"Achieving high data rates using TCP/IP over satellite networks can be difficult" - review and discuss.

Coursework 1 Question 1 a). "Achieving high data rates using TCP/IP over satellite networks can be difficult"- review and discuss some of the reasons TCP/IP has difficulty with satellite links, including the following issues: IP Throughput, IP Time To Live, IP Fragmentation, TCP Throughput and Throughput Expectations, TCP Sequence Numbers, TCP Transmission Window, Slow Start, and Congestion Avoidance. Achieving high data rates using Transmission Control Protocol & Internet Protocol (TCP/IP) over satellite networks can be difficult because satellite links have a high latency, which causes the reduction of the performance of some protocols like TCP/IP that are commonly used. The main reason to this problem is the design of TCP/IP. They were not designed to be applied in wireless environment, they were actually meant to be used in fixed networks only that are end-to-end and based on reliability and connection orientation. For example, the Internet, which is the biggest computer network consisting of millions of terminals is based on the TCP/IP protocol architecture, since it is a fixed Virtual Area Network (VAN). The architecture of TCP was designed to be used in networks with high Bit Error Rates (BERs), and it will not work well in wireless environment, where losses are due to high BERs. Besides, because IP relies on end-to-end data verification, it is unsuitable

  • Word count: 2409
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

"Automatic model transformations using extended UML object diagrams in modeling environments".

SC207 Software Engineering - Term Paper 2003 Automatic Model Transformations Using Extended UML Object Diagrams in Modeling Environments Chathapuram V Satish Year 2 Computer Engineering Nanyang Technological University [email protected] TOPIC DETAILS "Automatic model transformations using extended UML object diagrams in modeling environments". Author: Dragan Milicev Source: Software Engineering, IEEE Transactions, Volume: 28, Issue: 4, Apr 2002, Page(s): 413-431 ABOUT THE AUTHOR Dragan Milicev received the diploma degree in 1993, Msc degree in 1995, and PhD degree in 2001 all in computer science at the School of Electrical Engineering at the University of Belgrade, Yugoslavia. His research interests include object oriented software engineering, metamodeling and information systems. His personal webpage can be found at http://www.rcub.bg.ac.yu/~dmilicev. INTRODUCTION Modeling is a critical part of all the activities that are involved in the deployment of an engineering system. Modeling tools that provide an interface to implement, apply, check and visualize the modeling process are available and make the entire process less cumbersome and tedious. One of the most important features of the modeling tools is the automatic generation of an output and this is the main focus of discussion in the above stated paper. The output can be documentation, source code, net

  • Word count: 2285
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Point Blank - The purpose of this essay is to identify why the introductory sequence attracts a certain type of target audience.

Grosse Point Blank Essay The purpose of this essay is to identify why the introductory sequence attracts a certain type of target audience. By viewing the opening sequence you gain an immediate feeling or understanding that the movie is aimed at people aged between 20 and 30. At this age violence is the norm thing to see on television and is not that shocking to the age group in comparison of an age group of 50-60. The events that take place in the opening sequence are the conversation about Martin Blank the professional killer's ten year High School Reunion Party with his secretary/business partner Marcella. Whilst the conversation is happening Blank spots the cyclist assassin and then takes aim and shoots him before the cyclist reaches his intended target, which Blank has to protect. Then when the cyclist is shot he hits a car and comes off his bike. Whilst Blank is packing his equipment away, out comes his rival Grosse who then kills the man and his bodyguards which the cyclist was meant to kill. The opening credit sequence opens with a black background perhaps signalling death, and the song 'I can see clearly now' is played over both the opening credit sequence and opening assassination sequence. This song gives off an air of black humour in the mood of the film. This seems very hypocritical because the song is uplifting and the sequence is very violent and serious.

  • Word count: 790
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Wearable computers

Wearable computing facilitates a new form of human--computer interaction comprising a small body--worn computer (e.g. user--programmable device) that is always on and always ready and accessible. In this regard, the new computational framework differs from that of hand held devices, laptop computers and personal digital assistants (PDAs). The ``always ready'' capability leads to a new form of synergy between human and computer, characterized by long-term adaptation through constancy of user--interface. What is a wearable computer A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactional constancy, i.e. is always on and always accessible. Most notably, it is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities. The most salient aspect of computers, in general, (whether wearable or not) is their {\em reconfigurability} and their {\em generality}, e.g. that their function can be made to vary widely, depending on the instructions provided for program execution. With the wearable computer (WearComp), this is no exception, e.g. the wearable computer is more than just a wristwatch or regular eyeglasses: it has the full

  • Word count: 4385
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

'Four Hour Format' Recruitment System

'Four Hour Format' Recruitment System This may be a new way of recruiting for your business. Remember this: if you don't change the system or process of hiring that you've been using so far, then you'll simply get more of what you've already got. Here's a proven recruiting and induction system based on the following principles: . Attract a large pool of applicants and you're more likely to get the right person. 2. Implement multiple levels of screening and you'll waste less time in lengthy interviews with under-qualified candidates. 3. Observe a short list of applicants perform the essentials of the position in real time and you're less likely to be surprised on their first day. 4. Assess your short list of applicants to make sure that you're making an appropriate match. Here's the 4 Hours Format in detail: . Hour No. 1: Generate leads for position a. Develop job description and/or ad to include: i. Roles, responsibilities, tasks, duties ii. Skills required iii. Hours expected iv. Pay range b. Identify lead sources i. Look within company first and ask if team if they know anyone who may be appropriate ii. Post sign in your door/window iii. Post ad in local and daily papers iv. Post ad in trade/industry publications v. Post ad in local houses of worship vi. Email/mail/fax ad to customer database, vendors, personal/business colleague database vii. Fax job

  • Word count: 1087
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

History of Computer Architecture and Operating System.

History of Computer Architecture and Operating System Humans do not have the ability to solve all problems, and even if they do, not as fast as a computer can do. A digital computer is a machine that follows algorithms written by humans. Following an algorithm means solving a problem by carrying out instructions of how to solve it. The earliest electronic digital computers were launched in the 1940s. These machines had no operating system. The programs had to be entered one bit at a time on rows of mechanical switches. The language programs of the machine were entered on punch cards, and the programming process were speed by developing the assembly languages. The first Operating System was implemented in 1950s by the General Motors Research Laboratories. The systems were called single - stream batch processing systems because the programs and data submitted were in groups or batches. An Operating System is the software that controls the hardware. The hardware includes processors, storage, Input/Output devices, communications devices and data. Hardware only specify the physical devices that a computer uses to accomplish a task, provides computer power, but cannot use it. To make the power that the hardware provides useful, an Operating System is needed because it makes this power usable. Operating System, which are resource managers, manage the computer hardware and

  • Word count: 1798
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

IT at the Table.

PART A Have to use Nolan's Growth Model PART B IT at the Table Involving the IS professional in the merger and acquisition team early is essential. During initial meetings between the two entities, many of the general legal and business issues discussed could have potentially devastating effects on information system scope and design development. Being present to determine the language of the acquiring or ceding company is important for the IS executives. Items as mundane as provider networks can become cumbersome during implementation if one company's definition of a provider network differs from the other's. Clearly defining operational terms during the early stages helps IS executives incorporate them into a commonly understood scope document. The resulting design document will reflect a more realistic timeline and personnel estimate to be included in the overall economic analysis of the new formation. Information system assessment procedures greatly enhance the probability of a successful implementation. The need to integrate new systems quickly can be an extremely difficult task for a number of reasons: . Corporate planning does not always include IS personnel in the planning process. In addition, IS integration - related planning typically does not occur until the merger is over, thus delaying the process (Stylianou et.al., 1999). 2. The new corporate

  • Word count: 1647
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

What is the meaning of p<0.05?

Deakin University Faculty of Health and Behavioural Sciences School of Psychology What is the meaning of p<0.05? Jessica Jacques Submitted as an assessment for Research Methods C (HPS 742) Due Date: Tuesday 26th April 2005 Word Count: 1, 497 Hypothesis testing based on statistical significance has dominated behavioural and social science graduate programs for over 40 years and as a current psychology student I can promise you it still does (Huberty, 1996). A closer review of the history and current status of our beloved significance tests and their computed p value, revealed to me that one can probably say that few methodological issues in social science research have generated as much controversy. In fact as Anderson, Burnham, & Thompson (2000) note, across the years and throughout disciplines, the frequency of published criticisms has grown substantially. However before the feeling of the rug being pulled from underneath overwhelms me, one must ask the question what in fact is the meaning of the p value such as 0.05? Put more precisely what is being tested and where does it fit into data analysis and research if at all? This essay will unravel what exactly is tested by statistical significance tests, the role of replicability to the progression of scientific knowledge, significance testing based on the falsificationist approach to science and the topic of effect

  • Word count: 1883
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Analyzing First Order Kinetics - cis-trans isomerization of mercury dithizonate

The Hong Kong Polytechnic University Bsc(Hons) in Chemical Technology Chemistry Laboratory III Laboratory Report Inorganic Chemistry Experiment 6 Title: Analyzing First Order Kinetics - cis-trans isomerization of mercury dithizonate Name: KO KA LEE Student ID: 02183698D Class: 12047-2 Aim: The purpose of this experiment is to analyze first-order kinetics and rate constant by using four general methods: . Half-time method 2. Semi-log method 3. Guggenhein's method 4. R/R? method (ratios of rates). Results and Data Treatment: Half-time Method From the data obtained (Appendix 1), a graph of absorbance Y(t) against time is plotted. Graph 1 For 1st order kinetics, t = t1/2 y t1/2 = (y0 + y? ) / 2 From the data, y0 = 0.2969208 y? = 0 y t1/2 = (0.2969208 + 0) / 2 = 0.1484604 From Graph 1, At absorbance 0.1484604, t1/2 = 21.5s By kobs = ln2 / t1/2 , kobs = ln2/ 21.5 = 0.0322 s-1 Semi-log Method A graph of Z(t) = ln[yt-y?] against time is plotted. (The value of ln[yt-y?] refer to Appendix 3) Graph 2 From the equation, y= -0.0249x - 1.5439 Slope of graph = -kobs = -0.0249 ? kobs = 0.0249 s-1 Guggenhein's Method Take ?t = 1 A graph of Z(t) = ln[y(t+?t)-yt] against time is plotted. (The value of ln[y(t+?t)-yt] refer to Appendix 3) Graph 3 From the equation, y= -0.0276x - 4.9105 Slope of graph = -kobs = -0.0276 ? kobs = 0.0276 s-1 R/R?

  • Word count: 730
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

A Report On Molich and Nielsen Heuristics.

A Report On Molich and Nielsen Heuristics By Imran Musa Patel Contents INTRODUCTION 3 HEURISTIC EVALUATION 4 HEURISTICS OF GOOD DESIGN (MOLICH & NIELSEN) 5 TEN USABILITY HEURISTICS 5 USE SIMPLE AND NATURAL DIALOGUE 6 SPEAK THE USERS LANGUAGE 7 MINIMIZE MEMORY LOAD FOR USER 8 BE CONSISTENT AND KEEPING THE SAME STANDARDS 9 PROVIDE FEEDBACK 10 GENERAL SYSTEM RESPONSES FOR ERRORS 14 DESIGNING FOR SLIPS 15 LITTLE IS MORE 16 HELP AND DOCUMENTATION 17 PROVIDE HELP 17 HEURISTIC SUMMARY 19 BIBLIOGRAPHY 20 BOOKS 20 SITES 20 Introduction As software designers, it is important to build a user-friendly interface, to provide successful software. Implementing Molich and Nielsen design heuristics, within the development area can provide a leading edge with other competitors. In the following report, you will find how the Molich and Nielsen design heuristics can be implemented in the area of software design industry, how it can improve the product, and what heuristics means. This will be run along side examples of Microsoft. Heuristic Evaluation To make an evaluation of a users interface, heuristic evaluation is a cheap and quick method to under take such task. The most popular inspection method is heuristic evaluation. This is done synthetically, of a user interface design for usability. The whole aim of the heuristic evaluation is to identify problems

  • Word count: 2797
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay