Thursday, October 31, 2019

Sales proposal to Apple Inc Essay Example | Topics and Well Written Essays - 750 words

Sales proposal to Apple Inc - Essay Example I am the marketing manager at Amazon and I am writing on my behalf of my team. The purpose of this proposal is to offer you an opportunity into venturing into bed time stories for kids via our iPhone application.The world is advancing rapidly and no one knows that better than the geniuses at Apple. Every young should have access to all kinds of fun and exciting reading. ‘Bedtime Stories for Kids’ would be an I-phone based application that we propose to make; It will have the best literature for all children of all ages and would be made in the most user-friendly way for the parents to read out to their children via iPhone. It will be a very colorful application that would be specifically designed by Darren Smith, the famous children’s illustrator. It will contain very intriguing black and white drawings, pictures from famous artists in the children world and various other illustrations. It will also comprise of fascinating stories, fairy tales, myths, legends, hum or stories, fiction and accounts on lives of great men and women. It would be the most ideal application for parents who are too busy to go to book stores to fetch books for their children. They can cash in on this application and read it aloud to youngsters and children. The most amazing part of the offer is that, we are willing to make the entire application free of cost and willing to allocate 30 % of the revenue from the sale of stores to Apple. As this is only an application, there will be no shipping and other storage costs. We will also take care of the marketing of our application. This proposal will deal with other raw facts about Amazon and how we plan to go about marketing the application. Amazon.com is stationed in the United States. It is a multi-national electronic commerce company. Its headquarters are based in Seattle, Washington. Currently, it is America’s biggest online retailer. Its sales are three times the Internet a sale of Staples, Inc. Amazon was found in 1994 by Jeff Bezos. He launched it online in 1995. The company’s first name was Caracara Inc. Amazon’s name was very strategically chosen. It was chosen in conjunction with Amazon River. It is the largest river in the world, and begins with the letter â€Å"a†. Amazon.com hit off as an online bookstore. However they soon diversified their portfolio and ventured into selling DVDS, CDs, and MP3 downloads software’s, games, electronics, food, toys, furniture and apparel. They started spreading out from United States and established bases in Canada, the United Kingdom, Germany, France, Japan and China. Amazon’s business strategies: Amazon built its competitive edge on three core strategies. These were: 1. Cost Leadership 2. Customer differentiation 3. Focus Under its cost leadership strategy Amazon has stood out by offering rock-bottom prices. It provides good quality products at low prices. Its prices can’t be matched by its competitors. Th is makes it an obvious choice for customers. Under the second strategy, Amazon offers current and prospective customers differentiation via convenience. It is one of the largest e-stores at the moment. Its product assortment is huge. It capitalizes on its huge product assortment, fast and efficient delivery and efficient services. It has focused on 4 primary areas for its focus strategy. These include the 1. Product focus. 2. Customer focus 3. Technology focus 4. Distribution focus As mentioned before, Amazon has a huge product assortment. Its product assortment has always attracted customers. Technology has always been central to Amazon’s business. It is an e-commerce business, a virtual market place, where every transaction is done online. For the iPhone application we will focus on cost leadership and a customer focus strategy for the Children’s book application. Amazon’s E-marketing Strategy for the application: Amazon plans to ensure that it offers lowest p rices for most of the popular stories that it would be offering in the application.

Monday, October 28, 2019

Tax Incident Essay Example for Free

Tax Incident Essay Government generally collect taxes to generate revenue and question arise here is that after imposition of taxation, which group will bear the tax burden. After implementation of tax, there would be the division of tax burden between byres and sellers which is known as tax incidence. Tax incidence is linked to the price elasticity of demand and supply. If supply is more elastic than demand then the tax burden falls upon the buyers and when the demand is more elastic than supply then the producers will bear the cost of the tax. Tax incidence is basically the analysis of the effect of taxation on the distribution of economic welfare. Tax incidence expose that which group either consumer or producer is going to pay the price of new tax and it falls mostly on the group that has the inelastic price quantity or respond least to the price. Tax incidence or the tax burden does not depend on that where the revenue is collected but it depends upon the elasticity of demand and supply. The purpose of this review on the literature is that to analyze the effect of particular tax on the distribution of economic welfare. Section 2 is related to the literature review and section 3 is related to the conclusion. 2. Review of Literature 2.1 The incidence of sin taxes: Kotakorpi (2008) has examined the incidence of taxation on sin commodities. Sin commodities are those commodities whose current consumption causes utility cost in the future. Consumers are considered to be time inconsistent or having too much consumption of unhealthy goods. Sin taxes means taxes on unhealthy commodities. In the context of monetary cost sin taxes would lead to influence the individual’s utility. Increase in the consumption of sin commodities would lead to a higher monetary cost or higher utility benefit from self controlling. The author has analyzed the welfare effect of the sin taxes and the welfare effect of sin taxes depends upon the elasticity of demand. The individuals with less income group having higher elasticity of demand as compare to the high income group. There is possibility of progressive taxation as the benefit is high for the less income group. He has measure the incidence on individual utility through the overall impact of the tax. Sin taxes would lead to increase the welfare if the demand for  the unhealthy good is more elastic. For the case of poor demand is more elastic so the burden of sin taxes falls least on the poor as compare to the rich. It’s not necessary that taxation always hurts low income group but can be fair for the poor. The welfare of the economy would increases in case of sin taxes. 2.2 The incidence of tax on pure rent in a small open economy: Petrucci (2006) has investigate the effects of a land tax on capital structure and foreign investment in a life cycle small open economy with the assumption that labor supply is take as endogenous. Land is an as asset which is used as an input for the production. Tax on land means the higher would be the capital stock. The land tax leads to reduce the price of land but crowds out investment, consumption and welfare of nationals would increase. The consequences of land taxation depends upon that how government adopted the tax transfer program. Labor supply and domestic output reduced by land taxation, while the wealth and national income are increased. If land taxation were used to finance the un-productive government expenditure then the effects of taxation on the capital stock and aggregate wealth would be neutral. The main assumption of this article is the endogenous labor supply regarding the long run incidence of taxes. The final effects of land taxation on economic growth and wealth formation depend upon that the government tax transfer program. When tax revenues are distributed as lump-sum payments then the land taxation increases consumption and stimulate wealth but leads to reduce the capital stock. 2.3 Tax incidence in bargaining: Chae (2002) has investigates two-person bargaining model where one party is taxed and the other is non-taxed party who shares the burden of taxes. Sufficient condition is that tax party would entirely bears the tax burden are given and non-tax party would actually to benefit from taxation is given. In a competitive market, buyers and sellers share the tax burden and the larger burden falling on the party that has lower price elasticity. In a bargaining model, if the gross revenue of the tax party does not change then the taxation does not affect the other party. Thus the tax burden will falls completely on tax party. If the tax party is risk neutral and has zero opportunity cost then the burden of taxation falls completely on the tax party. If the tax party is risk averse with the constant relative risk  aversion, then the tax burden is shared by the non-tax party as initial wealth is also positive. The results show here that a risk loving party loses more form taxation than the ri sk averse party. In general, a bargaining party that is less risk averse has more bargaining power but the party with more bargaining power can also be more at risk to taxation. 2.4 The general equilibrium incidence of environmental taxes: Fullertton (2007) used a simple general equilibrium with pollution and has found the incidence of pollution tax on prices of outputs and on the returns to inputs. When both sectors are equally capital intensive and capital is a better substitute for pollution then is labor. Then return to capital would rise comparative to wage. These results provide evidence that the substitutability of capital and labor has very important consequences for environmental policy. The results show that a 10% increase in the pollution tax rate reduces pollution from 2% to 10%. The model in this paper provides theoretical analysis of the incidence and distributional effects of environmental policy. It shows that how differential substitution between factors greatly effect the burdens of a pollution tax. Environmental taxation has mostly focused on efficiency effects. This paper provides theoretical general equilibrium model of tax incidence of an environmental tax that allows for general forms of substitution among inputs of labor, capital and pollution. Pollution is modeled as an input along with capital and labor. Environmental policies can have important effects on firms’ demands for capital and labor inputs, which can impact the returns to owners of capital and labor in general equilibrium. 2.5 The tax system incidence on unemployment: A country specific analysis for the OECD economies: Ramon et.al (2008) examines the incidence of different tax structure on unemployment in OECD countries through wage bargaining model. The first important result from the analysis is that fiscal wedge does not play an important role in explaining unemployment. The more the payroll taxes are influenced towards the employees, the higher would be the unemployment. This is due to the higher elasticity of taxes impose on workers so that tax components affect unemployment even when the overall fiscal wedge remains unchanged. As unemployment determination is considered, supply side determinants (productivity growth) positively related to the  unemployment determination but negatively related with demand side determinants (inflation). This suggests that high situation of unemployment persistence may tend to require more structural reforms. If changes in the tax composition that leave the overall amount of revenues unchanged are harmless in terms of unemployment persistence then new possibilities for policy makers can be considered. 2.6 Tax and subsidy incidence equivalence theories: experimental evidence from competitive markets: Ruffle (2005) stated that tax burden does not depend upon that where revenue is collected but the division of tax burden between buyers and sellers only depend upon the elasticity of supply and demand. The theory of tax incidence equivalence is strongly related to the market formation and also enlarges to the subsidies. The benefit of the subsidy is not related to the one that who is in fact getting the subsidy. Basically, government should charge tax to decrease the agreement costs and it should not to leave the restrictive producers at disadvantages. In the competitive equilibrium market, particular shifts of supply and demand curves are considered to analyze the tax and subsidy equivalence theorems. Both the smaller no of markets and sufficiently large no of markets can trade profitably at the competitive price. The results propose that the discussion topic is that who is paying the tax or receiving the subsidy should pay attention on formation that at what degree market is under the competition level. And if the market is competitive then the tax should be manage in a manner that reduces the expenditure cost. 2.7 Tax incidence under oligopoly: a comparison of policy approaches: Hamilton (1999) examined the tax incidence under the oligopolistic market structure. Basically two forms of commodity taxation considered are the unit (or specific) tax and sales (or ad valorem) tax. The author has incorporated the shift parameters in a generalized tax schedule to analyze the incidence of taxation under oligopoly. Greater industry output and increased output per firm is associated with output elastic schedule. If there is a case of free entry in oligopoly then there would be the larger reduction in industry fix cost relative to the tax schedule that is less responsive to the equilibrium level of output. Taxation under oligopoly, benefit would be  increased with revenue neutral reforms to relatively output elastic tax plan. The results of other studies show that with specific or ad valorem taxation leads to efficiency loss in oligopolistic industries with a fix number of firms. Degressive taxes with both specific tax and ad volarem tax leads to efficiency gain, when the tax output is elastic enough. 2.8 The incidence of income tax on wages and labour supply: Bingley and lanot (2002) has analyzed the determination of equilibrium and labor supply in the presence of income taxes. They found the strong evidence of fractional shifting of income tax from worker to employer. As tax is not fully shifted if the income tax is incident on equilibrium wage. There is not shifting of burden of taxation as labor supply response to wages is measured. And the labor supply elasticity with respect to wage is very small after income taxation. Higher income tax leads to a higher employment. In the article, the author showed the effect of income tax on gross wages and labor supply wage elasticity. The incidence of taxation on gross earnings is a mix of labor supply and gross wage responses. In this model the author has chosen the Denmark country. In Denmark, income tax varies regionally as workers pay tax according to where they live rather than where they work. The result shows that the, in Denmark, gross earnings bear less than the full burden of labor taxation and gross wages bear proportionately more of that tax burden. The results shows, by ignoring the labor supply response to a tax change may lead to a wrong conclusion that the tax is fully incident on equilibrium earnings. 2.9 The incidence of personal income taxation: evidence from the tax reform act of 1986: D. kubik (2004) examined in this paper about the short run incidence of personal income taxation in US by analyzing that how wage structure shifted after the tax reform act of 1986. In this analyses pre tax wages and income of workers are endogenously determined through tax policy. Workers of an economy with different skills, the pre tax wage of each skill depend upon the quantity of labor supplied. Basically, the purpose of the paper is that whether changes in personal income tax affect the US wage formation through the evidence from the tax reform act of 1986. Firstly, the author has tested that how marginal tax rate of the median worker in  each occupation changed due to the tax reform and then tested the wages of workers in each occupation before and after 1986. Personal income taxation changes through the tax reform act of 1986 have affected the wage distribution and results shows that the legislation has lowered the marginal tax rate of high income individuals but low income individuals relatively unaffected. If the training and potential earnings of the people are quite similar then the tax reform act of 1986 will affected the people in the same way. High skill workers in a profession earns high incomes leads to a sharp decline in marginal tax rate but on the other hand low income individuals faced minor changes in marginal tax rate. The result depends on the assumption that labor supply decisions are affected by the marginal tax rate. Labor supply decision changes as individuals change their work hour decision or can cause a worker to drop the profession. Wage rate were affected by the shifts of workers supply in the labor market due to the tax reform 1986. 2.10 Tax incidence when individuals are time-inconsistent: the case of cigarette excise tax: Gruber and Koszegi (2004) stated that lower income groups consume much of the unhealthy or sin commodities to which excise tax is imposed in a greater proportion as compare to the higher income level. There is negative relationship between income and part of income which is spending on sin commodities. For example the imposition of tax on gasoline would be fall on the low income level and their utilities would be affected after increase in taxes. In this model consumers are considered to be time inconsistent in their consumption decision. In the model author has considered the smoking decision which is more appropriate in time inconsistent structure. The basic purpose of the incidence analysis is to determine that who is going to bear the tax through different tax policies and the adequate measure for this analysis is utility. Bad commodities such as smoking have been under discussion among policy makers and academics. The important point here is that tax on harmful addictive commodities is equal to the external cost and such taxes are highly regressive. Conclusion Government basically collects taxes to generate revenues the important thing  is that through which procedure it is being collected and who is going to bear the larger part of tax. After implementation of tax what would be the effect of tax on the welfare of the economy. Redistribution of income can be increased through taxation. Employment can be increased through labor income taxation. Welfare of the economy can be increased through sin taxes. Taxation on the unhealthy commodities leads to increase the welfare of the economy. References: Bingley, Paul and Lanot, Gauthier (2002), The incidence of income tax on wages and labour supply†, â€Å"Journal of public econmics†, vol: 83, page 173-194 Chae, Suchan (2002), â€Å"Tax incidence with bargaining†, â€Å"Economics Letters†. Vol: 77, page 199-204 Fullerton, Don and Heutel, Garth â€Å"The general equilibrium incidence of environmental taxes†, â€Å"journal of public economics†, vol: 91, page 571-591 Garcà ­a, Josà © Ramà ³n and Sala Hector, (2008), â€Å"The tax system incidence on unemployment: A country-specific analysis for the OECD economies†, â€Å"Economic Modelling† Gruber, Jonathan and Koszegi, Botond (2004), Tax incidence when individuals are time-inconsistent: the case of cigarette excise taxes†,† Journal of public economics†, vol: 88, page 1959-1987 Hamilton, Stephen F. (1999), â€Å"Tax incidence under oligopoly: a comparison of policy approaches†, â€Å"Journal of public economics†, vol: 71, page 233-245 Kotakorpi, Kaisa (2008), â€Å"The incidence of sin taxes†, â€Å"Economics Letters† vol: 98, page 95-99 Kubik, D. Jeffrey (2004), â€Å"The incidence of personal income taxation: evidence from the tax reform act of 1986†, â€Å"Journal of public economics†, vol: 88, page 1567-1588 Petrucci, Alberto (2006), â€Å"The incidence of a tax on pure rent in a small open economy†, â€Å"Journal of public economics†, vol: 90, page 921-933 Ruffle J.Bradley (2005), â€Å"Tax and subsidy incidence equivalence theories: experimental evidence from competitive markets†, â€Å"Journal of public economics†, vol: 89, page 1519-1542

Saturday, October 26, 2019

Analysis of Company Network Models

Analysis of Company Network Models CHAPTER 1 ABSTRACT The purpose of this exercise is to provide a detailed design document as per the requirements given in various formats by the Client NoBo Inc. The scope of this document includes at first explaining the requirements provided by the client, explaining the solution both from a top level view and detailed, also explained are the configuration steps, technologies used and scope of the future work and recommendations. We have used modular design approach for designing the network .The final outcome is a detailed document which will extensively assist in deploying and configuration stages of network for NoBo Designs. CHAPTER 2 INTRODUCTION 2.1 AIM: This project aims to analyse the various network models and design a network according to the clients requirements. 2.2 OBJECTIVES: All the Cisco network models: Campus network, Hierarchical network, Enterprise edge model have been reviewed. According to the client requirements the suitable network model has been identified and designed. Proper selection of the devices (Routers, Switches, Computers, cables) has been made to meet the service requirements. The cost for all the devices and equipments that are required has been estimated. Centralised internet connection has been provided for the branch sites from their respective headquarters. This provides high control on the data between the sites. IPsec is cond for data security while using the backup line when the main link goes down. Cisco IOS Firewall is also cond on the perimeter devices. The designed network has been cond on the simulator and all its functioning has been tested. 2.3 DISSERTATION STRUCTURE: CHAPTER 1: This chapter briefly discusses about the abstract of our project. CHAPTER 2: This chapter briefly explains the introduction of our project topic, reviewing all the objectives and ends with the conclusions of each and individual chapter in our dissertation. CHAPTER 3: This chapter explains the background of various network topologies, reviewing of all the concepts like routing, switching, IP addressing and ends with the discussion of the QOS, security issues. CHAPTER 4: This chapter introduces the requirements of network design, implementation, testing and ends with the explanation of all configurations. CHAPTER 5: This chapter briefly discusses about all the experimental results and ends with the analysis of the obtained results. CHAPTER 6: This chapter discusses the entire evaluation of our project and ends with the introduction of conclusions. CHAPTER 7: This chapter briefly discusses about the overall conclusions. CHAPTER 8: This chapter provides the recommendations and future work in our present topic. CHAPTER 3 LITERATURE REVIEW 3.1 Cisco Network Models: Network models may change due to the implementation of different technologies which are applicable to us. But the goal of each model is finally same which is convergence and achieving service integration. There are 6 different geographies available in an end-end network architecture which is briefly discussed below: ( Inc., C. S. (Mar2009, Roberts, E. (8/28/95). 3.2 Cisco Hierarchical model: It is an older model which is good for network scalability. The entire network is divided into 3 layers which are given below: Access layer: These devices are generally developed entirely in a network for the purpose of providing clients access to the network. In general it has been done by the switch port access. Distribution layer: In general, these devices are developed as aggregation points for access layer devices. These devices can be used for the dividing of workgroups or some other departments in the network environment. They can also provide WAN aggregation connectivity at various Cisco Network Models. Core layer: These devices are designed for the purpose of fast switching of packets and they should provide the redundant otherwise it results in loss of degradation of service at the time of network congestion or link failures. Finally these devices help in carrying the entire network traffic from one end to the other end. Finally this model provides good scalability and it supports the combination of SONA, other interactive services and these are applicable to any topology (LAN, WAN, MAN, VPN..) or other connectivity options which are applicable to us. The following diagram (3.1) shows us the Cisco Hierarchical model. 3.3 Campus Network Architecture: In last 10 years it has been developed rapidly and the no of services supported in this model are more. The basic structure of this model is just an extension of the previous model. It supports the implementation of various technologies in this model like QOS, MPLS VPN, IPSEC VPN, and HSRP and so on. It provides the network access to campus wide resources and provides layer 2 switching; layer 3 switching at the Access and Distribution respectively. Services in this model are switched from stateless to stateful and provide redundant devices to monitor all the events, connections in a network. Meeting of these requirements requires some changes in its basic model. The following (3.2) shows us the campus network architecture model.( Gilmer, B. (Nov2004) It provides the combination, multi- service environment which gives the sharing and connectivity of all the users who are working at the remote, branch sites. It requires the combination of both hardware and software devices for providing the services and applications to all the clients in a network architecture. SONA architecture helps an enterprise model to extend its services to the remote site under the consideration of good service levels. Cisco Unified Communications, security and so on can be offered at all the branch sites to overcome the problems of inadequate connectivity. The following diagram (3.3) shows the branch network architecture. It plays a major role in the deployment of any network. Now days, it is growing rapidly to implement more SONA functions. These additions of new functions like virtual servers, instant applications, dynamic change of network configurations and so on. Some resources will be added online to get the support of upcoming needs. This network architecture provides the info about on- demand services which provides dynamic network environment to all the users, consolidation of services while growing of various business applications provided by an adaptive network. Finally this network model reports more usage of our capital without any changes in its infrastructure. In general it has been developed for the purpose of higher level security features in network architecture. It has been done by the support of several server farms having different functionality from DMZ (demilitarized zone) functions like DNS, FTP, HTTP, Telnet and so on for all the users (internal/ external) to share various applications and services among partners and to get the access of internet applications. This network architecture is entirely different and it can make a new or it can break the all discussed Cisco versions. Based on the discussion of all the services like SONA, QOS, and transport services and so on which would mandatory in an end- end system? Based on the bandwidth requirements, their functions and providing QOS the WAN/ MAN has been designed. The functioning and geography plays a major role in deciding the method and speed connectivitys among various sites. The cost of total deployment of a network may vary and it is different from each other. If the connection exists between the sites is a traditional frame relay or if it is provided by a service provider. For example, by using MPLS this provides layer three connectivity between two ends. And it also varies by considering the distance between two sites. The convergence of various types of application over an IP network requires good connectivity, high security levels and providing of good services over the large WAN. The following fig (3.6) shows the WAN/ MAN architecture. (Israelsohn, J. (7/22/2004.) In this approach the overall network design and implementation is discussed with the adequate background. Modular Design Approach: The recipe for an efficient and robust network is to design the network taking into Consideration the various functionalities/requirement required by the network and placing that functionality into a module. Various modules might end up acting in independent physical devices or one physical device may contain all the modules, the idea is to visualize the various functionalities acting as independent unit. The part of the network which consists of hardware and configurations for the wide area networks is termed as the WAN module of the network. It should contain of the all routers, interfaces, cabling and configurations that belong to the Wide Area Networks. The module should be designed separate from the other modules. Similarly all the devices, interfaces and configurations that are involved in the virtual private network would be designed as one module. Some aspects of the design for which there are no pointers in the design documents are also discussed in the detail design section with details of the relevant choices. 1) Performance: A network to its end user is as good as how his/her applications perform. Following are few metrics to for measuring network performance. Responsiveness: The design should be such that it is par with the acceptable responsive time of all the business applications. Throughput: The rate of traffic passing through a given point in the network, it can be calculated in multiples of bits per second or packets per second. Utilization: utilization of resources is the most effective metric to calculate the congestion points in the network, aiding the network design to a great extent. 2) Availability: Network Availability is the key factor to a proper network design. Planning for continuous uptime is important for the business to carry out their activities without any interruptions. Following are a few points for availability: Device Fault tolerance: All the devices installed in the network should be of quality and reliable. Where ever possible redundant ports, modules and devices should be installed. Capacity Planning: A network design should consider adequate capacity planning, for example how many connections can a link handle in worst case scenarios. Link Redundancy: As per the business requirement at least all the important links and internet connectivity should be redundant. 3) Scalability: All the network modules should be designed as such that they should cater for future requirements as well as todays needs. Topology: The topology should be designed as such that it would require minimal configuration whenever any major or minor changes are required. Addressing: The network addressing should allow routing with minimum resources. For example by using route summarization and proper ip addressing scheme which would have minimal impact or no impact on the existing networks or subnets and routing mechanisms. Local Area Network Module: The local area network design primarily consists of dividing the various departmental requirements into logical network separations. At all the sites will create individual virtual area networks for all the departments. All the virtual area networks will use a class c /24 subnet mask, reason behind that is the IP addressing used for the internal networks is all private and hence no sub netting is required. All the Vlans at all the sites are local Vlans which means that they do not extend across the wan pipes. The departments at different sites might have similar names and functionality but its always recommended that the Vlans are kept to be local. The Virtual are network will divide the whole LAN into virtual boundaries allowing for broadcast control and provide for access-control using access-lists. A VLAN has been provisioned for the Server Network and wireless network at each site as well. The VLANS are local to the respective sites only and are class C /24 networks.DOT1q trunks have been placed between the layer 2 switches and the routers at each site. DHCP: The DHCP is Dynamic Host Configuration Protocol provides automatic IP addresses To the hosts on the TCP/Ip network [RFC 1531].It uses BOOTP known as bootstrap protocol. The DHCP server can be on the same or on a different network away from the host pcs. This is possible with the dhcp relay agent. When a client Pc boots, it searches for the server by sending broadcast packets on the network. When server gets theses broadcast packet it responds and sends a packet with an IP address to the client from the DHCP pool. The client can use the IP or can request for another IP instead. The client can hold this IP as according to the configuration in the DHCP server. The minimum duration for the client to hold the IP address is 8 days. After this period the clients has to make a new request for an IP address. This how , the DHCP usage in the network will reduce the intervention of the administrator from giving the IP addresses manually. NAT: For a Pc to connect to the internet and communicate with the other Pcs on the internet, it needs a public Ip address. One has to pay to have a public IP. It will be very expensive to have all Public IP addresses in a network. So, NAT provides a facility to convert the private IP address to the Public Ip which is on the interface of the device (router) that is directly connected to the internet via ISP. This saves money. Moreover it provides the additional security to the internal network By using the one public address. Following are the benefits that NAT provides: Preservation of IP address IP address and application privacy Easy management Routing Module: The routing module consists of the routing architecture at each site; it is the responsibility of the routers to forward packets to the correct destination. Routers by querying the routing table make the forwarding decision. 1) Static routes: At each site static routes have been placed at each head quarter sites. Static routes are the manual routes that are placed by the network administrator manually in the router and have to be taken out manually as well. At the headquarter site the static routes point to far end headquarter site or to the vpn subnet. 2) Default routes have been placed at all sites, Default routes are treated by the routers as a catch all. If there are no specific routes towards a given destination, the default route will be picked up and the packet would be forwarded out of that interface to which the default route belongs. Since the Internet has more than 100,000 routes , it would be infeasible to place all those routes into our routing table , so instead a default route has been placed at each headquarter to forward all the internet traffic towards the interface belonging to the ISP end. Since we are using the far end headquarter as back up to our internet connections at each site. A special type of default route has been added in each headquarter, if the internet link goes down, the floating route will come into the routing table and the original route will disappear. The floating route is nothing but a default route with a higher administrative distance. This is a feature of Cisco IOS, it originally takes the route with the lower AD and places that into the routing table, if that route is lost it would place the second default route with the higher administrative distance. 3) Routing Information Protocol: Routing information protocol version 2 has been used to propagate the Subnet routing between the sites. RIP is a distance vector routing protocol which advertises its routing tables to its neighbours and has a hop count of 15 , since our network has only five sites at the moment, RIP has been used for routing between the networks , the RIP version2 is the recent version of the rip ipv4 and it can carry variable length subnet masks . The RIP is adequate for our requirement. (http://www.ciscosystems.org/en/US/docs/internetworking/technology/handbook/Routing-Basics.html accessed on Dec 12 ,2009) RIP: As said earlier Routing Information Protocol is the only widely used distance vector protocol. It propagates the full routing table out to all participating interface in every 30 seconds. RIP works very well in smaller networks, but it is not scalable for large networks having slow WAN links or on networks with more than 15 routers installed. RIP version only supports class full routing, which essentially means that all devices in the network must have the same subnet mask. The reason: RIP version 1 does not propagate with subnet mask information. RIP version 2 supports classless routing, which is also called prefix routing and does send subnet mask in the route updates. (Chin-Fu Kuo; Ai-Chun Pang; Sheng-Kun Chan (Jan2009,) RIP Timers RIP has 3 different timers which regulate the performance: Route update timer: This timer sets the delay between the propagation of the full Routing table to all the neighbours: this would be normally 30 seconds. Route invalid timer If the router doesnt hear any updates for a particular router for 90 seconds it will declare that route invalid and will update all the neighbours to that the route has become invalid. Route flush timer : After the route has become invalid , another timer starts which is normally 240 seconds ,if the router doesnt hear anything about the said route , it will flush the route out of its routing table and will update the neighbour that I am going to remove this route from my routing . RIP Updates RIP being a distance-vector algorithm propagates full routing tables to neighbouring routers. The neighbouring routers then add the received routing updates with their respective local routing tables entries to accomplish the topology map. This is called routing by rumor, In routing by rumour the peer believes the routing table of its neighbour blindly without doing any calculations itself. Rip uses hop count as its metric and if it finds that multiple path share the same cost to a particular destination it will start load-balancing between those links, however there is no unequal cost path load balancing as there is possible in case of EIGRP. Rip can be troublesome in many ways: Rip actually only sees the hop count as a true metric, it doesnt take care into consideration any other factors So if a network has two paths, the first only 1 hop away with 64 Kbps of bandwidth but a second path exists with 2 hops but each link having a bandwidth of 2 mbps , RIP will always prefer path no 1 because the hop count is less. Rip has a very crude metric and hence not a protocol of choice in many networks. Since RIP by default is classless and is a true distance vector protocol, it also carries with itself same issues as presented by the distance vector routing protocols, fixes have been added to RIP to counterattack such problems. Snort is an open source network based intrusion detection system, it can do traffic logging and intrusion detection analysis on the live traffic, snort is installed on a host and the interesting traffic is copied to it via the port mirroring or port spanning techniques, Snort can be also used inline on an Ethernet tap, it can work in conjunction with Ip tables to drop unwanted traffic. Inter-site Routing: The routing protocol RIP version 2 will propagate routes among all the sites, each Vlan will be advertised as a network in the routing protocol. Switching: The switches at each site carry all the virtual local area networks. 1) A DOT1q trunk has been placed between the switches and the routers at each site. The dot1q trunks carries all the Vlans from the switches to the routers, the routers act as the layer 3 gateway for all the Vlans present in the site, the layer 2 switches alone cannot act as the layer 3 gateways and hence they require some kind of layer 3 device. 2) All the other ports in the switches are either access ports or are trunks to other switches in the same sites. The access ports are the user ports, each access ports would belong to one or the other Vlans. The no of access ports in the building would decide the number and the model of the switches to be placed inside the access layer. Vlan: By Default all the ports on a layer 2 switch belong to the same broadcast domain. The broadcast domains are segregated at the router level, however there are requirements to segregate the broadcast domains in campus switching environments, hence the virtual local area networks are used. The numbers of Vlans in a switch are equal to the number of broadcast domains, the ports on the switch which belongs to a particular Vlan belongs to a certain broadcast domain of that Vlan. Devices in one Vlan cannot connect to other Vlans if there is no layer 3 connectivity provided. Trunking: Speaking of IEEE 802.1Q. There are two different trunking protocols in use on todays Cisco switches, ISL and IEEE 802.1Q, generally referred to as dot1q. There are three main differences between the two. First, ISL is a Cisco-proprietary trunking protocol, where dot1q is the industry standard. (Those of you new to Cisco testing should get used to the phrases Cisco-proprietary and industry standard.) If youre working in a multivendor environment, ISL may not be a good choice. And even though ISL is Ciscos own trunking protocol, some Cisco switches run only dot1q.ISL also encapsulates the entire frame, increasing the network overhead. A Dot1q only place a header on the frame, and in some circumstances, doesnt even do that. There is much less overhead with dot1q as compared to ISL. That leads to the third major difference, the way the protocols work with the native Vlan. The native Vlan is simply the default Vlan that switch ports are placed into if they are not expressly placed into another Vlan. On Cisco switches, the native Vlan is Vlan 1. (This can be changed.) If dot1q is running, frames that are going to be sent across the trunk line dont even have a header placed on them; the remote switch will assume that any frame that has no header is destined for the native Vlan. The problem with ISL is that doesnt understand what a native Vlan is. Every single frame will be encapsulated, regardless of the Vlan its destined for. Access ports: An access port is a port which does not carry any Vlan information, the port which is cond as a an access port, on that port the switch takes off the Vlan information and passes the frame on to the end device, end device be it a pc or a printer or something else has no information passed about the Vlan. A).routing: The routing table in a router is populated mainly in 3 ways. a) Connected routes: router places the networks belonging to all types of its live interfaces in the routing table such routes carry an administrative distance of 0 as they are most trusted routers, these routes are taken out of the routing table if the interface goes down. b) Static routes are routes place manually by the router administrator and carry an administrative distance of 1, these routes are the second most trusted by the router after the connected routes, since these are being added by the administrator themselves c) Third type of routes are installed by the routing protocols and carry administrative distances according to the type of the routing protocol. Wireless local area network Module: A Vlan has been provided at each site which acts as a wireless network, the wireless Vlan connects to wireless access points which provides wireless connectivity to the users. Wireless access points are placed at each floor at all the sites, all the wireless access points will be of Cisco Linksys brands. The wireless access points at each site will be WIFI carrying all a, b or g standard. (O. Elkeelany , M. M. M., J. Qaddour (5 Aug 2004) The wireless networks will use WPA2 key security mechanisms to protect the network from unauthorised access and attacks. Proper placements of the wireless access points can be done after a physical inspection of the sites. If a barrier wall or something else obstructs the coverage of the wifi access points at a floor another wifi access point will be required at the same floor. IP Addressing Module: WAN Ip addressing, all wan connections are point to point and use a /30 subnet mask A /30 subnet only allows for two actual hosts which fits for the wan connections. VLAN Ip addressing, all the Vlans including the wireless and the server Vlans are /24 networks All the future Vlans should be /24 as well, this would help to limit the layer3 broadcasts to only 254 hosts, /24 is being used because our Vlans are all based on class c private addressing and there are adequate addresses in the same class for our future needs as well so there is no actual requirement to subnet any further, sub netting further would actually make the design complex without any real benefits. The routers also have a trunk which comes from their respective site switches. The 1st valid address of the each Vlan belongs to the router acting as a gateway to the Vlans. These .1 addresses are required to be hardcoded inside the routers themselves. The host addressing is taken care by the dhcp protocol, each router as its site will act as a dhcp server for all the Vlans present in the same site. The router acting as a dhcp server would provide gateway information to the hosts in each Vlan as well as the dns servers to be used and the domain information as well. A separate list has been maintained for the hosts outside the dhcp scope, should there be a requirement that a host be provided a static Ip address, and the same Ip address should be added to the list of non dhcp addresses for each Vlan at each site. Server Farm Module: A special virtual area network is in place at every site for a special purpose, this vlan only has servers placed in it, this Vlan acts as a DMZ at all sites. The servers at various sites are placed in separate Vlans to protect them from the broadcasts created by the users in the site as well as blocking unauthorised access. If the requirement arises that a server should also be placed in another Vlan at same time, either 2 network cards should be attached to the same server and each placed in the respective Vlan, if the server is required to be attached to more than 2 Vlans, then the server should carry a special network card which could build trunks with the 2960 switches. The speed and duplex modes on all the server ports should be manually cond by the network engineers as there are chances of duplex mismatch in the auto mode. Unauthorised access can be blocked into the server farm via using IP access-lists feature of the Cisco IOS.( Zhuo L , W. C., Lau FCM . (OCT 2003 ) Security Module: This is the most important module of the network design, as its name suggests it would cater for the network security, following are the security measures in place for the network designs. An integrated Cisco IOS firewall protects the perimeter interface (internet connection) from attacks from the outside world at both the headquarter sites; IOS firewall uses stateful inspection for the protocols listed in the firewall itself. As advised earlier the access to the server Vlan at each site is also controlled by the use of IP access-lists, only authorized IPs/networks and that too only on specific ports are allowed to traverse the DMZ(DEMILITARIZED ZONE). There are perimeter access-lists in place at the headquarter sites blocking most common and known attacks from the internet. The internet modules have been centrally designed to keep a tighter control and strict security. An additional measure of security can be placed at each site by adding an intrusion prevention system to each headquarter. A very effective intrusion detection engine is SNORT, being open source it can be installed in a very short period of time and is free. Further management Vlan can be secured by using port security and sticky Mac mechanisms. http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/prod_qas09186a008010a40e.html The Cisco IOS firewall is an EAL4 certified solution and is a stateful firewall, it is integrated into Cisco router IOS, IOS is the best available routing, security and VoIP software around, and integrating a stateful firewall produces an economical yet flexible solution. It is the ideal solution for small offices, branch offices and wherever the need arises for an embedded firewall solution. The Cisco IOS firewall can be turned on and off in the desired manner on the desired interface in the Cisco router Cisco IOS firewall can be cond in basically two modes, Classic firewall also known as CBAC control based access control or the new configuration technique which is called Zone based policy firewall. The later one is used wherever the network is required to be divided into various zones for example a DMZ zone. The later configuration methodology will be carried on in the future as it caters for the changing needs of networks. WAN MODULE: The Wan connectivity for the NoBo designs has been designed taking in consideration of the following characteristics WAN connectivity: Head -quarters: All the head Quarters have been has been connected via an International leased line from service provider. All the branch-offices are connected to their headquarters via leased lines as well via service provider. Wide Area Network Back up The internet connectivity at both the remote and client sites can be used as a backup in case the primary WAN link is down; a separate site-to-site vpn link will be required to be cond between the two sites. The site to site vpn will use the IPSEC framework which would be only used if the floating routes that are present in the Cisco routers start pointing towards the vpn links in case of the wan link outage. This IPSec vpn back up link should be strictly used as a back up as the internet bandwidth is limited and the latency is high. Network Management mechanisms would notify everyone, if the primary wan link is down. If the requirement for the backup link for a branch site comes up, same methodology can be used, the branch can acquire its own internet connection and use it as a backup link to its respective head office. In that case changes in routing will also occur. IPSec: IPSec is a protocol contains set of features that protect the data which traverses from one location point to another. The location itself defines the type of VPN. The location could be anything such as pc on the internet, a small regional office, a home office or any corp. headquarters. A user on the go would always connect to a user to site vpn and all the others would be called a site to site vpn. The IPSec protocol works on layer 3 and above, like tcp/udp header and data and does not protect any layer 2 frames, a different kind of protection mechanism has to be deployed for the same and also is possible only in the controlled network. The encryption and IPSec are many times thought to be one and the same thing but they are different, IPSec is basically a suite of protocols and one of them does encryption. Following are the features of the IPSEC protocol suite. Data confidentiality Data integrity Data origin authentication<

Thursday, October 24, 2019

HIV/AIDS Prevention Among Adolescents in South Africa :: HIV in Africa

Policy Brief: HIV/AIDS Prevention Among Adolescents in South Africa Heterosexual intercourse among adolescents is the primary method of HIV transmission in South Africa, with the majority of new infections occurring in the 21 – 25 year age group. An HIV-prevention campaign promoting abstinence among young people would seem to be an effective barrier to further infections. However, a policy promoting abstinence approaches the problem only superficially, and would not take into account all of the factors driving adolescents to engage in sexual relations, specifically unprotected sex, in the first place. Abstinence is not a viable method of HIV/AIDS prevention within the social, political, and economic context of South Africa. A more appropriate strategy would be a comprehensive program aimed at the de-stigmatization and prevention of the disease. A campaign promoting the use of condoms in all sexual encounters, backed by education and the expansion of HIV care and prevention services, and accompanied by policies addressing destructive economic conditions and gender inequality would be the most effective strategy. Countries such as Uganda and Senegal have had success when taking a direct approach to HIV prevention, we should follow their example and confront the epidemic on the terms on which it is striking our populace – through the unfettered, unprotected, and unhealthy sexual practices of our youth. Education is of primary importance in the war against HIV/AIDS. It is the most efficient preventative weapon in our arsenal. Most young adults are at risk because they lack the most basic information on HIV and how to protect themselves from infection. There is confusion about methods of transmission, cultural myths about the disease’s curability, and, perhaps most damaging, skewed perceptions of self-risk. In addition, there are high levels of denial of HIV’s prevalence in communities that have yet to experience AIDS-related deaths. This results in adolescents convincing themselves that they can filter out dangerous partners through appearance or reputation. AIDS is externalized as a disease striking only at the margins of society, and is not seen as sufficient enough of a threat to change one’s risky sexual behavior. HIV/AIDS education should be a community-wide occurrence. Scare tactics should be used to depict HIV in a realistic manner - as a disease incorporated into every community that can and will infect you if you do not take the correct precautions. Limiting education to the schools keeps HIV/AIDS as a medicinal, sterile topic, and disassociates parents who are unwilling or unable to talk to their children about issues of a sexual nature.

Wednesday, October 23, 2019

Case Study on School Safety

Case Study on School Safety Melissa Rookard EDD 520 January 24, 2010 Leslie Faught It is evident that schools' policies, programs, practices, physical structure, and teachers are factors internal to the school that determine school safety. These are the only factors that are internal to the school and within fairly complete control of schools. It is these factors that can be reformed and adapted to meet the end result of school safety. School safety is also determined to a very large extent by students, their criminal and other behaviors. Students in turn wear the dual hat of external and internal factors. They are external factors because they are part of the community and are internal factors because they are part of the school and can be disciplined to a certain extent through school policies. There was an incident at Horribly Heard Middle School in Dayton, Georgia. A young man names, Bruce, brought a gun to school and was taken into custody by the Dayton Police Department along with the help of the Department Juvenile Justice. There were many key players in locating the student to insure the school safety. A student was shown the gun and reported to his teacher, Mrs. Daisy. Mrs. Daisy in turn contacted her administrator and asked if he could come to the classroom. Mrs. Daisy, team leader, instructed her team to take the students to the library to check out books. Shortly after, they left an announcement came over the intercom that all students and teachers remain in class until told to dismiss. Teachers were instructed to read their e-mail immediately and follow the instructions laid out in the e-mail. All teachers had to take roll and report any missing children to the front office staff. Mrs. Daisy and her team stayed in the library and check their e-mail in the library. Administrator Bob, Principal Hope, and Resource Officer Life, came to the classroom to search Bruce and taken him into custody if the weapon was indeed on him. Two additional administrators stayed in front of the classroom to ensure no one came down the hall. Office Life took Bruce into custody and he was charged with weapons on school grounds. Once Bruce was taken off school grounds school ran as normally as possible. After school and the students were gone, the staff has an emergency faculty meeting. Principal Hope informed the faculty of the incident today and the student would not return back to school. Student was taken into Juvenile Justice Custody and no one was hurt. The student that told the teacher was also spoke to along with his parents in regards to the incident. They asked that he did not repeat was has happen to ensure students safety and parents concern. Students bring weapons to school more times than we are made aware. At HHMS, faculty and administration communicates well as was able to ensure school safety. Having students stay in the classroom or stopping all movements in the hallways is one way to keep order and asking faculty to take roll immediately and report any missing students via e-mail to front office staff is vital. I believe HHMS handle the situation to the best of their ability. School security is the most common type of activity that administrators should specifically set up to prevent disorder in the school. The most prevalent security strategy used throughout HHMS is various ways to monitor student and non-student movement within the school. The staff and administrators were primarily responsible for this task. To avoid a situation other types of security strategies could be used. Examples, are hiring special security personnel, use of metal detectors, and random searches. Schools should have two basic approaches to rules and procedures. The first approach are teachers tend to deal with all but the most serious discipline problems, including setting punishment and calling parents (if necessary). The second approach tends to deal with small infractions within the classroom and then refer students to an administrator for repeated or more serious infractions. The administrator was responsible for assigning punishment and contacting parents. Regardless of the approach, consistency of rule enforcement emerged as an important issue, especially among students. It is the role of the principal in setting the overall tone in a school when it came to discipline and enforcement of rules. School staff expressed more satisfaction if the principal set clear expectations, communicated regularly with staff, and gave them a voice in school issues.

Tuesday, October 22, 2019

My First Police Encounter essays

My First Police Encounter essays I was twelve years old and had recently moved from an impoverished environment in a suburb of Birmingham to an all-white neighborhood in San Diego. I and my adoptive mother were elated to be invited by her grandson to stay with him and his, at the time girlfriend. He was a recent Coast Guard retiree who was about to get married and wanted us there for the wedding. Also, in my opinion, he wanted to be able to take care of his elderly grandmother. I was in California meeting new kids and all of them were very mischievous. It was during one of these meeting outings that it happened. I was about to have my first police experience. It was the summer of 1976 when I met Johnnie. He was a hippy-type who rode BMX bikes, skateboards, and motor cross bikes. Being around Johnnie intrigued me because I had never experienced his type of life style. Johnnie was a rebel. He came and went almost as he pleased because his father was a single Dad and worked long hours. I and others would go over Johnnies to hang out sometimes after school where we would drink beer and smoke cigarettes. On one occasion, we decided we were bored. Because we no had no money we would brainstorm to come up with ideas to get money. On this particular occasion someone came up with the idea that we should go retrieve golf balls from the pond of a nearby Navy golf course. I thought it was a very safe and sound idea at the time. But, little did I know that the decision we made would lead to my first police encounter. The golf course we went to was on a military installation about one mile from Jack Murphy stadium, in a section of San Diego referred to as Allied Gardens. It was a very gorgeous installation were the local military held lots of picnics and activities. At the time, I had no idea that you needed an I.D. card to come on this installation. Nevertheless, my friends and I proceeded to take a roundabout route to the golf course and we traversed some woods and...