Thursday, November 28, 2019

A Catapult Investigation Essay Example

A Catapult Investigation Essay Example A Catapult Investigation Essay A Catapult Investigation Essay The aim of this experiment is to investigate how far a piece of block would travel using a catapult with different weights on the block and different force applied to the catapult.FrictionI know from text books and from lessons that friction will affect how far certain object travels. Since Im not going to change the friction or not going to change where I will do my experiment I dont need to worry about this factor.HypothesisMy hypothesis for this experiment is the more force you apply to the rubber band the further the wood will travel but the more weight you put on the block of wood the less distance its going to cover.Apparatus* A stool* Rubber band* Newton meter* Weights* A metre stickMethodI will do tests of 5, 10, 15 and 20 newtons force each with and without weights. I will put up to 3 weights on the block. I will do 5 repeats for each test. Firstly we had to set up the stool then we had to find a place to do the experiment but we made sure that we did the experiment in the s ame place throughout. We recorded our results on a book and put it on to a table.Fair testThe variables we didnt change in order to make this as fair test were the equipment and the place we did the experiment. We did this by writing our name in the equipment we used.DiagramSafetyWhen we were doing the experiment we made sure no one stood in front of the wood which was going to be released. We wore goggles so our eyes wont get damages if the rubber band flies at us.Other PrecautionsDuring the investigation we must make sure that we dont make any human error such as recording the distance wrongly or plotting the results wrong.These are the results(in cm)5N5N+1Weight5N+2Weights5N+3Weights161251151062161373159531775410N10N+1Weight10N+2Weights10N+3Weights796555387762494176595842767153367863474515N15N+1Weight15N+2Weights15N+3Weights13011091601551169864121119100711201159559118114945720N20N+1Weight20N+2Weights20N+3Weights205169132115267210134104250121135105230208130110200191121102Observati onsStandard DeviationI did standard deviation to find out how spread the collected data is. Here are the results:5NX(X-Mean)(X-Mean)^2160.20.0415-0.80.64160.20.0415-0.80.64171.21.44792.8Mean15.8Standard Deviation0.755N+1WeightX(X-Mean)(X-Mean)^2121.83.2410-0.20.04132.87.849-1.21.447-3.210.245122.8Mean10.2Standard Deviation2.145N+2WeightX(X-Mean)(X-Mean)^25-0.60.3660.40.1671.41.965-0.60.365-0.60.36283.2Mean5.6Standard Deviation0.805N+3WeightX(X-Mean)(X-Mean)^21-1.62.562-0.60.3630.40.1630.40.1641.41.96135.2Mean2.6Standard Deviation1.0210NX(X-Mean)(X-Mean)^2791.83.2477-0.20.0476-1.21.4476-1.21.44780.80.643866.8Mean77.2Standard Deviation1.1710N+1WeightX(X-Mean)(X-Mean)^2651162-2459-5257174963-1132080Mean64Standard Deviation4.0010N+2WeightX(X-Mean)(X-Mean)^2552.66.7649-3.411.56585.631.36530.60.3647-5.429.1626279.2Mean52.4Standard Deviation3.9810N+3WeightX(X-Mean)(X-Mean)^238-2.45.76410.60.36421.62.5636-4.419.36454.621.1620249.2Mean40.4Standard Deviation3.1415NX(X-Mean)(X-Mean)^21301.21.4 415526.2686.44121-7.860.84120-8.877.44118-10.8116.64644942.8Mean128.8Standard Deviation13.7315N+1WeightX(X-Mean)(X-Mean)^2110-4.823.041161.21.441194.217.641150.20.04114-0.80.6457442.8Mean114.8Standard Deviation2.9315N+2WeightX(X-Mean)(X-Mean)^291-4.621.16982.45.761004.419.3695-0.60.3694-1.62.5647849.2Mean95.6Standard Deviation3.1415N+3WeightX(X-Mean)(X-Mean)^260-2.24.84641.83.24718.877.4459-3.210.2457-5.227.04311122.8Mean62.2Standard Deviation4.9620NX(X-Mean)(X-Mean)^2205-25.4645.1626736.61339.5625019.6384.16230-0.40.16200-30.4924.1611523293.2Mean230.4Standard Deviation25.6620N+1WeightX(X-Mean)(X-Mean)^2169-29841210121442121419620810100191-7499901330Mean198Standard Deviation16.3120N+2WeightX(X-Mean)(X-Mean)^21321.62.561343.612.961354.621.16130-0.40.16121-9.488.36652125.2Mean130.4Standard Deviation5.0020N+3WeightX(X-Mean)(X-Mean)^21157.860.84104-3.210.24105-2.24.841102.87.84102-5.227.04536110.8Mean107.2Standard Deviation4.71AnalysisFrom these results its clear that my hypothesis were right. My hypothesis was the more force you apply to the rubber band the further the wood will travel but the more weight you put on the block of wood the less distance its going to cover. As Newton said When an object gains force it will accelerate or decelerate the acceleration or deceleration is proportional to the resultant force. This explains that when the block of wood was released at 20 Newtons the force it gained was much greater than the friction; this is why it could go for greater distance. But when the same block of wood was released at 5 Newtons the block of wood didnt go far enough this is because the friction was greater than the force released by the piece of wood.EvaluationI think that these results are not good because we didnt check the elasticity of the rubber band.Elasticity of the rubber bandI know from the Internet that elasticity of a normal rubber band will change when you keep on stretching but there is a limit when the rubber band will not stretch furthe r. I put 50g weight on a new rubber band and measured how much it stretched. I then took the weight and stretched the rubber band 20 times and put 50g weight and measured it. I did this until I got the same result 3 times. These are the results:155mm179mm200mm200mm200mmThese results show that the elasticity of the rubber band will change but there is a limit to it. If I had done this and used the same rubber band then I can be sure that the results are not wrong. I think I collected enough results.

Sunday, November 24, 2019

japaneseAmerican During WWII essays

japaneseAmerican During WWII essays Japanese immigrants and the following generations had to endure discrimination, racism, and prejudice from white Americans. They were first viewed as economic competition. The Japanese Americans were then forced into internment camps simply because The Japanese first began to immigrate to the United States in 1868. At first they came in small numbers. US Census records show only 55 in 1870 and 2,039 in 1890. After that, they came in much greater numbers, reaching 24,000 in 1900, 72,000 in 1910, and 111,000 in 1920.(Parrillo,287) Most settled in the western Many families in Japan followed the practice of primogeniture, which is when the eldest son inherits the entire estate. This was a push factor. Because of primogeniture, second and third sons came to the United States to seek their fortunes.(Parrillo,287) The promise of economic prosperity and the hope for a better life for their children were two pull factors. These foreign-born Japanese were known as Issei ( first generation). They filled a variety of unskilled jobs in railroads, farming, fishing, and domestic services. (Klimova,1) The Japanese encountered hostility and discrimination from the start. In California, a conflict with organized labor was due to their growing numbers in small areas and racial White workers perceived Japanese as economic competition. Their willingness to work for lower wages and under poor conditions brought on hostility from union members. The immigrants became victims of ethnoviolence. In 1890, Japanese cobblers were attacked by members of the shoe makers union, and Japanese restaurateurs were attacked by members of the union for cooks and waiters in 1892. It was very difficult to find steady employment; therefore, most of them entered agricultural work. They first worked as laborers, accumulated sufficient capitol, then as ten...

Thursday, November 21, 2019

U08a2 Measure of Solar Rotation Paper Essay Example | Topics and Well Written Essays - 1250 words

U08a2 Measure of Solar Rotation Paper - Essay Example The synodic period is the temporal interval that it takes for an object to reappear at the same point in relation to two other objects (linear nodes), e.g., when the Moon relative to the Sun as observed from Earth returns to the same illumination phase. The synodic period is the time that elapses between two successive conjunctions with the Sun-Earth line in the same linear order. The synodic period differs from the sidereal period due to the Earth's orbiting around the Sun (Wikipedia 2011). Using Sunspots in Measurement of Solar Rotation. The rotation of the sun has been measured by the motion of various features ("tracers") on the solar surface. The first and most widely used tracers are sunspots. Though sunspots had been observed since ancient times, it was only when the telescope came into use that they were observed to turn with the Sun. The English scholar Thomas Harriot was probably the first to observe sunspots telescopically as evidenced by a drawing in his notebook dated De cember 8, 1610, and the first published observations (June 1611). Johannes Fabricius had been systematically observing the spots for a few months and had noted their movement across the solar disc. This can be considered the first observational evidence of the solar rotation. Christopher Scheiner, (1630) was the first to measure the equatorial rotation rate of the Sun and noticed that the rotation at higher latitudes is slower, so he can be considered the discoverer of solar differential rotation. Each measurement gives a slightly different answer, yielding the above standard deviations (shown as +/-). St. John (1918) was perhaps the first to summarize the published solar rotation rates, and concluded that the differences in series measured in different years can hardly be attributed to personal observation or to local disturbances on the Sun, and are probably due to time variations in the rate of rotation, and Hubrecht (1915) was the first one to find that the two solar hemispheres rotate differently (The Essential Cosmic Perspective, 5th Edition, Page: 287). Sunspot Analysis: (Spotexerweb[1].pdf) (Day 1) June 22, 2011 Sunspot Latitude 15 Degrees Sunspot Longitude: 60 Degrees (Day 2) June 23, 2011 Sunspot Latitude: 15 Degrees Sunspot Longitude: 45 Degrees (Day 3) June 24, 2011 Sunspot Latitude: 15 Degrees Sunspot Longitude: 30 Degrees A AC( ( A\ Rotation of Sun Calculation: Difference in Longitude in Day 1 and Day 2: DL1: 15 (Delta Longitude) S1 = 2 days x 360 degrees 2 x 360 = 2 x 24 = 48 Degrees DL1 15 Difference in Longitude in Day 2 and Day 3: DL2: 15 (Delta Longitude) S2 = 2 days x 360 degrees 2 x 360 = 48 Degrees DL2 15 Calculation of Average (S): S = (S1 + S2) = (48 + 48) = 96 = 48 Synodic Rotation Period 2 2 2 Sidereal Period of Rotation (P): P = (S x 365.25) = (48 x 365.25) = 17532 = 42.424 Sidereal Rotation (P) (S + 365.25) (48 + 365.25 413.25 Comparison with Period of Solar Rotation for Solar Equator: Solar rotation is able to vary with latitude be cause the Sun is composed of gaseous plasma. The rate of rotation is observed to be fastest at the equator (latitude ?=0 deg), and to decrease as latitude increases. The differential rotation rate is usually described by the equation (Wikipedia 2011): Citations The Essential Cosmic Perspective, n.p. (5th Edition), Page: 287, Book Tracking Sunspots Data from SOHO, Spotexerweb[1].pdf, Web Sunspots,Wikipedia, The

Wednesday, November 20, 2019

An Analysis of The McDonaldization of Society by George Ritzer Essay

An Analysis of The McDonaldization of Society by George Ritzer - Essay Example In today's' complicated and ever changing society, we often try to achieve a sense easier is by implementing a function now known as "McDonaldization", which Ritzer describes in various ways. For instance Ritzer states that the concept of McDonaldization is defined as "the process by which the principles of the fast food restaurant are coming to dominate more and more sectors of American society as well as the rest of the world." The success of McDonalds, and of McDonaldization as a whole, is due to four basic factors--efficiency, calculability, predictability, and control. carry their own food, and throw out the garbage. This is not as efficient for the consumer, but it saves time for the workers. Education, health care, and the work place are all becoming McDonaldalized in order to become more efficient. Efficiency in McDonaldization has streamlined many processes, simplified goods and services, and forces the consumer to do work as well. Ritzer continues these ideas in marshalling the abundance of evidence which makes this trend very compelling. Using many examples from such disparate social institutions as family life, higher education, the funeral business, health care, and entertainment, Ritzer illuminates the broader trends within the "taken for granted" daily routines of life. He does so with a keen sociological eye, but also with a very wry sense of irreverence that adds a sarcastic touch of humor to the expose.The fast-food model, according to Ritzer, has a manner of pushing us towards ever greater reliance on the fostering of quantity over quality, attainment of efficiency, creation of predictability, and reducing much of our life experience to a coldly calculated "value." As one reads further and takes in the diverse landscape of specific illustrations for these trends, one begins to see the "McDonaldized" influence everywhere. Then too, one will also grasp why so many of us are complaining about the demise of free time in our lives, and how we have become unwitting captives of mindless inertia of "I want it fast, I want it now, I want what's next" mentalities. Just another issue and dimension of

Monday, November 18, 2019

Human Behaviors in Budgeting Essay Example | Topics and Well Written Essays - 2000 words

Human Behaviors in Budgeting - Essay Example A budget can deliver a criterion where employees are encouraged to achieve their targets under certain conditions. Conversely, budget can also inspire disorganization and conflict between employees or managers. If people are dynamically involved in developing budget, then it can be used as a device to support managers in handling their branches effectively. Budget can be a useful device for motivating people but if budget is developed from top level and enforces a threat for employees it can be resisted and will cause harm to the organization (Drury, 2007). Objectives of Budgeting Through budget, organizations can regulate the actions of different divisions. An effective budgetary system can act as a comprehensive control system for organization if there are certain implied or apparent links between budgetary processes and organizational rewards (Flamholtz, 1983). Budgeting comprises of creating specific targets, implementing strategies to accomplish the targets, and occasionally mat ch actual status with the targets. The targets can be general business objectives and particular goals for the individual divisions within organization. Budget provides a way for business by drawing the strategies of the operations in financial expressions. Budget helps organizations to direct activities and decreases the negative results (Warren & Et. Al., 2011). Though budgets are usually related with profit, they also play significant parts in operating several divisions of government. For instance, budgets are useful tools for managing finance for education and ration in rural areas. Budgets are also used in non-profit organizations such as public hospitals and cathedrals among others. Budget comprises of three activities which are planning, directing and controlling. Before planning the budget, it is important for organizations to forecast the amount of budget. The forecasting is often developed by considering the conclusions of past outcomes. Several statistical approaches are used for forecasting budget. The planning phase is comprised of forming specific objectives for future actions. It is a part of management process. Directing is the activity for satisfying the planned actions and controlling is periodically judging the progress of activities with the planned actions (Warren, 2008). Human Behavior in Budgeting Budget can have substantial effect on human behaviour. Budget can stimulate managers for developing their performance; adversely it can also de-motivate from putting extra effort and flatten the self-esteem of managers (Kimmel & Et. Al., 2010). The behavioural problems or dysfunctional consequences can arise from budgeting in three conditions which are: 1. The goal of budget is unattainable 2. The goal of budget is too simple to accomplish 3. The goal of budget disagrees with the goals of employees Unattainable goals: Employees will be de-motivated if performance expectations set by the managers are impractical or unattainable. An aggressive a nd achievable goal can probably motivate employees to accomplish the organizational objectives. Thus, employees should be engaged in

Friday, November 15, 2019

The Basics Of Opnet It

The Basics Of Opnet It In this lab we have followed the instructions that were given in the tutorial from the help menu. We built two networks as the first network that which is having 30 nodes and an internet server those are connected with Optical Fibre cables, and the second network that is having 15 nodes and it was connected to the first network with Optical fibre as well. And we will observe the results like LOAD and DELAY for the first network and We will repeat the same after connecting the second network to the same router. And we can observe in the graphs. Comparisons and review of the networks: All the circuit is been built by placing two networks one in first floor and second in the other floor. And we can observe it in the graph clearly. Figure 1 Both the networks in both first and second floors By the below figure we can notice the delay and Load on the server. When it was not connected to the second network the DELAY and LOAD are as shown in the figure Figure 2 Ethernet Delay (in sec) and Ethernet load (bits/sec) on the server node When the delay is observed in the server there is considerable delay , because server can receive all these nodes at the same time but the nodes are above the limit then there is a chance of delay in the server. Figure 3 This is the compared result of delay between First floor and expansion When the delay is observed in the server there is LOAD, According to this analysis we can say that the distance increased in the network can increase the load . As well as the more number of nodes also increases the load on server. Figure 5 this is the load (bit/sec) for First floor and expansion Conclusion: After this lab we can learn the basics of the OPNET IT GURU .I faced some problems with the terminology and with registration of the softwares whiles installing .This lab helped me in designing the small networks and linking them and comparing the results especially the load and delay Lab 5_ATM ASYNCHRONOUS TANSFER MODE A Connection-Oriented, Cell-Switching Technology Introduction: The goal of this lab is to analyse and examine the effect of Asynchronous Transfer Mode ATM adaptation layers and service classes on the performance of the network. There are different layers such as AAL that will discuss in this lab and will provide five service classes that can give a lot of useful information. Objective: To examine the effect of Asynchronous Transfer Mode ATM. And provide QoS capabilities through its five service classes: CBR, VBR-rt, VBRnrt, ABR, and UBR. With CBR (constant bit rate). And support all sorts of services, including voice, video, and data by using ATM. To study how the choice of the adaptation layer as well as the service classes can affect the performance of the applications. Procedure: As given in the manual create a new project after completing configured the network; initialized the network, configured the applications, followed by profiles were done. While in the subnets part first configure northeast subnet was completed and add remaining subnets was added. After that choose the statistics was tested and configure the simulation was fixed. Next duplicate the new scenario was duplicated and name it UBR_UBR. Finally run the simulation was run and the view results and analyse. Figure 1 this the CBR_UBR scenario Figure 2 this the design of north east subnet Figure 3 4 indicate the run simulation. Figure 3 Figure 4 View the Results Figure 5 this is the voice diagram that indicate the different delay between the CBR and UBR Questions and Answers 1) Analyse the result we obtained regarding the voice Packet Delay Variation time. Obtain the graphs that compare the Voice packet end-to-end delay, the Email download response time, and the FTP download response time for both scenarios. Comment on the results. Sol When we observe the voice packet delay variation in the above shown figure 5, it indicates the UBR makes delay for voice because of the service class as UBR is using for all applications for ATM Adaption layer AAL5 . While CBR is using AAL2 and we can observe a very smooth service. So we can say that CBR service class is good for Voice applications and UBR service class is good for EMAIL and FTP applications. Figures 6, 7 8 show the graph which compares the Voice packet end-to-end delay ,the Email download response time, and the FTP download response time for both scenarios. Figure 6 in Voice Packer End_ to End Delay (sec) Figure 7 Email Download Response Time (sec) Figure 8 the FTP Download Response Time (sec) By the voice packet end to end indicates that the CBR service is having higher quality when compared to UBR service. By Email download response time when compared responses from both the scenarios. From FTP responses when observed UBR_UBR the responses are beter when compared to CBR_UBR scenario. So as stated before from his graphs UBR is good for Email and FTP but not good for Voice, CBR service is good for Voice. 2) Create another scenario as a duplicate of the CBR_UBR scenario. Name the new scenario Q2_CBR_ABR. In the new scenario you should use the ABR class of service for data, i.e., the FTP and Email applications in the data stations. Compare the performance of the CBR_ABR scenario with that of the CBR_UBR scenario. Hints: To set ABR class of service to a node, assign ABR Only to its ATM Application Parameters attribute and ABR only (Per VC Queue) to its Queue Configuration (one of the ATM Parameters). For all switches in the network (total of 6 switches), configure the Max_Avail_BW of the ABR queue to be 100% and the Min_Guaran_BW to be 20%. Sol Figure 9, the delay variation for both CBR_UBR and Q2_CBR_ABR is similar that means ABR and CBR services are good quality service that uses for voice. Figure 9 this diagram of voice that indicates the delay variation Figure 10, the down load for CBR service is more than ABR service. Figure 10 this is time average for email Figure 11, CBR and ABR services are having same FTP download response time. Figure 11 FTP 3) Edit the FTP application defined in the Applications node so that its File Size is twice the current size (i.e., make it 100000 bytes instead of 50000 bytes). Edit the EMAIL application defined in the Applications node so that its File Size is five times the current size (i.e., make it 10000 bytes instead of 2000 bytes). Study how this affects the voice application performance in both the CBR_UBR and UBR_UBR scenarios. (Hint: to answer this question, you might need to create duplicates of the CBR_UBR and UBR_UBR scenarios. Name the new scenarios Q3_CBR_UBR and Q3_UBR_UBR respectively.) Sol: When we decrease the size of the file the QoS will improve, as the traffic congestion will decrese as in fig.13 and 14, the delay of voice time variation is same and the time average voice packet end to end is also same. And we can say as the decreasing of packet size can decrease traffic congestion. Figure 12 Figure 13 Figure 14 Concolusion: After this lab analysing the of Asynchronous Transfer Mode (ATM), and ATM adaption layers and service classes and their effect on the performance of the network. And it taught me how to deal with different layers like ATM adaption layers(AAL). Laboratory_6 (RIP) RIP: Routing Information Protocol Objective: In this lab we can analyze and configure the Routing Information protocol. R.I.P Overview: Router has to check the packets destination address and determine which output ports is the best choice to the address. By seeing the forwarding table router do the decision. And these algorithms are needed to build routing tables and the forwarding tables. Basic problem of the routing to find the lowest-cost path between two nodes, Where the cost of a path equals to the sum of costs of all edges that make the path. In this laboratory, we will build a network that utilizes RIP as its routing protocol. We will examine the routing tables generated in the routers, and also check that how RIPS is affected by link failures. Procedure: At the first the scenario named as NO_Failure was created. Network was build by using ethernet4_ slip8_gtwy and 100BaseT_LAN objects along with bidirectional 100BaseT_LAN links. After completion router configuration, remaining LANs were added. Then the statistics were chosen to realize the performance of the RIP protocol. Then simulation process was performed. The designed figure is given below : Figure-1 RIP Network (No_Failure) And we have to design a Failure scenario for that duplicate the of scenario 1, with inclusion of link node failure simulations as shown in figure-2. Figure-2 Rip Network (Failure) And after editing the attributes , which develop a link failure between Router 1 and Router 2. Then simulation process was performed. Figure-3 Comparison of number of updates in failure and No_Failure scenario. The above figures shows the number updates those are sent by the router to its routing table and when there is a failure to any other node connected to it as compared to the situation when there is no failure in any of the link. From the obtained graphs we can observe that for NO_Failure the number of updates decrease from 13 to 4 with time by approximately , because the routing table has already gathered information about neighboring nodes and after that only the information is updated that means updates being sent are less. The scenario is similar for failure in starting, but with time when the router senses link failure it again starts updating information in its routing table, the intensity of which is a little bit less then the time when it sensed the failure. RIP Trafic in No_Failure and Failure scenarios Figure-4 Comparison of RIP traffic sent in Failure and NO_Failure. Figure-5 Comparison for RIP sent traffic in failure and No Failure Scenarios. The above two graphs shows the comparison of RIP sent traffic in Failure and No_failure scenario. The above graphs the first represents overlaid comparison and second one is stacked comparison. The failure introduced into the RIP system changes the traffic sent signals and also the traffic received signals. Conclusion: By observing the results we can say that both No_failure and Failure scenarios are having different results and as the time taken for updating the Routing Information protocol is more for Failure scenario compared to NO_Failure scenario .Because the system require acknowledgement and discard the packet and resend it that takes lots of time to updating LAB 7_OSPF: Open Shortest Path First A Routing Protocol Based on the Link-State Algorithm Introduction: This lab lets us to know the working method of OSPF(Open Shortest Path First Protocol). By some analysis and steps in order to know more about this. Aim: To introduce the Open Shortest Path First (OSPF) routing protocol. And analyse the performance of the Open Shortest Path First (OSPF) routing protocol. Then set up a network that utilizes OSPF as its routing protocol. Analyse the routing tables generated in the routers. And observe how the resulting routes are affected by assigning areas and enabling load balancing. Procedure: By following the steps in the maual we can create the new project is done as we can see in the figure 1 Figure 1 create a new scinario After Creating, Configure the Network, Initialize the Network, Configure the Link Costs, Traffic Demands and figure the Routing Protocol and Addresses were completed. After that Configure the Simulation was the obtained results of the run was put it in the figure 2 3. Figure 2 run three simulation Figure 3 the result of simulation After getting the simulation result duplicate the present scenarios (Areas and Balanced Scenarios) and observe the results as shown in the figures 4,56 Results Figure 4 No_Areas Scenario paths from router A to router C Figure 5 No_Areas Scenario paths from router B to router H Figure 6 Area scenario Figure 7 the Balanced Scenario Answer the Question 1) Explain why the Areas and Balanced scenarios result in different routes than those observed in the No_Areas scenario, for the same pair of routers. Sol As the A and C router link is created as a traffic congestion in No_Areas, the packets go to other shortest path A,D,E and C are smaller as compared to A and C. And the cost is also more for A and C when compared to A,D,E and C , those are like 15 for A,D,E and C and A and C is 20.By OSPF protocol the shortest path is chosen. As the loop back interface allows a server and client to communicate on same host by using TCp/Ip the traffic packets between router A and C in the Areas scenario are expanded ,the packet will pass through link router A and C.And as per the load building option the Path cost for A,C,E,G and H and path cost for B,A,D,F and H are equal, So the packet may choose any one. 2) Using the simulation log, examine the generated routing table in Router A for each of the three scenarios. Explain the values assigned to the Metric column of each route. Hints: Refer to the View Results section in Lab 6 for information about examining the routing tables. You will need to set the global attribute IP Interface Addressing Mode to the value Auto Addressed/Export and rerun the simulation. To determine the IP address information for all interfaces, you need to open the Generic Data File that contains the IP addresses and associated with the scenarios. sol No_Areas Campus Network.RouterA,Campus Network.RouterC,163.64,0,RouterA > RouterC,Campus Network.RouterA, Network.RouterA RouterD,Campus Network.RouterD,Campus Network.RouterD RouterE,Campus Network.RouterE,Campus Network.RouterE RouterC Campus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB > RouterH,Campus Network.RouterB,Campus Network.RouterC RouterB,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterG RouterE,Campus Network.RouterG,Campus Network.RouterH RouterG Campus Network.RouterC,Campus Network.RouterA,169.09,2,RouterC > RouterA,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterD RouterE,Campus Network.RouterD,Campus Network.RouterA RouterD Campus COMMON ROUTE TABLE snapshot for: Router name: Campus Network. (Router A) at time: 600.00 seconds ROUTE TABLE contents: Dest. Address Subnet Mask Next Hop Interface Name Metric Protocol Insertion Time 192.0.1.0 255.255.255.0 192.0.1.1 IF0 0 Direct 0.000 192.0.3.0 255.255.255.0 192.0.3.1 IF1 0 Direct 0.000 192.0.4.0 255.255.255.0 192.0.4.1 IF2 0 Direct 0.000 192.0.12.0 255.255.255.0 192.0.12.1 Loopback 0 Direct 0.000 192.0.13.0 255.255.255.0 192.0.3.2 IF1 20 OSPF 36.496 192.0.11.0 255.255.255.0 192.0.1.2 IF0 35 OSPF 36.496 192.0.14.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.10.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.17.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.2.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.6.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.7.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.15.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.8.0 255.255.255.0 192.0.1.2 IF0 25 OSPF 36.496 192.0.19.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.9.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.16.0 255.255.255.0 192.0.1.2 IF0 5 OSPF 36.496 192.0.5.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.18.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 Areas scenario Campus Network.RouterA,Campus Network.RouterC,163.64,0,RouterA > RouterC,Campus Network.RouterA,Campus Network.RouterA RouterC Campus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB > RouterH,Campus Network.RouterB,Campus Network.RouterC RouterB,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterG RouterE,Campus Network.RouterG,Campus Network.RouterH RouterG Campus Network.RouterC,Campus Network.RouterA,169.09,2,RouterC > RouterA,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterD RouterE,Campus Network.RouterD,Campus Network.RouterA RouterD COMMON ROUTE TABLE snapshot for: Router name: Campus Network. Router A at time: 600.00 seconds ROUTE TABLE contents: Dest. Address Subnet Mask Next Hop Interface Name Metric Protocol Insertion Time 192.0.1.0 255.255.255.0 192.0.1.1 IF0 0 Direct 0.000 192.0.3.0 255.255.255.0 192.0.3.1 IF1 0 Direct 0.000 192.0.4.0 255.255.255.0 192.0.4.1 IF2 0 Direct 0.000 192.0.12.0 255.255.255.0 192.0.12.1 Loopback 0 Direct 0.000 192.0.16.0 255.255.255.0 192.0.1.2 IF0 5 OSPF 36.496 192.0.2.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.5.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.18.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.9.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.10.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.17.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.13.0 255.255.255.0 192.0.3.2 IF1 20 OSPF 36.496 192.0.11.0 255.255.255.0 192.0.4.2 IF2 40 OSPF 36.496 192.0.3.2 IF1 40 OSPF 36.496 192.0.14.0 255.255.255.0 192.0.4.2 IF2 20 OSPF 36.496 192.0.6.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.7.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.19.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.8.0 255.255.255.0 192.0.1.2 IF0 25 OSPF 36.496 192.0.15.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 39.238 Balanced scenario Campus Network.RouterA,Campus Network.RouterC,163.64,0,RouterA > RouterC,Campus Network.RouterA,Campus Network.RouterA RouterD,Campus Network.RouterD,Campus Network.RouterD RouterE,Campus Network.RouterE,Campus Network.RouterE RouterC Campus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB > RouterH,Campus Network.RouterB,Campus Network.RouterC RouterB,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterG RouterE,Campus Network.RouterG,Campus Network.RouterH RouterG Campus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB > RouterH,Campus Network.RouterB,Campus Network.RouterA RouterB,Campus Network.RouterA,Campus Network.RouterA RouterD,Campus Network.RouterD,Campus Network.RouterD RouterF,Campus Network.RouterF,Campus Network.RouterF RouterH Campus Network.RouterC,Campus Network.RouterA,169.09,2,RouterC > RouterA,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterD RouterE,Campus Network.RouterD,Campus Network.RouterA RouterD COMMON ROUTE TABLE snapshot for: Router name: Campus Network. Router A at time: 600.00 seconds ROUTE TABLE contents: Dest. Address Subnet Mask Next Hop Interface Name Metric Protocol Insertion Time 192.0.1.0 255.255.255.0 192.0.1.1 IF0 0 Direct 0.000 192.0.3.0 255.255.255.0 192.0.3.1 IF1 0 Direct 0.000 192.0.4.0 255.255.255.0 192.0.4.1 IF2 0 Direct 0.000 192.0.12.0 255.255.255.0 192.0.12.1 Loopback 0 Direct 0.000 192.0.13.0 255.255.255.0 192.0.3.2 IF1 20 OSPF 36.496 192.0.11.0 255.255.255.0 192.0.1.2 IF0 35 OSPF 36.496 192.0.14.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.10.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.17.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.2.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.6.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.7.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.15.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496 192.0.8.0 255.255.255.0 192.0.1.2 IF0 25 OSPF 36.496 192.0.19.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.9.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496 192.0.16.0 255.255.255.0 192.0.1.2 IF0 5 OSPF 36.496 192.0.5.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 192.0.18.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496 When we observe the tables both No_Area and Balanced are having same tables but they are different in Area scenario. And this occurs by some reasons like no traffic in between A and C and the area identifier ,the path will pass as per the identifier and table will be different . 3) OPNET allows you to examine the link-state database that is used by each router to build the directed graph of the network. Examine this database for Router A in the No_ Areas scenario. Show how Router A utilizes this database to create a map for the topology of the network and draw this map. (This is the map that will be used later by the router to create its routing table.) Hints: To export the link-state database of a router, Edit the attributes of the router and set the Link State Database Export parameter (one of the OSPF Parameters, under Processes) to Once at End of Simulation. You will need to set the global attribute IP Interface Addressing Mode to the value Auto Addressed/Export. This will allow you to check the automatically assigned IP addresses to the interfaces of the network. (Refer to the notes of question 2 above.) After rerunning the simulation, you can check the link-state database by opening the simulation log (from the Results menu). The link-state database is available in Classes _ OSPF _ LSDB_Export. Sol No_Areas Link State Database snapshot for: Router Name: Router A at time: 600.00 [Router Links Advertisements for Area 0.0.0.0] Link state advertisement list size: 8 - LSA Type: Router Links, Link State ID: 192.0.12.1, Adv Router ID: 192.0.12.1 Sequence Number: 47, LSA Age: 3 LSA Timestamp: 22.687 Link Type: Stub Network, Link ID: 192.0.12.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Point, Link ID: 192.0.16.1, Link Data: 192.0.1.1, Link Cost: 5, Link Type: Stub Network, Link ID: 192.0.1.0, Link Data: 255.255.255.0, Link Cost: 5, Link Type: Point-To-Point, Link ID: 192.0.13.1, Link Data: 192.0.3.1, Link Cost: 20, Link Type: Stub Network, Link ID: 192.0.3.0, Link Data: 255.255.255.0, Link Cost: 20, Link Type: Point-To-Point, Link ID: 192.0.14.1, Link Data: 192.0.4.1, Link Cost: 20, Link Type: Stub Network, Link ID: 192.0.4.0, Link Data: 255.255.255.0, Link Cost: 20, LSA Type: Router Links, Link State ID: 192.0.13.1, Adv Router ID: 192.0.13.1 Sequence Number: 49, LSA Age: 3 LSA Timestamp: 24.149 Link Type: Stub Network, Link ID: 192.0.13.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Point, Link ID: 192.0.12.1, Link Data: 192.0.3.2, Link Cost: 20, Link Type: Stub Network, Link ID: 192.0.3.0, Link Data: 255.255.255.0, Link Cost: 20, Link Type: Point-To-Point, Link ID: 192.0.14.1, Link Data: 192.0.11.1, Link Cost: 20, Link Type: Stub Network, Link ID: 192.0.11.0, Link Data: 255.255.255.0, Link Cost: 20, LSA Type: Router Links, Link State ID: 192.0.14.1, Adv Router ID: 192.0.14.1 Sequence Number: 50, LSA Age: 3 LSA Timestamp: 24.149 Link Type: Stub Network, Link ID: 192.0.14.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Point, Link ID: 192.0.12.1, Link Data: 192.0.4.2, Link Cost: 20, Link Type: Stub Network, Link ID: 192.0.4.0, Link Data: 255.255.255.0, Link Cost: 20, Link Type: Point-To-Point, Link ID: 192.0.18.1, Link Data: 192.0.10.1, Link Cost: 5, Link Type: Stub Network, Link ID: 192.0.10.0, Link Data: 255.255.255.0, Link Cost: 5, Link Type: Point-To-Point, Link ID: 192.0.13.1, Link Data: 192.0.11.2, Link Cost: 20, Link Type: Stub Network, Link ID: 192.0.11.0, Link Data: 255.255.255.0, Link Cost: 20, LSA Type: Router Links, Link State ID: 192.0.17.1, Adv Router ID: 192.0.17.1 Sequence Number: 52, LSA Age: 4 LSA Timestamp: 24.239 Link Type: Stub Network, Link ID: 192.0.17.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Point, Link ID: 192.0.16.1, Link Data: 192.0.2.2, Link Cost: 5, Link Type: Stub Network, Link ID: 192.0.2.0, Link Data: 255.255.255.0, Link Cost: 5, Link Type: Point-To-Point, Link ID: 192.0.19.1, Link Data: 192.0.6.1, Link Cost: 10, Link Type: Stub Network, Link ID: 192.0.6.0, Link Data: 255.255.255.0, Link Cost: 10, Link Type: Point-To-Point, Link ID: 192.0.15.1, Link Data: 192.0.7.2, Link Cost: 10, Link Type: Stub Network, Link ID: 192.0.7.0, Link Data: 255.255.255.0, Link Cost: 10, LSA Type: Router Links, Link State ID: 192.0.15.1, Adv Router ID: 192.0.15.1 Sequence Number: 51, LSA Age: 5 LSA Timestamp: 24.239 Link Type: Stub Network, Link ID: 192.0.15.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Point, Link ID: 192.0.17.1, Link Data: 192.0.7.1, Link Cost: 10, Link Type: Stub Network, Link ID: 192.0.7.0, Link Data: 255.255.255.0, Link Cost: 10, Link Type: Point-To-Point, Link ID: 192.0.19.1, Link Data: 192.0.8.1, Link Cost: 10, Link Type: Stub Network, Link ID: 192.0.8.0, Link Data: 255.255.255.0, Link Cost: 10, LSA Type: Router Links, Link State ID: 192.0.19.1, Adv Router ID: 192.0.19.1 Sequence Number: 129, LSA Age: 5 LSA Timestamp: 27.687 Link Type: Stub Network, Link ID: 192.0.19.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Point, Link ID: 192.0.17.1, Link Data: 192.0.6.2, Link Cost: 10, Link Type: Stub Network, Link ID: 192.0.6.0, Link Data: 255.255.255.0, Link Cost: 10, Link Type: Point-To-Point, Link ID: 192.0.15.1, Link Data: 192.0.8.2, Link Cost: 10, Link Type: Stub Network, Link ID: 192.0.8.0, Link Data: 255.255.255.0, Link Cost: 10, Link Type: Point-To-Point, Link ID: 192.0.18.1, Link Data: 192.0.9.2, Link Cost: 5, Link Type: Stub Network, Link ID: 192.0.9.0, Link Data: 255.255.255.0, Link Cost: 5, LSA Type: Router Links, Link State ID: 192.0.16.1, Adv Router ID: 192.0.16.1 Sequence Number: 130, LSA Age: 3 LSA Timestamp: 27.688 Link Type: Stub Network, Link ID: 192.0.16.1, Link Data: 255.255.255.0, Link Cost: 0, Link Type: Point-To-Po

Wednesday, November 13, 2019

Abigail Adams and How She Shaped the Role of Women in American History

Almost everyone’s heard of her, there have been numerous books written about her, several thousand letters accounted for that she wrote. She was also the wife of the second president and the mother to the sixth American president, who was this woman? She was Abigail Adams. Abigail Adams life didn’t acquire meaning solely from knowing and being around these two great men however, Adams was eminently worth knowing as an individual herself. Throughout the ages, women have always been involved in war but Abigail Adams brought a new concept to women and war with her involvement in the early colonial years and the American Revolution. Abigail Adams did many things in her lifetime but the questions I will be attempting to answer is how exactly did she impact the Revolutionary War and change the social roles of women in such a male dominated society. First and foremost, some basic knowledge on the early years and the foundation of Adam’s life are imperative to the understanding of Abigail Adams and how she grew into becoming the women she did. Abigail Adams was born Abigail Smith in a church in Weymouth, Massachusetts on November 11, 1744. Adams’s parents were William Smith, a liberal Congregational minister and her mother Elizabeth Quincy was of a prominent political family at the time. Abigail was the second born of four siblings, one brother and three sisters, their family faith was Congregational. The Adams’s were an active family in throughout the community and involved in the politics of the time. A majority of Adams’s younger days consisted of corresponding with family and friends and reading. Her childhood and young adult life didn’t involve much singing, dancing or card playing as young women typically participated in... ... Thoughts Life and Letters of Abigail Adams Gelles, Edith B. First Thoughts: Life and Letters of Abigail Adams . New York, New York: Twayne Publishers, 1998. Dearest Friend: A life of Abigail Adams Withey, Lynne. Dearest Friend: A Life of Abigail Adams. New York, New York: Free Press Division of Macmillan Publishing Co., Inc., 1981. Abigail Adams - A Life Holton, Woody. Abigail Adams - A Life. New York, New York: Free Press A Division of Simon & Schuster Inc., 2009. Patriotism and the Female Sex, Abigail Adams and the American Revolution Skinner Keller, Rosemary. Patriotism and the Female Sex: Abigail Adams and the American Revolution. Brooklyn, New York: Carlson Publishing Inc., 1994. Abigail Adams, An American Women Akers, Charles. Abigail Adams, An American Women. Toronto, Canada and Boston, Massachusetts: Little Brown and Company, 1980.