Monday, December 30, 2019

Sci 209 Week 4 Paper - 984 Words

Oceans, Hurricanes, and the Climate SCI 209 Your Name March 01, 2010 Introduction Natural disasters occurring from the climate change could be on the rise. Global warming has been rumored to be causing more hurricanes, typhoons, cyclones, heavier monsoonal rains that cause major flooding, mud slides, and other disasters worldwide. A tropical cyclone, also referred to as hurricanes, typhoons, or cyclones, depending on where in the world the cyclone is occurring, are one of the world’s grandest shows of energy provided by nature. Hurricanes are large, swirling, low pressure storms that have sustained winds of over 74 miles an hour and are formed over warm ocean waters (NASA, n.d.). The purpose of this paper is to discuss hurricanes†¦show more content†¦Beta drift is caused by the Coriolis Effect and tends to have more effect on the storm as it grows due to the increased effect at higher latitudes. Other factors such as high pressure ridges, wind shear, other hurricanes, land masses, and the jet stream also have a steering effect on hurricanes. With a ll the different factors of propagation, the path a hurricane will take is very difficult to calculate. Ocean Currents and Hurricanes Ocean currents effect hurricanes far more than hurricanes effect ocean currents. Surface ocean currents carry the warm waters to the hurricane breeding areas and fuel the storms with warm currents along their paths. Cold water currents also play a major role in robbing the storms of one of their sources of fuel when hurricanes pass over the colder currents, like the ones along the eastern U.S. border. Hurricanes with their strong winds cause huge waves, mix warm surface waters and their currents, with the deeper cooler water. Not much is known about what happens to that warmer water once it has been sunk into the depths of the ocean but some suggest that the heat is transported towards the poles via ocean currents (Bettex, n.d.). The Gulf of Mexico’s loop current creates large warm water eddies in the gulf and is likely intensifying hurricanes that pass over them. These eddies are blamed for fueling some of the worst storms ever, like Katrina and Rita (Ocean Motion and Surface Events, n.d.). Hurricanes, StormShow MoreRelatedSci 209 Complete Course Oceanography2175 Words   |  9 Pageshttp://homeworkfox.com/questions/general-questions/1166/sci-209-complete-course-oceanography/ SCI 209 Complete Course Oceanography SCI 209 Complete Course Oceanography SCI 209 Week 1 SCI 209 Week 1 Individual Assignment NOAA Activity Part One Ocean Exploration Navigate to the National Oceanic and Atmospheric Administration (NOAA) site at http://oceanservice.noaa.gov/ Select Explore from the menu, then select Ocean Exploration listed below Oceans. Choose an explorative mission that took placeRead MoreReview of Related Literature3694 Words   |  15 Pageseffects in addition to high operational cost. Insecticides of botanical origin have been reported as useful for control of mosquitoes. Azadirachta indica (Meliaceae) and its derived products have shown a variety of insecticidal properties. The present paper discusses the larvicidal activity of neem-based biopesticide for the control of mosquitoes.MethodsLarvicidal efficacy of an emulsified concentrate of neem oil formulation (neem oil with polyoxyethylene ether, sorbitan dioleate and epichlorohydrin)Read MoreOn the Interface between Operations and Human Resources Management16889 Words   |  68 PagesCommissioned Paper On the Interface Between Operations and Human Resources Management John Boudreau †¢ Wallace Hopp †¢ John O. McClain †¢ L. Joseph Thomas ILR Human Resource Studies, Cornell University, Ithaca, New York 14853 IEMS Department, Northwestern University, Evanston, Illinois 60208 Johnson School of Management, Cornell University, Ithaca, New York 14853 Johnson School of Management, Cornell University, Ithaca, New York 14853 jwb6@cornell.edu †¢ hopp@northwestern.edu †¢ jom1@cornell.eduRead MoreFruit Tree Diversity And Fruit Consumption9708 Words   |  39 PagesChapter 4: Fruit tree diversity and fruit consumption in the context of deforestation in Cameroon 1. INTRODUCTION The world has been confronted with serious difficulties in curbing down the rate of undernourishment especially in sub-Sahara Africa (Vinceti et al., 2013, Arnold et al., 2011, Goenster et al., 2011). In developing countries, the livelihood and food security of smallholder land users are often at risk from unpredictable harvests, land degradation and climate change (Paumgarten and ShackletonRead MoreHemp Cultivation in China42289 Words   |  170 PagesDiemenstraat 192 1013 CP Amsterdam The Netherlands Clarke, R.C. 1995. Hemp (Cannabis sativa L.) Cultivation in the Tai an District of Shandong Province, Peoples Republic of China. Journal of the International Hemp Association 2(2): 57, 60-65. This paper summarizes the history of hemp (Cannabis sativa L.) cultivation and traditional use in the Tai an District of Shandong Province in the People s Republic of China, and investigates the cultivation and processing techniques currently being employedRead MoreEssay on Teaching: Grammatical Number and Notes21041 Words   |  85 Pagesdiscussing activities in progress at this exact moment? Now, right now, at the moment, etc. Review the Meaning and Use notes on page 36. * Which time expressions are used when discussing activities in progress, but not at this exact moment? This week, these days, etc. Review the Meaning and Use notes on page 36. * Give three examples of stative verbs that have different meanings when used in present continuous rather than when used in simple present. Have, look, see, weigh, taste, think, etcRead MoreHsc General Math Textbook with Answers153542 Words   |  615 Pagesalgebraic terms Equations 84 Solving equations after substitution 91 Changing the subject of the formula 96 Scientific notation 101 Chapter summary 105 Multiple-choice questions 106 Short-answer questions 107 78 iii iv Contents Chapter 4 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 Interpreting sets of data 109 Mean 109 Median 116 Measures of spread 120 Investigating sets of data 126 Double stem-and-leaf plots 132 Double box-and-whisker plots 135 Radar charts and area charts 141 ComparisonRead MoreMedicare Policy Analysis447966 Words   |  1792 Pagesand for other purposes. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, 3 SECTION 1. SHORT TITLE; TABLE OF DIVISIONS, TITLES, rmajette on DSK29S0YB1PROD with BILLS 4 5 AND SUBTITLES. (a) SHORT TITLE.—This Act may be cited as the 6 ‘‘Affordable Health Care for America Act’’. VerDate Nov 24 2008 12:56 Oct 30, 2009 Jkt 089200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H3962.IH Read MoreManagement Control Systems Pdf115000 Words   |  460 PagesICFAI welcomes suggestions from students for improvement in future editions. rI B S U se O nl y C la s s of 20 09 Contents PART I: AN OVERVIEW OF MANAGEMENT CONTROL SYSTEMS Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Introduction to Management Control Systems Approaches to Management Control Systems Designing Management Control Systems Key Success Variables as Control Indicators Organizing for Adaptive Control Autonomy and Responsibility

Sunday, December 22, 2019

Short Story The Kidnapper - 1181 Words

No one else in the arcade noticed the kidnappers. The sound effects of the games the people played shot throughout the mind of one of the only people that had. The man could feel the pressure of the gun against his side, his eyes cringing from the pain, his body shaking from the tension of what pain his attacker had promised would come. But the man forced himself to appear steady. Maybe they’ll just let us go, he thought, we could just go back to playing the arcade games. Everyone could just be calm. Everyone could be okay, go back to playing the games. We may even be able to leave the arcade. I just have to be calm. We can all go back to playing the games. But by looking into the two of theirs’ eyes the man could tell that that wasn’t likely to happen. His best friend stood shielding the little girl that the man now stood at gunpoint trying to save. The child couldn’t even see him as shards of tears rolled over her eyes. Behind them were the two other assailants that had come with the attacker. Each of their bodies composed of more muscle than bone, and each of their pockets bulging with the impression of a gun. Right as the man sensed the kidnapper squeezing the trigger of his gun against his side, he heard the sound of a virtual machine gun slowly ripping through its target. Rather than rapid firing at everything in sight, as the man vaguely recalled it doing, the noise of the blast slowly ripped through one of its targets, as if enjoying the process ofShow MoreRelatedShort Story Irony913 Words   |  4 Pagesall these stories we are talking about. The Merriam-Webster definition of irony is â€Å"the use of words to express something other than, and especially the opposite, of the literal meaning.† These stories will keep you wondering what’s going to happen and when you least expect it, irony will come out of no where and surprise the reader. In the short stories, â€Å"The Veldt,† â€Å"Just Lather, That’s All,† and â€Å"The Ransom of Red Chief,† Irony is active throughout the whole story. In the short story â€Å"The VeldtRead MoreThe Ransom of Red Chief1721 Words   |  7 PagesLife had been well until O. Henry had been accused of the embezzlement of bank funds. O Henry denied the indictment but was still put in jail. In prison, he wrote and published hundreds of short stories in order to support his daughter. O. Henry was once asked why he wrote; he replied that every story conveys something about being a person. Having been wrongly accused may have led O. Henry to communicate his belief that criminals receive what they deserve in The Ransom of Red Chief. Read MoreAmusement in â€Å"The Ransom of Red Chief†.600 Words   |  3 Pages Amusement in â€Å"The Ransom of Red Chief†. Dictionary.com defines humor as a comic and absurd quality causing amusement. O.Henry adds amusement in the short historical fiction story, â€Å"The Ransom of Red Chief†. O.Henry adds humor to his story through the use of literary devices. O.Henry uses allusion, word play, and irony to create levity in his story. All of these create levity but one that especially creates levity is allusion. First, Allusion is good for creating humor because by using prior knowledgeRead MoreThe Ransom Of Red Chief Analysis1730 Words   |  7 Pagesliterature is The Ransom of Red Chief written by O. Henry. I enjoyed the plot twist in this story, as well as the symbolism and irony throughout. When the antagonists, Sam and Bill devise a plan to kidnap Johnny, the son of wealthy businessman Ebenezer Dorset, they anticipated a good sum of easy money. As the story unfolds, Johnny proves to be very troublesome and causes much stress to the extent when the kidnappers cannot tolerate Johnny any longer. They sent a ransom letter to Ebenezer to â€Å"demand fifteenRead MoreHome Alone, And Ransom Of Red Chief And Home Alone1696 Words   |  7 PagesNo matter what story there is always a theme and sometimes it can be very moving. The theme for Ransom of Red Chief and Home Alone is that appearances can be deceiving. It states on page 62, â€Å"Hey little boy! says Bill, would you like to have a ba g of candy and a nice ride? The boy hits Bill square in the eye with a piece of brick†(O’ Henry 62). This means that Bill thought Red Chief was stupid, small and he didn’t expect the little boy to hurt him. From a scene in Home Alone Harry and Marv knockedRead MoreComparing Two Newspaper Articles2069 Words   |  9 Pages Comparing two newspaper articles, one from a tabloid and one from a broadsheet will convey the different techniques that tabloids and broadsheets use to present stories. Media in general, aim to inform and interest the audience which consist of many different types. Diverse emotions and ideas are created by the media; foremost tabloids. Tabloids are papers like ‘The Sun’, ‘The Mirror’, ‘The Daily Mail’, ‘The Express’ and ‘The Star’. In contrast to these are broadsheets like ‘The Times’, ‘The Guardian’Read More Achilles in The Illiad is not a Hero Essay100 9 Words   |  5 Pagesleads through personal example and accomplishments requiring bravery, skill, determination, and other admirable qualities.† Achilles, in no manner, fits this definition. By contemporary standards, he is instead a pathetic villain. Aside from being a kidnapper, rapist and murderer, Achilles proves to be emotionally weak, selfish, and malicious. Many times throughout the Illiad, Achilles is also referred to as â€Å"godlike†. The gods of Greek mythology were subject to the same emotions and character flaws asRead MoreVictory Lap1369 Words   |  6 Pagesseen in â€Å"Victory Lap† by George Saunders, a short story written in such a way that the events that are enrolling throughout the story are being processed and told through the minds of three main characters. Having the perspective of each character allows us, the readers to get a much greater understanding about them and to make a better character analysis. Having said that, this story i s simply about a girl, Alison getting kidnapped by an unnamed kidnapper. What were really captivating were the changesRead MoreHumor of a Common Fear817 Words   |  3 Pagesâ€Å"Life doesnt make any sense, and we all pretend it does. Comedys job is to point out that it doesnt make sense, and that it doesnt make much difference anyway.† ~Eric Idle. In â€Å"The Ransom of Red Chief† by O. Henry this concept comes to life. The story is about two men kidnapping a young child and karma coming back to bite them in the butt. The two men are Sam and Bill, each is being abused by the child known as Johnny but goes by Red Chief. Sam and Bill ask for a ransom of $2,000, but they end upRead MoreFinding Nemo Film Analysis1117 Words   |  5 PagesAfter a confusing instructional speech on how to exit properly Squirt pushes them into the exit flume and back into the open water. After Kim gets snatched by the kidnapers Bryan hears heavy breathing on the phone. Bryan threatens the kidnapper and the kidnapper responds with a thick accent, Good Luck,. Bryan arrives to the apartment were everything occur and found Kims phone. He visualizes the abduction from the clues left behind at the scene and finds and recovers the memory card from Kims

Saturday, December 14, 2019

Rogarian Arguments Free Essays

Quiz – Chapter 2 Name: U number: 1. The dramatic recovery of Russian Economy in recent days can be attributed to: a. record world prices for oil and gas b. We will write a custom essay sample on Rogarian Arguments or any similar topic only for you Order Now the succession of Vladimir Putin as president c. Putin slashed subsidies to state-owned enterprises d. the price increases for imports due to ruble’s devaluation e. all of the above can be attributed 2. According to author William Greider, executives and marketers must take into account the following new realities in the global economic situation: a. production has become â€Å"uncoupled† from employment b. he world economy dominates the scene c. the struggle between capitalism and socialism is over d. the growth of e-commerce diminishes the importance of national barriers e. all of the above 3. The rampant corruption and bribery witnessed in a nation’s economy is referred to as: a. re-nationalization b. managed democracy c. Kleptocracy d. autocracy e. None of the above 4. One of the distinguishing features of Centrally Planned Capitalism economic system is: a. all production resources are privately owned b. the state has broad powers to serve the public interes t as it sees fit c. ommand resource allocation is utilized extensively in private resource ownership environment d. market allocation policies are permitted within and environment of state ownership e. none of the above 5. The Swedish government has significant holdings in key business sectors and has hybrid economic system that incorporate: a. market capitalism and centrally planned socialism b. centrally planned socialism and market socialism c. centrally planned socialism and capitalism d. market socialism and market capitalism e. market capitalism and socialistic capitalism 6. Which type of economic system is characterized by command resource allocation and private resource ownership: a. market capitalism b. centrally-planned capitalism c. market socialism d. centrally-planned socialism e. None of the above 7. Which type of economic system is characterized by market resource allocation and state resource ownership: a. market capitalism b. centrally-planned capitalism c. market socialism d. centrally-planned socialism e. None of the above 8. China predominantly follows an economic system that can be classified under: a. centrally planned socialism b. market socialism . market capitalism d. centrally planned capitalism e. socialistic capitalism 9. Which of the following is true about economic output in China today: a. the state sector accounts for about 75 percent of output b. the state and private sectors each account for about 50 percent of output c. the private sector accounts for about 75 percent of output d. the private sector is virtually nonexistent i n China e. the state sector is virtually nonexistent in China 10. The Washington, DC-based Heritage Foundation compiles a survey of over 150 countries ranked by degree of economic freedom. Although there are a number of key economic variables which are considered in this ranking it does not include: a. monetary policy b. banking policy c. black market d. property rights e. none of the above 11. Singapore banned the import, manufacture, and sales of chewing gum in the country since wads of gum were making a mess on sidewalks, buses, and subway trains. Violators are subject to severe penalties and before buying a pack consumers must register their names and addresses. This according to author William Greider demonstrates that Singapore’s government: a. is harshly autocratic . administers a paranoid control over Singaporeans c. administers a paranoid control over press and politics d. runs an effective welfare state e. all of the above 12. The general characteristics shared by low-income countries does not include: a. high birth rates b. low literacy rates c. concentration in Africa south of the Sahara d. heavy reliance on foreign aid e. low tourist income 13. Whic h of the following BRIC nations fall in the lower-middle-income category? a. India and China b. China and Brazil c. Brazil and Russia d. Russia and India e. none of the above 14. Pursuing alternative sources of energy, such as wind and solar power is important due to the fact that: a. people in developing countries are more conscious about environment b. global marketers are more interested in publicizing environmental issues c. it is easy to develop solar power in many parts of the world d. heavy reliance on fossil fuels contributes to global warming e. people worldwide can afford to buy power generated from wind and solar 15. Product and market opportunities in a postindustrial society are more heavily dependent upon new products and innovations than in industrial societies. An example of this would be: . Nestle marketing Bono brand cookies in Brazil b. Coca-cola company developing a beverage Vintago in low-income countries c. New e-commerce markets for interactive forms of electronic communication d. Hermes creating handbags called Amazonia e. India’s Suzlon Energy using wind driven turbines 16. The Organization for Economic Cooperation and Developm ent (OECD) is comprised of: a. the 30 high-income countries b. countries that believe in market-allocation economic systems c. pluralistic democracies d. countries that demonstrate progress toward economic reform e. all of the above statements are applicable 7. The fastest-growing sector of world trade includes: a. travel and entertainment b. accounting and legal services c. royalties and license fees d. engineering services e. all of the above 18. Between the year 2001 and 2006, China bought more than $ 250 billion in U. S. Treasury bonds. Such purchases: a. ensures that China’s currency is relatively weak compared to the U. S. dollar b. indicate that China is not sure of its economic viability c. show that currency exchange rate is unpredictable d. predict that yuan will be devalued in the near future e. China’s currency is stronger than the U. S. dollar 9. To the extent that a country sells more goods and services abroad than it buys, there will be: a. a greater dem and for its currency b. a surplus production of goods and services c. a scarcity of goods and services within the country d. a need for revaluation of its currency e. time for fluctuating its currency 20. The Big Mac Index dated February 01, 2007 shows that the price of Big Mac in China was 11 yuan whereas its price in the United States was $ 3. 22. The index translated into yuan being undervalued by 56%. This shows that: a. Big Mac is more expensive in the United States than in China b. Big Mac is less expensive in the United States than in China c. Big Mac costs the same in the United States and China d. Big Mac is less popular in China than in the United States e. Big Mac is more popular in China than in the United States Essay Question The newly independent countries of the former Soviet Union present an interesting situation: on one hand the income is declining creating considerable economic hardship whereas there are attractive opportunities with good potential from moving out of the low-income category. What are some of the problems and opportunities for these countries? How to cite Rogarian Arguments, Papers

Friday, December 6, 2019

IT Network Designing A Case Study of Direct Engineering

Question: Discuss about theIT Network Designing for a Case Study of Direct Engineering. Answer: Introduction: Requirements Analysis Scope of the Project Direct Engineering and Logistic Solutions (DEALS) is a new business that will comprise of four businesses merged together in a centralized network infrastructure. The four buildings have been connected by underground fibre cable back to the communications room in the main office. The work that will be performed mainly in this project is merging of IT assets of the four businesses into a new network. This project will determine the client requirements for the new network as well as the server requirements along with required hardware for the new network. This includes the installation and setup of all the network devices, cabling and interfaces, which may include but may not be limited to workstations, multi-function devices, servers, switches, routers, racks, and all related server roles as mentioned in the section 2.1. Necessary Features The network will be designed to achieve several specific business and operational objectives: Secure Service: The main objective of this network will be to provide secure administrative computing service to DEALS. It will be designed to be functionally and physically isolated from access by people not employed by DEALS to minimize the risk of unauthorized use. Integration and Update: In this project, the installation of necessary network equipment will be in a new building with only exterior walls. The network and equipment being installed will be new state of the art equipment designed specifically for DEALS connecting with the other four branches as NELLS, HEFA, TANB and WIMPS. Versatile Information Processing: The network will enable users to retrieve, process, and store data regarding the operation of the DEALS, its clients, accounting, billing, tracking, and check in and check out of IT assets to be merged at the facility. Scalability: The network design will be scalable so that more network cable equipment can be added if required and as per availability of funds without having to redo the installed network. Desirable Features The examination of the case study reflected that the clients need a robust network infrastructure with following features: Scalability: The network design must be Scalable so that it can grow to include new user groups and remote sites andcan support new applications without affecting the level of service delivered to existing users (Channegowda, Nejabati and Simeonidou 2013). Availability: A network designed for availability is one that delivers consistent, reliable performance 24 hours a day for 7 days a week. In addition, the failure of a single link or piece of equipmentshould not significantly affect network performance. Security: Security is a feature that must be designed into the network, not added on after the networkis complete. Planning the location of security devices, filters, and firewall features is criticalto safeguarding network resources. Manageability: No matter how good the initial network design is, the available network staffmust be able to manage and support the network (Develderet al. 2014). A network that is too complex or difficult tomaintain cannot function effectively and efficiently. Project Constraints In this report, Project Constraints are defined as the project's parameters by setting limits on what can be done. For example, if the project has a fixed budget, planners may have to use the equipment they can afford rather than the equipment they consider ideal for the job. The three general categories of project constraints that have been identified for DEALS network infrastructure are as below: Time constraints: The time constraint for this project that has been estimated for finalization is Twelve Weeks. This estimated time is required for the project, as it will comprise of Four weeks for preparation, Six weeks for Installation and Testing along with additional Two weeks for Training and monitoring. Resource constraints: A project's budget is a common resource constraint. If the proposed budget cannot meet the projected personnel costs, equipment costs, and software costs, the project cannot continue or may need to be modified to address the restraints (Burakowski et al. 2012). The total budget that has been allowed for the IT section of DEALS Network Infrastructure setup project is $365,000. The support staff associated with this project will be allocated in between $30 to $50 per hour for technical personnels and will rise for management level staffs along with highly trained staffs. Additionally, in context to the DEALS network infrastructure setup project there is other resource constraints as: The appropriate personnel for the network infrastructure development i.e. Network Engineer may not be available or their training may not be sufficient to complete the project. Computer resources or hardware equipment may not be accessible. Schedule constraints: A project schedule also may restrict what the project can accomplish. For example, many organizations do not allow changes to the IT environment during specific times, such as during the end of the corporate fiscal year or peak business cycles (Vleugels and Peeters2012). If the DEALS network infrastructure project is due for completion during one of these periods, the project scope may require modification. The scheduling is considered as an essential aspect in any project however, it should done in such a way that the project does not interrupts the business processes. Hence, in this context to the DEALS Network Infrastructure Setup project, the average business time to cost ratio for possible interruptions was estimated and it has been found that Business is not to be disrupted during the project. Feature constraints: In context to this, particular DEALS Network Infrastructure setup project these type of constraints can affect a project's start or scope. For example, if DEALS is evaluating a new product based on a particular feature and that feature is not available or does not meet the company requirements, the organization may choose to cancel the project. If a particular feature is critical, the project scope may be modified to include the feature. The additional features in this project for the development of DEALS network Infrastructure can be imposed on the network as per choice only if it is within the allocated budget. The implementation of the additional features may require alternative actions or route provided it be within the scope of this project. The project team and business sponsors often negotiate project constraints, as well as business requirements. The budget may seem like a firm constraint, but if increasing the budget results in meeting an important business requirement, the budget may be adjusted to include the requirement (Lu et al. 2013). However, in this project, grouping of physical hardware and logical components will be done which are needed to provide a number of features for the network. Initial Server Requirements Proposal Required Server Roles It is relatively obvious that every server fulfills some kind of role. Some are Web servers. Some are file servers. Others are domain controllers (DCs) or infrastructure servers, such as Domain Name System (DNS) and the Dynamic Host Configuration Protocol (DHCP). Then, of course, there is the DC/File Server/Web Server/Application Server/Firewall/DHCP/ DNS server, also known as "the server" in DEALS business case. However, none of them is anything until they are deployed one or more roles to them (Zhang, Wang and Sun 2013).Because not every server is made equal, it makes sense that the same configuration is not optimal for every server. This seems rather obvious if one considers the fact that to meet the needs of each role the server must have certain software installed and settings made. A role is a collection of software that collectively enables the server to provide some service to the network. Generally, a role is for what the server has been procured. An example of a role is Domain Controller or Application Server (Shah2013). Often a role can be installed in one-step, but may require significant configuration to function the way it is desired. In this particular case study in context to the merging IT assets of NELLS, HEFA, WIMPS and TANB, the examination has been done on server roles that are required as below: Active Directory Domain Services (AD DS) Application Server DHCP Server DNS Server File Services Network Policy and Access Services Print Services Web Server (IIS) Windows Deployment Services (WDS) Explanation on the Requirement of Server Roles The requirement of each server role is explained as below: Active Directory Domain Services (AD DS): This role promotes the server to a DC. In addition to running dcpromo.exe manually, as in prior versions, this role have to be installed. The AD DS will store information about users, computers, and other devices on the DEALS network. ADDS in the DEALS network will help administrators to securely manage this information and facilitate resource sharing and collaboration between users. ADDS is also required to be installed on the DEALS network in order to install directory-enabled applications such as Microsoft Exchange Server and for applying other WindowsServer technologies such as Group Policy. Application Server: Provides access to programs written using an application framework. It is typically not used by itself but rather in conjunction with the Web Server role. DHCP Server: Provides DHCP (dynamic IP address assignment) to computers throughout anetwork. DNS Server: Provides host name-to-IP address name resolution services throughout a network. File Services:It adds additional file server services such as the Distributed File System (DFS), the shared folder management tools, and Network File System (NFS) for Unix-based clients (Lundqvist, Mattssonand Kim2012). Network Policy and Access Services: This role provides the collection of services related to remote network access. Print Services: Provides advanced printer management services. Web Server (IIS): By default, if no configuration options are made during installation of the role, IIS 7.0 provides only static HTML support (Mueller, Ledererand Timmerer2012). This role in DEALS network will allow sharing information with users on the Internet, an intranet, or an extranet. Windows Deployment Services (WDS): WDS is Microsofts latest technology to deploy the operating system remotely to computers over the network. Phase of Network Construction for Each Role The network construction for the server roles mentioned in the previous section have to undergo two phases to complete the merging of the four buildings IT assets. The new network will have a client/server configuration and a domain with active directory implemented, all primary server assets are to be located in the new main office. The new network will be implemented in two phases as below: Phase OneIt will involve the setup of the network infrastructure (cabling, switches, routers and printers) and two Domain controllers with all policy requirements implemented along with the required network folder structures and access controls implemented. In this phase there will also be a provision to provide an internal email system so all employees can have internal email. In this phase of the network infrastructure setup, there will be implementation of following features for the new client/server network with policies: All network nodes and devices must be named according to the network-naming scheme The network must use an IP addressing scheme that caters for all nodes on the network and allows for easy expansion of the network All servers, routers, switches and printers are to have static IP addresses, all other nodes are to use DHCP to gain an IP address The network speed required is Gigabit Only authenticated user are allowed to access the network When users logon they are presented with a message that contains the companies Acceptable Use Policy Company policy is to require all users to use complex password for logging on to the network Each user is to have a Home drive (H :) mapped on the file server All failed login attempts are to be auditable events Provide centralized storage of company data in an appropriate file and folder structure and provide backup and restoration capability using a suitable backup program, schedule and media Provide an environment where company resources can be shared and easily accessed by the users who require it by implementing access controls that restrict access to data and resources to only employees that require it to carry out their work. Auditing of users accessing the following network resources is required Staff records folder Financial records folder ResearchDevelopment data folder Customer records folder User are to be restricted to 4 consecutive login attempts before being locked out of the system The lockout period for failed login attempts is to be 15 minutes, after this time period has elapsed the users account is to be unlocked All User Accounts are to have the full details of the user included and recorded on a User Account Record sheet Details of all server settings, policies and network topology are to be fully documented As the management are expecting the company to grow over the next few years they require a network setup that is easy to expand when required Provide the capability to implement phase two of the network without major changes or disruption to the network structure Phase Two This phase will provide for the implementation of remote login capability, an SQL server, and cater for the future implementation of an in-house web server to host the companies proposed web site. Recommended Network Operating System A network operating system includes special functions for connecting computers and devices into a local-area network (LAN). Some operating systems, such as UNIX and the Mac OS, have networking functions built in (Dean2012). The term network operating system is generally reserved for software that enhances a basic operating system by adding networking features. The recommended Network Operating System for DEALS is Windows Server 2012 Datacenter edition as it is robust in nature and has added capabilities like Volume Licensing and OEM for maintenance of the IT assets. Alternate Network Operating System The alternative network operating system that can be used for merging the IT assets of the four buildings into DEALS is Windows Server 2012 R2 Standard edition. In this operating system, the Server Manager has been redesigned with an emphasis on easing management of multiple servers. It offers improved reliability for on-disk structures and compatibility with existing APIs as well as technologies. Features of Network Operating System The Windows Server 2012 Datacenter edition offers some essential features of Network operating system as presented below: Basic Operating Features: It supports the basic underlying operating features of networks such as support for processors and the various protocols that allow computers to share data (Mistry and Seenarine2012). Thus, it will also support the processing of other software applications that run on individual computers within the DEALS network. Security Features: It supports a number of security features that control access to the network. It will provide DEALS network with authorization and permission for access to the network, with specific control of features such as user management, log-on controls and passwords. Networking: It is the platform on which computer networking takes place. The DEALS network requires basic features to allow for file, print and Internet connections by using Windows Server 2012 Datacenter (Shimiet al. 2012). Data backup and replication functions are controlled through the network operating system. Administrative Interface: It has an administrative interface that allows a network administrator to monitor and maintain the system. This interface will have a menu that allows the administrator of DEALS network to perform functions such as formatting hard drives and setting up security protocols for both the system and individual users. Evidence of the Ability of the Network Operating System Windows Server 2012 Datacenter The PowerShell v3, Hyper-V 3.0 and System Center 2012 are some of the best features that can be found in this network operating system to install it for the DEALS network infrastructure. The following features make this Network Operating System to be suitable for DEALS. Hyper-V 3.0: It includes two new options for admins to use. The extensible switch extends a virtual network's functionality in ways that were not possible until now. PowerShell v3: It makes automation throughout the server while working with programs such as Active Directory to promote cloud-based servers without the need of a deployment wizard directly on the server (Wright et al. 2012). Microsoft System Center 2012: The suite of updated products help admins run enterprises smoothly with cloud computing. They include Virtual Machine Manager 2012 and Configuration Manager 2012 and make the management of cloud deployment easy. Windows Server 2012 R2 Standard It is ideal for Non-virtualized or lightly virtualized environments. Storage Pinning is one of the essential feature in this operating system as Pinning makes it possible to ensure that files you always want on the fastest storage, such as boot disks in a Virtual Desktop Infrastructure deployment, will never be moved to the slower storage tier. Otherwise, files that you always want to take advantage of SSDs might be moved to the HDD tier after some period of relative inactivity. Recommended Mail Server Application The most useful and recommended Mail server application for the DEALS network is Gattaca Mail Server as it is full featured and 100 % compatible to existing standard (Cahillet al. 2012). It can be used as an internal server also as a server for reception or sending e-mails to others mail servers in the Internet or to main mail server in the organization. Alternate Mail Server Application The alternative Mail server application for DEALS to merge the IT assets of the four buildings and to run the business operations successfully is Citadel. It is an e-mail system that can be implemented with DELL Network operating system as Users of Citadel/UX systems also have available to them a web-based user interface which employs Ajax style functionality to allow application-like interaction with the system (Carvalho 2012). Recommendations and Hardware Requirements Scope The purpose of this document is to identify the requirements of the Hardware requirements for each server role. The Hardware requirements analysis provides generic functionality across multiple embedded hardware platforms. This generic functionality can be selectively changed by user code, thus providing application specific software. This document will provide a complete set of identified hardware and each roles that will be installed in favor of the particular hardware for the entire DEALS network infrastructure.The major benefit to this is that offices utilizing the same hardware will only contain thespecificserver roles. Hardware canbe interchanged without effecting how the program logically functions. If the hardware is supported by the roles, a user will be able to utilize the server functionalities using one specific set of hardware and port it to another set just by changing minor configuration and settings. The final goal of this section is to provide enough flexibility to a llow for support of multiple hardware components by differentmanufacturers. Overview The solution for DEALS network setup provides an abundance of features that range from abstracting the hardware from a users application to keeping memory requirements to a minimum. Since this solution is targeted towards embedded solutions, optimizationmust be in the forefront. The deployment of Network operating system in DEALS will require anyone of the following steps: Installation: It is the basic concept of getting the new operating system on the hardware. Specifically, a clean installation requires deleting the previous operating system. Upgrade: It means moving from the existing operating system to Windows Server 2012 R2, while staying on the same hardware (Matoset al. 2012). Even while staying on the same hardware, some server roles might require specific steps to ensure a smooth upgrade. Migration: It means moving from the existing operating system to Windows Server 2012 R2 by transferring to a different set of hardware (Knight et al. 2012). Migration, which might vary considerably depending on the server roles that have been installed. Mapping of Each Role to Physical Server The server roles that can be implemented to Windows Server 2012 are: Active Directory Domain Services (AD DS) Application Server DHCP Server DNS Server Web Server (IIS) Windows Deployment Services (WDS) The below mentioned roles can be implemented in DELL Network operating system: File Services Network Policy and Access Services Print Services Identification of Usable Existing Hardware The existing hardware that can be used for this project to setup DEALS Network Infrastructure: DELL OptiPlex 745s, DELL OptiPlex 780s HP4200dtn Laser Printer Cisco 837 ADSL Modem/Router Identification of Usable Existing Hardware with Upgrades The following existing hardware can be upgraded for utilization in the DEALS Network Infrastructure setup: HP4200dtn Laser Printer Cisco 837 ADSL Modem/Router CISCO Catalyst 2900 XL Switch Identification of Recommended New hardware details The recommended hardware details for installing the server roles are presented in the table as below: Component Minimum Requirement Recommended Sever Roles Processor 1.4 GHz 2 GHz or faster Active Directory Certificate Services (AD CS) Active Directory Domain Services (AD DS) Application Server DHCP Server DNS Server Memory 512 MB RAM 2 GB RAM or greater Available Disk Space 32 GB 40 GB or greater Optical Drive DVD-ROM drive DVD-ROM drive Component Minimum Requirement Sever Roles Processor 1.2 GHz Fax Server File Services Network Policy and Access Services Print Services Terminal Services Web Server (IIS) Memory 256 MB RAM Available Disk Space 32 GB Optical Drive DVD-ROM drive Component Minimum Requirement Recommended Sever Roles CPU speed 1.4 GHz 64-bit processor Quad-core, 2GHz Active Directory Federation Services (AD FS) Active Directory Rights Management Services (AD RMS) Windows Deployment Services (WDS) Memory 512 MB RAM 4GB Available Disk Space 32 GB 100GB Identification of New Alternative Hardware Details Component Minimum Requirement Microsoft Recommended Processor 1.4 GHz 2 GHz or faster Memory 512 MB RAM 2 GB RAM or greater Available Disk Space 32 GB 40 GB or greater Optical Drive DVD-ROM drive DVD-ROM drive Display Super VGA (800x600) monitor XGA (1024x768) monitor Server Hardware Details Existing/New DELL PowerEdge 2800s Make DELL Model PowerEdge 2800s Specifications Processor 800 MHz Cache Memory 1 MB RAM 12 GB DDR SDRAM HDD 73 GB Roles Hosted File Services Network Policy and Access Services Print Services Peripheral Hardware Details Existing/New Cisco 837 ADSL Modem/Router Make Cisco Model 837 ADSL Modem Specifications Cable SOHO/800 series router modem cable, Blue light console cable (RJ-45 2 DB-9) Authentication Method CHAP PAP, RADIUS, SSH2 protocol, TACACS+. RAM 80 MB Software Cisco Security Device Manager 2.0 Roles Hosted Active Directory Domain Services (AD DS) Application Server DHCP Server DNS Server References Burakowski, W., Tarasiuk, H., Beben, A. and Danilewicz, G., 2012, August. Virtualized network infrastructure supporting co-existence of Parallel Internets. In Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD), 2012 13th ACIS International Conference on (pp. 679-684). IEEE. Cahill, J.M., Miron, T.C., Antonoff, L.N. and Livingston, S.L., Microsoft Corporation, 2012. Automatically managing system downtime in a computer network. U.S. Patent 8,181,071. Carvalho, L., 2012. Windows server 2012 Hyper-V cookbook. Packt Publishing Ltd. Channegowda, M., Nejabati, R. and Simeonidou, D., 2013. Software-defined optical networks technology and infrastructure: Enabling software-defined optical network operations [Invited]. Journal of Optical Communications and Networking, 5(10), pp.A274-A282. Dean, T., 2012. Network+ guide to networks. Cengage Learning. Develder, C., Buysse, J., Dhoedt, B. and Jaumard, B., 2014. Joint dimensioning of server and network infrastructure for resilient optical grids/clouds. IEEE/ACM Transactions on Networking (TON), 22(5), pp.1591-1606. Dobrilovic, D., Jevtic, V., Stojanov, Z. and Odadzic, B., 2012, September. Usability of virtual network laboratory in engineering education and computer network course. In Interactive Collaborative Learning (ICL), 2012 15th International Conference on (pp. 1-6). IEEE. Doerr, B., Owens, K.R. and Yung, J.C., Centurylink Intellectual Property Llc, 2015. Provisioning virtual private data centers. U.S. Patent 9,059,933. El-Shimi, A., Kalach, R., Kumar, A., Ottean, A., Li, J. and Sengupta, S., 2012. Primary data deduplicationlarge scale study and system design. In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12) (pp. 285-296). Ferrari, A., Russo, M. and Webb, C., 2012. Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model. Pearson Education. Knight, B., Veerman, E., Moss, J.M., Davis, M. and Rock, C., 2012. Professional Microsoft SQL Server 2012 Integration Services. John Wiley Sons. Liu, L., Chu, R., Zhu, Y., Zhang, P. and Wang, L., 2012, April. DMSS: a dynamic memory scheduling system in server consolidation environments. In Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on (pp. 70-75). IEEE. Lu, H., Arora, N., Zhang, H., Lumezanu, C., Rhee, J. and Jiang, G., 2013, December. Hybnet: Network manager for a hybrid network infrastructure. In Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference (p. 6). ACM. Lundqvist, L., Mattsson, L.G. and Kim, T.J. eds., 2012. Network infrastructure and the urban environment: advances in spatial systems modelling. Springer Science Business Media. Matos, R.D.S., Maciel, P.R., Machida, F., Kim, D.S. and Trivedi, K.S., 2012. Sensitivity analysis of server virtualized system availability. IEEE Transactions on Reliability, 61(4), pp.994-1006. Mistry, R. and Seenarine, S., 2012. Microsoft SQL Server 2012 Management and Administration. Sams Publishing. Mueller, C., Lederer, S. and Timmerer, C., 2012, November. A proxy effect analyis and fair adatpation algorithm for multiple competing dynamic adaptive streaming over HTTP clients. In Visual Communications and Image Processing (VCIP), 2012 IEEE (pp. 1-6). IEEE. Shah, Z.H., 2013. Windows Server 2012 Hyper-V: Deploying the Hyper-V Enterprise Server Virtualization Platform. Packt Publishing Ltd. Stanek, W., 2013. Windows Server 2012 inside out. Pearson Education. Tate, J., Beck, P., Ibarra, H.H., Kumaravel, S. and Miklas, L., 2016. Introduction to storage area networks. IBM Redbooks. Vleugels, K. and Peeters, R., Omega Sub Holdings, Inc., 2013. Apparatus and method for integrating short-range wireless personal area networks for a wireless local area network infrastructure. U.S. Patent 8,599,814. Vleugels, K. and Peeters, R., Ozmo, Inc., 2012. Apparatus and method for integrating short-range wireless personal area networks for a wireless local area network infrastructure. U.S. Patent 8,165,102. Wright, P., Sun, Y.L., Harmer, T., Keenan, A., Stewart, A. and Perrott, R., 2012. A constraints-based resource discovery model for multi-provider cloud environments. Journal of cloud computing: advances, systems and applications, 1(1), p.1. Zhang, Y., Wang, L. and Sun, W., 2013. Trust system design optimization in smart grid network infrastructure. IEEE Transactions on Smart Grid, 4(1), pp.184-195.