Tuesday, May 26, 2020
Things You Wont Like About How to Write Research Paper Outline and Things You Will
Things You Won't Like About How to Write Research Paper Outline and Things You Will There are a lot of topics on which we've written an essay. Capitalize the topic in order for it to stand out and look much better. Additionally, the topic ought to be narrow. Therefore, it's much better to start out with outlining your topic. The Characteristics of How to Write Research Paper Outline As the introduction provides the very first impression to a person's reader, the conclusion brings about an enduring impression to the reader. A conclusion is a little part of an essay but an extremely important one. It gives you a chance to have the final word on the topic at hand. Your conclusion is your opportunity to have the previous word on the matter. How to Write Research Paper Outline for Dummies Research papers are designed to demonstrate a student's academic understanding of a subject. Except for writing skills, term paper can supply a student with a very good practice. In the event your paper is devoted to social science or humanities, you have a chance to use some creative approaches. The research paper is an essential part of any educational procedure, thus write it in the right way is must for any student. The Appeal of How to Write Research Paper Outline Your conclusion can go past the confines of the assignment. As soon as you've restated the subject of the research, you've got to restate your thesis statement. You have to compose a thesis statement, whenever you are working on the outline. The core thesis statement has to be re-told. Lies You've Been Told About How to Write Research Paper Outline Explain the function of the existent literature in your research and what's completely new about your own notion. You're able to narrate about that, but not argue and earn research to supply proper evidence to show your point. It is a good idea to begin with a succinct overview then ahead and slowly narrow down to central facets of the study. I n reality, solid evidence from sources is the secret to the best way to compose a research paper successfully. When you're immersed in studying, find out more about the problem that you presumably know a good deal about, perhaps even more than your professor. Otherwise, you should suggest an additional research. However, you can suggest an additional research, if needed. In case the research is adequate, you are going to be able to provide a whole solution. If You Read Nothing Else Today, Read This Report on How to Write Research Paper Outline You ought to make sure there are lots of standards for selecting a specific subject for your paper. When it's more than four, it needs to be indented. The Ultimate How to Write Research Paper Outline Trick The outline is a brief paragraph, which is made up of three or four sentences and represents your plan of the whole paper. The very first paragraph might consist of only the attention grabber and some narrative in regards to the issue. Whether there are a few paragraphs, the very first line of each extra paragraph ought to be indented by an other quarter inch past the default one-inch indentation. Before it's possible to write a productive conclusion paragraph you will need to comprehend its goal. The primary purpose of any rationale is to offer the possible reader with food for thought stressing the importance of the explored subject. Elaborating more on the topic of the consequences of your studying to elicit actions can demonstrate urgency when seeking change. A conclusion may also enable you to push past the boundaries hence enabling you to consider broader issues, and elaborate on the significance of your findings. It offers you an opportunity to elaborate not only the impact of your findings but also the significance. What You Should Do to Find Out About How to Write Research Paper Outline Before You're Left Behind If you would like to come across topics for research paper use our website! Most research papers seek to create a student step beyond the existent bounds of solid wisdom and further scholastic discussion on a topic. A few of the questions in your report may stay unanswered. Make certain you addressed the principal question of your research in the introduction and your readers don't see it for the very first time. Lies You've Been Told About How to Write Research Paper Outline You should assume your paper is targeted at someone with a very good working knowledge of your individual field. In the debut, you're trying to inform the reader about the rationale behind the job, justifying why your work is a necessary element of research in the specialty. Once you are finished with the technical portion of the research paper introduction, let us now make an outline of the structure. Keep tabs on your reference materials so that you can cite them and construct your bibliography later. So use the scientific technique to produce your paper complete. When seeking to understand how to compose a research paper conclusion, a couple things will need to get considered. The intro duction is where to highlight any weaknesses in the experiment from the beginning. It's possible to always monitor its implementation procedure and be in touch with your own personal writer. Top How to Write Research Paper Outline Secrets However you take notes, remember to keep an eye on the sources for all your key facts. Rather than covering everything, your essay introduction must tell that the whole paper is going to be on Homer's Odyssey or medieval goldsmiths from the whole history. An extensive review of the used literature is a huge means to spell out the significance of your own work. An outline can help you organize your thoughts before you dig in the writing process. Once reading your thesis, your readers ought to be motivated to read the remainder of the essay. As any book or movie, introduction intends to set the background and provide your assignment a particular context, permitting the reader to learn how your work complements previous researches on the simil ar topic. Whether there are over two works by the identical author, include the title of the job in the start or within the parenthesis in abbreviated form. Because academic manners of writing are referred to creative writing too. As everyone probably knows, the hardest part is only to start the paper. Make your opening sentence solid and interesting, as it will produce an impression about the full paper. Below you'll find the most relevant methods for writing a terrific reesarch paper introduction. Restate key statistics which you can emphasize the best point of a person's paper. Explain the goal of your paper and the way you intend to approach the topic. Next tips will reveal to you just how to fulfill the objective of research paper introduction and eliminate the creative mess. The Do's and Don'ts of How to Write Research Paper Outline To be subjective method to observe yourself as an author so you may attempt to understand a problem deeply, thus, possible outcomes make up scenarios that aren't reinforced by documentation. Of course about the angle you decide to reflect on this issue, different reflections of what it is that you're predicted to write about will come out. Regarding, from which angle you have a look at your topic, it is going to reflect unique facets. Thus, your topic ought to be up-to-date and currently discussed in your society. Where to Find How to Write R esearch Paper Outline It is crucial to bear in mind that without an appropriate outline, information wouldn't enter the acceptable locations. You don't need to include too many specifics. It's OK to copy such information so long as you reference it using a citation. Typically, it features complete info on it.
Sunday, May 17, 2020
Is The Tort Means A Public Wrong - 1977 Words
Tort means a public wrong. If a person harms a public interest it is call tort. In this particular scenario, Theo-Paul can sue Barack for tort. Although this does seem like a matter of contract act too yet studying here, it is to be considered under Consumer Law 2010. Barack purchased a tool that is known to be risky if it is not fit for use. He should have purchased it from a reliable source with warranty to ensure that the ladder is of good quality and holds a warranty in case of anything goes wrong. But Joe was not a reliable source; in fact Barack had never met him before. It was the first time that Barack saw him passing by an purchased the ladders from him without even taking into consideration there quality of the ladders and takingâ⬠¦show more contentâ⬠¦Only if Barack would have taken precautionary measures, he could have avoided half of this penalty, plus he could sue the party he had purchased the ladders from and recovered his losses. His negligence was not only a disaster for Theo-Paul but also for himself. Barack is liable for paying damages to Theo-Paul under the clauses of breach of duty (as he did not perform his duty of getting his stock from a reliable source) and duty of care (as he did not examine the ladders and determine if they were fit to use or not). The sections/clauses applicable in this case are 86AA, 87U, 87V, 87Y, 87Z, 87ZA and 87ZC. Answer 2: Case study with respect to ACL part 3-5: The ACL states the statutory regulations for dealing with claims for economic loss, damage, or loss due to supply of unsafe goods. A liability action can be brought against a manufacturer where: â⬠¢ loss or damage was suffered as a result of injuries sustained because of defective goods; â⬠¢ loss or damage was suffered as a result of another individual sustaining injury because of defective goods; â⬠¢ loss or damage was suffered as a result of another good being destroyed or damaged because of defective goods; and/or â⬠¢ Loss or damage was suffered as a result of land, a building or a fixture being destroyed or damaged because of defective goods. For the purposes of bringing a liability action
Friday, May 15, 2020
7 Ideas to Make Some Extra Cash in a Student Way!
Lack of ready cash is and has always been one of the most obvious problems students encounter in everyday life. Even if your parents are helping you out, or if you feel there is little to no time left to do any work after you deal with your studies, there are still ways to make a few extra bucks to make things a bit easier. 1. Sell Things You Donââ¬â¢t Need Be honest with yourself: you have a lot of things in your dorm and back home that you donââ¬â¢t use, donââ¬â¢t need and most likely will never touch again except when moving them around looking for something actually useful but lost under all this stuff. So, you may kill two birds with one stone: declutter your life and get some extra cash. Just head out to Craigslist or eBay, and you can do it without any fuss. 2.à Freelance Freelancing is easier today than ever ââ¬â you can work and earn money whenever you have free time without leaving your room. So, if you are good with words, have some graphic design skills, know a foreign language, know your way around video or photo editing or have any sellable skills at all, feel free to try your luck at places like Upwork. 3. Get a Job on Campus Why look elsewhere when a job may await you right where you are? Many colleges have bulletin boards detailing job offers specifically tailored to suit students, especially in terms of flexible schedules, like tutoring. Not the most exciting way to earn money, but it will get a few extra bucks into your wallet and some entries into your resume. 4.à Sell Body Parts The first four Google autofill results for ââ¬Å"I want to sell myâ⬠are ââ¬Å"hairâ⬠, ââ¬Å"eggsâ⬠, ââ¬Å"bloodâ⬠and ââ¬Å"kidneyâ⬠. Although you should probably draw a line at kidneys, thereââ¬â¢re other body parts you can readily part with. There is a huge demand for blood, plasma, sperm and hair ââ¬â most of which can be donated repeatedly for a regular boost to your earnings. 5.à Help out Other Students There are always students who need money less than you ââ¬â why not take it from them by assisting them in their studies? We donââ¬â¢t suggest that you should write papers for others, but proofreading and editing them, compiling study guides and tutoring your fellow students for a reasonable price is completely alright. 6.à Become an Intern If you are lucky enough to find a paid internship, you will do much more than simply find a source of income ââ¬â you will get some experience in the industry you are going to join and an entry in your resume. 7.à Become a Study Subject If you college carries out a lot of research you are certain to encounter opportunities to take part in studies, be they medical, psychological, sociological or any other. If you are not so lucky, try out corporate studies ââ¬â they also may be a source of income. As you may see, if you are ingenious enough there are a lot of ways to earn some extra money without wasting a great deal of time ââ¬â and we wish you luck in doing so!
Wednesday, May 6, 2020
The Media And Popular Culture - 2187 Words
Media and Popular Culture Popular culture is different from traditional culture; it is based on the timeline of the significant characteristics of a culture. Popular culture is the ideas, attitudes, thinking, memes, images, and other phenomena that are in the mainstream of a given culture, especially the western culture in the early 20th century to the middle 20th century and the emerging global mainstream in the early 20th and the 21st century. Deeply influenced by the mass media, this collection of ideas permeates daily life of the society (Wikipedia 2014). Mass media is conceived and designed to reach a very large media audience. It may need to be in the form of broadcast media, in television and radio, or print media, such as newspapers and magazines. Internet media can also obtain the status of the mass media; actually, with so many ways out there provided by internet media, mass media has been more accessible than ever before. Some people also call it the mainstream media, refe r to the fact that it tends to give prominent coverage to the news that are cater for the interest of the public, while ignores the controversial news. Most people around the world are dependent on mainstream sources for most of their news, so globally, it has already been a huge industry. But there could be some problems with mass means too, as it could devour the diversity and have negative effect on popular culture. The continuous development of communication technology, especially theShow MoreRelatedMass Media and Popular Culture953 Words à |à 4 PagesMass Media and Popular Culture March, 2009 Let us face the facts, mass media and popular culture need each other to coexist. Furthermore, in todays society the mass media serves the interest of popular culture. Moreover, it is the vehicle of free speech in a diverse, multicultural society. In addition, mass media refers to communication via radio, televisions, movie theaters, television, newspapers, magazines, and, etc; thereby, reaching out to the larger audience. On the contrary, popularRead MoreMass Media and Popular Culture1367 Words à |à 6 PagesHow has mass media a created a relationship among popular culture, mass media and different forms of dissemination? Mass media is any form of communication used to reach a large group of people. There are different types of media; examples of media are magazines, movies, television, books, recording devices, radio and the internet. As time goes on, new and improved technology is developed in the mass media industry for communicating and entertainment purposes. As mass medi a continues to grow andRead MorePopular Culture And Social Media Essay2299 Words à |à 10 PagesPopular culture was, and perhaps still is, seen as a touchy and risky topic that should not be experimented in by many educational institutions. Callahan and Low (2004) point out that popular culture is looked upon unfavorably due to its fluid nature and habit of putting teachers in zones outside their expertise and familiarity (p.52). Additionally, as described by Gutià ©rrez (2011) popular culture and the fandoms that inevitably followed were believed to create a single path by which the individualRead MoreInfluence of Media and Popular Culture Essay924 Words à |à 4 Pageshere through Mass Media. ââ¬Å"Lies My Teacher Told Meâ⬠said that textbooks and society hide and manipulate the important but negative facts to make historical characters to be heroes. It makes young children to believe what they have learned are true. Not only textbooks, but also Media and popular cultur es take roles to teach wrong directions and to have stereotypes between genders. When people think about Media and popular cultures, reality show is reminded naturally since it is popular throughout AmericaRead MoreEssay about Mass Media and Popular Culture1491 Words à |à 6 PagesMass Media and Popular Culture: Effects on the Population Mass Media and Popular Culture Mass media and popular culture go hand in hand. This paper will discuss the impact of mass media on enculturation, examine the relationships among media, advertising and the formation of normative cultural values, and discuss the impact of the internet on popular culture and the way we communicate today. Real world examples of this impact will be provided to prove our point of view and the overall effectRead MoreThe Sociological Aspects Of The Media And Popular Culture Essay1622 Words à |à 7 PagesThe media influences how people experience social life. Media such as newspaper, television and film, are important sources of information, education and entertainment. It can be used to learn more about the world and the people in it. In this regard it can be said that the media represent, interpret and endorse aspects of social experience (Oââ¬â¢Shaughnessy and Stadler, 2005). The media are also implicated in social regulation, or in other terms, the government of society. The media are implicatedRead MorePopular Culture Consisted Around Social Media Essay796 Words à |à 4 PagesThis week, the theme in Popular culture consisted around social media. The first of the many links we were provided was the ââ¬Å"This American Life Podcast: ââ¬ËStatus Updateââ¬â¢Ã¢â¬ . This 14-minute podcast was about how these freshmen girls in high school discussing how they use social media, such as Instagram. In the prologue, they basically talk about how parents donââ¬â¢t understand the satisfaction they gain from social media and how it gives you confidence in a way. They discussed the typical comments theyRead MorePopular Culture Analysis : Social Media And Business1283 Words à |à 6 PagesStudentââ¬â¢s Name Tutorââ¬â¢s Name Culture June 17, 2015 Popular Culture Analysis: Social Media and Business Facebook, Twitter, Google Plus, LinkedIn, and Instagram, are extremely popular social media sites found on the internet. None of these sites would have emerged had it not been for the development of the computer, and then, the internet. Today, thanks largely to the internet, communicating globally have become very simple. Gone are the days when people sent letters by post, or in case of emergenciesRead MoreThe Representation of African Americans in the Media and Popular Culture901 Words à |à 4 PagesIntroduction In popular culture, specifically American television, representations of African Americans often rely upon an array of stereotypes. Representation is the production of meaning through language or signifying systems. In media, the dominant stereotypes of African Americans include the sapphire, the coon, the jezebel, and the buck. These stereotypes originated during the minstrelsy period of the 1830s from white actors in blackface. While classic Black stereotypes originated during thisRead MoreMy Experience At The Center For Film, Media, And Popular Culture994 Words à |à 4 Pagesthe Center for Film, Media, and Popular Culture from January to April. I interned for the entire semester, four hours a week. At times, there would be events, so I would intern for more hours on those days. If there was an event, I would intern one hour at the office, and two to three hours at the event. My experience at the Center wasnââ¬â¢t very eventful, but it did provide me with knowledge that I will take with me wherever I go. The Center for Film, Media, and Popular Culture provided me with not
Immigration And The Issue Of Immigration - 982 Words
My current event is on the issue of Immigration and Refugees that is going on in our society. Immigrants have been the back bone of what made America great. This country is supposed to be the land of opportunity. For the people that come here that is all that they hear. Wanting a fresh start from whatever country they came from. The NASW (2015) said that ââ¬Å"Immigration has increased rapidly in the 1990s, with more than 13 million people moved to the United Statesâ⬠(p.176). Immigrants and Refugees is an issue that has been talked about for many years. ââ¬Å"In 1965 the Immigration and Nationality Act Amendments provided a sweeping change in immigration law. The national origins system was abolished and a new set of priorities for admitting immigrants was adoptedâ⬠(NASW, 2015, p. 176). So Immigration has been a part of our culture, American society, and policy making for a long time now. It is talked about today even with during our Presidential campaign for 2016. The problems with Immigrants and Refugees coming to America came to issue when ââ¬Å"Donald Trump said he would deport all undocumented immigrants in the United States which is an estimated 11 million peopleâ⬠(Saunt, 2015). In this article the Author Claudio Saunt made it his effort to explain that is a horrible idea. Saunt (2015) wrote in his article that ââ¬Å"In the past American cities and countries in the Southwest and Midwest tried to expel Mexican-Americans once before in the 1930s, and it was a traumatic result for theShow MoreRelatedImmigration And The Issue Of Immigration987 Words à |à 4 PagesRepublicans and Democrats have been fighting over the issue of immigration since the 1900s. Immigration has been an issue declared by both Democrats and Republicans alike over debates, elections and even the presidency. Each political party has different viewpoints of immigration and how it effects society and the U.S. as a whole. Immigration is the great division between two opinions. These two sides are: one being people that are accepting with immigrants coming in and out of the U.S., while theRead MoreThe Immigration Issue Of Immigration1965 Words à |à 8 PagesImmigration is one hot topic in todayââ¬â¢s conversation and society. Many think that immigrants coming to America are taking many jobs away from who need them. Some also think that there are jobs being taken away are not ones that Americans would not perform due to the horrible working conditions, low pay, and lack of important medical coverage. The immigration issue has come to a point where the United States must make a decision to spend a lot of money to curtail the amount of immigrants coming hereRead MoreImmigration Issues997 Words à |à 4 Pagesand messy immigration policies have become a serious problem to gain control of. Although immigrants have contributed to America, the government should reform current immigration policies and limit immigrants flow today because of the eco nomics and the large population problem. Kofi Annan in her lecture on International Flows of Humanity states that we must approach the issues of immigration with the strong ethical compass. Jagdish Bhagwati asserts that while changing immigration policies weRead MoreThe Issue Of Immigration Reform Essay1401 Words à |à 6 Pages Immigration Reform Tony Smith HSE 430 November 17, 2016 Nick R. North Immigration Reform Introduction Public Opinion The American public seems to be aware of the issue in general, but is short of the details. There has certainly been a healthy amount of media coverage of immigration reform, but as the coverage itself is unclear as to how best to frame the problems, it mostly informs about the existence of the issue rather than informing about the issue itself. As such, there is conflictingRead MoreImmigration As An Ethical Issue1148 Words à |à 5 PagesIMMIGRATION AS AN ETHICAL ISSUE 2 Immigration as an ethical dilemma has attracted decades of debate. It is an ethical issue that has not found a solution, and it does not appear that it will find one soon. Immigration debates may look interesting but the two antagonistic groups: those who support immigrant and those who oppose them seem to score equally with no solution (Kourtsounis, 2014). The groups that oppose immigration have strongly accused the government for allowing its borders to remainRead MoreThe Issues Faced By Immigration1567 Words à |à 7 Pagescomes to being able to secure employment, decent housing and adequate payâ⬠. Potential immigrants often opt out of immigration because to them it isnââ¬â¢t worth it if they have to take lower paying jobs that arenââ¬â¢t in their original field of work. Immigrants often convey these struggles and challenges to their home country consequently discouraging other potential immigrants. ââ¬Å"Solving the issues immigrants currently confront is thus integral to the long-term prosperity of Canadaââ¬â¢s economyâ⬠. The source recommendsRead MoreImmigration Issues Essay762 Words à |à 4 Pagesto do with the immigrant issues such as Community Catalyst, National Immigration Law Center (NILC), and the Center for Law and Social Policy (CLASP). What policies have been proposed to address this issue? What is the potential or actual effect of any proposed legislation? Who has been helped (or might be in the future) by the legislation or health policy change? Despite the order to penalize those local agencies and states that do not cooperate with the federal immigration enforcement, Boston, CaliforniaRead MoreThe Issue Of Immigration Policy1189 Words à |à 5 Pages Although the issue of immigration policy has been at the center of political debates, largely discussed in the media and newspapers, no one has yet found a solution to this ill-defined problem, that would comply with the Americaââ¬â¢s core values. While I think the immigration policy does need a reform, the solution to this problem certainly is not a deportation of all undocumented residents. Currently, there are nearly 40 million United States residents that were born abroad.About 11Read MoreThe Issue Of Illegal Immigration1420 Words à |à 6 PagesOne of the most controversial issues in politics today is that of illegal immigration. ââ¬Å"Immigration has been a constant source of economic vitality and demographic dynamism throughout our nationââ¬â¢s history.â⬠(CAP Immigration Team, 2014) There are thousands of immigrants that arrive in the United States each year. Over the years, illegal immigration has been growing despite policies made to prevent this growth. In my opinion, immigration will continue to be a social issue that is fiercely debated duringRead MoreThe Issue Of Illegal Immigration1523 Words à |à 7 PagesThe issue of illegal immigration has become one of the most important issues of concern to the international community and the countries that represent a source of migrants as well as countries that receive them it is worth mentioning that there is a close link will appear in the coming days between the global financial crisis and the issue of illegal immigration; since that crisis will push millions of young people to the lists of unemployed to increase their number in developing countries, and
Enterprise Network and Security Management â⬠MyAssignmenthelp.com
Question: Discuss about the Enterprise Network and Security Management. Answer: Introduction: Comparing and contrasting the OSI reference model with the TCP/IP model it can be found that both the models finds its use for network communication. The main difference between the OSI and the TCP/IP model is that the OSI model is not used in the practical field for communication because it is a conceptual model but the TCP/IP model is applied for the establishment of connection between the hosts connected in the network (Colin, Mathieu Nakechbandi, 2016). The TCP/IP model is based on client server architecture while the OSI reference model is a theoretical model. There are 4 layers in the TCP/IP model but the OSI model consists of the 7 layers. The TCP/IP model was developed by the department of defense and the OSI model was developed by the international standard organization (ISO). The OSI model is not tangible but the TCP/IP model is tangible. The TCPP/IP model is mostly used but the OSI model is never used in the network communication. From the above network models the OSI reference model is the most useful for describing the network because this model is based on the layering concept and each of the layers in the model have different functionality. A bottom up approach is followed and for transferring data packets in the network and it is flexible to handle different protocols used for communication in the network (Kori Rai, 2016). There are four layers in the TCP/IP model but in OSI model the layers are broken down into seven layers and it makes the TCP/IP model to rely on the OSI reference model. For the completion of the hands on project 2.3 the a web browser is opened and the URL www.gestioip.net/cgi-bin/subnet_calculator.cgi is inputted for determining the number of subnet mask that are required for supporting the specific subnet in an IPv4 network. The network address for the IP address 192.168.0.0 is defines with the help of the online subnet calculator tool. The instruction is followed as given on the requirement and a similar result is obtained and demonstrated in the following figure. The information generated from the subnet calculator are reviewed and the last two fields consists of the mapped IPv4 address and the 6 to 4 prefix that can be used for the configuration of the dual stack network. The configuration of the dual stack network is important for enabling communication with the IPv6 network. Calculation of host address range, broadcast address For proceeding with the hands on project 2.5 a web browser is opened and the URL www.subnet-calculator.com is inputted for the determination of the range of host address, broadcast address and the different values that can be used for an IP address. The website provides a detailed description of the network calculations and describes the usage of the wild card mask, broadcast address and the subnet range for configuration of a network. The maximum subnet drop down list is clicked to open and different values appears such as 1, 2, 4, 8, 16, 32 and 64 and from them the 4 is selected and the new values are recorded. The calculation is done for the class c network address 192.168.0.1 and the following table is created. Subnet mask Subnet bits Mask Bits Hosts per subnet Host Address range Broadcast Address 255.255.255.192 2 26 62 192.168.0.1 - 192.168.0.62 192.168.0.63 On the selection of the Class network the IP address changes to 10.0.0.1 and the mask address is changed to 255.255.0.0 and thee new values for the subnet is given in the following table. Subnet calculation of IP 10.0.0.1 Subnet bits Maximum subnets Mask Bits Hosts per subnet Host Address range Broadcast Address 8 256 16 65534 10.0.0.1 - 10.0.255.254 10.0.255.255 When the class A address table is compared with the class C address table it is found that the IP address changes and range of the first octet also changes. For the class C subnet mask it cannot be changed to 255.255.255.0 and it starts from 255.255.255.0. The experiment is continued with the different class of IP address such as Class B and the changes in the values are noted such as the range of the IP address, Subnet ID and the broadcast address. It is network layer protocol that is used for the conversion of the IP address to the Mac address also known as the Ethernet address. If a physical address needs to be obtained by the host an ARP request is sent to the TCP/IP network and the reply is received with the physical address (Medhi Ramasamy, 2017). The application of the reverse ARP is used for getting the IP address of the host by broadcasting the physical address and a reply is received from the server with the IP address of the host. The Arp cache is used to maintain a map between the IP and the Mac address of the host and communicating using the ARP protocol. It carries the data packet to the specified IP address and used as a mediator between the network layer and the IP protocols. Case Study Task The network solution is designed for a medium sized organization named Foreshore IT Solutions for accommodation of the expansion. The network is designed such that the six branches of the organization are able to communicate with each other. A class A network address is used for the preparation of the network subnet plan. A single router is used for each of the department and the interface of the router is required to be configured following the network subnet plan. The network address plan is created for minimizing the wastage of the IP address and increase the efficiency of the solution. The subnet is created for increasing the security of the network and enabling better control on the hosts connected in each of the subnets of the proposed network solution. A prototype of the network is designed in cisco packet tracer and the network devices are configured according to the subnet plan for testing the connection between the different departments of the organization. A central router is deployed in the network for the management of the network traffic for each of the department of the organization. The router also needs to be configured with access control list such that the hosts connected in the network can be managed and monitored for increasing the security. The router is connected with a layer 3 switch and the servers are connected to it such that all the department can access the servers via the central router. The firewall is used for connecting the ISP with the internal network of the organization such that the unknown request can be blocked and the central res ources can be secured. Network Address solution Network Address:10.0.0.0/21 Number of IP address available for the network:2046 Required number of IP address:1130 Number of IP address available in the subnet:2036 Subnet Name Needed Size Allocated Size Mask Dec Mask Address Assignable Range Broadcast Head_Office 60 62 /26 255.255.255.192 10.0.7.128 10.0.7.129 - 10.0.7.190 10.0.7.191 Finance_office 260 510 /23 255.255.254.0 10.0.4.0 10.0.4.1 - 10.0.5.254 10.0.5.255 IT_Call Centre 520 1022 /22 255.255.252.0 10.0.0.0 10.0.0.1 - 10.0.3.254 10.0.3.255 Research_and_Development_Office 120 126 /25 255.255.255.128 10.0.7.0 10.0.7.1 - 10.0.7.126 10.0.7.127 Marketing_Department 40 62 /26 255.255.255.192 10.0.7.192 10.0.7.193 - 10.0.7.254 10.0.7.255 Information_Technology 130 254 /24 255.255.255.0 10.0.6.0 10.0.6.1 - 10.0.6.254 10.0.6.255 The address solution is created by calculating the subnet for each of the offices and allocating the range of IP address for connecting the hosts deployed in the network. Six DHCP pool is created with the range of the IP address and the IP used for the interface of the router are excluded from the IP address. Some extra IP address are kept in reserve for the accommodating the future growth of the organization. The central router needs to connect with the six sub network for connecting the offices and enabling the hosts to communicate with the other office network. The router is configured with static routing such that the paths between the routers are updated and reduce the consumption of the bandwidth and increase the efficiency of the network. Each of the branch office network are configured with VLAN such that the collision in the data traffic can be reduced. The IP route command is used with specifying the next hop address for the creation of point to point interface. If the number of hosts per subnet increases to 1024 there would be a need to re calculate the subnet plan and the following network address should be used for the accommodation of the new hosts in the network. The configuration interface of the router and the static routes must be cleared and the new IP address should be inputted for the configuration of the network. Subnet Name Needed Size Allocated Size Address Mask Dec Mask Assignable Range Broadcast Finance_office 1024 2046 10.0.0.0 /21 255.255.248.0 10.0.0.1 - 10.0.7.254 10.0.7.255 Head_Office 1024 2046 10.0.8.0 /21 255.255.248.0 10.0.8.1 - 10.0.15.254 10.0.15.255 IT_Call Centre 1024 2046 10.0.16.0 /21 255.255.248.0 10.0.16.1 - 10.0.23.254 10.0.23.255 Information_Technology 1024 2046 10.0.24.0 /21 255.255.248.0 10.0.24.1 - 10.0.31.254 10.0.31.255 Marketing_Department 1024 2046 10.0.32.0 /21 255.255.248.0 10.0.32.1 - 10.0.39.254 10.0.39.255 Research_and_Development_Office 1024 2046 10.0.40.0 /21 255.255.248.0 10.0.40.1 - 10.0.47.254 10.0.47.255 Conclusion The network solution is proposed for the Foreshore IT solution for increasing its efficiency and meet the current growth of the organization. The area of expansion and the requirement must be analyzed before deployment of the network. The hardware device installed in the network must be configured according the address solution prepared for the organization. In case of increase in the number of host the router needs to be reconfigured with the new address plan created for the network. For increasing the security of the network the traffic of the network must be monitored and all the network devices must be password protected such that the unauthorized users does not have access of the network configuration. Bibliography Colin, J. Y., Mathieu, H., Nakechbandi, M. (2016, May). A proposal for an open logistics interconnection reference model for a Physical Internet. In Logistics Operations Management (GOL), 2016 3rd International Conference on(pp. 1-6). IEEE. Edwards, J., Bramante, R. (2015).Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley Sons. Hamadneh, N., Murray, D. (2017, August). Private subnetting one (PS1), an algorithm for private IPv4 address allocation. InProceedings of the 7th International Conference on Information Communication and Management (pp. 40-44). ACM. IPv4/IPv6 subnet calculator and addressing planner. (2018).Gestioip.net. Retrieved 27 March 2018, from https://www.gestioip.net/cgi-bin/subnet_calculator.cgi Jafarian, J. H., Al-Shaer, E., Duan, Q. (2015, April). Adversary-aware IP address randomization for proactive agility against sophisticated attackers. InComputer Communications (INFOCOM), 2015 IEEE Conference on(pp. 738-746). IEEE. Kori, P., Rai, S. S. (2016). ANALYSIS OF NETWORK SECURITY THREATS AND VULNERABILITIES BY DEVELOPMENT IMPLEMENTATION OF A SECURITY NETWORK MONITORING SOLUTION.International Journal of Engineering, Management Medical Research (IJEMMR),2(8). Medhi, D., Ramasamy, K. (2017).Network routing: algorithms, protocols, and architectures. Morgan Kaufmann. Oppitz, M., Tomsu, P. (2018). Networks for Sharing and Connecting. InInventing the Cloud Century(pp. 97-129). Springer, Cham. Panko, J., Panko, R. R. (2015).Business data networks and security. Pearson Education. Porter, C. (2018).Online IP Subnet Calculator.Subnet-calculator.com. Retrieved 27 March 2018, from https://www.subnet-calculator.com/ Robertson, S., Alexander, S., Micallef, J., Pucci, J., Tanis, J., Macera, A. (2015, September). CINDAM: Customized information networks for deception and attack mitigation. InSelf-Adaptive and Self-Organizing Systems Workshops (SASOW), 2015 IEEE International Conference on(pp. 114-119). IEEE. Santos, M. G. M., Marcillo, P. A. A. (2018). Security in the data link layer of the OSI model on LANs wired Cisco.Journal of Science and Research: Revista Ciencia e Investigacin,3(CITT2017), 106-112. Shin, B. (2017). A Practical Introduction to Enterprise Network and Security Management. Wang, Y., Wang, H., Liu, L., Song, W., Lu, J. (2015, December). Research and implementation of network planning and design for community. InComputer Science and Network Technology (ICCSNT), 2015 4th International Conference on(Vol. 1, pp. 847-850). IEEE.
Tuesday, May 5, 2020
Concept of Project Management Methodology-Myassignmenthlep.cm
Question: Discuss about the Concept of Project Management. Answer: Introduction The main objective of the literature review is To understand the concept of project management methodology for software development project. It will allow the reader to gain deeper understanding about the project management methodologies. The benefits and limitations of the methods can be studied and the most appropriate method for the software development project should be selected. The information has been collected from various sources such as books, articles, journals, online publications and previous research papers. As per Glaiel, Moulton and Madnick, 2014, Software development project consist of many integrated and functionally dependent activities which combines to form a new product. Software projects develop a product which has never been tested. The scope of the project changes many times which leads to delays and extended budgets. Furthermore, lack of communication between the management and software developers affects the deliverables and final outcome of the project (Heagney, 2016). The literature will be useful in selecting the framework which will provide a structured approach to achieve all the objectives of the project. The methodologies which can be used are: Agile methodology Agile is commonly used for software and IT projects. According to Glaiel, Moulton and Madnick, 2014, More than 35% of project manager have adopted agile in IT related projects due to its incremental model. There are four values which are included in Agile: interactions of individuals, working software, collaboration of customer and adapting to the change. As per to Moniruzzaman and Hossain, 2013, Agile methodology should be used is projects which are not well defined. It is suitable for projects which b involves human interactions and collection of data. It allows the manager to develop self managed teams which performs their task in an effective manner. The main benefits of adoption of Agile method is that it allows the manger to make changes as per the requirements of the project. The inputs and feedback is taken from the stakeholders and it is included in the process. Azim, et.al, 2016 suggests that Agile is useful where there is need for drastic shifts or change in the assignme nts of the team. It also ensures that each process is reviewed and tested before its launch. On the contrary, Morley, 2016 believes that It becomes difficult to assess the requirements and efforts in lager IT projects and its deliverables. It can be used only with smaller IT projects. Similarly, Nelson and Morris, 2014 pints out that, Agile lacks effective designing and documentation stages which can affect the performance of the project. Project management body of knowledge (PMBOK) Project management body of knowledge (PMBOK) is a traditional method which is generic in nature. It focuses on estimations of work, risk identification, dependencies, time scales and handling of different activities. It has various best practice principles which can be used to successfully complete the project. It includes 39 groups with 9 knowledge aspects (Banihashemi, Hosseini, and Sankaran, 2017). The areas of knowledge include time, cost, integration, scope, communication, quality risk, human resources and procurement. Along with this, The process of PMBOK consists of initiation, creation of plans, implementation, reviewing and monitoring, controlling and project closure. It provides resources to the manager which helps him to gain understanding about the requirements of the project. According to Nelson and Morris, 2014, PMBOK uses iterative environment and it is completely based on the requirements of the customers. On the contrary, Rahmanian, 2014 believes that PMBOK can incr ease rigidity in IT projects as it encompasses extra when applied. It considers the entire project as a single identity which increases complexities for the manger. Furthermore, it uses descriptive approach including governance thorough project sponsor and stakeholder which may not be suitable for the IT related projects (Bresnen, 2016). Software development project can be benefitted Due To This Approach Because It Allows Error Free Updating. Prince 2 PRINCE 2 provides a systematic and structured approach which allows the project manager to organize and control different activities in the project. It has 44 process groups which helps interaction between various activities. It can be easily integrated with different models such as ITIL, managing successful programs, OGC gateway and CMMI. Furthermore, it identifies the key risk areas in the project which can be used to reduce complexities in the entire project. As per the Turner, 2016, PRINCE 2 differentiates the roles of project manager and workers which helps in managing all the activities. It is completely a process driven methodology which can be useful for software development project. On the contrary, Banihashemi, Hosseini, and Sankaran, 2017 believes that PRINCE 2 is not appropriate for the iterative approach of development. It is completely different from PMBOK as it does not contain knowledge areas and processes. IPMA Competence baseline According to Leach, 2014, IPMA Competence baseline is a model which uses competencies, qualification, knowledge and experience of the project manager to attain the objectives. The project manager can develop his own practices which can be applied to the project. It can be useful in defining competencies such as contextual, technical and behavioral. Moniruzzaman and Hossain, 2013 states that ICB method is completely different from other methodologies because it allows the person to develop appropriate methods and techniques. It can be useful for the project because the project manager has through knowledge about the concerned project. But Glaiel, Moulton and Madnick, 2014 argues that ICB does not provide any specific approach or methods which should be applied to the project. Waterfall methodology Waterfall methodology is known for its linear sequential and life cycle based model. It require through analysis and planning at each stage. The requirements are defined in the initial stages which help in planning and creation of standards. It has many steps which consist of planning, development, quality assurance, monitoring and project completion. It follows a sequential process which ensures that all the deliverables are produced with high quality. Only after the analysis the next phase is started. As pe Rahmanian, 2014, Waterfall method should be used for software testing due to its systematic approach. It should be applied to those projects which has clear and well defined requirements. Banihashemi, Hosseini, and Sankaran, 2017 states that Waterfall method allows the manger to follow the schedules which does not overlapping of activities. But it does not allow customer interaction which is needed is software projects. Morley, 2016 argues that It is not possible to back and mak e changes in the plan which increases rigidity in the project. Software projects range from moderate to high risk. Waterfall method will not be suitable for this. It is successful where technology is clearly understood and less ambiguity is there. Apart from this, the cost of fixing the errors can be very costly for the manger which can cause delays. Scrum methodology Scrum methodology provides a framework to the manager which makes it easy to manage complex activities involved in the project. It was developed as a software development project. But now it is also used in new product development and innovative projects. It can be useful in quick development and testing of codes. According to Glaiel, Moulton and Madnick, 2014Scrum considers the feedback of the customers which allows it to make changes as per the requirements. Changes can be easily made which improves the performance of the project. Apart from this, it can be used with different technologies, systems and programming language. It not only improves the quality of the deliverables but also allows the manger to follow the schedules. But Walker, 2015 believes that Scrum can lead to scope creep situation because it does not have end date. It will encourage the stakeholders to demand more improvement and development is the existing system. It may not be possible for the manager to achieve this aspect of the project. Similarly, lack of commitment and support of the workers will result in failure of the entire project (Gollenia, 2016). IT should be only used when trust and collaboration exist between team members and the project manager. Conclusion The most appropriate method which should be applied to Software development project is Agile methodology. It will allow the project manager to bring relevant changes at very low cost. Agile model uses incremental approach which is produced at regular intervals. It does not require through planning which is needed in Waterfall method in the initial stages. The project manager of the Software development project can customize the process as per his requirement. It is not possible in PMBOK which increases rigidity in the process. Along with this, it does not rely on the knowledge and experience of the project manager which is used by IPMA Competence baseline method. Therefore, it will be beneficial for the project manager to use Agile methodology in the Software development project. It will have long term benefits which will improve the performance of the project. References Azim, N., et.al, 2016. People Factors in Agile Software Development and Project Management.International Journal of Emerging Technology in Computer Science Electronics (IJETCSE) ISSN, 0976-1353. Banihashemi, S., Hosseini, M.R., Golizadeh, H. and Sankaran, S., 2017. Critical success factors (CSFs) for integration of sustainability into construction project management practices in developing countries. International Journal of Project Management. Bresnen, M. (2016). Institutional development, divergence and change in the discipline of project management.International journal of project management,34(2), 328-338. Glaiel, F.S., Moulton, A. and Madnick, S.E., 2014. Agile project dynamics: A system dynamics investigation of agile software development methods. Gollenia, L.A., 2016. Business Transformation Management Methodology. Routledge. Heagney, J., 2016. Fundamentals of project management. AMACOM Div American Mgmt Assn. Heagney, J., 2016. Fundamentals of project management. AMACOM Div American Mgmt Assn. Konstantinou, E. and Mller, R., 2016. The role of philosophy in project management. Project Management Journal, 47(3), pp.3-11 Leach, L.P., 2014. Critical chain project management. Artech House Moniruzzaman, A.B.M. and Hossain, D.S.A., 2013. Comparative study on agile software development methodologies. arXiv preprint arXiv:1307.3356. Morley, C., 2016. Management d'un projet systme d'Information-8e d.: Principes, techniques, mise en oeuvre et outils. Dunod. Nelson, R.R. and Morris, M.G., 2014. IT Project Estimation: Contemporary Practices and Management Guidelines. MIS Quarterly Executive, 13(1). Rahmanian, M., 2014. A comparative study on hybrid IT project management. International Journal of Computer and Information Technology, 3(05), pp.1096-1099. Turner, R., 2016. Gower handbook of project management. Routledge. Walker, A., 2015. Project management in construction. John Wiley Sons.
Subscribe to:
Posts (Atom)