attributes of the actual wired, wireless, fiber optic, or other connection that is used to transport data across a single link. The Physical layer also defines the shapes of the connectors and type of media which can be used. Another problem solved at this layer is how to encode the bits (0’s and 1’s) that make up the data being sent across the medium.2 The “bit encoding” (or modulation) determines how fast data can be sent across the link. 9.2 Data Link (Layer 2) The OSI Data Link layer is concerned with how the systems using a physical link cooperate with one another. When data is broken into packets, the Data Link layer defines special sequences to indi- cate the beginning and end of each packet. The stations commu- nicating using the physical connection are assigned addresses to allow for effective use of the media. Sometimes multiple stations are sharing the same media (as on a wireless network) and the Data Link layer defines how those stations will share the connec- tions with the other systems connected to the network. Most Data Link layers also have some form of checksum to detect and/or cor- rect for errors in the transmitted data. The design problems solved in the Physical and Data Link layers of the OSI model are addressed by the Link layer of the TCP/IP model. 9.3 Network (Layer 3) Like the Internetwork Layer (IP) in the TCP/IP model, the OSI Net- work layer deals with the global assignment of “routable” ad- dresses to the various systems connected to the network. The 2“Manchester Encoding” is a common technique for encoding bits for trans- mission across a wire. 9.4. TRANSPORT (LAYER 4) 103 Network layer governs how routers forward packets across mul- tiple hops to get from their source to their destination. Like the IP layer, The OSI Network layer does not attempt to be error free, as it assumes that lost data will be detected and retransmitted at the next layer up. 9.4 Transport (Layer 4) The Transport layer in the OSI model manages packet loss and retransmission as well as flow control and window size. The rest of the functionality of the TCP/IP Transport layer is handled in the Session layer in the OSI model. 9.5 Session (Layer 5) The OSI Session layer handles establishing connections between applications. The Session layer deals with “ports” so that a con- necting client application can “find” the correct server application on a particular system. Some aspects of secure transmission are also handled in the OSI Session layer. 9.6 Presentation (Layer 6) The Presentation layer focuses on how data is represented and encoded for transmission across the network. As an example, the Presentation layer would describe how to encode the pixels of an image so that the receiving application can properly decode the data. The Presentation layer also handles data encryption and decryption. 9.7 Application (Layer 7) The OSI Application Layer is very similar to the Application layer in the TCP/IP model, in that it contains the applications them- selves. Some applications are client applications that initiate connections, and other applications are the server applications that respond to those connection requests. The various pairs of applications have protocol standards that define interoperability 104 CHAPTER 9. THE OSI MODEL between multiple clients and multiple servers from different ven- dors. !#$\%&( )&&*+,#(+$ -$(.$.(/0 1+$0 )&&*+,#(+$ !#$\%&( 5#(#61+$0 278\%+,#* !#$#\%#& ()\%#*+),-.#/0$ ()\%12$+#)3445 !#$ 67&+08+&+$1 9**7+),-3-6#:$+), 9**7+),-3-;##*+)0$+#) <#&$0,7-3-=7>:7)\%+7 4277*-3-;#))7\%$# Figure 9.1: Comparing the TCP and OSI Models 9.8 Comparing the OSI and TCP/IP Models We can use the OSI model to provide an alternative “view” of the TCP/IP model by comparing how the OSI model breaks network functionality into its layers and how the TCP/IP model breaks its functionality into layers. 9.9 Link Layer (TCP/IP) The TCP/IP Link layer combines the Physical and Data Link layers from the OSI model. The Physical and Data Link layers are usually implemented in hardware. Products like Ethernet, WiFi, satellite, or fiber optic often are implemented in a network driver card that plugs into the back of a computer or router. The network driver card generally implements both the physical and the data link 9.10. INTERNETWORK LAYER (TCP/IP) 105 aspects of the connection in the hardware on the card. In most cases, the data link layers are tuned to the limitations and require- ments of their corresponding physical layers. So in real systems, it is somewhat rare for a particular data link layer to be arbitrarily paired with any number of physical layers. Since it can be hard to separate the physical and data link aspects for a particular link technology, the TCP model combines them into a single layer for simplicity. 9.10 Internetwork Layer (TCP/IP) One place that maps pretty cleanly between the two models is the OSI Network and TCP/IP Internetwork layers. They perform the same functions of creating a globally routable address space and building routers to insure that packets properly find their way from the source to the destination across multiple hops. 9.11 Transport Layer (TCP/IP) The features of the Transport layer in TCP/IP are spread across the Transport and Session layers of the OSI model. The OSI Transport layer deals with flow control and packet retransmission, while the OSI Presentation layer deals with multiple applications running on multiple ports as well as session establishment and teardown. The Secure Sockets Layer (SSL) in the TCP/IP model corresponds to parts of the Session and Presentation layers in the OSI model. 9.12 Application Layer (TCP/IP) The TCP/IP Application Layer combines the non-security aspects of the OSI Presentation layer and the OSI Application layer. While many TCP/IP applications deal with issues like encoding and de- coding various types of data, the TCP/IP model does not see data formatting as a separate “layer”. Various data encoding and de- coding technologies are used in TCP/IP applications, but TCP/IP tends to treat these capabilities as library code that applications make use of as needed for the application. 106 CHAPTER 9. THE OSI MODEL 9.13 Conclusion While the TCP/IP model described in this book is widely used to guide the implementation of TCP/IP networks, hardware, and soft- ware, the OSI model can help us look at and compare a wide range of network architectures ranging from openly developed networks to proprietary vendor-specific networks. 9.14 Glossary abstract model: A model and set of terminology that is used to generally understand a problem area and guide the development of standards and implementations to solve problems. implementation model: A model and set of terminology that is used to guide the development of standards and an implementa- tion to solve a particular problem. ISO: International Organization for Standardization. A worldwide body that develops standards in computing, networking, and many other areas. OSI: Open System Interconnection. A seven-layer model used to help organize the design of various approaches to network archi- tecture. 9.15 Questions You can take this quiz online at http://www.net-intro.com/quiz/ 1. What is the primary value of the OSI network model? a) OSI networks are used in the southern hemisphere b) The OSI approach can be use to analyze many different net- work models c) OSI networks make better use of limited bandwidth d) OSI networks are more secure 2. How many layers does the OSI model have? a) Four 9.15. QUESTIONS 107 b) Six c) Seven d) Nine 3. Which of the OSI layers deals with the shape of connectors for network connections? a) Physical b) Data Link c) Network d) Transport 4. Which of the layers is most similar between the OSI and TCP network models? a) TCP Link Layer and OSI Data Link Layer b) TCP Internetwork Layer and OSI Network Layer c) TCP Transport Layer and OSI Transport Layer d) TCP Application Layer and OSI Session Layer 5. What layer does the TCP/IP Secure Sockets Layer map to in the OSI network model? a) Secure Data Link Layer (SDLL) b) Secure Network Layer (SNL) c) Secure Transport Layer (STL) d) Session and Presentation Layers 6. Why does the TCP model combine the OSI Data Link and Physical layers into a single Link layer? a) Because the TCP model does not worry about the Physical layer b) Because the TCP model designers were ignored at the 1981 OSI meeting in Utrect, Netherlands c) Because quite often the design of Data Link and Physical layers are tightly connected for a particular technology d) To make the TCP model easier to understand by end users Chapter 8 Secure Transport Layer In the early days of the Internet, networks were small and all of the routers were in secure locations. As long as each computer connected to the Internet protected itself from unwanted incom- ing connections, it was felt that there was no need to protect data from prying eyes while it was crossing the network. So the Link, Internetwork, and Transport layers were focused on the efficient movement of data and solving the problems of a large-scale shared distributed network without worrying about the privacy of that data. But as the use of the Internet grew rapidly in the late 1980s and literally exploded when the Web became mainstream in 1994, se- curity and privacy of network traffic became very important prob- lems to solve. When we began using the Internet to conduct com- merce and credit cards and bank account numbers were being routinely sent across the network, securing data became essen- tial. And when we started using wireless technologies like WiFi, security became necessary for even the simplest uses of the In- ternet. There are two general approaches to securing network activity. The first makes sure that all of the network hardware (routers and links) is in physically secure locations so it is not possible for someone to sneak in and monitor traffic while it is crossing the Internet. This approach is not practical for hundreds of thousands of network routers owned and operated by many different orga- nizations. While you might be able to ensure that some of the router operators adhered to strict security procedures and poli- cies, sooner or later a mistake will be made. And once WiFi was added to the mix and your packets went over radio waves, a net- work attacker could just sit in a coffee shop and intercept packets 89 90 CHAPTER 8. SECURE TRANSPORT LAYER as they passed through the air. Under these conditions, the only reasonable solution is to encrypt data in your computer before it is sent across its first physical link, and then decrypt the data in the destination computer after it arrives. Using this approach, we assume that an attacker can see all of the packets that you send, but they cannot decrypt the data that they have captured. The encryption also guarantees that there is no way to alter your data while it is crossing the Internet. 8.1 Encrypting and Decrypting Data The concept of protecting information so it cannot be read while it is being transported over an insecure medium is thousands of years old. The leaders in Roman armies sent coded messages to each other using a code called the “Caesar Cipher”. The simplest version of this approach is to take each of the characters of the actual message (we call this “plain text”) and shift each charac- ter a fixed distance down the alphabet to produce the scrambled message or “ciphertext”. Then we send the ciphertext via the courier or other insecure transport to the other person. The courier cannot read the mes- sage because it appears to be random characters unless you know the technique used to encode the message. As long as the person receiving the message knew the number used to shift the message, they could unshift the characters in the encoded message to reproduce the original message. Here is a simple example of plain text and ciphertext using a shift of one: Plain text: Go to the river Cipher text: Hp up uif sjwfs We use the word “encrypt” to describe transforming the plain text to the ciphertext and “decrypt” to describe the reverse process. The Caesar Cipher is very simple to defeat, but it was used to protect important messages until about 150 years ago. Modern encryption techniques are far more sophisticated than a simple character shift, but all encryption systems depend on some kind of a secret key that both parties are aware of so they can decrypt received data. 8.2. TWO KINDS OF SECRETS 91 8.2 Two Kinds of Secrets The traditional way to encrypt transmissions is using a shared se- cret (a password, a sentence, a number) that only the sending and receiving parties know. With the secret, it is easy to decrypt the received data, but if you received the data without possess- ing the secret, it would be effectively impossible to decrypt the message. Figure 8.1: Shared Versus Asymmetric Keys In the early days of the Internet, two people could send encrypted email to each other by one person first calling the other person on the phone and giving them the decryption secret. This worked well when there were only a few users on the network, but could not scale to situations where a company might have millions of customers and could not afford to make a phone call to each cus- tomer to establish a shared secret before they could make a pur- chase. It might seem like a good idea to distribute the shared secrets over the Internet, but if we assume that the attackers are monitor- ing and capturing all network traffic, they could also capture the unencrypted message that contained the shared secret. At that point it would be trivial for the attacker to use the shared secret to decrypt a message. And even worse, the attacker could inter- cept a message, delay it, then decrypt it, change and re-encrypt it, and send the modified message back on its way. The receiving 92 CHAPTER 8. SECURE TRANSPORT LAYER computer would decrypt the message and never know that it had been modified by an attacker while in transit. So shared secrets clearly would not work to solve the problem of securing network traffic between trillions of pairs of networked computers. The solution to this problem came in the 1970s when the con- cept of asymmetric key encryption was developed. The idea of asymmetric key encryption is that one key is used to encrypt the message and another key is used to decrypt it. The computer that will be receiving the encrypted data chooses both the encryption key and decryption key. Then the encryption key is sent to the computer that will be sending the data. The sending computer encrypts the data and sends it across the network. The receiving computer uses the decryption key to decrypt the data. We call the encryption key the “public” key because it can be widely shared. We call the decryption key the “private” key be- cause it never leaves the computer where it was created. Another name for asymmetric keys is public/private keys. The whole process is designed so that if an attacker has the public key (which was sent unencrypted) and the encrypted text, it is virtually impossible to decrypt the encrypted data. There is a lot of math with large prime numbers that makes it hard to guess the private key from the public key and encrypted data. So with the advent of public/private key technology, the only question left was how to apply it in our network model. 8.3 Secure Sockets Layer (SSL) Since network engineers decided to add security nearly 20 years after the Internet protocols were developed, it was important not to break any existing Internet protocols or architecture. Their so- lution was to add an optional partial layer between the Transport layer and the Application layer. They called this partial layer the Secure Sockets Layer (SSL) or Transport Layer Security (TLS). When an application requested that the Transport layer make a connection to a remote host, it could request that the connec- tion either be encrypted or unencrypted. If an encrypted connec- tion was requested, the Transport layer encrypted the data before breaking the stream into packets. This meant that the Transport layer, Internetwork layer, and physical (link) layers could still per- form exactly the same way whether the packets were encrypted 8.4. ENCRYPTING WEB BROWSER TRAFFIC 93 Figure 8.2: Where Encryption and Decryption Happens or non-encrypted. The applications making the connections were also spared the details of how encryption and decryption worked. Since encryption was a simple and transparent addition to the Transport layer, there was no need to change the routers that operate at the Internetwork and Link layers. There was no need to change any Link layer hardware to make encryption work. And applications did not need to be modified except to request that a connection be encrypted when appropriate. 8.4 Encrypting Web Browser Traffic Since web browsers and web servers operate at the application layer, we barely notice whether we are using encrypted or un- encrypted connections. Web browsers use the URL convention of replacing “http:” with “https:” to indicate that the browser is to communicate with the web server using the Secure Transport Layer instead of the unencrypted Transport layer. Your browser will usually show a “lock” icon in the address bar to let you know that you are communicating with a secure web site. 94 CHAPTER 8. SECURE TRANSPORT LAYER There is a small overhead in setting up the https connections and a small cost to encrypt and decrypt the data that is being sent. Since https was slightly more costly, for a while it was used only for pages that contained passwords, bank account numbers, or other sensitive data. But over time as networks have become faster and the https im- plementations have gotten much more efficient, there is a trend toward encrypting all web server interactions whenever you are interacting with a web server where you have an account. The current trend is towards using https for all web traffic. 8.5 Certificates and Certificate Authorities While public/private key encryption works to allow the distribution of encryption keys across insecure networks and the use of those keys to encrypt transmissions, there is still a problem of knowing if the public key that you have received when you connected to a server is really from the organization it claims to be from. Figure 8.3: Certificate Authorities and Public Keys Perhaps you think you are connecting to www.amazon.com but a rogue computer intercepts your traffic, claiming to be 8.6. SUMMARY 95 www.amazon.com and giving you a public key to use for encryp- tion. If your web browser trusts the key, it will use the rogue computer’s public key to encrypt your banking information and send it to the rogue computer. Since the rogue computer gave you the public key, it also has the corresponding private key and is able to decrypt and abscond with your banking information. So your computer needs to know who the key is actually coming from. This is achieved by sending you a public key that is digi- tally signed by a Certificate Authority (CA). When your computer or browser is initially installed, it knows about a number of well- known certificate authorities. If your browser is given a public key that is signed by one of the well-known certificate authorities, it trusts the key and uses it to encrypt and send your data. If your computer receives a public key that is not signed by one of its trusted certificate authorities, it will warn you before sending your data using the key. If you see a warning message about an untrusted certificate, you should probably say “no” and figure out why your network traffic is not being routed to the server that you think it is going to before sending any sensitive data. 8.6 Summary Since the Internet was nearly 20 years old before we needed broadly deployed security, we had to find a way to add security to the already existing four-layer model. The perfect place to add se- curity was as an option in the Transport layer. This is why we call secure connections on the Internet “Secure Sockets Layer” (SSL) or “Transport Layer Security” (TLS). There are subtle differences between SSL and TLS but they both encrypt data at the Transport layer. The invention of public/private key encryption was well timed in that it solved the key distribution problem of shared-secret en- cryption approaches. With public/private keys, the public encryp- tion key can be routinely shared across insecure media. This means we can use an unencrypted connection to exchange data and upgrade the connection to a secure connection. By inserting the secure layer at the top of the Transport layer, we were able to avoid changing the Application, Internetwork, and Link layers while still easily securing any Transport layer connec- tion. This approach ensures that all data being sent across a con- nection is encrypted before it leaves your computer. Given that 96 CHAPTER 8. SECURE TRANSPORT LAYER many of us use wireless connections like WiFi, which are easily monitored by attackers, it is a good idea to encrypt data before it is sent across WiFi. Browsers support secure connections by changing the prefix on the URL from “http:” to “https:”. By keeping an eye on the URL, end users can make sure they never send sensitive data across insecure connections. A series of trusted Certificate Authorities will sign public keys to give you an assurance that the key you received is indeed from the organization you expect it to be. The design of the Secure Transport Layer provides a secure and yet easy-to-use mechanism for secure communications across the Internet at a scale of trillions of pairs of interacting comput- ers. 8.7 Glossary asymmetric key: An approach to encryption where one (public) key is used to encrypt data prior to transmission and a different (private) key is used to decrypt data once it is received. certificate authority: An organization that digitally signs public keys after verifying that the name listed in the public key is actu- ally the person or organization in possession of the public key. ciphertext: A scrambled version of a message that cannot be read without knowing the decryption key and technique. decrypt: The act of transforming a ciphertext message to a plain text message using a secret or key. encrypt: The act of transforming a plain text message to a ci- phertext message using a secret or key. plain text: A readable message that is about to be encrypted before being sent. private key: The portion of a key pair that is used to decrypt transmissions. public key: The portion of a key pair that is used to encrypt transmissions. shared secret: An approach to encryption that uses the same key for encryption and decryption. SSL: Secure Sockets Layer. An approach that allows an appli- cation to request that a Transport layer connection is to be en- 8.8. QUESTIONS 97 crypted as it crosses the network. Similar to Transport Layer Se- curity (TLS). TLS: Transport Layer Security. An approach that allows an ap- plication to request that a Transport layer connection is to be en- crypted as it crosses the network. Similar to Secure Sockets Layer (SSL). 8.8 Questions You can take this quiz online at http://www.net-intro.com/quiz/ 1. How do we indicate that we want a secure connection when using a web browser? a) Use https:// in the URL b) Use a secure web browser c) Open an incognito window d) Manually encode the address of the server using SHA1 2. Why is a shared-secret approach not suitable for use on the Internet? a) Because people would lose or misplace the secret b) It is difficult to distribute the secrets c) Encryption and decryption with shared secrets are too easily broken d) Encryption and decryption with shared secrets take too much compute power 3. What is the underlying mathematical concept that makes public/private key encryption secure? a) Continuous functions b) Taylor series c) Karnaugh Maps d) Prime numbers 4. Which of the keys can be sent across the Internet in plain text without compromising security? 98 CHAPTER 8. SECURE TRANSPORT LAYER a) Encryption key b) Decryption Key c) Shared Secret d) Univerally Safe Key (USK) 5. Where does the Secure Sockets Layer (SSL) fit in the four- layer Internet architecture? a) Below the Link layer b) Between the Link and Internetworking layers c) Between the Internetworking and Transport layers d) Between the Transport and Application layers 6. If you were properly using https in a browser over WiFi in a cafe, which of the following is the greatest risk to your losing credit card information when making an online purchase? a) Someone captured the packets that were sent across the WiFi b) Someone captured the packets in the gateway router c) Someone captured the packets as they passed through a core Intenet router d) You have a virus on your computer that is capturing keystrokes 7. With the Secure Sockets Layer, where are packets encrypted and decrypted? a) They are encrypted and decrypted as they pass through the router b) Each physical link has its own separate encryption c) They are encrypted in your computer and decrypted in the server d) They are encrypted in the WiFi gateway and decrypted in the last router before the destination computer 8. What changes to the IP layer were needed to make secure socket layer (SSL) work? a) No changes were needed b) We had to add support for Secure IP (IPSEC) c) We needed to support longer packets in IP 8.8. QUESTIONS 99 d) The Time-To-Live (TTL) value needed to be encrypted 9. If a rogue element was able to monitor all packets going through an undersea cable and you were using pub- lic/private key encryption properly, which of the following would be the most difficult for them to obtain? a) What servers you were communicating with b) How often you used the servers c) How much data you retrieved from the servers d) Which documents you retrieved from the servers 10. What is the purpose of a Certificate Authority in pub- lic/private key encryption? a) To make sure people do not forge badges for learning activi- ties b) To make sure packets get routed to the correct destination computer c) To assure us that a public key comes from the organization it claims to be from d) To choose when a particular country must switch from IPv4 to IPv6 11. The ARPANET network was in operation starting in the 1960s. Secure Sockets Layer (SSL) was not invented util the 1980s. How did the ARPANET insure the security of the data on its network? a) By using public/private keys and encrypting all transmis- sions b) By using encryption at the Link layer c) By making sure no one could access the physical links d) By only using secure WiFi routers 12. Which of these answers is “Security is fun” encrypted with a Caesar Cipher shift of 1. a) Ptsjduao rt dii b) Wentudhs di dju c) Tfdvsjuz jt gvo d) Asdfghjk qw zxc 100 CHAPTER 8. SECURE TRANSPORT LAYER 13. What Caesar Cipher shift was used to encrypt “V yvxr fr- phevgl”? a) 1 b) 6 c) 13 d) 24
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident