Wednesday, 7 October 2015

Physics Assignment Help: 30-kg hanging object is connected by a light..

Q) 30-kg hanging object is connected by a light, inextensible cord over a light, frictionless pulley to a 5.00-kg block that is sliding on a flat table. Taking the coefficient of kinetic friction as 0.162, find the tension in the string.

Sol:
It’s given that M1=5kg, M2=30kg, Also M1 is moving with acceleration a, caused by the Tension in string: Ts, and the friction, Fr, Hence aM1= Ts - uM1g, where u= coefficient of kinetic friction.
Similarly, the mass 30kg is moving with the same above acceleration a by the forces of weight and the Tension in the string,
Hence aM2=M2g- Ts
By adding the above two equations we get,
a= (M2g-uM1g)/ (M1+M2)
Therefore the tension in the string is given by,
Ts = M1g (M2-uM1)/ (M1+M2) +uM1g
By substituting the values in the above equation, we get
Ts = [5*9.8*(30-0.162*5)/ (5+30)] +0.162*5*9.8
  = 48.8N


Write Ups: Data Security~Institute of Research has sensitive information..

Q) ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ inc. for research on genetics. The information must be kept top secret at any cost. At ABC Institute, the researchers are unsure about the type of key (Asymmetric or Symmetric) to be used. Please formulate a possible solution and describe the advantages and disadvantages of any solution employed.

Sol:
Here the security measures have to be taken care for both ABC institute as well as XYZ Inc. So the secure information has to be maintained and preserved from both the sides.
First it’s better to have a secure room which we can call it as ODC where all the research is being done. This room must have a user entry access and user validation. The access must be given to very few members who are deeply involved in research. This will help to preserve the information at least within the room. Also only the genuine users have been given access to that room, which helps in tracking. In case if we find any problem or issue then we can catch hold of only those genuine members.
Try to block the emails that come in or go out with large attachments. It’s better to completely scan the machines and emails of the members thoroughly for every two days. Also keep track of the emails and machines of others i.e., who is not a genuine member but works for that company into other field. So that in case of any doubts they will be caught in this scanning itself.
All the telephone lines from ODC block i.e., a place where research of genetics is being done and preserved in both companies have to be recorded or tapped. So that in incase of emergency it will be very helpful to block the leakage that is taking place most probably within the genuine members.
 All the USB drives has to be disabled in all the machines in ODC, so that members will not be able to takeout any confidential data from the system and they will not be able to copy it into any other external drive or Pen drives or other USB dongles.
The concept of data masking can be used here which hides the specific data or some sensitive information within a database from all the unauthorized members so that if any others receive an email from ODC machines they will definitely not have authorization to view that information. 
It’s always better to encrypt the data before storing it in a database or hard disk. Whenever you want to continue with the research then you can decrypt the information with the help of the decryption password. The decryption password has to be randomly generated code which will change every minute. The device that can be used here is secure id device, which randomly generates the numbers for every minute. This device has to be maintained in the ODC, which has to be taken care only by two of the senior members. Anyways without decrypting we will not be able to view the information.
The one and only main disadvantage of this solution is that the initial investment for infrastructure including equipments and man-hours is very high, but once implemented then it will be very useful.
References:

Write Ups: Operating Systems~Evaluate two operating systems..

 Question: Evaluate two operating systems

Answer:
Let us evaluate the two different operating systems Microsoft windows and apple Mac by comparing/contrasting between the two.
Every windows machine takes around 3-5 minutes to start up or reboot where as every Mac machine takes around 15-17 seconds to start up or reboot. Hence we can say that the Mac system starts faster and also load all the installed application automatically as soon as the system starts up, where as in windows only when the user requests or clicks on a particular application then only it loads up to open. So in Mac machine all the application are preloaded as soon as the system reboots, hence user can use any of the installed applications without waiting for it to load.
When we talk about the size of the operating again windows OS needs a space of 5GB for installation where as Mac OS needs a space of around 2GB. When we look at the installation and un- installation of OS, then definitely windows takes more time to format and reinstall when compared to Mac OS. But when we look at the accessibility perspective then windows is very much better than Mac.
Windows is compatible with all the applications say when we talk about compatibility and application support then windows is very much better than Mac systems. Hence windows OS has a very high legacy application support.
When we talk about the audio part, then definitely both Windows and Mac OS will be compared equally in audio playback. Hence the audio output quality of both the OS are same. But definitely the video quality and video playback is excellent in windows OS when compared to Mac OS.
Windows support almost all the software’s mainly audio editing software’s, video editing software’s, all kinds of antivirus, also all kinds of audio and video players etc. Hence the windows OS is always compatible with the latest application may be any business application or commercially used applications, or any personal use applications.
The user interface and user friendliness is very high in windows OS when compared to Mac OS. Hence any new user will be able to use windows application without much guidance when compared to Mac OS.
The software updates are usually with respect to technology. Hence the updates in windows OS software in much more than the updates coming up for Mac OS. This might be one of the drawbacks to windows since users have to upgrade to new version by paying extra amount to enjoy new features always.
Finally let us talk about the picture quality. Picture quality in both the OS when imported from some other device or when downloaded from web remains the same. Hence the quality of the image remains the same in both the OS.

References:

Communications: Net Neutrality Write Up

Q)I need information on Internet Neutrality ( Net Neutrality) covering not only the common sense aspects (why we should stop the gov) but how it will differently affect consumers and most importantly the WEB 2.0 generation of start-ups and openness ( open source applications, p2p sharing, social media/networks, etc.) and entertainment ( the surge of independent musicians and artists.)
Are there any big companies (preferably in communications or media) who are pushing the envelope and would ultimately benefit?

There should be a way to connect this to the concept of their becoming two internets, the paid and unpaid. 


Sol:
Net neutrality (also Network neutrality, Internet neutrality) is one of the principle proposed for all the users accessing networks and participating in the Internet that gives no restrictions by the ISP’s(Internet service providers) and also the governments on sites, contents and platforms, also the kinds of equipment that may be attached while sending to others, and the modes of communication involved.
Service providers argue that if net neutrality is not enforced, they will have sufficient incentives to build special high-quality channels that will take the Internet to the next level of its evolution. But if they do get their needy wish, net neutrality is then consigned to the only dustbin, and they do build the new services, but no one uses that. If the networks that are mostly built are the only ones that are publicly discussed, which is a likely prospect.

What will service providers publicly promise to do, when they are given with complete control of their own networks, is to build the special facilities for the streaming movies? But there are few fatal defects to the above promise. One is that movies are not likely to offer all that much income. The other is that delivering movies in real-time streaming audio/video is the one of the wrong solution, expensive and unnecessary.

If Internet service providers are to derive the most significant revenues and also the profits by exploiting the available freedom from the net neutrality limitations, then they will need to be engaged in much more.
Such calls for preemptive regulation are only unjustified. There is no evidence for those broadband operators who are unfairly blocking access to the websites or online services today, and there is no other reason to expect them to do so in the near future. No firm or corporate has any sort of bottleneck control over the market power in the speedy broadband marketplace; it is also very much a competitive free-for-all, and no one has any idea about what the future market will look like with so many new other technologies and operators also entering the picture. In the absence of the clear harm, government typically doesn’t regulate in the preemptive, prophylactic fashion as a CBUI members are requesting.

Moreover, from being something the regulators should forbid, vertical integration of the new features and also the services by broadband network operators is one of the essential part of the innovation strategy and companies will need to use for competing and offer customers the available services they demand.

Network operators also have got the property rights in their systems so that they need to be acknowledged and also honored. Net neutrality mandates would be flout on those property rights and hence reject freedom of contract in this marketplace.

This will also affect the consumers in such a way that they will not be able to enter some of the sites or they will be not be able to access or download some of the information since user are not restricted on the data access from the website, so that same user can go for unlimited downloads resulting in others not able to access the required information in case of emergency. Even in perspective to WEB 2.0 generation of startups and openness the social community sites are loaded with unnecessary junk data due to net neutrality as a result the maintenance  of the website as well as database becomes complex also resulting in follow ups so that there is no illegal data coming into the websites from any of the users.

Allegations of discrimination have come up with many heated intellectual debates as well as countless legislative and judicial squabbles in the United States of America. Regardless of the available veracity of the accusations in the given case, the charges are quite often sensitive and serious. Sometimes the word “discrimination” gets thrown in a very cavalier manner by the parties watching to enlist the support of government in a dispute in which it doesn’t belong. A good recent example of that comes from the field of Internet policy. A heated industry catfight has erupted between major technology companies over how Internet content should be accessed through high-speed broadband networks owned by cable or telephone companies. One of the group called the
Coalition of the broadband Users and also the innovators which adds among its members like Amazon, Apple, Microsoft, EBay, Yahoo and Disney has petitioned the FCC (Federal Communications Commission) to implement rules to ensure that cable and BSPs (broadband service providers) will not make use of their control of speedy networks to disturb consumer access to the websites or other users access. The CBUI proposal or the variations of it, has been typically labeled “digital nondiscrimination Or “Net neutrality”. Despite in the absence of the evidence that network operators are currently being imposed “discriminatory” restrictions on the network users.

CBUI members claim the FCC which adopt the preemptive safeguards which will ensure that the consumer access to Internet content is unfettered and full in the near future. In filings with the FCC and CBUI members the claim that cable and telephone companies are forging into a broadband duopoly which will also define the Internet for some time and network operators to encumber or the infringe in the relationships among their customers in between their customers and destinations on the Internet. Stanford University professor Lawrence Lessig—famed for leading and similar antidiscrimination antitrust crusade against the Microsoft that has endorsed the CBUI Net neutrality proposal, arguing, about the network owner is increasingly in the existing position of picking as well as choosing how the network gets used. Hence others, such as FCC commissioner Michael Copps, are speaking about the issue in far more apocalyptic terms.

We could be on the verge of the inflicting terrible damage on the Internet network. I am worried that we could be able to  witness the start and also the end of the available network or internet as we know it. Which proponents of the internet neutrality such as Copps, Lessig, and CBUI all members fear is that Broadband Service Providers will leverage their supposed market power is to force the customers to accept a variety of unsavory limitations on the use of the available networks owned by Broadband service providers. For eg, access to some specific sites might be restricted, the attachment of few technologies or some devices might be forbidden and also additional networks might not be allowed due to security reasons to develop at the periphery, or at edge, or at  the network (i.e., where consumers interface with the network). For eg, Broadband Service Providers might seek to curtail the attachment of wireless fidelity(WIFI) devices or networks by the consumers.

It is definitely plausible that Broadband Service providers might restrict consumer’s access to the network content or restrict attachment of various other devices or networks at the available edge of the system. Since there are some examples of Broadband Service Providers engaged in such tasks today, there might be scenarios in which it is exactly sensible for a network owner to un-restrict the existing restrictions or differential pricing available schemes on its speedy broadband customers. Network owners may also discourage the use of other certain devices on the available networks to stop system crashes and network interference. They may also need to price the services separately to protect network from congestion or in capturing higher revenues on better bandwidth intensive services. They might need to integrate the content vertically and conduits on their available systems, or make partnerships with other firms so that they can help them to reach the new customers and also offer them superior services. Also there might be scenarios in which stoppage of access to certain websites makes sense for most of the network operators. They might block access to certain websites that is in some controversy or it might contain material where some subscribers might find it as objectionable, or they might block sites simply to protect running the ads of a leading corporate competitor.

Consumers will consider few restrictions; say as a prohibition on the upcoming release of viruses on a broadband network, which is trivial and fully acceptable. Other stoppage, such as a restriction on the access to the competitor’s website or a specific competitor’s advertisement, will be considered an intolerable constraint by many of the corporate users.

But the important concept here is whether any of this should be considered as an illegal work and is to be prohibited by law. Most regulators adopt the regulations in governing the underlying available infrastructure of speedy broadband networks or the existing overall architecture of the network to ensure that openness or neutrality and also the end-to-end characters of the network are preserved. Also what would be the impact of such a regulation in terms of the existing economic incentives for current and upcoming future broadband operators to fully innovate and also invest in most expensive new networks. Do the rights of property of network owners come into picture here? Do high tech network operators are even having the property rights in this case. Those are also complicated with the questions that will deserve extensive exploration also before policymakers rush to adopt the supposedly simple internet neutrality regulatory guidelines. In the last, the only real question in this debate can be simply stated as who will decide. That is nothing but who will call the shots of the network owners or someone else when it always comes to questions about the use of infrastructure in the Information age. For the reasons listed below, it would be wise for the policymakers to make allow the entities that own and also operate broadband networks in the freedom to experiment with few various business models to better serve the consumers. The alternative of preemptive and prophylactic government regulation also has far too many downsides. Discrimination in this concept is something difficult to define with and also open to the very much subjective topic. Disputes over what constitutes on this discrimination will definitely lead to endless and regulatory proceedings which will open the door to a great deal of the mischief by all the companies or all the organizations that will feel that they should have greater control over how the broadband networks are well operated, either in a better-faith effort to improve the existing operation of those networks or to be frank in a more self-centered effort to game with the regulatory system to their own as an advantage. Net neutrality regulation also has the property rights Broadband Service Providers possess in the infrastructure they will also own and operate. Hence by ignoring property rights and by opening the door to the increased regulatory meddling, internet neutrality regulation threatens to the retard innovation and also investment in new broadband facilities. Instead of keeping so preoccupied with maximizing number of the consumer welfare within the confined existing systems, proponents of the net neutrality, especially the impressive list of well heeled corporate that are part of CBUI will need to put more thought and energy into idea of how the networks of the future are to be funded and constructed. The principle that CBUI members being seem to ignore is that competition in the above creation of networks is very important as competition in the goods as well as services that get sold over existing networks.

Big companies definitely gets benefited from this since there is not restrictions on the net access and usage hence they will always go for heavy use large downloads resulting in more use when compared to individuals where they also make large profits with the help of this hence they get benefited from net neutrality.

Finally, proponents of Net neutrality will also results in ignoring the fact about the network capacity usage and the profit motive which will always provide very powerful checks on overly restrictive as well as carrier activities. Carriers definitely make money always by only carrying huge traffics. Capacity utilization is one of the very important concepts in the field of networking business. A speedy broadband network without the subscribers is like a airplane with the empty seats and a recipe for financial disaster. Broadband Service Providers will not want to restrict the traffic flows or encumber Net-surfing activities for the fear of diminished capacity use as as frustrated consumers will consume less of those available networks, or leave the network altogether as free. That is why cable operators will not configure their set top boxes to middle with the consumer access to traditional television channel stations. Even though they will have the technical capability to restrict the existing stations consumers watch or even though when they want to watch them, cable operators understand that their video with customer base will grow only if they will expand the range of the viewing options, not curtail or artificially limit of them. Hence finally in attempting to attract as many as subscribers as possible, Broadband Service Providers will also need to take few steps to make sure the integrity as well as performance of the networks or to expand the range of the service offerings to attract new customers. That is why some minor restrictions on the certain types of network uses where activities will occasionally be imposed by carriers. For eg, cable companies currently provides access to the certain video channels on a pay-per-view plan basis, largely because most users don’t want, in that way so their children will not gain access to those channels. Broadband Service Providers will have to strike an dedicated balance, but the profit will motive them with a powerful incentive not to restrict activities on their networks. That is especially the case of the speedy broadband market which grows increasingly competitive hence consumers have more options from which they can choose.

Hence there should be a way to connect this to the concept of their becoming two internets, the paid and unpaid. Generally there are policies saying about the fair usage policy where the users are restricted to some limits in the unlimited plans of data usage so that if they cross the limit of that then they should pay extra from the actual rentals. This will act as paid internet where it the usage is within the limits then it is concept of free internet. This will definitely benefit the Internet service providers in limiting the user’s mainly corporate users since the restriction is made such that unlimited access is controlled.


References:


1) "Network Neutrality ". A guide to network neutrality,   2008.
2) The Delusions of Net Neutrality | Andrew Odlyzko | Voices ... (n.d.). Retrieved from --voices.allthingsd----20080904/the-delusions-of-net-neutrality/
3)      A e-book book on net neutrality, towards co regulatory solution, 2009
4) "Vint Cerf speaks out on net neutrality", Net neutrality importance By Davidson, Alan , 2005

5) "Common sense about network neutrality". Support on internet neutrality By Farber, David,   2006). 

Computer Science Assignment Help: Consensus algorithm

“Consensus algorithm”:  A group of ten people need to decide which one flavor of ice cream they will all order, out of three options. The algorithm can question and re-question the participants, and present the answers to the participants, until a consensus is reached. This exercise is somewhat more open-ended. Add your assumptions if necessary. Obviously, this algorithm might never result in an answer. Deal with that too.

Answer:

Step1: Please ask the group of people to select one flavor of ice cream and go to step 2.

Step2: Please plan for ordering the selected flavor and go to step 3 else go to step 1.

Step3: Please confirm from all the ten people whether they are ok with the selected flavor of ice cream, if yes go to step 4, else go to step 1.

Step4: Please go for the second round of confirmation from each one of them among the 10, if they are ok then go to step 5, else go to step 1.

Step5: Please order the selected flavor of ice-cream as a group of 10, if there is no discrepancy in the choice and go to step 6, else again go to step 1

Step6: Please wait for the waiter to serve the ice cream, if yes go to step 7, else go to step 8.

Step7: Enjoy having the delicious flavor of ice-cream, go to step 9.

Step8: Please remind the waiter again, and go to step 9.

Step9: Come out of the ice-cream shop as a group of 10 once you finish having it, else go to step 7.


Explanation:



Here we will not consider the percentage of members in a group opting for a flavor choice; instead we go for probability considering three to four members at a time. Hence we give three chances for the group of 10 members to select their choice, we are not ordering at the first choice we are giving two more other chances to choose so that as per the probability, at least after the third round for asking for the choice they all group of ten will come to the conclusion and they must be able to order it at that stage or else this keeps repeating until they all come to the conclusion.

Wednesday, 26 November 2014

Networking Homework Help: Explain why security is important for WLANs, even more ...

Q)Explain why security is important for WLANs, even more so than for wired networks. 

Sol:

More security is needed and security is very much important in case of wireless LANs, when compared to wired LANs. The main reason behind this is in case of wireless LANs by making use of the wireless authentication of the authorized wireless user any one can make use of it also hacking the wireless network is very easy if it is not password protected. Since in most of the WLANs the users are not protected by a unique password, since wireless LANs are always used in case of places like college campus or office campus where multiple users can access the network. Hence in case of wired LAN there is a need for the dedicated channel or cable through which every user can get connected to the network whereas in case of wireless LANs there is no need for it, sometimes it will not even ask for any security passwords. Hence any user can get connected to the network and use it without paying for it. As a result more security is important for WLAN’s when compared to Wired LAN.

Networking Assignment Help: What specific steps can be taken to improve security in WLANs...

Q)What specific steps can be taken to improve security in WLANs?

Sol:

 The below steps can be taken to improve the security in WLANs:
a) Initially wireless network has to be authorized and authenticated.
b) Also all the users try to get connected to that particular has to be authorized and authenticated.
c) Every user connected to the network has to be uniquely identified by their own unique username and password.
d) Multiple users with same username and password should not be allowed to connect to the network.
e) Every user has to be properly disconnected so that no one in queue must be able to continue to get connected to the network with their username and password.