Tuesday, August 25, 2020

Why Get Married

Sub-atomic Nanotechnology and Literature Envision a reality where you could have anything you needed. Gold? Here it is. Another vehicle? Voila. Precious stones? Gracious, here, if it's not too much trouble have a portion of mine, there's additional in the back. Obviously, this isn't our reality at the present, yet it may be the universe of things to come. Sub-atomic nanotechnology will have the option to give whatever one needs or needs, for nothing or for a little measure of installment. In any case, it won't just influence business and material merchandise. It will influence medication, war and weaponry, law authorization, undercover work, amusement, removal of waste and trash, and even writing. Writing will maybe be influenced in a more prominent manner than one may might suspect. Be that as it may, before I get to that, let me clarify what, precisely, atomic nanotechnology is. In l 959, Nobel Prize-winning physicist Richard Feynman set forth a thought. His thought was that anything could be produced using the ground up, out of individual particles or atoms. This is nanotechnology: the working or control of individual iotas or atoms, each in turn, and situating and arranging them decisively and over and again, until enough aggregated to shape a huge scope, usable substance. Feynman didn't name it and blueprint the science, be that as it may. This was finished by K. Eric Drexler. In the 1970's, the point at which he was an understudy at MIT, Drexler concocted a thought of nanotechnology, and illustrated its potential employments. He believed that on the off chance that one had the capacity or innovation to work with singular iotas and atoms, at that point one could make a crate that would change basic materials into hamburger. It sounds peculiar, however that was the real trick. The thought was that you could open the entryway, hurl in some stuff, work the c ontrols, and two hours or so later: out moves some new hamburger. It sounds odd on the grounds that we are encouraged that meat originates from cows, not from a case of grass clippings and old tennis shoe insoles. Be that as it may, it truly bodes well. Steers utilize just a couple of materials when making meat: grass, air, water, daylight. At the point when they are processing that garbage, they are only revising the particles to frame trademark examples of hamburger. The main genuine distinction between the techniques for meat creation of dairy animals and Drexler's container is that bovines make hamburger utilizing proteins and fluids, where responsive operators haphazardly impact, and Drexler's crate makes meat precisely. Drexler states that the particles and molecules would need to be controlled by small, little robots, generally alluded to as constructing agents.

Saturday, August 22, 2020

Letter of Intent Personal Statement Example | Topics and Well Written Essays - 250 words

Letter of Intent - Personal Statement Example One of the most significant encounters to me was entry level position in Cairo Microsoft Innovation Center (CMIC). I have additionally taken an interest in Imagine Cup 09 in Cairo facilitated by Microsoft. This experience can fill in as a proof of my expert aptitudes and capacities. In my nation of origin, I have chipped away at self-governing frameworks advancement ventures, explicitly, on Unmanned Aerial Vehicles (UAV) for 15 months. Additionally, I have enough involvement with gathering necessities, planning, executing, and testing distinctive programming applications. I likewise have a decent information on some key programming dialects, for example, c++, java, and JSP. As an exceptionally energetic individual that appreciates trying sincerely and accomplishing planned outcomes I truly need to be the piece of this program since it will open another open doors towards worldwide work understanding. I am appreciative ahead of time for exhaustive thought and trust in the call for

Sunday, August 9, 2020

Why Would Opiate Medications Cause Fainting

Why Would Opiate Medications Cause Fainting Addiction Drug Use Opioids Print Why Would Opioid Medications Cause Fainting? By Rod Brouhard, EMT-P facebook twitter linkedin Rod Brouhard is an emergency medical technician paramedic (EMT-P), journalist, educator, and advocate for emergency medical service providers and patients. Learn about our editorial policy Rod Brouhard, EMT-P Medically reviewed by Medically reviewed by Steven Gans, MD on January 23, 2020 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on February 10, 2020 There is no real difference between heroin and prescription opiates. Snap Decision / Getty Images More in Addiction Drug Use Opioids Cocaine Heroin Marijuana Meth Ecstasy/MDMA Hallucinogens Prescription Medications Alcohol Use Addictive Behaviors Nicotine Use Coping and Recovery Opioid medications are often prescribed to help control pain, but they can sometimes have unpleasant side effects. In addition to the risk of addiction and abuse, narcotic pain medications can sometimes cause people taking them to pass out. This can be a frightening experience for the patient taking the medications as well as any family, friends, or passersby who happen to be there to witness the loss of consciousness. In order to understand why opioids sometimes cause people to faint, it is important to know about how these drugs work. Note: The following is to help understand opioids better and is not intended as advice for medical treatment. Opioids and Fainting Opioidsâ€"medications made directly from opium extract or a synthetic version of opiumâ€"can cause loss of consciousness and possibly death. These medications are also known as narcotics. A drop in blood pressure is fairly common. Paramedics administer opioid medications to relieve pain as well as to reduce the workload of the heart during certain types of heart-related emergencies (usually for chest pain during heart attacks or congestive heart failure). The action that leads to lower blood pressure in opioids is the same action that reduces the hearts workload. To better understand how opioids do what they do, lets start by looking at symptoms of opioid overdoses. How Opiates Impact the Brain and Body Opioid Background These medications are often used for pain control, but they have a long history of abuse. The opioids most people recognize are morphine, Vicodin, codeine, Oxycontin, and heroin. There are several more drugs in this class available and many have different names in different countries (Rapifen and Transtec are common names in the UK). Heroin, developed by the Bayer Company (yes, same as aspirinâ€"and released commercially only a year apart), hasnt been legal in the United States since 1924 and is no longer commercially produced worldwide, unless you count illegal production. Its worth noting that unlike legal medications, illegal opioids are not regulated and their purity can be unpredictable, which can contribute to overdoses. Besides administering opioids therapeutically (usually morphine, but paramedics in some areas may carry different versions) paramedics are often called upon to treat opioid overdoses. There are three classic signs of an opioid overdose: Unconsciousness. The patient is almost always completely unresponsive.Constricted pupils (sometimes referred to as pinpoint pupils)The patient is breathing slowly or not breathing at all. This is called apnea or respiratory arrest. The most common opioid overdoses seen by paramedics involve heroin, but any opioid medication can cause the signs and symptoms above. The problems with opioid medications dont only happen with overdose. Some opioids, such as morphine, cause decreases in heart output and blood pressure. How it happens is still being studied and it seems that not all opioid medications are created equal. Individual reactions to opioids vary from one person to the next, meaning that one persons reactions and side effects to a drug like morphine or fentanyl might be very different than someone elses. Besides whatever direct effect an opioid medication might have on blood pressure, there are other opioid-related reactions that can affect blood pressure and possibly contribute to fainting, among other things. It is impossible to predict the degree to which an opioid medication will change an individuals blood pressure. However, knowing that blood pressure could be affected helps us be prepared for possible adverse reactions. Histamine and Heroin Stereotypically, heroin addicts are depicted as itching constantly and scratching a lot. There might be a reason for that; opioids cause a release of histamine. Histamine is the same thing thats released during an allergic reaction. Allergic reactions cause itching, among other things. Histamine also plays a part in anaphylaxis, which is a severe allergic reaction that can be life-threatening. The symptoms of anaphylaxis often include low blood pressures. Combined with the typical decrease in blood pressure of some opioids, this can lead to a precipitous drop in blood pressure and fainting. Understanding Opioid Overdoses Opioid-Induced Constipation Opioids are also well-documented causes of constipation. Chronic users can develop severe constipation that can lead to cramping in the gastrointestinal tract. Gastrointestinal cramping stimulates the vagus nerve, which leads to lower heart rates and drops in blood pressure. Cramping is another potential trigger for fainting due to sudden losses of blood pressure. Important Considerations Even though these are some of the oldest pain relievers available, there is still a lot we dont know or understand about opioid medications. With all the possible reactions and effects of opioids, a loss of blood pressure bad enough to cause a loss of consciousness (fainting) is not out of the question. Adding the sedative effects of opioids and their propensity to decrease breathing just makes things more complicated. Read the Labels Always follow directions on all medications (prescription and over the counter). Doing so may help you avoid situations that can lead to fainting. For instance, the precautions for oxycodone warns that the medications may result in lightheadedness, dizziness, and fainting when standing too quickly. Ultimately, for some people, opioid medications simply may not be the answer. But given the important role that these pain control agents can play, its worth exploring the options with a doctor in cases involving severe pain. With expert supervision and safe and careful titration, pain control and improved quality of life can be achieved. How to Spot the Signs of a Pain Killer Addiction

Saturday, May 23, 2020

Social Influence On Social Psychology - 1870 Words

Social influence is a big matter in social psychology which is referred to the ways in which different people’s thoughts, actions and feelings are subjective by social groups. On a daily basis we are deluged by numerous efforts by others to influence us, and that’s why, the study of social influence has long been a dominant matter of analysis for social psychologists and researchers in many other social sciences (e.g. marketing and political science). Social Psychologists focus on the situation. They study the social influences that describe why the same person will act inversely in different situations. Theorists have typically distinguished between three types of social influence which are compliance, conformity, and obedience. Compliance is often referred to as an active form of social influence in that it is usually intentionally initiated by a person where they may choose to comply or not to comply. Yet, the thoughts of social reward and punishment may lead them to compliance when they really do not want too. During the 1970s, psychologist Philip Zimbardo conducted an experiment in which participants played the roles of guards and prisoners in a mock-prison set up in the basement of the psychology department at Stanford University. Originally slated to last two weeks, the experiment had to be terminated after just six days after the guards began displaying abusive behaviour and the prisoners became anxious and highly stressed. The experiment demonstrated how peopleShow MoreRelatedSocial Psychology And Social Influence1600 Words   |  7 PagesIn social psychology, social influence is a process where someone’s beliefs, thoughts and behaviour change by being exposed to beliefs, thoughts and opinion s of others. It manifests in several forms, such as obedience, compliance and conformity. All these types of social influence have been studied by numerous researchers who investigated the reasons why people conform to social norms and obey to authorities, such as Milgram’s classic studies on obedience. His experiments support the popular ideaRead MoreSocial Psychology: Social Influence768 Words   |  3 PagesIntroduction Social influence is a major topic in social psychology and looks at how individual thoughts, actions, reactions and feelings are influenced by other people or social groups. â€Å"Social influence can be seen in our conformity, our obedience to authority, and our group behavior† (Psychology 579). Social influence may also be represented by peer pressure, persuasion, marketing and sales. Purpose of the Study The purpose of this study is to determine how effective social influence is on a groupRead MoreSocial Psychology: The Study of Influences Essay1420 Words   |  6 Pagesthat has been explored. Psychology, or the study of â€Å"why†, has been attempting to answer such questions for centuries. Although there are many answers (reflected in the number of schools of psychology), Social psychology attempts to explain the environmental factors that lead to a person behavior. By definition, Social Psychology is â€Å"the study of the manner in which the personality, attitudes, motivations, and behavior of the individual influence and are influenced by social groups† (Merriam-WebsterRead MoreFritz Heiders Influence Of Social Psychology884 Words   |  4 PagesAt the beginning of the 1900s, Social Psychology was in its infancy as psychologists studied individuals and how they thought, felt, and behaved in their social environment. Scientific methods were developed to describe, capture, and measure social relationships and their influence. Fritz Heider was such a psychologists and his work still influences social psychology and its research today. Judgement of conduct, a current study by Dr. Wong Yee Cheung, is influenced by the work of Heider. The workRead MoreKurt Lewin s Influence On Social Psychology Essay1209 Words   |  5 Pagespsychologist who had the biggest impact on social psychology would be Kurt Lewin. Commonly known as the father of social psychology, Lewin put in countless hours of hard work and research in the study of the individual behavior among social situations. By working with other renowned psychologists, creating theories of his own, and leaving a mark on the world that still thrives today, Kurt Lewin is greatly responsible for the many of the advancements of psychology throughout history. Born in a smallRead MoreUnderstanding Social Psychology And How Relationships With Others Can Influence An Individual s Thoughts And Behaviors966 Words   |  4 PagesWhen studying social psychology, it is essential for one to understand social groups, how they work, and how relationships with others can influence an individual’s thoughts and behaviors. For this reason, a full understanding of cooperation is necessary for social psychologists. Defining Cooperation Cooperation has several components, and therefore must be broken down when being defined. Most importantly, it involves multiple people in any sort of beneficial relationship; that is, the outcomeRead MoreHow do others influence our behaviour? Discuss with reference to social psychology theory and research.1989 Words   |  8 Pagescount: 1,633 How do others influence our behaviour? Discuss with reference to social psychology theory and research. Social influence has many different definitions in psychology, it is mainly used to summarise the field of social psychology. Mainly looking at â€Å"how thoughts, feelings and behaviour of individuals are influenced by actual, imagined or implied presence of others† (McGrath, 1970.) Our social life is mainly distinguished by our social influences; influences we are both consciously andRead MoreSocial Psychology Definition Paper1122 Words   |  5 PagesSocial Psychology Definition Paper Sinthia Brye PSY/ 400 August 30, 2010 Joyce Willis Social Psychology Introduction Social psychology it observes as the influence of our situations with special attention on how we view and affect one another. Social psychology perceives the way we think, influence people, and relates to others. Social psychology lies at psychology’s boundary with sociology, which sociology is the study of people in groups and societies? Social psychology isRead MoreThe Study of Human Behavior in Given Situations1613 Words   |  7 PagesPsychology is a social science study that covers diverse subject topics and carries out different forms of research in order to understand the development and function of human beings. It is a scientific study that focuses on peoples mind and its functions especially those affecting behavior in a particular context. Psychology is divided into different branches, and each branch addresses its own form of content in relation to mental processes and behavior. Social psychology is one of the psychologyRead More Social Psychology Essay1687 Words   |  7 Pagesorigins of modern social psychology. It is therefore important to consider that social psychology cannot be traced back to one single source of origin (Burr, 2003). Hence, this is the reason why there are debates of what social psychology is. Allport (1985) describe d social psychology as the study an individual’s thoughts, feelings, and behaviours which are influenced by the actual, imagines, or implied presence of others. As seen from this definition there is a direct link between social science and the

Tuesday, May 12, 2020

Psychological And Physical Effects Of Procrastination Essay

The Psychology of Procrastination Marcus W. Middleton Caledonia Mumford Central School Abstract The psychological and physical effects of procrastination can be detrimental to the health of an individual. However this is a fixable habit that can be overcome through learning and treatment. Introduction In 2007, it was found that up to 95% of students in the United States procrastinated on academic tasks. Even worse, 30% to 60% of those students procrastinated regularly and 75% of them considered themselves to be procrastinators (Skowronski and Mirowska, 2013). While procrastination can have negative effects on one’s health both physically and mentally, this lifestyle can and should be changed. Many of those who procrastinate disregard the mal-effects of procrastination. Some of these effects include cardiovascular disease and even an increased susceptibility to illnesses. There are psychological and physical aspects of procrastination that can make it difficult to overcome this habit, but data supports that through learning about procrastination and how to control one’s time, individuals definitely have the power to become well managed workers. Discussion REASONS Procrastination can be expressed in many ways. There are so many different ways to procrastinate because there is a multitude of reasons why people engage in this self-harming lifestyle. Procrastination has been shown to be a universal pattern (Yesil, 2012). People find things to procrastinateShow MoreRelated Procrastination: Habit or Disorder? Essay1395 Words   |  6 PagesProcrastination: Habit or Disorder? Procrastination is the art of keeping up with yesterday and avoiding today. - Wayne Dyer (6) Universally common to college students, procrastination is often addressed as a bad habit. Yet, in most cases, this isnt a nuance, but a perpetual occurrence - no longer qualifying for the term habit. Typically thought of as a behavioral trait, procrastination thrives on a cycle of blame shifting and avoidance. Falling victim to this habit myself, I embarkedRead MoreThe Negative Effect of Procrastination on College Students858 Words   |  4 PagesProcrastination is a tendency to postpone, put off, delay, reschedule, take a rain check on, put on ice, hold off, or to defer what is necessary to reach a particular goal.(Rogets 21st Century Thesaurus, Third Edition. Philip Lief Group 2009.) While attending College some students find it hard to juggle work, family, and friends. Leading most students down a dangerous path to procrastination; that negative impact affect students from their physical health, mental health, and social health. EveryoneRead MoreProcrastination Is The Thief Of Time868 Words   |  4 Pagesâ€Å"Procrastination is the thief of time.† Edward Young The ability to procrastinate can be very easy. Merriam-Webster’s Collegiate Dictionary defines procrastinate as: to put off intentionally and habitually, to put off intentionally the doing of something that should be done. (online) To choose something enjoyable over a task that must be done is sometimes very easy. Why do we procrastinate? Why do we make the choice to put off todays task till tomorrow? What are some of the causes of procrastinationRead MoreInformative Speech On Procrastination1023 Words   |  5 Pagesapproaching and you still haven’t come close to completing your assignment. And we end up somewhere like this. Well, I believe that we can all relate to this and we have all done this to ourselves before. I’m talking about procrastination. B. Social Significance: For many of us, procrastination is a strong and inexplicable force that prevents us from completing our important and urgent tasks. It’s like the same thing when you bring the like poles of magnets together, it repels. And according to a statisticalRead MoreStrategies for Overcoming Procrastination1081 Words   |  5 PagesStrategies for Overcoming Procrastination Keanna Jones Gen 200 March 18, 2010 Instructor: Jenta Young â€Å"You don’t have to see the whole staircase, just take the first step† says Martin Luther King Jr. (Finest Quotes, Lift Your Spirit Up, 2010). Sounds simple enough to some, but for many people taking the first step can be quite difficult. In other words, putting off something intentionally that should be done is called procrastinating (Merriam-Webster, 2010). There are lots of reasonsRead MoreHow Sleep Are Capable Of Predicting Significant Health Outcomes1599 Words   |  7 Pagesits effect on both mental and physical health (Kroese, Evers, Adriaanse, Ridder, 2016). Digdon and Howell (2008) note procrastination to be the inclination to postpone task commencement or conclusion, wavering actions, or the demonstration of insufficient time allotment for the accomplishment of tasks. Therefore, opting to go to bed later than primarily intended with no external influence is termed bedtime procrastination (Kroese., et al. 2016). Reported associations between procrastination andRead MoreStudent Procrastination And An Open Testing Environment958 Words   |  4 PagesAcademic procrastination is an established area of research in higher education and psychology. This phenomenon has been studied with many forms of student assignments, including those in online courses (e.g., Goda, Yamada, Kato, Matsuda, Saito Miyagawa, 2014; McElroy Lubich, 2013; Klingsieck, Fries, Horz, Hofer, 2012; Rabin, Fogel, Nutter-Upham, 2011). Up to 70% of university students consider themselves to be procrastinators (Goda et al., 2014; Schouwenburg, Lay, Pychyl, Ferrari, 2004)Read MoreNegative Effects Of Social Media1297 Words   |  6 Pagesnetworks can cause adverse psychological harm and even lead to physical harm. Although many may argue that social media pertains to be useful, there prove to be more harmful aspects rather than helpful aspects of these media sites. These effects are not only psychological, but they may also be physical. Not only do social networks cause depression, anxiety, and cyberbullying, they also can result in decreased privacy and physical harm. By recognizing these harmful effects, it is possible to combatRead MoreThe Biological Approach : Mental Processes And Behaviors1356 Words   |  6 Pagesforget memories and thought processes. Neurons are the basic building blocks of the brain and nervous system. They control our muscle movements and thought processes. If neurons are damaged people may experience difficulty in various cognitive and physical behaviors. Everything we do depends on neurons communicating with each other. Neurons communicate by sending and receiving electrical signals throughout the brain and body with the use of neurotransmitters. Neurotransmitters are chemicals that areRead MoreSocial Networking Addiction1159 Words   |  5 Pagesadded a new social dimension to the web. While such networks have made people, communities and groups with shared interests stay more â€Å"connected,† Internet addiction and social network addiction in particular also started being recognized as psychological disorders all over the world. While several 90†²s studies focused on Internet addiction, the next decade saw the growth of a new addiction related to all manner of social networking sites, especially the current king of the jungle: Facebook. In

Wednesday, May 6, 2020

Preventive Measures for Teenage Pregnancy Free Essays

There are a lot of teen mothers growing up in this world wondering, what if I would have stayed in school? What could I have become? Would it have made my life easier if I had thought first? Teens don†t think of the consequences of their actions. They don†t think that the aftermath of their irresponsibility can lead to pregnancy. Having a child comes with a lot of responsibility. We will write a custom essay sample on Preventive Measures for Teenage Pregnancy or any similar topic only for you Order Now The teen doesn†t fully understand that all free time is lost, that she will have to find some may to support herself and the child, and that any of her aspirations for future plans are now drastically changed. Children take up a lot of time, which also means, no more school. If we can some how get through to them that this is what happens when you get irresponsible, it will eliminate a big portion of the problem. One of the best ways of getting the point across is to have a guest speaker that has been through a teen pregnancy before. Whether it be, the person that it actually happened to or that teens mother, which is some times even better. It all comes down to the education of the teen being the best form of prevention. The more they know about sex and it†s consequences at a young age the less likely they are to are to go out and be irresponsible about it. Teaching teens about different types of protection and how they work is some times one of the best ways of keeping the number of teen pregnancies down. Not to mention a fall in the number of teen sexually transmitted diseases. The reason why teaching about protection is good is obvious. The reason the words â€Å"some times† are underlined is because teaching them about sex some times drives a teen that normally wouldn†t have had sex till later on in there lives to think, ‘well, it seems like everyone is doing it. If it†s important enough that we must learn about it in school then I guess it†s normal.† So the argument that education is the best prevention goes both ways. On another plane, parents can help and/or hurt the situation. Every once in awhile at the dinner table or in some public place it seems that parents or even relatives are always wanting to know if you have a girlfriend yet or not. This is definitely not an extreme case but there is always that subconscious thought in the back of there heads that†s saying, I guess I should get on the ball and start looking for a mate. On the other hand, though not every parent thinks so, but their children do listen to them. Any words of advice or even telling them about your own experiences as a teen will help. Even if the parent doesn†t know much about the subject they should try to tell the teen that and a little of what they do know. That will make the child think you care and maybe think twice about their actions. Teens are not dumb and if it seems to them that you are making and honest effort and you really believe in what you are saying they will respect that and listen. There is no real solution to the teen pregnancy problem but education and teen to parent communication are good steps in the right direction. We need to let our children know that we are there for them and that we care. After all no one wants to think of what they ‘could have† become. How to cite Preventive Measures for Teenage Pregnancy, Papers

Saturday, May 2, 2020

ELECTRONSRUS Management

Questions: ELECTRONSRUS is a company that designs, manufactures and sells electronic network equipment based in Wrexham. Business is so good for this HI-TEC company that they have decided to take over the old hospital which is on the other side of Wrexham about 5 miles away from their existing building. The buildings require some modification to fit in with the new plans of the company and as part of this you have been asked to provide a design to install the network infrastructureTo ensure that they do not interfere with the support of their customers during the move they have decided to install a new IT system and Computer Network in the new building before they move in. For this reason, and for the immediate future, a link to the old office will be essential.The attached sheet shows a plan of the premises. A list of the proposed use of the buildings is provided below. Further information is available from your lecturer. 1. Brief but concise description of the available technological solution s2. Compare and contrast these options3. Make a judgement as to the preferred solution for ELECTRONSRUS, justifying your choice. Answers: Requirement Analysis Introduction ELECTRONSRUS are manufacturers of electronic network equipments. They design sale their products in Wrexham,United Kingdom since long years. Because of increased business, they have expanded to include new office buildings in their company. ELECTRONSRUS hire us, for the effective and vital communication between old and new offices and within the premises of each building.We are providing Virtual local area network (VLAN) for the whole ELECTRONSRUS Company. VLAN VLAN is a virtual LAN.Say , you have connected multiple PCs to a single switch providing a private subset of LAN where computers are interacting with each other.A single switch will behave like multiple switches .Each VLAN has its own boradcast domain and IP subnet.[1] The VLAN is used to create multiple broadcast domains in a switch. For example a single CISCO catalyst switch 2970 series of 48 ports can be divided in two VLANs . VLAN 1 is craeted using 1 to 24 and VLAN 2 is created using 25to 48 .One of the special feature of VLAN technology is less hardware usage like two VLANs are created on a single switch .VLANs help in minimising traffic.To connect VLANs in network that have multiple interconnected switches, we use VLAN trunking. Cisco catalyst 2970 supports two different trunking protocols: Inter Switch Link (ISL) and IEEE 802.1q.VLAN provides physical topology independence by grouping users regardless of their physical location. For instance,a two storey building with 20 users on each floor is connected via CISCO catalyst 2970 switch with 48 ports. VLAN is bounded in logical subnet so to reach other subnet layer 3 routers are needed. All devices in same VLAN share same IP subnet and PCs connected in different VLANs are in different subnets . It helps in reducing latency by using Layer 2 devices and therefore, minimizing usage of layer 3 routers.VLAN technology is beneficial in existing practical networks.There can be port based VLAN , Mac address based VLAN and Layer -3 based VLAN.IEEE 802.1Q is a standard for VLAN and provides details of VLAN interoperions.IEEE 802.1 Q has provided standard method for implementation in Ethernet frames. Benefits Of Vlan Effective easy management of workstations Load Balancing Bandwidth Allocation Effective Securitymanagement and more security options Increased performance Simplified software configurations Reduced latency VLANs provide an easy and cheap costs infrastructure for networks. They allow easy management of large networks by enabling centralized configuration of devices. They give high performance over shared devices by reducing collisions and limiting broadcast traffic. It simplifies configuration by grouping of department resources into a single subnet. IP addresses and subnet masks configured on PCs will be in same subnet for same VLAN. Figure 1:Network diagram for VLAN configuration Customer Requirements Installation of IT system and computer network in new building. All admin,design, manufacturing plant and store should be connectedto reliable network. A network link must be provided to connect old and new offices of ELECTRONSUS. Site Map And Details Figure 2 :New site for ELECTRONSRUS Site Description: Administration office: The administration office is a threestorey building and is going to be used for various departments. Top Floor = Management and directors sittings. Total member at floor = 60 members Middle Floor = Human resource purchasing department personnels Total member at floor = 60 members Ground Floor = IT Staff Total member at floor = 60 members Design office: This is a 2storey building and is going to be usedin various departments. Top Floor = Engineering design staff Total member at floor = 150members Ground Floor = Sales Marketing Total member at floor = 75 members Stores office: The Stores is where all the components for the manufacturing are kept along with the completed equipment ready for dispatching. It is a fourstorey building with approximately five members of staff on each floor. Top Floor = Store Staff Total member at floor = 5 members Second Floor = Store Staff Total member at floor = 5 members First Floor = Store Staff Total member at floor = 5 members Ground Floor = Store Staff Total member at floor = 5 members Manufacturing Plant: This is where the equipment is manufactured. It is a single storey building where about 120 production operatives will work. They are many different areas in this building since there are lots of different tasks that need to be performed. It includes a Machine shop where there are heavy electrical cutting machines and Arc welders. There is also a test bay where all the equipment is thoroughly tested before being shipped. The offices are for the Area managers. External Access It must be possible to have the following External access:- General Internet access Access to Suppliers Network Access to Suppliers to restricted part of ELECTRONSRUS Intranet Access for Sales Marketing staff to the ELECTRONSRUS Intranet when they are remote from the site Network Topology The most mainstream designs, or topologies, incorporate the token ring, bus, point to point, star topologies. Basic Topologies BUS With a bus design, every node/hub is joined consecutively along the system backbone. A node/hub is any equipment associated with the system, for example, a printer, scanner or PC. Backbone is the term used to portray the primary links to which the system fragments are joined. At the point when one node/hub sends data to another node/hub through the system, the data goes along the backbone until it achieves the wanted accepting node/hub. Token Ring With a ring arrangement, every node/hub is joined successively along the system backbone. Be that as it may, not at all like the bus arrangement, the end of the network associate with the first node/hub, resulting in a circuit. Node/hubs on a token ring alternate sending and getting data. In the token ring topology, a token goes along the backbone with the data being sent. The node/hub with the token sends data to the following node/hub along the backbone. The getting node/hub peruses the data tended to it and afterward passes the token and any extra data to the following node/hub. This proceeds until the token and information make it back to the first node/hub in the system. Star With a star design, every node/hub is joined with a focal center point by means of system sections. At the point when one node/hub sends data to another node/hub, the data goes through the hub. The hub does not channel or course the data in any capacity; it just serves as a connector between system sections. Point-To-Point Point-to-point topology is the least complex of all the system topologies. The system comprises of an immediate connection between two PCs. This is quicker and more solid than different sorts of associations since there is an immediate association. The impediment is that it must be utilized for little zones where PCs are in close vicinity. VLAN Segmentation A VLAN is a switched network that is segmented logically by departments of an organization or applications. A VLAN creates broadcast domain defined set of switches. VLAN consists of end systems, switches, and routers. VLANs are created to provide the segmentation services.It address scalability, security and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization traffic flow management. [4] VLANs technology divides broadcast domains in different VLANs. So that packets are switched between ports designated to the VLAN range. Communication Between VLANS CiscoIOS software (switches and router OS) provides full-feature routing at Layer 3 and translation at Layer 2 between VLAN.Five protocol are mainly used: [4] IEEE 802.10 Protocol IEEE 802.1Q protocol Inter Switch LinkProtocol ATM LANE Protocol ATM LANE Fast Simple Server Replication Protocol Electronsrus Detailed Networktopology Admin office, manufacturing, store and design office routers are connected. Admin office is connected via the internet cloud, and its fixed line will be leased theline by the service provider. To connect old building/office ip sec tunnel is used. Design building router is used for back up lease line by service provider. Multiple switches are used in topology with 48, 24 0r 8 ports. There will be free ports in every vlan , so that in the future there can be enhancements. Ip Addresses And Subnet Mask For Each VLAN New Buildings premises Floor Members IP address Subnet IP address range Name of the Vlan First 60 192.168.0.0/26 192.168.0.0- 192.168.0.62 Vlan_admin_First Second 60 192.168.1.0/26 192.168.1.0- 192.168.1.62 Vlan_admin_Second Third 60 192.168.2.0/26 192.168.2.0- 192.168.2.62 Vlan_admin_Third Design Building Engineering design Top 150 192.168.5.0/25 192.168.5.1-192.168.5.126 Vlan_design_Top Sales and Marketing Ground 75 192.168.5.128/25 192.168.5.129- 192.168.5.254 Vlan_design_Ground Stores building First 5 192.168.7.0/28 192.168.7.1-192.168.7.14 Vlan_Stores_First Second 5 192.168.8.0/28 192.168.8.1-192.168.8.14 Vlan_Stores_Second Third 5 192.168.9.0/28 192.168.9.1-192.168.9.14 Vlan_Stores_Third Manufacturing Plant Ground 120 192.168.10.0/25 192.168.10.1-192.168.10.126 Vlan_manf_Ground Hardwar Requirements Hardware Repeaters At the point when Ethernet was initially implemented, a great many people utilized a copper coaxial link. Notwithstanding, the most extreme length of this link was 500 meters, which was not sufficiently long for a few systems. To address this issue, system designers utilized repeaters to join a few Ethernet portions. Bridges Bridges give a Transparent ways to joining LANs. A bridge is a gadget that join physically isolated LAN fragments, (for example, diverse Ethernet links) into one legitimate LAN section. There are four classifications of bridges: source routing, Transparent, translating, and encapsulating. Transparent extensions are utilized for Ethernet, though source routing bridges are utilized for token ring systems. Encapsulating extensions unite two fragments of the same media, (for example, token ring to token ring) more than a medium. The accepting extension takes out the envelope, checks the destination, and sends the casing to the destination gadget. Routers LAN fragments joined by a switch are physically and intelligently separate systems. Rather than a bridge, when different system sections are joined by a switch they keep up their different legitimate identities (system location space), yet constitute an internetwork. Switches determine the destination and course for every bundle, and they can be utilized to direct bundles and interconnect a mixed bag of system architectures. A noteworthy contrast between an extension and a switch is that the bridge recognizes bundles by source and destination address, though a switch can likewise recognize parcels by convention sort. Switches accommodate the interfaces to WANs. Switches Ethernet communicates over the system utilizing the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) process. A convention utilizing CSMA/CD screens, or listens to, the media for system movement, or data going through the system starting with one hub then onto the next. In the event that a hub does not sense any activity, it will send casings or bundles of data onto the media. A system edge is similar to a sent letter. The letter is put in an envelope that has an arrival location and the location of its destination. Information are similar to the letter and the casing is similar to the envelope. The information is put in the edge and the casing has the tending to data and lapse checking code Hardware Requirements In Design There are many vendors of network devices like Allied Telesis, Arista , Avaya , Brocade , Cisco , Dell , D-Link ,Draytek , Enterasys Secure Networks , Extreme Networks ,Fortinet, HP, Juniper Networks ,Net gear , Transition Networks and Zyxel. But, CISCO is one of the leaders in networking solutions and provides a wide variety of switches from SMB to enterprise and ISP provider networks.Cisco peripherals are alittle bit costly, but they are known in themarket for their customer support. We are opting for Cisco peripherals. Designing Guidelines: Ideally thenetwork should be designed hierarchically in 3 layers (Access, Aggregation, and Core) but looking at the requirements I am proposing following guidelines: Each building will have its layer twoswitches where they do would be isolated using VLANS. Vlanbe restricted Broadcast domain. We will call It as Access Layer Private IPv4 Subnets would be assigned based on number of members per floor. We can go for IPv6 addressing, but that would make the migration cumbersome as of now. We can plan for Migration to IPV6 if required once everyone is migrated to anew network Aggregate traffic of these switches will be uplink to Core/Aggregate router that in our case would be one. Each building would be connected to each other using Core router We can have redundancy by having multiple Core routers as well Layer 2 Switch, but this would depend on customer investment and criticality both of which is still unclear. Leased line would be purchased from Service provider and will be connected to any building core router that would act as a gateway. We can have back up leased line as well from other service provider, but that would again depend on customer BCP. Core router would be required to do NATTING in case of IPV4 address to access the internet as private range is not routable on internet Design For Electronsrus Network VLANs are available on the CISCO Catalyst 6000 running CatOS 5.4 or later, on the Catalyst 4000, 2980G, 2980G-A, 2948G, and 4912G running CatOS 6.2 or later. We are opting for CISCO Catalyst 2970 series. CISCO catalyst is layer 2 Series Switch used for Access connectivity in VLANs. I am selecting Cisco hardware as Cisco is known for its customer support as well as they keep bringing latest features on their products as and when required. These series switches have features like QOS, STP, etc. which can be required in the network as anetwork grows. There are vendors Like Alcatel Lucent, Summit, Juniper that offer similar hardware required for the network, but I am going in with Cisco Hardware. Configuration The following two configurations comprise the Cisco Catalyst 2970 Series: Cisco Catalyst 2970G-24TS-24 Ethernet 10/100/1000 ports and four small form-factor pluggable (SFP) ports Cisco Catalyst2970G-24T-24Ethernet 10/100/1000 ports Cisco catalyst 2970m series comes with Cisco Enhanced Image (EI) IOSSoftware .CISCO catalyst suports IGMP leave timer ,IGMP snooping querier,DSCP transparency , VLAN-based QoS1and hierarchical policy maps on SVIs , Device Manager ,SSL Version 3.0,IEEE 802.1x, Flex Links , SFP module diagnostic management ,Smart ports Macros. [3] Hardware used Cisco catalyst 2970 series switches around 15 or more Router 2900 series around 3 in quantity. Connectors and cables 10BASE-T ports: RJ-45 connectors , 100BASE-TX ports: RJ-45 connectors 1000BASE-T ports: RJ-45 connectors, 1000BASE-T SFP-based ports: RJ-45 connectors[3] 100BASE-TX ports: RJ-45 connectors 2-pair Category 3, 4, or 5 unshielded twisted-pair (UTP) cabling 2-pair Category 5 UTP cabling 1000BASE-SX, -LX/LH, -ZX, and CWDM SFP-based ports: LC fiber connectors (single-mode or multimode fiber)[3] Management console port: RJ-45-to-DB9 cable for PC connections[3] Power connector RPS 675 Internal power supply connector Environmental conditions Operating temperature:32 to 113F (0 to 45C)[3] Storage temperature: -13 to 158F (-25 to 70C)[3] Operating relative humidity: 10 to 85 percent (noncondensing)[3] Operating altitude: Up to 10,000 ft (3049 m)[3] Storage altitude: Up to 15,000 ft (4573 m) [3] Contempora 4(C4) Series Rack cabinet system Linux windows servers For VOIP Connectivity , require IP phones For Security , surveillance cameras(CCTV) Biometrics , card punching system Centralized Air conditioning Software Requirements Lan Software/ Operating System As the name suggest LAN operating system is required to operate on the LAN system, manage the tremendous work load with a number of various types of server attached to it. It has basically two aspects (i) Server Software (ii) Work station Software. As case of other multi user operating system, LAN operating system also facilitate the sharing of expensive resources such as printer, storage space etc. among all LAN users, provides security of data permits connections to other network. There are various types of LAN operating systems for example Novel Netware, LAN server, omni met, PC Net, IBM PC LAN, Etherlik plus etc. Catalyst 2970 G-24T uses Cisco IOS Release 12.2(18)SE Catalyst 2970 G-24TS uses Cisco IOS Release 12.2(18)SE Supported windows 98,NT 4.0 , 2000 XP 7 Supported Microsoft internet explorer 5.5,6.0,7.0. Supported Microsoft Netscape Navigator 7.1 2970 Supports IGMP leave timer ,IGMP snooping querier,DSCP transparency , VLAN-based QoS1and hierarchical policy maps on SVIs , Device Manager ,SSL Version 3.0,IEEE 802.1x, Flex Links , SFP module diagnostic management ,Smartports Macros. Cisco IOS software release 15.0. All the above requirements, can be altered after any discussion with IT Team of ELECTRONSRUS. Internet Connection Internet Connection Internet connection or broadband can be taken from any SERVICE PROVIDER like reliance,airtel, Vodafone etc. I suggest following connections: BroadBand Connections: It is a high speed internet connection. User can dial phone and remain connected on internet at the same time.With broadband , users can watch live news and sports. Fixed Broadband Connections: There is wireless or fixed modem in this connection. Fixed Wireless and satellite connections: In some countries, in remote areas fixed wireless connection or a satellite connections are provided. Remote Access Remote Procedure Call (RPC) is an authoritative method for building applications like client/server based, distributed etc. The Remote Procedure Calls (RPC) method is a model of high-level interactions for various applications in the network. RPC is a dominant method for building applications based on client/server or distributed networks. It is base on enlarging the idea of predictable or local calling procedure, in such a way that the procedure called not required to exist near the similar address space just like the procedure of calling. The two procedures can be on the same system, or rather can have dissimilar systems and are connected using a network. By means of RPC, agenda on platform of networking can interact with resources like remote and local. RPC permits the use of particular kinds of calling procedures that are designed to conceal the underlying mechanisms on which network is working in a network application. The complication concerned in the expansion of distributed doling out is decreased by maintaining the remote call semantics whether the same or different the server and client are using the same system. This feature of transport autonomy of RPC cuts off the elements of physical and logical layer application from the layer of data communications method and gives the flexibility to the application for a diversity of transports applications. Remote procedure call (RPC), exactly, permits you to call up a course of action on both a local and a remote machine evidently. A call of client is interpreted into a remote machine call Client Remote File SystemWrite (hello); Server File SystemWrite (Hello); RPC is executed on above layer of two-way messaging by means of a procedure stubs available on the client as well as server. The procedure stubs just offers the interface of invocation for programmers. The real applications of those actions are described remotely. Basically the client stub has following tasks at hand: Marshalling or Building messages Sending messages Response wait Unpack reply Return result The server stub has following tasks at hand: Do N threading in order to wait for the requests Loop: For some time just look for command Upon receiving command perform decoding and unpacking of request parameters, this is also called as unmarshalling Now next step is procedure call Using results obtained build message for replay Now finally send reply Implementation Issues The stubs are repeatedly produced. A client has no clue about which port is for communication because this is runtime. Consequently, the client requests to have an already known port for moreover a server or a process name server that decides which server to get in touch with. Features RPC acts as a local host but Mask remote function calls The RPC is a Client-server based model message passing is the basic way for Request to reply paradigm in remote procedure call Functions uses methods like message passing and using function parameters it returns value Properties of RPC The Remote procedure call do function call based on the pattern of Language-level The Remote procedure call is quite simple for any programmer to understand There is a Synchronous method for request and reply communication between host and client It has no specific choice for any programming language and hence language neutral Before forwarding a reply to any request, it do matches the corresponding port for that requests There is automatic matching for replies and requests It posses Distribution transparency which put out of sight the complication of a distributed system and gives quality assurance Failure Modes of RPC Sometimes there can be failure in the system due to semantics of Invocation hold up by RPC due to some congestion in network or server, congestion in client network or last due to server failure Disadvantages of RPC One disadvantage is the way of interaction that is it uses Synchronous interaction for the request and replies hence more chance of connection loss etc. Client and server are closely coupled and have direct effect on each other. In some scenarios the client might block the process for a quite long time in case loading of server directs to client with multi-threaded programming Some clients are slow or failed to reply due to network problem or other which delays the reply to the server There must be multi-threading at the server interface because generally it has more than 1 client Distribution Transparency is not probable to mask all troubles RPC model is not object-oriented and hence duplication cannot be avoided The above factor leads to invocation of servers functions rather than using objects to call methods, which just store references and hence avoid all loading at invocation. Remote Access In Network Application Through IP sec tunnel old and new office buildings are connected. IP SEC TUNNEL MODE IPSec tunnel mode is thedefault mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer).[5] Tunnel modeis most commonly used between gateways (Cisco routers or ASA firewalls), or at an end-station to a gateway, the gateway acting as a proxy for the hosts behind it.[5] Security And Network Management Security Information and computer security is a task of software team. We concern here for physical security. Physical security faces different threats of environment, political, natural as compared to computer and information security. The threats are classified as: Natural Calamity threats: Catastrophe, Floods, earthquakes, storms and tornadoes, fires, extreme temperature conditions and so forth. System threats:Power supply issues, voltage issues, temperature issues so forth. Man interference threats: Unauthorized access, hijack attack, spoof attack so on. Politically motivated threats:Strikes and riots in the city, civil disobedienceand so forth. security and network management measures Develop security team. Develop proper plan. Do risk analysis management. Entries in critical data center rooms should be limited Proper pathways around building to guide to main entrance Back door entries should be limited to suppliers and equipment deliveries. Pathways should have proper lighting to guide people in night. Do natural surveillance sometimes Deploy electronic motion sensors There should be continuous video surveillance Biometric access and exit sensors for critical areas like data center UPS backup generators ,gas based fire suppression system Server monitoring Redundant HVAC controlled environments Proper fencing IP support for devices such as switches and routers Effective Fencing near building Proper web access management Proper password management on devices Back up of data every day. References : Difference between VLAN and LAN.[online]. Available:https://www.differencebetween.net/technology/internet/difference-between-vlan-and-lan/.[Accessed: July 19, 2011]. Vlan configuration examples[online]. Available:https://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switches/H3C_S3100_Series_Switches/Configuration/Typical_Configuration_Example/Low-end_E_S_Configuration_Examples(V1.04)/200809/616200_1285_0.htm. Cisco catalyst 2970 series switches[online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-2970-series-switches/product_data_sheet09186a0080197384.html. Routing between VLANs overview[online]. Available:https://www.cisco.com/en/US/docs/ios/lanswitch/configuration/guide/lsw_rtng_vlan_ovw_ps6350_TSD_Products_Configuration_Guide_Chapter.html Understanding VPN IPSEC TUNNEL mode and IPSEC TRANSPORT MODE[online]. Available: https://www.firewall.cx/networking-topics/protocols/870-ipsec-modes.html