Network Design - Information Systems
NO PLAGAIRISM PLEASE!  All the instructions have been attached below. The CTO has asked you to develop a network design that provides the following: · A Microsoft word document that spells out your network design, the recommended network cabling, device(s), and connections between workstations, device(s), and servers (in other words, summarize in writing your recommendations to the above).  · A physical network diagram that displays the components specified above. Format the body of the paper with the following sectional headings (should be bolded in paper): 1. Network Design Description 2. Network Devices and Connections 3. Network Cabling 4. Conclusion Your network diagram can be produced using any drawing software package available if you save it in a format that is viewable to your instructor, such as a pdf (check with your instructor to ensure she/he can open your particular network diagram). In addition, you may choose to draw your physical diagram by hand, which is okay. Please make the diagram neat and legible, use color to identify specific components and cable paths, label all components, and upload a high-resolution photo of your design to the assignment tab. You may break your diagram into sections (photograph and upload those separately) if you include an illustration of how these sections fit together. Introduction This is an individual project. Each student must complete a network design for an office building that proposes a telecommunications solution to address an organization that is moving into a new office space. The target audience will be the organization’s Chief Technology Officer (CTO). The network design deliverable is an Microsoft Word document. The completed network design deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects. The Network Design is valued at 14% of the course grade. Scenario Congratulations! After graduating from UMUC with your degree, you’ve been hired by a local company that is in the process of moving into new space. Your job is design out the local area network for this new space. The office building has 3 floors with cubicle and office space for 24 workstations on each floor. Additionally, on the second floor, there is a separate space designated for four file servers, which will be used company-wide. Finally, there are two telecommunications closets on each end of each floor for housing network equipment. Please review the accompanying office diagram for specifics before you begin designing the network. Your design assumption is that the network should support the following on each desktop workstation: a) Office applications such as Microsoft Office Suite (housed on one of the local servers) b) Electronic Mail (housed on one of the local servers) c) Network file sharing (housed on one of the local servers) d) Internet Access e) Database access to one of the local servers f) Occasional data streaming (live video conferencing, etc.) Your specific assignment is to complete the following: 1. Specify what type of cabling would run to each workstation; 2. Specify the network device(s) housed on each floor; 3. Specify the connections between the network devices and servers (what type of network are you proposing); and 4. Explain your rationale for each of the decision above. In other words, why did you select the device/cabling/connections. 5. Develop a physical network diagram that shows cabling choices, network devices and connections to devices and servers. The Deliverable The CTO has asked you to develop a network design that provides the following: · A Microsoft word document that spells out your network design, the recommended network cabling, device(s), and connections between workstations, device(s), and servers (in other words, summarize in writing your recommendations to the above). · A physical network diagram that displays the components specified above. Format the body of the paper with the following sectional headings (should be bolded in paper): 1. Network Design Description 2. Network Devices and Connections 3. Network Cabling 4. Conclusion Your network diagram can be produced using any drawing software package available if you save it in a format that is viewable to your instructor, such as a pdf (check with your instructor to ensure she/he can open your particular network diagram). In addition, you may choose to draw your physical diagram by hand, which is okay. Please make the diagram neat and legible, use color to identify specific components and cable paths, label all components, and upload a high-resolution photo of your design to the assignment tab. You may break your diagram into sections (photograph and upload those separately) if you include an illustration of how these sections fit together. IFSM 370 Project 1: Network Design for Office Building Instructions You should include at least one relevant external reference, and your sources must be cited correctly in APA format. Use sectional headings that are descriptive of the topic criteria in the assignment. Your paper will be graded according to the Scoring Rubric below. Be sure you have incorporated all required aspects of the assignment. Page 4 of 5 Scoring Rubric Attribute Full points Partial points No points Possible Points Proposed Cable Recommendation The proposed cable recommendation is based on a complete understanding of telecommunications concepts and is applicable for this situation. Cable distance limitations have been adhered to. The proposed cable recommendation is based on an incomplete or limited understanding of telecommunications concepts. The solution may or may not be applicable for this situation. Cable distance limitations have not been adhered to. Cable recommendation missing. 3 Proposed Network Device(s) The proposed network device recommendation is based on a complete understanding of telecommunications concepts and is applicable for this situation. The proposed network device recommendation is based on an incomplete or limited understanding of telecommunications concepts. The solution may or may not be applicable for this situation. Network device recommendation missing. 3 Proposed Network Connections The proposed network connections (type of network) recommendation is based on a complete understanding of telecommunications concepts and is applicable for this situation. The proposed network connections (type of network) recommendation is based on an incomplete or limited understanding of telecommunications concepts. The solution may or may not be applicable for this situation. Network connections recommendation missing 2 Physical Network Diagram Physical network diagram is complete (contains all relevant connections, devices, and labeled appropriately) so that the CTO can understand the design without reading the accompanying write-up. Physical network diagram is partially complete (missing some relevant connections, devices, and may not be labeled appropriately or missing labels) so that the CTNetNO cannot get a full understand the design without reading the accompanying write-up. No physical network diagram present. 3 External research Any reference source other than the assigned readings and course materials are incorporated and used effectively and cited using APA guidelines. Any reference source other than the assigned readings and course materials are not incorporated correctly or are cited incorrectly using APA guidelines. No sources cited. 1 Total Points: 12 10 m 10 m 10 m 10 m 10 m 10 m 100 m 100 m 25 m Workstations Telcom closets Servers Elevator Shafts Project 1 Building Diagram Module 3: Telecommunications and Networking Essentials, cont. Topics 1. Network Components 2. Network Topologies Network Components Advances in networking technology have been great and many over the past two decades. From early technology that transmitted at 4 Mbps to current technology that transmits at 100 Gbps, and from thick Ethernet to wireless, technology continues to evolve. Telephones have also experienced an astonishing evolution, going from voice only to now supporting voice, data, and video. The equipment used to interconnect our networks has also continued to change. Maintaining a working knowledge of the hardware that forms the fabric of our networks is essential. This section will relay a basic explanation of the networking components that you may encounter while designing telecommunications systems. Network Interface Adapters Every network computer must have at least one network interface adapter to provide the link between the computer and the network. It could be integrated in the motherboard or inserted in the expansion slots. Industry Standard Architecture (ISA), Peripheral Component Interconnect (PCI), or PC Card buses are a few of the many types of adapters. A computer's network interface adapter is associated with the specific data link-layer protocol that the network is using and is usually connected with a cable jack, such as RJ-45 for twisted-pair cables, BNC or AUI for coaxial cables, or ST or SC for fiber-optic cables, but it can also be a wireless transmitter of some sort. Understanding Network Interface Adapter Functions In a sending machine, the network interface adapter is responsible for creating frames with the data (datagram) received from the network layer. In the receiving machine, the network interface adapter reads the contents of the incoming frame and passes the data to the appropriate network layer protocol. The network interface adapter implements the physical-layer encoding scheme that converts the binary data into electrical voltage (or light pulses or radio signals) and then converts the received signal back into binary data. It transmits and receives data one frame at a time, so it uses built-in buffers to store data temporarily. It is also responsible for converting data from parallel communication within the computer to serial communication over the media. In addition, the network interface adapter is responsible for implementing the media access control (MAC) mechanism (CSMA/CD or CSMA/CA) that the data link-layer protocol uses to regulate access to the network medium. Figure 2.12 Network Interface Card Source: User: Barcex. [Photo of a FORE Systems network interface card]. Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Network Hubs A hub or concentrator is a device used to connect all the computers on a star or ring network and is associated with the physical link-layer protocol that the network is using. Ethernet hubs are most common because Ethernet is the most popular data link-layer protocol. Token ring multistation access units (MAUs) are hubs, too, and other protocols, such as FDDI, can also use hubs. An Ethernet hub is a multiport repeater, meaning that it amplifies all of the signals that pass it to counteract the effects of attenuation. A large network can have many hubs interconnected through a specialized port called an uplink port. When data enter a hub through any of its ports, the hub amplifies the signal and transmits it through all the other ports. It seems feasible to create very large networks just by using many repeaters or hubs, but in practice, the addition of hubs or repeaters is governed by the 5-4-3 Rule. The rule states that in a collision domain, no two nodes may be separated by more than five repeaters or hubs, four segments, and three populated segments. A populated segment is an Ethernet segment with at least one machine directly connected to it. Another function of the Ethernet hub is to provide a crossover circuit that connects the transmit pins to the receive pins for each connection between two computers. The uplink port in the hub is the one port that has no crossover circuit. A crossover cable is a UTP cable that has the transmit pins on one end of the cable wired to the receive pins on the other end, thus eliminating the need for a crossover circuit in the hub. Therefore, two computers can be connected directly to each other without a hub by using a crossover cable. Hubs are physical-layer devices, meaning that they usually do not interpret a signal. However, some expensive hubs have data-processing capabilities and can provide store and forward services using their buffers. Some "intelligent" hubs include management features. These intelligent hubs can be used to monitor the operations of the hub's ports along with Simple Network Management Protocol (SNMP). Although they look similar, the MAU used in token ring networks is different from the Ethernet hub. A MAU is a passive device and does not work as a repeater. Moreover, a MAU does not transmit a packet to all of the connected computers simultaneously. Instead, it transmits to one computer at a time in one direction in the ring, until the packet reaches the originator, where the packet is removed. Ports in MAUs where no running computers are connected are not included in the ring and are said to be in the loopback state. MAUs have no uplink port to interconnect, but they do have a different mechanism called ring in and ring out ports, which are used to connect one MAU to another. Network hub connections are illustrated in figure 2.13. Figure 2.13 Repeaters Connecting Five Segments of a Network Network Connections In the simplest network, two computers are connected to each other, perhaps only with a crossover cable, and they share data. With a hub, some cables, and some network interface adapters, a group of computers can be turned into an effective local area network. However, other types of hardware devices will soon be required as the network grows larger—as efficiency decreases with increased traffic. By using such special devices, the size of the network can be increased without decreasing its efficiency. Bridging Bridging is a technique used to connect networks at the data link layer to provide packet filtering, meaning that it propagates only the packets that are destined for the other side of the network. When a large LAN experiences excessive collisions or delays due to high traffic levels, a bridge can reduce the traffic by splitting the network in half. a. Connecting LANs with a Bridge A bridge can be used to join two existing LANs or to split one LAN into two segments. It is a physical unit, typically a box with two ports, and it can interpret the data link-layer protocol header. The bridge does packet filtering, in which it reads the destination MAC address in the packet and allows the packet to go to the other side of the bridge only when the packet is destined to go there. If a computer on one segment (one side of the bridge) sends a packet to a computer in the same segment (the same side of the bridge), then the bridge does not allow that packet to cross it. The use of a bridge thus cuts the unnecessary traffic in the network. Figure 2.14 Bridge Operation b. Bridges and Collisions A collision domain is an area in a network where only one packet can function at a time, but multiple packets collide. When a new hub is added to an existing network, the computers attached to that new hub become part of the same collision domain. On the other hand, when a bridge is added to an existing network, computers on each side of the bridge create separate collision domains. Smaller collision domains bring about fewer collisions, fewer retransmissions, and improved efficiency. c. Bridges and Broadcasts There are three types of message in a network: · unicast message · multicast message · broadcast message Unicast is a communication between a single sender and a single receiver over a network. An earlier term, point-to-point communication, is similar in meaning to unicast. Most network traffic is unicast traffic. Multicast is a communication between a single sender and multiple receivers on a network. In multicasting, one computer sends data to a specific group of computers on the network simultaneously. Broadcast is to cast or throw forth something in all directions at the same time. In computer broadcasting, a packet is addressed to all machines on the network. A broadcast domain is the group of computers that receive such broadcast messages. Although a bridge divides a collision domain into multiple collision domains, it cannot divide a broadcast domain into multiple broadcast domains (a router or a brouter can handle this). d. Transparent Bridging Transparent bridging is a technique that bridges in the Ethernet network use to automatically compile hardware addresses (MAC addresses) in an internal address table. When the bridge receives a frame and reads the destination MAC address in the data link-layer protocol header, it compares that address with the table. If the address is not among the listed addresses, the bridge allows that packet to pass to the other side of the bridge. If multiple bridges are installed for redundancy, then there is a potential danger of getting the broadcast packets forwarded endlessly. This is called a bridge loop. To avoid this, bridges communicate among themselves, using a protocol called a spanning tree algorithm (STA), in which one bridge is selected to process the packet while all other bridges in the segment remain idle until the processing bridge fails. The use of a spanning tree algorithm is illustrated in figure 2.12. Figure 2.15 Using the Spanning Tree Algorithm e. Source Route Bridging Token ring networks do not use the spanning tree algorithm to protect a communication from bridge loop. Instead, they use a different technique called source route bridging, in which they add a route designator in broadcast messages (All Rings Broadcast—ARB) and use that route designator to avoid sending the packet to the same bridge twice and to determine which bridge provides the most efficient route through the network to a given destination. f. Bridge Types The simplest bridge used to connect two similar sections is called a local bridge. It does not modify the data in the packet; it simply reads the MAC address in the data link-layer packet header, compares it with the table, and either forwards it to the other section or discards it. A translation bridge is a data link-layer device that connects network segments using dissimilar network media or protocols. The functions of these bridges are more complicated as they strip off the data link-layer frame to repackage it in a new format. These bridges can connect an Ethernet segment to a token ring segment or a 100Base-TX to a 100Base-T4. A remote bridge uses some form of WAN link, such as a modem connection or leased telephone line, to connect two network segments at distant locations. This reduces the amount of traffic passing over the WAN link. Switching A switch is a network connection device that forwards an incoming packet only to the port that provides access to the destination system. Switches may look like hubs, but they differ in that hubs forward incoming packets out through all of their ports. A switch essentially converts a LAN from a shared network medium to a dedicated one. A bridge reduces unnecessary traffic congestion on the network, but a switch practically eliminates it. A standard switched network is illustrated in figure 2.16. Another advantage of switching is that each pair of computers using a switch has the full bandwidth of the network. In addition, full-duplex operations are available in switch, effectively doubling the throughput of the network. Replacing all routers with switches is not recommended, however, because a switch still relays a broadcast to every other computer's packets, increasing the number of unnecessary packets processed by each system. This situation can be addressed by using a virtual LAN (VLAN)—a broadcast domain created by one or more switches. With a VLAN, subnets can be created on a switched network. When a computer on a particular subnet transmits a broadcast message, the packet goes only to the computers in the subnet, rather than to all computers in the network. Communication between subnets can be either routed or switched, but all traffic within a VLAN is switched. Layer 3 switching is a variation on the VLAN concept that minimizes the amount of routing needed between the VLANs. A switch using VLAN software is illustrated in figure 2.17. Three types of switching technologies exist: · cut-through · store-and-forward · fragment-free Cut-through switches, in what is called matrix switching or crossbar switching, forward packets immediately by reading the destination address in the data link-layer protocol header. They are inexpensive, but the major drawback with this technique is that the switch can forward incomplete or damaged frames, resulting in more unwanted traffic and bandwidth utilization. A store-and-forward switch, on the other hand, waits until the entire packet arrives, using a memory buffer that stores the incoming data and verifies the data by performing a frame check sequence (FCS). It is more expensive. This type of switching enables the switch to drop frames that are incomplete or damaged, thus reducing unwanted traffic. This technique is similar to that of a cut-through switch in that it forwards a part of the frame before receiving the entire frame. The difference is that the switch waits for 64 bytes to be received before forwarding the first part of the frame. This is done to check for collisions that can be detected in the first 64 bytes of the frame. This switch does not check the FCS in the frame. Figure 2.16 A Standard Switched Network for Two LANs Figure 2.17 A Switch Using VLAN Software Routing A router connects two networks, forming an internetwork. Routers operate at the network-layer protocol of the OSI model—the boundaries of all LANs. On a large internetwork, such as the Internet, a packet may have to pass through many routers to its destination, connecting distant networks using WAN links. A router has an internal table called a routing table that contains information about the networks around it. The router uses this routing table to determine where to send each packet. When a packet has to pass multiple networks on its way to the destination, each router that processes it is called a hop. Finding out the most efficient way to transmit a packet by minimizing the number of hops is one major function of all routers. The router does this by maintaining a value in its routing table called a metric that specifies the relative efficiency of each route. The process of building a routing table can be either manual or automatic. Static routing is the process of creating a routing table manually, which may be practicable in a small network with few routers. However, manual build-up is unworkable in a large network with hundreds of routers. Dynamic routing is the process of building a routing table automatically, using a specialized protocol in which the system registers, updates, and shares routing information on the fly, without the network administrator's participation. Routers are mostly hardware, but there are also software-based routers. Routers can be small and cost as little as $100 each, or they can be large and very expensive, as much as $100,000 each. Even a computer with two or more network interface cards, called a multihomed computer, can be used as a private router. Firewalls A firewall is a network security device. Firewalls are used in protecting local area networks when they connect to the Internet or any other untrusted source, such as incoming traffic from unauthorized or unknown sources. Firewalls can be thought of as routers with an additional set of security rules, which are defined and configured based on the identified security requirements associated with them. What separates a firewall from a standard router is that packets are not automatically forwarded by the firewall from one network to the next. When the firewall first examines a packet, it checks the source and destination addresses, the protocol type, the port, and other data within the packet in accordance with security rules. If the packet fulfills the requirements of the security rules, then the firewall retransmits it and may log it. If the packet does not fulfill the security rules, then it is blocked and logged. There are two required network connections to a firewall and one optional one. The first required connection is to the trusted (protected) network. This consists of the internal systems that one wishes to protect. The second required connection is to the untrusted (unprotected) network, better known as the outside world, or the Internet. The optional network is called the DMZ, or demilitarized zone. Devices that require both protection and public access reside in the DMZ. An example of a device on a DMZ is a web server, which is used to serve web content and needs to be accessible from the outside. See figure 2.18 for an illustration of a firewall. Hardware Firewall: Hardware firewalls are considered appliance devices that are specifically designed to perform the firewall function. They still need to be patched and updated to ensure that they are kept up to date with the latest patches and updates. Software Firewall: A software firewall runs on an existing system utilizing the system's operating system. It is an application that runs on it, performing firewall functions. The firewall software needs to be patched and updated to ensure that it is kept up to date with the latest patches and updates, and the host operating system needs to be updated and patched as well. Firewall limitations: It is important to understand that firewalls have to be configured individually, based on the specific requirements of the environment that needs to be protected. A firewall is not an all-in-one security solution. It needs to be used in conjunction with other technologies and as part of a defense-in-depth approach, utilizing multiple layers of protection. Multiplexer A multiplexer (sometimes abbreviated mux) allows for multiple signals to be transferred across a single link, which eliminates the waste of bandwidth and the need for intelligence in the devices. Multiplexers have three significant characteristics: · They can combine multiple signals on a single communication link, thereby allowing multiple terminals to share a common circuit. · They are nonintelligent (dumb) devices that do not modify or delay the multiplexed signals in any way, thereby appearing transparent to the end user. · They are used in pairs connected by a single link. There are an identical number of inputs to and outputs from the pair. The sending multiplexer is called a mux, and the receiving multiplexer is called a demultiplexer or demux. However, the sending and receiving muxes can reverse roles. There are three types of multiplexing: frequency-division multiplexing (FDM), time-division multiplexing (TDM), and statistical time-division multiplexing (STDM). Two of these types, FDM and TDM, have the three characteristics listed above and therefore involve pure multiplexing. STDM is not pure multiplexing because the multiplexers involved have some intelligence. They differ from the second of the characteristics listed above because they require a terminal identification, require intelligence to identify the receiving terminal, and may delay the signal in a condition of heavy traffic. See figure 2.19 for an illustration of how a multiplexer works. Figure 2.19 Multiplexer Network Topologies In module 1, we started to define a network and took a quick look at local area networks and wide area networks. You will recall that a network can be defined as two or more computers that are linked in order to · share resources · exchange files · allow electronic communications The computers on a network may be linked via different types of media (e.g., cables, telephone lines, radio waves, satellites, or infrared light beams). The advantages of having a network usually far outweigh the disadvantages, but these should be addressed on a case-by-case basis. Some of the advantages of having a network are: · Shared resources: This saves time and reduces equipment costs on items such as printers and hard disks. · Shared data files: This helps eliminate the possibility of having multiple incompatible copies of files and increases productivity by providing access to the same data to several users. · Shared applications: This allows more than one user to utilize the available applications. · Electronic communication (e-mail): Users can leave each other electronic mail instead of playing phone tag. Some of the disadvantages are: · Installation costs: The initial setup of a network can be expensive. It depends on how many devices will be connected and on the amount of construction that needs to be done. If, for example, your only reason for considering a network is to share resources such as printers, it may be cheaper to buy each user his or her own printer. · Administration and support costs: Someone skilled in network administration must be consulted when the network is down. · Security: As you connect multiple computers and networks, you open up the possibility of an unauthorized individual accessing your network and resources. Networks are generally classified into one of two groups, depending on their size and function. A local area network, or LAN, is the basic building block of any computer network. Local Area Networks (LANs) LANs usually consist of two or more devices (i.e., computers), connected directly, or through the use of a hub, switch, or other connectivity device. A LAN can range from the simple (two computers connected by a cable) to the complex (hundreds of interconnected computers and peripherals throughout a large organization). A system of LANs connected in this way is called a wide area network (WAN). Each computer in the LAN must have a connecting device called a network interface card (NIC). The NIC provides the connections between the computer's motherboard and the network media. See figure 2.20 for an illustration of a LAN. Figure 2.20 Local Area Network Most LANs connect workstations and/or personal computers. Each computer (also known as a node) within a LAN not only has its own central processing unit (CPU) with which it executes software programs, but it is also able to access data and devices anywhere on the LAN through an external path or a resource located on a different system. This allows many users to share software applications, information, and expensive devices, such as laser printers, plotters, and storage. Users can also use the LAN to communicate with each other by sending e-mail or instant messages. LANs typically have the following characteristics: · Data transfer occurs at high speeds (higher bandwidth than dialup, DSL, and most affordable commercial leased lines). · They exist in a limited geographic area. · The organization running the LAN usually manages connectivity and resources, especially the transmission media. Wide Area Networks (WANs) As we discussed in module 1, a WAN is a network of networks and other devices that are connected together. As businesses grow, and their locations and the number of LANs begin to multiply, a requirement emerges to connect the multiple LANs together. Routers are used in many cases to join two LANs together, and the Internet, private lines, cable, and/or satellites can be used as the telecommunications path between the LANs. See figure 2.21 for an illustration of a WAN. Figure 2.21 Wide Area Network WANs allow for the basic expansion of LANs, linking them and allowing them to communicate with each other. By definition, a LAN becomes a WAN when it crosses a public right of way. At that point, the network is no longer local and requires a public carrier for data transmission. The characteristics of WANs are · low- to high-speed links · wide geographic area, ranging in size from regional to coast-to-coast to global · devices and equipment used to carry signals between networks belong to a commercial carrier (AT&T, Verizon, etc.) The benefits of LANs and WANs are identical, with the exception that WANs cover larger geographic areas of operation. The network architecture, which covers all the design aspects of the network, defines the relationship that network devices have with one another. The two main network relationship bases are peer-to-peer and client-server. Peer-to-Peer On a peer-to-peer network, all computers are equal. Peers share resources, and there is no server, and thus no centralized management, dedicated to handling requests for those resources. Each workstation acts as both the client, which issues requests, and the server, which receives and processes requests. Smaller networks of 10 or fewer computers may work well under this model. The peer-to-peer network model is an inadequate solution for large networks, because many clients requesting services can put an undue strain on a typical workstation. See figure 2.22 for an illustration of a peer-to-peer network. Figure 2.22 Peer-to-Peer Network The advantages of the peer-to-peer network model are · easy setup · low installation cost · best used in small networks of approximately 10 workstations · amount of hardware necessary to connect all workstations is limited · low maintenance The disadvantages of the peer-to-peer network model are: · The data are scattered across all workstations. If there are a large number of users, the sharing of documents becomes a problem because of the possibility of multiple versions of the same document. · There is a security risk. Users may be required to remember multiple passwords for each resource on the network, tempting them to write them down, or resources may not have any passwords assigned at all. · Users must be trained to share their own resources and act as administrators, taking on system management responsibilities such as storage management, sharing resources, and patch and update management for their own machines. · There is no central management or administration. Client-Server A client-server network consists of workstations, or clients, that issue requests to a server. The client workstation is responsible for issuing requests for whatever services are required. The server's function on the network is to service those requests. Servers are generally more powerful than their client counterparts due to the fact that they must service a large number of requests. Some examples of server-based network operating systems (NOSs) are Microsoft Windows Server and UNIX. See figure 2.23 for an illustration of a client-server network. Figure 2.23 Client-Server Network The advantages of the client-server network model include · centralized security · dedicated servers that take the load of processing client requests off workstations that may not have the capacity to service those requests · easy accessibility · synchronized files or a well-organized shared directory structure · ease of backups The disadvantages of the client-server network model include · dependency on an administrator · expensive hardware (server) · expensive software (NOS) · requires highly trained administrators Network Topology Network topologies are defined by how the nodes are connected. We will see below how the nodes in mesh, star, tree, bus, ring, and wireless networks are connected and how the different connection topologies affect how messages are sent. Mesh Topology In mesh topology, every node is connected by a dedicated point-to-point connection to all other nodes. A message will require only one hop, no matter where the sending and receiving nodes are located in the network. Figure 2.24 shows a mesh network. Note that messages from A to B or from A to C both require one hop. The number of dedicated point-to-point connections in a mesh network increases at roughly the square of the rate of increase in the number of nodes. The equation for computing the number of connections required is as follows: number of connections = T x (T – 1)/2 where T = the number of nodes or terminals Table 2.1 shows that as the size of the network grows, the number of connections required will quickly become unmanageable. Table 2.1 Connections Required for a Mesh Network Number of Nodes or Terminals Number of Connections Required 3 3 10 45 100 4,950 Star Topology In the star topology, the central node is connected to every other node. Figure 2.25 shows a star network. Messages between A and B, where neither is the central node, always require two hops. Note that the network goes down if the central node goes down. Figure 2.25 Star Topology The advantages of the star topology are: · A break in one cable does not affect all other stations as it does in bus technologies, because there is only one station per segment, generally making the star more reliable. · Problems are easier to locate. · It is the easiest to design and install, with the exception of bus topology. · The star does not require a terminator. The disadvantages of the star topology are: · Hubs, which are required for star topology, are more expensive than bus connectors. · A failure of the hub can affect the entire configuration and all connected stations. · Star topologies use more cable than bus topologies. Tree Topology · The tree topology consists of a root node and a series of attached cascaded nodes. This topology closely resembles a corporate organization chart. Figure 2.26 shows a tree network. Messages from A to B must flow up to reach the lowest common node and then down to B—in our diagram, this consists of three hops from node A up to the root node and then two hops down to node B. A message from B to C simply moves up one node to a common node and then down two nodes. Figure 2.25 Tree Topology Bus Topology · In the bus topology, a cable running the length of the network connects all nodes or workstations with a multipoint connection. Figure 2.27 shows a bus network. The small solid rectangles at each end represent the cable ends. A message from node A to node B is put onto the bus and is received by all nodes on the bus, including node B. Figure 2.27 Bus Topology Ring Topology · In the ring topology, a closed loop connects all of the workstations. Figure 2.28 shows a ring network. Messages from A to B flow through the intervening nodes, in sequence, until they reach B. In our diagram, four hops are required if the traffic flows only in the counterclockwise direction. Figure 2.25 Ring Topology The advantages of the ring topology are: · It prevents network collision because of the media access method. · Each station functions as a repeater, so the topology does not require additional network hardware. The disadvantages of the ring topology are: · A failure at one point can bring down the network. · Because all stations are wired together, adding a station means that the network must be shut down temporarily. · Maintenance on a ring is more difficult than on a star topology because an adjustment or reconfiguration affects the entire ring. Wireless Topologies Wireless LANs have two basic topologies: · ad hoc · infrastructure In the ad hoc topology, groups of computers are equipped with wireless network interface adapters and are able to communicate freely with each other within a communication range. This topology is useful in a small area, such as a home or a small business, where there are few computers and the installation of cables is difficult. In the infrastructure topology, wireless-equipped computers communicate with a network using wireless transceivers, called network access points, connected to the LAN by standard cables. This topology is better-suited to a larger network that has only a few wireless computers—for example, laptops belonging to traveling users. See figure 2.29 for an illustration of infrastructure wireless topology. Figure 2.29 Network Access Points in Infrastructure Wireless Topology Summary Here is a recap of the concepts covered in this module. · Computers use multiple systems to process data electronically, but ultimately, they store data using binary code. · Computers store and process various types of data, including audio, images, and video. · Computers require two types of memory in order to function: volatile and nonvolatile. · There are only 13 root-level domain name servers worldwide, and their purpose is to translate meaningful domain names into numerical decimal identifiers. · IP addresses are unique numbers used to identify network devices. The IP address is broken down into parts. The first two octets provide the network address, the third octet provides the subnet address, and the fourth octet provides the host address. · While the OSI networking model is fundamental for understanding data communication, the TCP/IP networking model focuses on computer-specific network connections. · The seven layers of the OSI model are: physical, data link, network, transport, session, presentation, and application. · The four layers of the TCP/IP networking model are: network interface, internet, transport, and application. · A signal is a mechanism that is used to convey data from one place to another, and it can be in either analog or digital form. · Conducted media are represented by cabling that acts as the transmission medium and carries data signals between devices. · Wireless media transmit information via frequencies from the radio frequency spectrum. Wireless communications consists of a transmitting device and a receiving device. · Network components are used to connect to the physical network via the appropriate media. The network components are responsible for translating the data into electronic signals, and sending, forwarding, and routing the data packets until they reach their intended destinations. · A network can be defined as two computers connected to each other by a medium (wired or wireless) so they can share data. A local area network (LAN) is a group of computers and other devices located in close proximity to each other and connected by a common medium. A wide area network (WAN) is a network of networks and other devices that are connected. · In a peer-to-peer network, all computers are equal. Peers share resources, and there is no server dedicated to handling requests for those resources. · A client-server network consists of workstations, or clients, that issue requests to a server. The client workstation is responsible for issuing requests for whatever services are required. The server's function on the network is to service those requests. Module 2: Telecommunications and Networking Essentials Topics 1. Digital Representation of Data 2. How the Internet Works 3. Data Transmission and Network Media 1. Digital Representation of Data It all comes down to bits and bytes and 1s and 0s. All data within our computer systems are represented by 1s and 0s as they are processed and transmitted across our telecommunications networks. Different computer systems use different numeric systems (hexadecimal or octal) to represent this information within the systems. In order to represent a value or provide meaning, the data are pulled together into a data format that can be recognized by the computer system. A popular data format for reviewing text data is ASCII (American Standard Code for Information Interchange). Other data formats allow us to listen to audio, view images, and watch videos. Computers use volatile and nonvolatile memory to process and store data as they are completing complex operations or displaying the information you requested on your monitor. Volatile memory is memory that loses its contents when the computer or hardware device loses power. Computer RAM (Random Access Memory) is a good example of volatile memory. Nonvolatile memory is memory that keeps its contents even if power is lost. CMOS (complementary metal oxide semiconductor) is a good example of nonvolatile memory. Sound complicated? It really isn't, once you become familiar with the new terminology and understand how data are represented and handled. The good news is that we do not have to communicate in binary (1s and 0s) and the computer does the necessary conversions to turn the 1s and 0s into something meaningful. However, even though you do not need to speak binary, hexadecimal, or octal, it is still valuable to understand and convert those number systems. As you troubleshoot telecommunications networks, you will quickly learn that many of the tools provide the data in the operating system's native number system (e.g., hexadecimal or octal). In order to troubleshoot successfully, you will need to be able to understand and sometimes translate the data that are provided. In the next section, we will begin to learn how network components are addressed. The binary number system also plays an important role in how device addresses are selected and distributed within a network. For example, binary ANDing is used to determine the network number for a specified IP address given its subnet mask. It requires the IP address and the subnet mask to be converted from decimal to binary. The ANDing operation is performed by multiplying the two binary numbers and converting back to decimal, with the result yielding the network number for the specified IP address. 2. How the Internet Works In module 1, we discussed the importance of defining standard communication models to ensure that different types of devices can communicate (share information). In this module, we will take a more detailed look at those models and create an understanding of how devices are found within our networks and on the World Wide Web. Each device has a unique Internet Protocol (IP) address, much like a street address, that allows packets of information to be labeled with the sending IP address and destination IP address. Once the packet has been labeled properly, it is sent out across the network through network devices that route the packet to its final destination. IP addresses are numeric in form and work well for computers, but they are hard for humans to manage and remember. The Domain Name System (DNS) was developed to allow us to represent network devices with names instead of numeric IP addresses. The web address www.umuc.edu will be translated by DNS to the appropriate numeric IP address, and that IP address will be sent back to the computer making the request. Once the computer receives the correct IP address, a connection request is initiated, and the two devices start to communicate. The primer "How the Internet Works" will provide additional detail on how IP addressing and DNS work together. It will walk you through the reference models we introduced in module 1, the OSI model and TCP/IP. Now that we know how the Internet works, we can begin to take a look at the various components that are used to build telecommunications networks. The next section will start at layer 1 of the OSI model and discuss the connectors and media that are used to start connecting and building our networks. 3. Data Transmission and Network Media When we prepare to send information across a network, the data travel down the layers of the OSI model and are converted to a signal at layer 1, the physical layer. Once they are converted to a signal, the data are sent out using network media, conducted or wireless, to their final destination. Signals A signal is a mechanism that is used to convey data from one place to another, and it can be in either analog or digital form. In telephony, a signal is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call. In electronics, a signal is an electric current or electromagnetic field. For example, phones today generally display the signal level by using bars, which indicate the strength of the signal based on your location. Analog Analog means continuous; that is, a set of specific points and all the points between them. A good example of an analog device is a watch or clock with an hour hand, a minute hand, and possibly even a second hand. When someone looks at this type of clock or watch, the hour hand does not point exactly to the hour—it points somewhere between the present hour and the next hour. The same is true for the minute hand and minutes, and the second hand and seconds. All three hands are moving continuously. In some situations, an analog phone line may need to be used to transmit data using a device called a modem. The data are converted from the system, which by default only processes and understands in digital format, to analog so they can be transmitted by analog means (modulated). Once they are received at their intended destination, they are converted back to digital (demodulated) so they can be processed and understood by a computer. This is less common today due to the prevalence of native digital networks, but in cases where digital networks have not been established, data transmission using analog means is still possible and feasible. Digital Digital means discrete; that is, a set of specific points and no points between them. A good example is a digital clock. It shows the exact hour, minute, second, and possibly tenths or hundredths of a second, but it cannot indicate any time between these discrete states. Figure 2.1(a) shows an analog signal of continuously varying signal strength, where signal strength is shown as amplitude. Figure 2.1(b) shows a digital signal with two discrete values. Figure 2.1 Analog and Digital Signals (a) Analog (b) Digital It is possible to use analog signals to transmit either analog or digital information. Likewise, it is possible to use digital signals to transmit either analog or digital information as discussed by using a modem in which the data are converted from digital to analog to be transmitted and from analog to digital once they are received to be processed. When a signal repeats a pattern over a measurable time frame, it is said to be periodic. The time in seconds (T) that it takes to complete the pattern is called the period, and the completion of one full period is called a cycle. The number of cycles in a second is called the frequency (f). Frequency is measured in cycles per second, or hertz (Hz). The relationship between period (T) and frequency (f) is T = 1/f Example 2.1 shows the relationship between period and frequency. Example 2.1 Period and Frequency If the period = 1 ms (millisecond) or .001 seconds, the frequency is 1/.001, or 1,000 cycles/second (Hz). If the frequency is 100Hz, the period is 1/100 = .01 seconds. If a signal does not repeat itself over time, as with either of the signals in figure 2.1, it is said to be a periodic. Signals that repeat themselves, such as those shown in figure 2.2, are said to be periodic. The signals in figure 2.2 repeat themselves over the three cycles that are shown. Figure 2.2 Periodic Analog and Digital Signals (a) Sine Wave (b) Square Wave When data are represented by a digital signal, there are usually two voltage levels, with one level representing a 1 and the other level representing a 0. In a system where the positive level is a 1 and the negative level is a 0, the seven-bit ASCII code for the letter S is 1010011. Figure 2.3 shows the digital signal representing that bit pattern. Figure 2.3 Digital Signal for 1010011 Computers use digital signals. Signals in computers might be electrical voltages for copper cable, pulses of light for fiber optic, or infrared/radio waves for wireless networking. In a typical communication, the sending computer uses signals to transform binary data into a form of code that the receiving computer can interpret back (to binary data). Conducted Media There are three primary types of cable used to build LANs: 1. coaxial 2. twisted pair 3. fiber optic Coaxial and twisted pair are copper-based and carry electrical signals, and fiber-optic cables use glass or plastic fibers to carry light signals. Coaxial Cables Coaxial cable has two conductors, one inside the other, within a sheath. A central core, made of either a solid copper wire or braided strands of copper, carries the signal. A second conductor made of braided copper mesh surrounds the core, with insulation in between. This second conductor functions as the cable's ground. Again, the entire assembly is encased in an insulating sheath. Coaxial cable, which provides protection from noise interference, has been used for long-distance telephone transmission, cable television, and cabling in a local area network. There are two types of coaxial cable used in LANs—RG-8 and RG-58—which are similar in construction but vary in thickness and the types of connectors they use. RG-8 is a thicker cable (0.405 inches in diameter), and the network that uses this medium is sometimes called the thick Ethernet. RG-8 cable usually runs along a floor to create a trunk, and separate AUI (attachment unit interface) cables run from the trunk to the network interface adapters in the computer. RG-58 is a thinner cable (0.195 inches in diameter), and the network that uses this medium is sometimes called the thin Ethernet. Thick Ethernet and thin Ethernet are also called 10Base5 and 10Base2, respectively, because they run at 10 Mbps, use baseband transmission, and are limited to maximum cable segment lengths of 500 and 200 (actually 185) meters, respectively. Figure 2.4(a) Components of a Coaxial Cable Figure 2.4(b) A Coaxial Cable Terminator Plug, Showing the Center Conductor Source: User: Colin. [Photo of F connector]. Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Coaxial Cable Connectors Coaxial cable connectors depend on the type (RG) of the cable. Figure 2.5 shows the type of connectors used with thin Ethernet— BNC (Bayonet Neill-Concelman) connectors—and thick Ethernet (transceivers). Figure 2.5 Coaxial Cable Connectors Source: User: Kb. "BNC connectors used to connect video card to monitor." Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Twisted-Pair Cables Twisted-pair cables comprise pairs of twisted wires. Shielded twisted-pair (STP) cable provides an extra layer of isolation from unwanted electromagnetic interference, while in unshielded twisted-pair (UTP) cable, each conductor is a separate insulated wire. Twisted-pair cables are twisted to prevent the signals on the different wire pairs from interfering with each other (called crosstalk) and to reduce electrical interference from outside sources, such as motors. There are usually 2 to 12 twists per foot, and a higher number of twists provides higher quality. The multiple wire pairs are encased in a single sheath, and the different colors allow users to identify the different wires in the bundle. The Electronic Industries Alliance (EIA) and the Telecommunications Industry Association (TIA) have developed EIA/TIA rating standards for UTP, ranking them from Category 1 to Category 7, as shown below. · Category 1 is used for telephone systems. It is good for voice and low-speed data communications at up to 9,600 bps over distances of up to four miles. · Category 2 is suitable for data transmission at up to 4 Mbps at distances of up to four miles. · Category 3 can be used both in voice-grade telephone networks and for data transmission. The principal users of this type of cable are 10-Mbps Ethernet and 4-Mbps Token Ring. Two out of four of the wire pairs are used in a typical connection; however, by using all four wire pairs, this same cable can be used for 100-Base-T4 Fast Ethernet and 100-Base-VG-AnyLAN. A single segment of this cable can carry a signal up to 100 meters. · Category 4 can be used for data transmission at up to 20 Mbps at distances of up to 100 meters. It is used mostly in 16-Mbps Token Ring networks. · Category 5 can be used in 100Base-TX Fast Ethernet, Synchronous Optical Network (SONET), and Optical Carrier (OC3) Asynchronous Transfer Mode (ATM) for data transmission at up to 100 Mbps at distances of up to 100 meters. · Category 5e is an extended version of Category 5 with tighter specifications, and is suitable for Gigabit Ethernet in 1000Base-T. · Category 6 is under development and will probably support speeds of up to 200 Mbps at distances of up to 100 meters. · Category 7 is also under development and may support speeds of 600 Mbps at distances of up to 100 meters. Shielded twisted-pair wire is available in Categories 1 through 5. The main difference between UTP and STP is that STP has only two wire pairs and has foil and mesh shielding around each pair that provides additional protection from interference. STP also provides a higher level of security than UTP because it reduces electrical emissions that can be detected outside the cable. See figure 2.6 for an illustration of twisted-pair cable. Figure 2.6 Twisted-Pair Cable Twisted-Pair Connectors Both STP and UTP use RJ-45 telephone connectors. These are similar to RJ-11 telephone connectors. Although RJ-11 and RJ-45 connectors look alike at first glance, they are very different. The RJ-45 is slightly larger and will not fit into an RJ-11 telephone jack. The RJ-45 also houses eight cable connections, while the RJ-11 houses only four. Figure 2.7(a) and figure 2.7(b) show the difference between the RJ-45 and RJ-11 connectors. Figure 2.7(a) RJ-45 Plug and Jack Source: User: Sylvain Leroux. "8P8C with T568B wiring (RJ45) plug and jack." Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Figure 2.7(b) RJ-11 Plug and Jack Source: User: Sylvain Leroux. "6P2C (RJ11) plug and jack." Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Fiber-Optic Cable Fiber-optic cable has a core made of glass or plastic that carries light signals. A plastic cladding that reflects the light surrounds the core, and both the core and cladding are wrapped in a protective buffer and an outer jacket. A fiber-optic cable carries light in only one direction, and a pair of cables is required for two-way transmission. Fiber-optic cable is completely resistant to electromagnetic interference and is less subject to attenuation—the tendency of a signal to weaken as it travels over a cable or other medium. It can span a distance of up to 120 kilometers without excessive signal degradation. Fiber-optic cable is used in high-security applications because it does not emit signals that could be detected outside the cable. There are two primary types of fiber-optic cable, single-mode and multimode, with the thickness of the core and the cladding being the main difference between them. Single-mode transmission uses a thin fiber-optic cable that is only 8.3 microns wide, with a cladding of 125 microns. This is called 8.3/125 single-mode fiber. The narrow fiber core requires a highly focused light source, such as a single-wavelength laser, but it can transmit at high rates over longer distances and is more commonly found in outdoor installations that span long distances, such as telephone and cable television networks. Most multimode transmission uses a fiber-optic cable width of 62.5 microns with a cladding of 125 microns, and thus is called 62.5/125 fiber. This mode can use a light-emitting diode (LED) rather than a laser as a light source, and it carries multiple wavelengths, but it is limited to short-distance use. Fiber-optic cables use one of two connectors: the straight-tip (ST) connector or the subscriber connector (SC). Fiber-optic cable is more expensive than twisted-pair or coaxial cable. Fiber-optic cable is illustrated in figure 2.8(a) and figure 2.8(b). Figure 2.8(a) Components of Fiber-Optic Cable Figure 2.8(b) Fiber-Optic Cable Source: User: Hustvedt. [Photo of a TOSLINK fiber-optic cable]. Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Fiber-Optic Connectors Straight-tip (ST) connectors appear as illustrated in figure 2.9(a), and they connect by inserting and twisting. Subscriber connectors, or SC connectors, appear as illustrated in figure 2.9(b), and they attach by inserting until a click is heard or felt. Special care should be taken with the tips of any type of fiber-optic connector. Ensure that you never touch the ends or let them come in contact with any item other than a connector. Always keep the end caps on your fiber ends; this will prevent many connectivity problems. As a safety precaution, never look through the end of a fiber connector; the laser light that is being emitted can cause damage to your eyes. Figure 2.9(a) Fiber-Optic ST Connector Source: User: Ytrottier. "ST optical fiber connector." Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Figure 2.9(b) Fiber-Optic SC Connector Source: User: Adamantios. "SC optical fiber connector." Used under Creative Commons Attribution-Share Alike 3.0 Unported license. Although it is generally considered more secure than some other media, fiber-optic cable is still susceptible to tapping, so it is really important to ensure that physical protection mechanisms are in place to protect the cable. Wireless Media Wireless technologies, such as terrestrial and satellite microwave, have been used for years to provide connectivity over large geographic areas; however, many of the solutions have been very expensive. Over the past decade, wireless technologies have improved in reliability, cost, and security, making it the technology of choice when designing new networks. As we discussed in module 1, the Federal Communications Commission is responsible for managing the radio frequency spectrum. Each different type of wireless medium uses the same basic technology, but with a different set of assigned frequencies. In this section, we will discuss some of the more common types of wireless media. Microwave A microwave transmission uses a microwave link that transmits tightly focused beams of radio signals with a wavelength ranging from 300 mm to 10 mm (1 GHz to 30 GHz) to send and receive microwave signals. The microwave links can be made up of a series of microwave radio antennas located on top of buildings or mountains. The microwave signals consist of tightly focused beams of radio signals. Each microwave link must be in sight of other links in order to transmit the signal. This is known as line-of-sight transmission and is required for many wireless technologies. Microwave technology is capable of sending a signal 20 to 30 miles. An example of an application for microwave technology would be a set of office buildings that are within the same general geographic area, but the distance between each building is too far to run a dedicated line. As long as there is a clear line of sight between the office buildings, a microwave antenna could be placed at each end, and signals could be shared. Figure 2.10 Microwave Transmission Source: User: GeographBot. (2008). [Photo of Goosemoor transmitter tower]. Used under Creative Commons Attribution-Share Alike 2.0 Generic license. Satellite Satellite communications allow communication to take place around the world. Satellite technology is very similar to microwave. The major difference is that instead of the signal traveling from one land-based link to the next, the transmission is sent to a satellite in space (this is called uplinking) and sent back down to the receiving ground station on Earth. Satellite transmissions also have a line-of-sight requirement, but they have the advantage of being able to send signals a much greater distance around the world. A key use of satellite technology is to reach areas that cannot feasibly be reached with some type of conducted medium because of the difficulty of digging ditches and tunnels to run cable. Imagine trying to transmit data to villages in the mountains of Tibet. It would take years and quite a lot of money to provide cable capability over the mountains, but satellite communications would only require the equipment to uplink and the receiving ground station. In the case of television, satellite transmission is a means of sending a signal to areas that cable TV cannot reach practicably. See figure 2.10 for an illustration of a satellite ground station. Figure 2.11 Satellite Transmission Infrared When you think of infrared technology, the first example that might enter your mind is a TV remote control. Infrared is also a line-of-sight transmission technology that sends a focused ray of light (infrared) a very short distance. Most applications of infrared technology for computers are used to connect wireless peripherals (e.g., a keyboard or a mouse). Bluetooth Bluetooth does not need to be in line of sight. It uses low-power radio communication to make its wireless link. Bluetooth was designed for providing simple wireless connectivity for computer peripherals and personal devices, including cell phones. Bluetooth has the advantage over infrared of being able to transmit over a longer range, up to 30 feet, and it has the ability to connect to more than one device. Wireless Networking The wireless media technologies we have discussed so far are either used to connect local area networks (LANs) or to connect devices over short distances. The Institute of Electrical and Electronics Engineers (IEEE) has defined a wireless networking specification, 802.11, that can be used to build wireless LANs. 802.11 specifies an over-the-air interface between a wireless client and a base station, or between two wireless clients. 802.11x refers to a family of specifications developed by the IEEE for wireless LAN (WLAN) technology. You can read here about the several different protocols that have been defined, all providing different transmission capabilities: 802.11a was up to 2 Mbps, 802.11b was up to 11 Mbps, 802.11g was up to 54 Mbps, and 802.11n was up to 100 Mbps. More information about 802.11 can be found on the IEEE Standards Association website . Wireless networking technology provides the flexibility to design a LAN without being concerned with physical limitations. Over the years, the reliability, cost, and security of wireless networks have improved to the point where they are direct competitors with wired LANs. Wireless transmissions take place over the air, so the information can easily be captured or tapped by an intruder. It is very important to use a strong encryption protocol, such as WPA-2, and make sure your wireless transmitter and receiver are kept up to date with the latest security patches to ensure proper protection of your data. Transmission Impairment Transmission impairment can be caused by imperfections in the transmission media. Three causes of impairments are · attenuation: the loss of energy in the signal · distortion: a change in the shape of the signal · noise: the addition of unwanted energy to a signal Keep these three causes for transmission impairment in mind when you are troubleshooting network connectivity issues.
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident