Project proposal "Designing a simple Integrated Network for a Secondary School"

Designing a simple Integrated Network for a Secondary School Yayale Nabeel Ahmed MDX 08 Key words Internetworking, interoperability, email, database, servers, workstations, connectivity, Internet Problem definition Currently, up to 60 to 70 percent of schools in Nigeria are not computerised, so I have been authorized by a proprietor of a medium sized secondary school to setup an entirely new network from scratch for his school. The scale of the school currently is about 50 to 65 staffs and about 500 students who are dependent on the small number of computers. Because their computers are not networked, they both don't have the resources needed to keep pace and updated with technology, Internet based learning materials, communication between staffs and students. The only 11 computers the school have currently get access to the Internet using dial up connection, this as a result give them relatively slow connection and most of the time no connection. The administrative department include; the principals office, vice principal, finance office, admission office, reception. The faculty department composes of the staff room. The student department includes the physics lab, computer lab, chemistry lab and biology lab respectively. These entire departments don't have any option of sharing information but to move up and down from one room to another physically. With this, you

  • Word count: 1835
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This report will cover the aspects of applying the principles illustrated in Ciscos Gigabit Ethernet Campus Design whitepaper to the network in Middlesex University. There will also be discussions focusing upon the chosen WAN technology

This report will cover the aspects of applying the principles illustrated in 'Cisco's Gigabit Ethernet Campus Design' whitepaper to the network in Middlesex University. There will also be discussions focusing upon the chosen WAN technology that will be implemented within the design, features giving resilience, budgetary limit of the implementation of campus design, security features and the quality of service features for this design. Currently the university has a network consisting of many clients connected to a hub via coaxial cabling (shown below in fig.1). The hub acts as an interface connecting the clients with each other but can also have its disadvantages, as clients send data to the hub at the same time the CSMA/CD protocol is used, its used when a collision like this occurs to act as a defence and takes control of all incoming data for a period of time. The current architecture runs on a multilayer campus design using the generic campus design. Multilayer design bonds gigabit Ethernet trunks to the layer 2 switches located in the wiring closet and the layer 3 switches in the distribution layer. Fig1. example of how clients (PC's) are connected to a hub Gigabit campus switches offer users the chance to build an extremely high performance networks, high reliability and with the ability to make self-management implementations makes it easy to manage and maintain. A

  • Word count: 1214
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Why are governments so concerned about the use of cryptography in digital communications? What kind of laws and regulations have they brought in to try to deal with their concerns? How far do such efforts threaten the privacy that organisations need for conducting legitimate business?

Why are governments so concerned about the use of cryptography in digital communications? Cryptography is a discipline which embodies principles, means and methods for the transformation of data utilized to ensure the confidentiality of data, authenticate the data and to ensure its integrity1. Internet has resulted in data, business and communication being conducted on open networks which are more difficult to control and monitor than traditional channels. Despite its value in ensuring information and data security, many nations regard cryptography as a dual-use technology that can be applied for civil and military purposes, and therefore should be regulated. Governmental concerns particularly revolve around the reduced ability for intelligence and security agencies to perform effective surveillance of computers and electronic communication to uncover, prevent and prosecute illegal activities2. What kind of laws and regulations have they brought in to try to deal with their concerns? The Wassenaar agreement3 acts as the principal document on the encryption software export control regimes around the world. Its guidelines base restrictions on the key length of symmetric cryptographic products, and allow the free export of mass-market cryptographic software which complies with such provisions. OECD Guidelines for Cryptography Policy4 focus on trust, free choice and

  • Word count: 726
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Evaluating Websites Usability - comparing 5 websites.

Higher Diploma in Software Development Web Development – Practical 2 Evaluating Websites Usability Website 1: www.lit.ie First Impressions: . URL is Good, Short, and very intuitive. 2. Download time is slow with image slideshow and animations loading at noticeably different times. 3. Home page seems cluttered with image slideshow on top, rolling text, links to videos. Text is readable and has a tool on the top tool bar for changing text size (Although this function only works on some text not all). Simple colours with red and blue being main colours used. 4. Only 40% of home page on one screen, scrolling up/down required. 5. Is obvious that it is home page to a college or learning institute with pictures of recent graduates, Links to college related links i.e. “Study @ Lit “ , “Current Students” etc clearly visible. 6. Moving mouse over key words on top tool bar gives drop down menus of links to all aspects of the Institute. 7. When hovering over the “About” keyword on the top tool bar, the pop down menu clearly details contact details, links to relevant information and presidents welcome note all increasing user confidence in site. Navigation: . Tool bar gives clear choices with drop down menu offering more detailed links 2. Site Map on bottom of webpage offers clear links to all relevant information. 3. Navigational links visible on the top tool

  • Word count: 3743
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

MS Office solutions. Fantasy mobiles require: An excel spreadsheet with two work sheets; Inventory & Monthly Sales GUI to update stock quantities on the first worksheet GUI to calculate total and average sales of a

MS Office Development Contents . Introduction 3 2. Task A 4 2.1 System requirements 4 2.2 Prototyping 4 2.3 Implementation part 1 6 2.4 Functional Testing 10 2.5 Logical Testing 10 2.6 Implementation Part 2 12 2.7 Functional Testing 15 2.8 Logical Testing 15 3. Task B 17 3.1 System Requirements 17 3.2 Prototyping 17 3.3 Implementation 18 3.4 Functional Testing 19 4. Task C 20 4.1 System Requirements 20 4.2 Pseudocode 20 4.3 Implementation 20 4.4 Testing 22 5. Evaluation 24 5.1 Evaluation of the Solutions 24 5.2 Self Evaluation 25 6. Bibliography 26 6.1 Books 26 6.2 Websites 26 6.3 Online Articles 26 6.4 Other 26 . Introduction Microsoft Office is an office suite of related applications. VBA (Visual Basic for Applications) is an advanced feature which can be used within the office suite applications to develop solutions for office environment problems. When coming from a VB.Net background, you have a head start but nonetheless there is still a learning curve to undergo. The VBA object library also differs from version to version of Microsoft Office making it more complicated for developers. The crux of VBA is that it allows automation of already featured tasks found in the MS office applications. Its major benefit comes from the fact that by hitting a key, or clicking a button, it can initiate and complete an entire process removing many

  • Word count: 4479
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Information Security System

Table of contents: . Introduction 2. Existing threats and risks 3. What a virus is and how to protect a computer 4. General controls 5. Application controls 6. Summary conclusion Introduction Information has no value in itself. Nowadays any company stores its information on its computers. Information is now considered so important that it is regarded as a factor of production, labour, enterprise and capital. Whether it is a revenue company or any other organisation it is necessary to keep a record of events in the company in order to maintain its operational activities. The main aim of this assignment is to increase the awareness of users in the area of information security in order to be able to secure our personal data better then before. In this assignment I'll try to investigate and analise the main objectives such as: > Why computerised systems are particularly important > The major risks and threats to computer security > How to deal with computer misuse, such as hacking and viruses > How to protect your computer from harmful program > How back up can be put in place for essential computer facilities Many organisations today are highly dependent on their Information Systems and must be mindful that all IT resources are not immediately replaceable in the event of damage or destruction. Replacing a mainframe computer, for example, could involve a lead

  • Word count: 3883
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Message confidentiality, Encrypt/Decrypt an arbitrary message using secret key cryptography including Base64 encoding.

Assignment of Network Security (NETSEC/IV2020) Dated: 20 December, 2009 Report topic: Message confidentiality, Encrypt/Decrypt an arbitrary message using secret key cryptography including Base64 encoding. Introduction Secret key cryptography is also known as Symmetric Encryption. Here same key is used for both the Encryption and Decryption processes [1]. In this approach, sender and receiver both should know the algorithm to use and the secret key. Sender and receiver should be kept the key secret and they should obtain the key in a secured way [2]. Most commonly used secret key cryptography algorithms are DES, 3DES, RC4 etc [1]. In this test DES has been used to encrypt/decrypt an arbitrary message. Here Base64 encoding has also been used to encode the message. We know that, while sending SMTP e-mails with attachments normal text files can be attached in plain text format, but binary files (such as image files) cannot be attached in the same way. Binary files need some sort of encoding process to be attached with STMP mail. And the most widely used encoding is Base64 [3]. Description of DES algorithm DES Encryption Process "DES has a very strong internal structure" [2]. The following figure presents an overview of the DES encryption process. Figure 1: DES Encryption process In DES encryption process 2 inputs are provided to the encryption function: a 64 bit plain

  • Word count: 740
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study.

RESEARCH REPORT ON: MANAGING NETWORK OPERATING SYSTEM IN THE ORGANIZATION A CASE OF NATURAL FOREST RESOURCES MANAGEMENT AND AGROFORESTRY CENTRE (NAFRAC), SHINYANGA. PREPARED BY: MARTIN, masanja (ADIT III 2007/2008) SUPERVISOR: KAVUTA, K. D A RESEARCH PROPOSAL SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF ADVANCED DIPLOMA IN INFORMATION TECHNOLOGY OF THE INSTITUTE OF ACCOUNTANCY ARUSHA. ABSTRACT This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study. It has been conducted for 16 weeks at effective from the 1st October, 2007 to end of January, 2008. A case study method was used because the study was at a single unit and it is less expensive compared to other methods such as survey. The findings are presented in relation to the research questions, while analysis of data presented in relation to the proposed methods which are both qualitative and quantitative, with figures and tables by using scientific packages for social science (SPSS) & Microsoft excel (Version 2003). Data was interpreted in relation to the objectives of the study. The researcher gave a conclusion in relation to research questions and data interpretation against objectives of the study, and finally the researcher provided some recommendations for any

  • Word count: 11449
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Explain the Emergence of Markup Languages.

.INTRODUCTION The report will explain the Emergence of Markup Languages. The aim of the report is to describe and evaluate different types of markup languages that exist at the present time. In addition, it will particularly focus on the following areas: * Background to Mark Languages * SGML * HTML * XML * WML * SMIL * Other Markup languages (i.e. MathML, CML, etc.). 2.PROCEDURE In order to produce this report, secondary research technique was used. This enabled us to gather information from the Internet, and this was the best medium to conduct our research effectively. This is because resources and up-to date information was available. 3. BACKGROUND TO MARKUP LANGUAGES Historically, the term markup was primarily used to describe annotations or other marks within a text intended to instruct a compositor or typist how a particular passage should be printed or laid out ( Lou Burnard, 1995). During the 1970s, computer scientist at IBM conceived of breaking away from display and printing towards structural markup (George Dillion, 1999). This is because it was possible to identify the structural units of a document in terms of a (large) set of general structural units (paragraph, abstract, example, etc.). (George Dillon, 1999). After the production of text was automated. The term markup was extended to include different types of special "markup codes" inserted into

  • Word count: 6767
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

individual project

A study of a smart card ID system in government Submitted in partial fulfilment Of the requirements for the degree BSc (Hons) Business Information Systems Leeds Metropolitan University May 2004 Acknowledgements I would like to acknowledge the contribution others have made during my time at university and especially during the final year of my course towards the construction and completion of the individual project. First of all I would like to thank Ms Linda Strickler my supervisor for whom has stuck by me through some difficult times and has provided me with all the support and guidance that I have needed. Without her generous support and desire to succeed I would have been lost within the project. Secondly I would like to thank Mr Steve Cockerill for his astounding support and understanding throughout some very hard times that I faced. Without his strength and belief in me I would have been in a very difficult situation. And lastly I would like to thank my friends and family for their unwavering support throughout my years at university. Thank You All Plagiarism Disclaimer I certify that all material in this dissertation which is not my own has been identified and properly attributed. Signed: ------------------------------------------------- Date: --------------------------------------------------- Abstract The purpose of this report is to outline the

  • Word count: 11205
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay