Sunday, May 24, 2020

I Am Tourist - 1512 Words

The poem I Am Tourist deals with the meaning and significance of tourism; particularly focussing on the modern take on what is a tourist. Adrian Mitchell presents the point of a ignorant tourist, and shows their lack of connection to the foreign land through the use of various literacy techniques such as imagery. The poems purpose is to let us witness the typical touristss shallow mindset, lack of respect to the culture and misplacing of priorities. It is written in first person narrative which makes us, the readers feel as though it is a personal experience; which to some extent it is. We can all relate as we have either been the tourist ourself or have observed characters like the poem described who have ventured abroad. The†¦show more content†¦We can all relate as we have either been the tourist ourself or have observed characters like the poem described who have ventured abroad. The poem I Am Tourist deals with the meaning and significance of tourism; particularly focussing on the modern take on what is a tourist. Adrian Mitchell presents the point of a ignorant tourist, and shows their lack of connection to the foreign land through the use of various literacy techniques such as imagery. The poems purpose is to let us witness the typical touristss shallow mindset, lack of respect to the culture and misplacing of priorities. It is written in first person narrative which makes us, the readers feel as though it is a personal experience; which to some extent it is. We can all relate as we have either been the tourist ourself or have observed characters like the poem described who have ventured abroad. The poem I Am Tourist deals with the meaning and significance of tourism; particularly focussing on the modern take on what is a tourist. Adrian Mitchell presents the point of a ignorant tourist, and shows their lack of connection to the foreign land through the use of various literacy techniques such as imagery. The poems purpose is to let us witness the typical touristss shallow mindset, lack of respect to the culture and misplacing of priorities. It is written in first person narrative which makes us, the readersShow MoreRelatedI Am A Tourist Guide At St. Michael s Cathedral886 Words   |  4 PagesWith Love and Squalor Amelia He When I boarded the afternoon flight for Vancouver, my total outfit consisted of a small carry-on bag, a North Face rain jacket, and a black leather snap purse containing my ticket, passport, wallet, and a folded paper with my residential address on West Mall Street. It was early September. I was at the ripe age of seventeen, bright, timid, and full of the foolish illusions of youth. A gush of tears at my mother’s farewell wave, a touch in the throat when the planeRead MoreWhat I Learned About My Life2536 Words   |  11 PagesI knew I forgot to do something yesterday. The feeling had followed me like a shadow all day long, but by the time that I closed my eyes with the moon’s light all too visible through the thick gaps of my window’s shades, I thought it to be simple paranoia leftover from finally finishing high school. Now that I’m two feet away from Miss Mariam’s back gate, however, I suddenly realize what I was supposed to do. I was supposed to drop off that pie to the new neighbor. It’s all coming back to me nowRead MoreSymbolism Of Symbolism In Shakespeares Romeo, Venice950 Words   |  4 Pagestwo star crossed lovers could make an array of bricks a must-see tourist attraction for miles. Of all the hope and love I stand for, I remain a symbol of my home Verona, Italy. I, Juliets Wall, am known for my Shakespearean origin, my deteriorating sides, the organization who responds to letters, and my symbolism of hope for lovers. I was built in 12th century Italy, it is a small country with a rich history and large tourist appeal. It is imperceptibly larger than the U.S. state Arizona andRead MoreMy Cultural Identity1115 Words   |  5 PagesI may look a typical Starbucks loving white girl to people but I am more than that, Culturally and ethnically. My cultural identity is defined by the community which I reside in and the people that belong to it. I am seen differently in the different places I have been to. I am seen very differently here in Hawaii where I live compared to in Japan or on the continental US. Cultural identity to me is a vast term used by every individual to define their own culture. I haven’t really thought about howRead MoreRapid Growth for Hong Kongs Service Industry Under Globalization1079 Words   |  4 Pagesto get an opportunity to work into the service industry, especially for part time. During the previous semester break, I was employed by a Hong-Kong Tea House Restaurant as a part-time Crew. I was responsible in serving my customers. And this report is talking about the conflict with my customer. It contains three parts. Firstly, I would briefly describe the conflict. Secondly, I would analyze the possible causes of the conflict. And lastly, there is a self-reflection on my communication skills andRead MoreA Small Place by Jamaica Kincaid1389 Words   |  6 PagesA Small Place by Jamaica Kincaid presents the hypothetical story of a tourist visiting Antigua, the author’s hometown. Kincaid places the reader in the shoes of the tourist, and tells the tourist what he/she would see through his/her travels on the island. She paints a picturesque scene of the tourist’s view of Antigua, but stains the image with details of issues that most tourists overlook: the bad roads, the origin of the so-called native food, the inefficiency of the plumbing systems in resortsRead MorePersonal Statement : Mai Nguyen Tran1216 Words   |  5 PagesStateme nt I still remember the last time back in 6th grade when I was holding onto a banana that two French tourists handed to me as I stood outside of Nguyen Tri Phuong middle school waiting for my parents to pick me up...I could still remember that sense of mesmerizing curiosity upon seeing people who were different from me†¦Having grown up in Hanoi, a very homogenous place where tourists scarcely come and where everyone I saw has black eyes, black hair, and similar skin complexion, I was alwaysRead MorePersonal Narrative Essay - Original Writing949 Words   |  4 PagesPersonal Narrative I am at room in a very spacious hotel with beautiful ambience and a relaxed atmosphere, far away from the hustles and bustles of this world. And as i could visualize an endless wilderness and say; â€Å"it’s in middle of nowhere†, so is this locational description of this hotel. What I now know though, is that it’s at the periphery of our Narok County, deep at the Maasai Mara, Kenya. The hotel usually visited by the high and mighty of this world: Hollywood movie producers, renownedRead MoreMy Final Culture Project : Puerto Rico1233 Words   |  5 PagesFor my final culture project, I decided to take a trip to the beautiful island of Puerto Rico. Puerto Rico is a commonwealth of the United States, therefore, passports are not needed when traveling to and from the island. It is located in the northeastern Caribbean Sea and sits east of the Dominican Republic and West if the U.S. Virgin Islands. Spanish is the primary language in Puerto Rico, however, most Puerto R icans almost speak English. These two languages are both official languages of PuertoRead MoreTourism s Benefits Of Tourism921 Words   |  4 PagesTourism Cares Scholarship Essay – Kathleen Lo â€Å"So you want to be a travel agent?† This is a question I am frequently asked when I tell people I am studying tourism. Tourism affects almost every industry, from land development to fishing, from recreation to hospitality. Interestingly enough, very few people understand what a career in tourism actually involves. Not only is it a vital source of income for many stakeholders, tourism has the potential to impact virtually everyone. Furthermore, it involves

Wednesday, May 13, 2020

Japan And The Jewish People - 2202 Words

Although much research has taken place on the involvement of Japan in WWII, only limited research has been conducted into the connection between Japan and the Jewish people who were being prosecuted at the time. This paper aims to produce further acknowledgement and understanding of the history of the Jewish people in Japan, as well as give a different perspective on Japanese views and ideas of the period and strive to correct any misconceptions that may be strongly held since Japan’s defeat in 1945. Throughout Japan’s history, foreigners have been regarded with alternating reverence and contempt, as benevolent gods and threatening demons (Goodman and Miyazawa, 1995). So substantial was this ambivalence that it evolved into a major feature of Japanese religion, whose deities are often interpreted as ‘visitors from afar’ (Goodman and Miyazawa, 1995). These deities would be waited upon until they could give their blessings to the Japanese people, and would th en be ushered away. Japanese attitudes towards the Jews and foreigners in general have always followed this basic pattern, even in the present day. Foreigners are seen as visitors to be admired and revered or criticized and expelled depending on the fluctuating needs of Japan (Goodman and Miyazawa, 1995). In 1635, fearing a military conquest by foreign powers, Japan expelled most missionaries, traders and foreigners and began a period of isolation, Sakoku, that would last more than 200 years. However during this supposedShow MoreRelatedThe Second Example Of The Benefits Of Military Intervention1365 Words   |  6 PagesThe second example of the benefits of military intervention is shown during World War II which started in 1931 when Japan Invaded Manchuria. The War involved virtually every part of the world, split up into two groups, the Axis, and the Allies. The Axis consisted of Germany, Italy, and Japan, and the Allies consisted of France, Great Britain, the United States, the Soviet Union, and China. During this time Germany was under the power of dictator Adolf Hitler, who was determined to invade and occupyRead MoreEssay about Adolf Hitler: The Invasion of Poland575 Words   |  3 Pagesgroup called the Nazis. He convinced those men that Jewish people had ruined the world and caused Germanys downfall after World War One. They were also against people like gypsies, criminals, or anyone they thought were undesirable. Soon after the Germans started, Japan and Italy joined to help their cause. As the war went on the Nazi party grew bigger and stronger and countries started fighting back, but the Nazis were to strong. Then one day Japan bombed Pearl Harbor and just like that AmericansRead MoreThe Manhattan Project Essay545 Words   |  3 Pagesuranium atom, which made people be scared of what Hitler might be capable of. Also Hitler and his people had begun discovering new types of weapons that were useful for them in the war. Something that apparently Hitler did not quite think about, was the persecution of Jewish scientists such as Albert Einstein, who could very well use his abilities against Hitler. Albert Einstein was a Jewish refugee in the United States. Another very important scientist, although not Jewish, was Enrico Fermi, whoRead MoreThe War Of World War II1348 Words   |  6 PagesWorld War II was fought between two powers; the axis and the allied powers. The axis powers consisted of Germany, Italy, Japan, Hungary, Romania, and Bulgaria while the allied powers consisted of U.S., Britain, France, USSR, Australia, Belgium, Brazil, Canada, China, Denmark, Greece, Netherlands, New Zealand, Norway, Poland, South Africa, and Yugoslavia. While the United States Armed Forces were deployed in other parts of the world, the ones back home were facing the struggles of a war they had noRead MoreShelby Meyer. Mrs.Cour. Composition. 8 May 2017. Axis Powers.882 Words   |  4 Pagesduring WWII (world war two). The powers were comprised of Germany, Italy, and Japan. They wanted to take over the world. They fought against the Allied Powers, which were basically the rest of the world, a nd they almost won. How? I m about to tell you! A big part of why they got so far was their leaders.Adolf Hitler, Benito Mussolini, and Hideki tojo These men knew how to get what they wanted. They spoke in a way to grab people s attention and make them listen. Together they were able to lead theirRead MoreWwii And The World War II953 Words   |  4 Pagesâ€Å"reparations†. The amount of money required exceeded the financial funding needed in order for German to flourish through the destruction. The treaty ruined the German economy, allowing people to starve, and brought the government to utter chaos. In this deposition a man by the name of Adolf Hitler became the savior of the German people. Allowing Germany to take back what was rightfully theirs before the battles of obliteration. In January of 1933 Hitler is appointed Chancellor of Germany. Without surpriseRead MoreHitler s Death Of World War II1748 Words   |  7 Pagesextreme interest in this party, which changed its name to the Nationalsozialistische Deutsche Arbeiterpartei or NSDAP. Hitler began representing the party and exploiting his views of hatred towards the Treaty of Versailles, politicians, Marxism and Jewish people. Hitler eventually became chairman of the party in 1921. Hitler began making large steps forward in trying to progress the evolution of the Nazi Party and the revolution of Germany. On November 8, 1923, Hitler and his followers stormed a publicRead MoreThe World Of The Holocaust1020 Words   |  5 Pagespart in the war was United States, United kingdom, Japan and Germany. Many lives were loss on both fronts during this conflict. It also launch us into a New age of technology war ware, Which is known as the Nuclear Age. When the first atomic bomb was dropped on two major cities in Japan, it changed the hole out come of war. But never the less we must focus on human life, that which was loss during the time the war was taking form. One race of people who suffered the most was the Jews. The questionRead MoreHow Was The Holocaust Happen?1082 Words   |  5 PagesPowers (Germany, Italy, Japan) and the Allied Powers (Britain, United States, Soviet Union, France). Most of the countries in the world were involved in some way. It was the deadlie st war in all of human history with around 70 million people killed. World War 2 started in 1939 when Germany invaded Poland. Great Britain and France responded by declaring war on Germany. The war in Europe ended with Germany s surrender on May 7, 1945. The war in the Pacific ended when Japan surrendered on SeptemberRead MoreThe Rise Of Adolf Hitler1523 Words   |  7 Pagesand blamed the Marxists. After many rallies and speeches, he was a household name, and one that will be remembered for many years, he is Adolf Hitler. Adolf Hitler was the person behind the holocaust, killing 6 million people, and started World War 2, killing 50 million people in the war. Also, he rose to fame in the late 30s and early 40s in Germany, which soon became Nazi Germany. After Hitler made multiple speeches and rallies, he became Chancellor of Germany. After Adolf Hitler invaded Poland

Wednesday, May 6, 2020

Organizing A Collection Of Cds And Dvds Free Essays

The average CD and DVD collection grows continuously and hence it becomes an important and Herculean task to organize them in a proper manner. Such an arrangement should also result in easy retrieval of the CDs and DVDs when we need them. The first step to follow in organizing a large DVD and CD collection is to buy proper shelving. We will write a custom essay sample on Organizing A Collection Of Cds And Dvds or any similar topic only for you Order Now We need to buy CD notebooks or multiple CD racks and also shelves specifically for DVDs. Next is to decide on the criteria for categorizing the collection. The criteria options are alphabetical arrangement, arrangement based on genre, chronological arrangement etc. Next is to separate the CDs that are not of much concern. New CD cases are to be purchased for those CDs whose cases are damaged or missing. Using multiple levels of shelving can result in a much longer time for retrieval (Associated Content, 2005). Sort the CD and DVD collection according to the criteria chosen. If the collection is very large this sorting can be done in stages to avoid confusion. We may also choose to sub-categorize the collection additionally. For example if we choose to categorize based on the artist then sub-categorizing may be based on the release date or alphabetically based on the title. If our taste in music and movies is very broad we can buy colored electrical tape and designate a particular color to each genre. We could also store all the CD’s in our computer before organizing them, if we have a large drive space and ensure we take regular backups (wikiHow, 2005). Plastic storage units with slots for individual CDs may be used but if we arrange them alphabetically then we need to move hundreds of CDs each time we need to insert a new CD into the collection. We May also choose to arrange less used CDs and DVDs in a notebook rather than putting them in display (eHow, 1999). This will save a considerable amount of storage space. Putting away previously used CDs and DVDs before taking a new one ensures that our collection remains organized. The following criteria could be used for organizing the CDs and DVDs. Alphabetically: We could arrange the CDs in the alphabetical order either by the artist’s name or the title. The movies could be arranged alphabetically based on the title, key actor or the director’s name. This is the most commonly used criteria for arranging the CDs. The downside of this option is the necessity to move all the CDs and DVDs when we buy an album or movie. This scheme can also be combined with other schemes of arrangement like alphabetical with genre etc. Chronologically: This arrangement is based on the order of release or purchase of the CDs and DVDs. We could choose chronological based on album release date, or chronologically by the purchase date or historical era or chronological based on the life stage that could be associated with each album or movie. The movies could be arranged based on the era the content of the movie is based on (Propeller, 2003). By Genre: This type of arrangement is for who have a very large collection and a broad taste in music and movies. We could arrange folk followed by rock and then melody. Similarly in movies we could categorize the collection as horror, action, mystery, comedy, love or make it more specific like Documentary, Zombies etc. If the collection is very large an entire rack could be devoted to each genre (Expert Village, 2008). Most Frequently Used: The albums and movies which are played most are arranged at the front of the pile and those which are not frequently used are arranged behind them. This arrangement makes the most played ones very easier to find. This scheme is also self organizing. Randomly: This is the least used scheme where in the CDs and DVDs are arranged in a random manner (Brunchma, 1997). The other schemes of arrangement also include critical arrangement where the best ones are placed at the beginning and the worst at the end. Arrangements can also be done based on performer’s or composer’s origin, album title, instrumentation, mood and the tempo of the CDs (Propeller, 2003). Bibliography: (2005) Associated Content Available: http://www. associatedcontent. com/article/272550/how_to_organize_a_large_dvd_ collection. html? page=2 Last Accessed: 28 May 2008 (1997) Brunchma Available: http://www. brunchma. com/archives/Forum2/HTML/000270. html Last Accessed: 26 May 2008 (March 1999) eHow Available: http://www. ehow. com/how_2032270_organize-cd-collection. html Last Accessed: 26 May 2008 (2008) Expert Village Available: http://www. expertvillage. com/video/370_organize-cds. htm Last Accessed: 25 May 2008 (2003) Propeller Available: http://music. propeller. com/story/2006/11/09/17-ways-to-organize-your-cd-collection/ Last Accessed: 26 May 2008 (January 2005) wikiHow Available: http://www. wikihow. com/Organize-a-Large-CD-Collection Last Accessed: 25 May 2008 How to cite Organizing A Collection Of Cds And Dvds, Papers

Monday, May 4, 2020

Analysis of Network Architecture

Questions: You are required to produce the following deliverables as part of your contract: 1. Analyse the network and enlist all vulnerabilities found. 2. The vulnerabilities identified in the network architecture from (1) above should be explained in detail. 3. Provide recommended improvements to the network architecture in order to harden the entire network and to fix the vulnerabilities identified above. 4. Draw the improved network architecture. 5. Based on a rough estimate of the number of operating devices at the Perth HO and the Port Hedland Offices, as well as the network bandwidth, estimate the network traffic intensity during a given time of the day (approximated in numbers). Is there any bottleneck identified on this link that can be exploited by the adversary for launching a DoS attack? If so, propose a solution for countering this threat. 6. Create a JMeter profile to generate network traffic with intensity calculated in (5) above. 7. Generate the network traffic based on the profile from (6) above. 8. Capture the generated network traffic using Wireshark. (Hint: Run Wireshark on a separate virtual machine from JMeter). 9. Write-up network security policies for the resources of the network (devices and technologies). Do not write access policies for end-users rather define policies appertaining solely to the network architecture. Answers: 1.0 Introduction The days are gone for the individuals thats they need do need to determined anything early with respect to workstations for operating the work and they need to follow the complex work processes that is involves various physical devices for each and every single communication or interaction among their workstations. Even if we look at Two decades ago, IT (Information technology) and Computer networking have changed the way the world operates and how the individuals are fit inside it. The working hours are now not been restricted in firm or a corporate and the area of influence to the environmental location of their workplace. Irrespective of the political lines doing or operating business has become almost independent (Shen, 2013). All the individuals in the enterprise are now looking to be linked up with one another through internet and any other connections they so considered specifically at all location and time period. It has become hugely specialized as far as its functionalities are concern and the concept of the workplace has been completely differs that it is no more a mandatory meeting point for any task that is been done. It is been expected that any individual can perform any task based on their own devices as now a days everyone has one computing device for sure. Considering a scene that everything can be smooth and polished and we have to prepare ourselves to handle such huge amount of vulnerabilities and risks that have come in the same package as technological enhancements. They try to protect by keeping themselves checked every now and then (Xu, 2016). If we look at the requirements of old ages then we can easily put a correspondence or comparison between the network protections. Everything needs to be done in this case such as counter measures for different attacks needs to be put in the areas, regulation of traffic, blocks needs to be drawn up, the different entrance points needs to be checked. To protect such incident there is the only possibility with regular or consistent vigilance and sufficient preparation. 2.0 Solution and Details 2.1 Windows Server 2008 Windows server is one of the operating system from Microsoft and is completely depends on Windows Vista similar code. Windows Vista functionality and architecture is similar with Windows server and when if we review the installation of complete graphical user interface as Windows vista installations as it enhance the ability of server (Dugan Pruski, 2013). The launch of Windows server 2008 was highlight because of including native wireless support and IPv6 support and additionally to an amount of enhancement in general security and pace (speed). A huge amount of capabilities were included in the 2008 version of Windows Server that will assist the network administrator. Server managers, Self-healing NTFS, Failover Clustering, Windows system resource manager, Active Directory, Server core are included. For the domain of 64-bit operating system it is been marked as the entry server for Windows operating systems, moreover all other variations were released in both 64-bit and 32-bit versions (Jani Jbara, 2013). It is capable of supporting the 1TB of memory on 64-bit architecture and 64GB of memory on 32-bit architecture and it is also capable of supporting 32 single physical processor. 2.2 Windows 8 The operating system released by Microsoft is Windows 8 is a sample or attempt to unite and streamline the UI and OS platforms for all its private computing devices that includes cell phone devices. Windows NT family has been included Windows 8 as its part of a family. A huge amount of functionalities in Win-8 were cut down to User interface that is touch screen such as face or picture locking system and PINs for authentication of the user login (Chang, Tsai Chen, 2013). Latest add ups to Win-8 which includes UEFI and Hybrid Boot integration for better and quick startup, which support the close field communication and native support for Universal service bus 3.0 devices. The Win-8 protection functionalities which includes intelligent screen pushing and virus filtering, mainly controls provided by latest system backup options Reset and Refresh, Family Safety and Securing booting to protect boot kits from getting infected the system between other s. There are latest store apps and wins softwares that are provided or launched which streamline the utilization of the OS from the cell phone touch screen devices. 2.3 Windows 10 Win-10 is the new OS (operating system) for private computing applications released and developed by Microsoft. It prolonged on the older concept in win-8 that focuses on combing UI and features available to mobile users and desktop, effectively reducing the difference among the desktop devices and mobile devices and the global private computing applications (Stidley, 2012). Win 10 introduced by global apps are a proper placing up from older metro-style apps that launched Win 8 and its main objective is to process the application code to execute across Win based applications without any modifications. Win 10 launched with more protective functionalities catering to latest requirements and parallel with its mission or objectives of combining all private computing applications. This include various factors of authentication such as enhanced support for authentication related to biometric in the terms of face and iris recognition and permissions through inbuilt cameras and biometric such as fingerprint recognition if supported the fingerprint readers if available (Panek, 2015). The abilities are decoded on the selection versions of Win 10 and that allows the automatic decoding of critical information through various policies and selective rejection of access to decode the information to applications and creating hurdles running of software that is not been signed digitally through a device guard. 2.4 Red Hat Linux It is a Linux distribution that was developed by the organization Red hat and ended in 2014. It is recognize to be the first distribution in Linux to utilize the RPM package manager that is been developed originally for use with RED HAT LINUX but adapted lately and utilized many distributions in Linux. The Version 3.0.3 of RHL (Red Hat Linux) was also the first distribution Linux to support the linkable format and executable as divergent to the a.out format used by the older and other variations (Whitaker et al., 2016). It also launched such functionalities as Anaconda, it is a graphics installer which is user-friendly to use for Linux novices and have the ability of configuring firewalls and Lokkit. After the rejection was done, the Fedora assignment was included with RHEL (Red Hat Enterprise Linux) creation, thus providing the lift up to the Open source and Fedora free OS (Operating System). 2.5 Apache The most widely used web service in the world is Apache. The creation of Apace is conducted by an open source community of various developers under the foundation of the ASF (Apache Software Foundation) and at its core, the servers of apache as on HTTP daemon and as an HTTP server, but an amount of another functionalities has been included on to in the form of modules that are compiled which extended this common functionality (Minasi et al., 2013). Basic language user interface supports included Perl, Tcl, PHP and Python. Another functionality which includes SSL (Secure Sockets Layer), filtering support and a URL Rewriting module, Transport Layer Security support and so on so forth. It usage an open-source interruption and prevent modules called ModSecurity. It also provides the supports services of virtual hosting to allow an individual apache installation to handle different websites. Digital certificate authentication and password authentication are some of the authentication methods available (Tidro, Boyce Shapiro, 2015). It does not integrate in a individual architecture and does provide the support MPM (Multi Processing Modules) thus allow it to run in any one of the three different modes such as threat or process hybrid, event hybrid and process based. So here the right choice of MPM allows the Apache to be optimized for various architectures. Other recognition functionalities of apache which includes bandwidth throttling, gzip decompression and compression, IPv6 compatibility, Reverse Proxy functionality, custom logging and HTTP/2 protocol support. 2.6 MS Exchange Server It is a calendaring application as well as mail server which is been developed by Microsoft for executing exclusively on the line of operating systems of Windows Server (Chang, Tsai Chen, 2013). The actual version of this application or software was an inner mail server which is been used by Microsoft and the new versions of the application or software was launched for the basic or general utilization in the month of Oct, 2015. A huge amount of different versions of the Server Exchange has been launched over the years and it has been listed as Exchange Server 4.0, Exchange Server 5.0, Exchange Server 5.5, Exchange Server 2000, Exchange Server 2003, Exchange Server 2007, Exchange Server 2010, Exchange Server 2013, and Exchange Server 2016. The most recognizable functionality of the Exchange server of MS role is in clustering. Moreover the server exchange gives failover clustering for the exchange service, there is a individual point of rejection in the Exchange data as all the connecters in the cluster are expected to transmit the same information while using Exchange server MS (Zhu, Yang Lovinger, 2014). There are many issues that were recognized by the 2007 Exchange server, but not rely on the manufactures of storage and not fully eliminated and individual software suppliers to give the asynchronous and geo-clustering data replications to rectify the problem. 2.7 IEEE 802.11 This is bunch of basic issues and maintained by the IEEE (Institute of Electrical and Electronics Engineers) MAN/LAN regular committee for accessing media controls and physical layer terms. The rules apply to WLAN (Wireless Local Area Network) over the 60 GHz, 2.4 GHz, 5 GHz, 3.6 GHz, 900 MHz frequency bands. The brand Wi-Fi of products with respect to networking is based upon IEEE 802.11 standards. The different revisions to the standards that are 802.11a, 802.11b, 802.11a, and so on so forth, remove the older versions of the standard so as to include them and the standard stated only by the new revision. Moreover, the marketplace uses various revisions as single standards to particular abilities of their services and products. The first introduction of wireless techniques of modulation is stated in the 802.11 in the year 1997 and the latest or the present version of the modulation technique is stated by 802.11ac. The different standards each reflects the bands frequency that they can utilize and this utilization is also varies slightly on the local and country laws (Shinder, Diogenes Shinder, 2013). The work of 802.11b on the 2.4 GHz radio band frequency and utilize the same OFDM (Orthogonal Frequency Division Multiplexing) transferring scheme as was stated in 802.11a. The throughput that is average of 802.11g is about 22Mbit/s. 802.11g is completely backward compatible fir 802.11b and 802.11 standards older version is 802.11g that have been launched in the month of June 2003. 2.8 WPA and TKIP Wi-Fi Protected Access is a protocol of security and certification program with respect to security that was created by the Wi-Fi Alliance and it was created in response to serious issues that the finders exposed in the older wireless computer networking security system of WEP (Wired Equivalent Privacy). WPA has implemented a huge amount of 802.11i standard and most recognizably it usages of TKIP (Temporal Key Integrity Protocol). The basic variation among TKIP and WEP authentication is that TKIP automatically generates a latest 128-bit key for individual packets and WEP used an individual undetermined 64-bit or 128-bit key which is entered manually on all the devices and access points, thus TKIP prevents the attacks of WEP threats. Michael is a message integrity checker algorithm that is been included by WPA and it replaces the CRC algorithm of WEPs (Loschen, Stewart Lombardo, 2014). Various security threats to WPA2/WPA applications which includes WPS PIN backup, Hole 196 and MS-CH APv2 weaknesses. 2.9 BYOD Bring your own device is the full form of BYOD and the organization policy that is changing rapidly and gaining huge momentum. This rule is enabling the employees to bring their own computing applications or devices, such as tablets, smart phones and laptops to their organization and utilization of these applications or devices to enable the data that is addressed to be recognized by the organization and in the old fashion it is accessible only through the organization authenticated and provided desktop computers placed in the organization. The major drive behind such rules is that with the rise of computing and mobile devices, many workers have started to bring their devices in the office premises and they find it much easier to work on their own devices (Mavrogiannopoulos et al., 2013). Many other companies have placed a banned policy for employees to use their personal devices in the office premises but that policy completely fails. It has been observed that by BYOD the productivity of the organization has increased the reason is that they can utilize their personal device much easier and it will lead to easy operation and increase in productivity. 2.10 VPN The companies have made the employment of the Virtual Private Network for granting access for the private network of the company to the internet of the employees. The employees can make usage of the internet for accessing from remote place through the network of the company. It has the perception of the differences, which will be not be present physically in the campus of the company and office (Merlin, 2013). An achievement of the meaning variety, for an instance the protocols of tunneling through virtual mode, connections through dedication and the encryption of the traffic. VPN in the tradition has the network model which has point to point connection and has no support for the technologies of broadcasting. The usage of VPN has to make a creation of the Wide Area Network, which will make a connection among the employees staying in the remote place, which are at the outside of the offices. The company has made the campuses, which has the separation in geographic manner through a network, which is single. A provision of the confidentiality of the VPN is there against the sniffing in the packet level. It has the authentication of the sender, which has the integrity in their message (Weisbecker Hat, 2013). In generally, the protocols that are been followed make a consideration of the VPN protocols that are secure. The security of Internet Protocol (IPSec), the layer of transport security (TLS/SSL), the layer of security regarding Datagram Transport (DTLS), Encryption of Point to point basis of Microsoft (MPPE), Protocol of Microsoft Secure Socket Tunneling (SSTP), Network of Multi Path Virtual Private (MPVPN), and the VPN of Secure Shell (SSH). There is authentication of VPNs both ends which provide a performance of two factor authentication, biometrics, passwords and the methods of cryptography which are secure. The network to network has a tunneling through the usage of the digital certificates or passwords. The protocols of Mobile VPN has a difference from the protocols in the VPN of convention for the users of mobile (Ferrari, 2015). They expect for continuous roaming through the networks and going through the coverage of network. It actually makes a cause of the models of the convention based network of the tunnels used for disruption. In case of the connections which are dropped, timeouts of applications, data which are lost. The protocols of the Mobile VPN has a requirement for making disassociation of the tunnel networks that are coupling. It locates in between the functionalities of locator and host authentication. Both of them has the dependence on the address of IP. The protocol of Host Identity is the example of the protocol that belongs to VPN. 2.11 PPTP The meaning of the PPTP is Point to Point Protocol of Tunneling that implements the protocol of VPN. A tunnel of PPTP has made the establishment through the peer contact within usage of the port of TCP 1723. However, the tunnel of GRE has an initiation and maintenance regarding the usage of the connection of TCP (Farash Attari, 2014). Here is the encapsulation of GRE tunel of the packets of PPP, which makes an allowance of the protocols that are compatible with the PPP that are tunneled. There are certain vulnerabilities regarding security that have an existence in PPTP. There is an association of the vulnerabilities that have the existence in PPTP. The vulnerabilities have association with the protocols that are in PPP and MPPE, the integration which is mutual. A vulnerability is the MS-CHAP-v1 that has the unsecured consideration. The session key of RC4 has the usage of MPPE that can have the vulnerability for the MS-CHAP-v2 for the attacks in the dictionary level. There are attacks of brute force and the MPPE vulnerabilities for making the attacks of bit flip. 2.12 WAN A computer network that is termed as Wide Area Network has the connection of the network that is smaller or the computers in the individual level through a high distance. A general employment is there of the WAN that makes the interface of the leased telecommunication service (Brown et al., 2015). There is an operation on package of different subscription such as the consumption of the bandwidth that are based on the packages. There is example of internet that can be used for WAN. The employment of WAN is in the institutions, which is of variety. The companies along with the governments has the creation of the environment where an occurrence of their activities are there and the participation can have the communication for the location in the geography. The range of geography can have the coverage through the WAN that can be of cities of multiple numbers that is throughout the world. A connection of WAN has the LAN in multiple numbers, which are owned in private terms. It actually depends on the area of coverage and the type of application and the type of specification where the WANs have the definition. It has the terms of Metropolitan Area Networks and Campus Area Networks. On the other hand the CAN makes connections with multiple LANs that makes the presentation in the campus through the usage of the technology of WAN (Prahlad et al., 2014). There is the LAN for the building of individual in the campus. These are the usage of the organizations for the provision of the interconnections in interdepartmental level of the campus. There is the MAN which makes connection of campuses in multiple numbers which has the city blocks along with buildings that goes far for covering the entire city. There is the utilization of the network of the technology in the WAN for achieving the interconnections of LAN. The technologies that are been stated through the usage of WAN have several variation levels, such as the telephone lines that can be switched by the circuit with the waves of the radio and fibers of optic. The speed of the link in the edge is of the WAN that can have the range starting from 1 Mbit/s to 1 Gbit/s in case the core links of the WAN has the speed which has the range from 1Gbit/s to the higher of 100 Gbit/s. 2.13 Network of Mobile Ad-hoc The networks, which are in the level of Mobile Ad-hoc have the network which is absolutely infrastructure less that can have the self configuration and the task of technology which are wireless. Major devices in the MANET has the capability for moving freely about the direction in the independent level without the restrictions that are particular or the patterns that are predictable (Xu et al., 2013). It actually has the meaning of the link and distance between the nodes that are been subjected for change in continuous manner. The nodes has the receiving of traffic in large amount that has the consumption of the traffic that is relevant. It actually makes a doubling through the router. Each and every node has the maintenance for the information of routing and the transmissions of packet between the nodes. It is all about accounting the presence of an unknown number that is possible for the transceivers among the end nodes. The protocols of difference has a development and implementation in the last twenty years due to the wireless technologys proliferation and the computing device of the mobile that has the interest in the MANETs (Lobanov et al., 2013). On the basis of the technology and application used, the various MANET types used has the definition such as the SPANs or the Adhoc Networks of the Smart Phones, Adhoc Networks of Vehicle (VANETs), Mobile Adhoc Networks based on Internet (iMANET). It is absolutely needless for telling that the network has the employment of the technologies along with the pr otocols that are been specialized in difference from the protocols of regular network. It is the networking protocol that are the protocols of ad hoc network in the natural basis. 2.14 Firewall A network security systems category is the firewall that has the design for monitoring and regulating the flow of the traffic among the network for securing the network against the traffic that is malicious and vulnerabilities of the security. There is the deployment of the firewall for securing the network that is the system of single host (Little, Adams Brown, 2013). It is against the network that is potentially insecure such as the internet. The network is there in the protection of firewalls scope and there is a general assumptions that it will have trust and security. There will be the firewall that has the work for maintaining the state. In such case of the firewalls that are based on network, there will be the solution on software that is of the firewall. It can be the computer appliance of the hardware that makes a hostage of the firewalls and has all the software. The firewall has the work in the different level for the model of OSI as per its application. In the layer of Network there is a work of Firewall which has made a performance of filtering the packet, in the judgment that is not for the packets that are incoming. It follows the rules that are certain and defined by the administrator of the network (Kirsch, 2014). The packets actually has the rules following that is standardized by the administrator of the network. These rules are allowed for passing the firewall. The firewalls of Application Layer will have the functionality that is more and they have the analysis and reading of the data, which has transmissions in inside. It has the scanning of them for the items, which are improper. 2.15 Antivirus There is the software that is anti-malware and the software, that is of security that makes the helping of the users for preventing, detecting and removing the malware from the systems of the computer (Pires et al., 2012). The only intention for using to remove the virus of the computer where there is a growth of role for inclusion of the protection that is against the attacks of malware. Such attacks include the worm of computers, ransomware, hijackers of browser, Trojan horses, backdoors, spyware, keyloggers, dialers and rootkits. In the additional level, the software of antivirus have the bundle for the functionality in the additional level in the filtering of spam, scanning of URL, phishing and scam to attack the filters. Most of the programns in the antivirus has the employment in the security of layers in multiple level for achieving a rate in better detection. There is an impossibility of the algorithm for perfect detection in the viruses of possibility. The methods that are two up and coming are been recognized for the classifiers of frontier good of the techniques that are of scanning specific malware scanning (Pascal et al., 2012). A detection of the sandbox is there for the techniques in case of mining of data. In the detection of sandbox, files are been suspected for allowing for running in the environment that is virtual where there is the logging of the actions. It is all about to make decision to check that there is a malicious activity. In the techniques of data mining, there are features that are been extracted from the file and there will be an analysis to learn the machine and techniques to mine the data for the classification of its maliciousness. In the methods by tradition there is the detection of the malware that makes the inclusion of detection that is absolutely based on the heuristics and detection. 2.16 Policy of Security The policy of security in the system has the definition where a constitution of systems secure state. In the organizations case, the policy of security will have the dictation for the constraints that are various which are placed on the members in the organization that has the elements of external category, such as walls and the doors, which are locked (Willliams Tang, 2013). In case of the system of the network, the policy of security has the controlling of the system that is of various functions. There are components, which are internal to the users along with the systems that are external. The environment should have the performance of the tasks regarding the systems. The policy of security has the importance as because it has the power for prevention regarding the risks of security in the inadvertent level. It actually makes an ensuring the risk which has the area of attacks that are considered to be malicious. The design of policy regarding security for the systems, which are complex is for the task that is challenging. The security policy has the system for staying secure (Chaudhri et al., 2015). There should be the capability of the system for the enforcement of the security policy in the strict manner otherwise the existence will not make any yield of the results. 2.17 Vulnerabilities of network The vulnerability of network has the weakness in the architecture of the network that is of overall network. It actually provides the allowance for performing the actions for the attacker that makes the assurance of information in the level of compromise. In case of flaw of the system or the case of susceptibility, there is the existence of the attacker that have the capability for the exploitation of the gains regarding the flaw access. There will be a production of vulnerability in the system. There should be a noting that all the vulnerabilities does not have the carriage of the risk. In such case, there will be the existence of the vulnerability that can have the affection as possessed assets have the value of none. Several examples are there in the case of exploiting vulnerability are there in the knowledge (Durumeric et al., 2013). As the attacks of success are been conducted, there is a term for the exploitation of the vulnerability. There are attacks, which are conducted in t he level of success. There should be an exploitation of the vulnerability. In case of vulnerability, there is the time period that comes among the system vulnerabilitys introduction. There is a removal of the vulnerability that has the meaning to introduce the policy of security to limit the access for the updation of the system. Its also about the attackers removal in the system. There is quite variety of the vulnerability cause. The systems are quite complicated as they have the difficulties for securing the design flaws, which is susceptible in the inherent manner. In the point of access in the network there is the introduction of the point of possibility for creating the vulnerability throughout the network. The bugs of the software and the operating system has the flaw for leading the vulnerability creation. The management that is improper in case of the passwords by the employees can have the result in leaking the information through the creation of vulnerabilities. 2.18 DoS Attack The service attacks denial or the DoS is the malicious attackers attempt for causing the resource of the system for becoming unavailable for the usage that is intended through its users of dependency. There are current DoS Attackers in the service of network. In the modern days, the attacks of DoS have the distribution. It has general attack of spoofing of IP address (Chaudhri et al., 2015). The attacks are in two forms, services of crashing and flooding. The attacks worst known form is the DoS of Advanced Persistent. In such case the attackers have the resource and establishment for skills of networking. There is such attack that will be in between the multiple vectors. There should be strategic attackers that have switching targets for measures to prevent and mitigate. There should be the vectors for attack through cycling which makes target of continuous cause in case of suffering the provider of service. 2.19 JMeter There should be a development of the JMeter tool through the support of Apache Software Foundation which have the project for loading the web applications for the purpose of testing. It should be measured and analyzed to perform service of network (Williams Tang, 2013). The functionality of the JMeter should have the augmentation through the developers for usage of the plugins. The functionality has the expansion to install the design of new ones. 2.20 Wireshark Its a tool of open source to analyze the traffic of network in the level of packets. There should be a usage of troubleshooting of network, development, analysis and education. It should have the crossing of the platform software which has the running in the systems which are like the Unix. It has the similarity of the functionality for monitors of other packets that have the features of the interface along with options of sorting. It has the capability to understand the structure for protocols of networking. API pcap actually captures packets through the factor that is limiting through capabilities of capturing. 2.21 Vulnerability list Connection of wireless is open. There is no installation of the firewalls. There is no such protection of the servers behind the firewall of hardware (Pascal et al., 2012). Communication of long distance is through the network that is wireless. Exchange of web has the direct connection to the cloud that is without the security. There is no such definition of ACL. The polity of network is very old and high vulnerability is there. 2.22 Improvements that are recommended for hardening the network Fixing the vulnerabilities The connections that are wireless should have the security through the usage of firewall. There should be a protection behind the firewall hardware (Pires et al., 2012). There should be an ACL definition for protection. The policies of the revised network is required for threats that are current. 3. Implementation 3.1 Network that is improved Figure 1: Improved Network 3.2 Profile of JMeter Figure 2: JMeter 3.3 Capture of Wireshark Figure 3: Wireshark Capture 4.0 References Brown, M. S., Adams, N. P., Brown, M. K., Kirkup, M. G., Little, H. A. (2015).U.S. Patent No. 9,172,540. Washington, DC: U.S. Patent and Trademark Office. Chang, B., Tsai, H. F., Chen, C. M. (2013). Evaluation of virtual machine performance and virtualized consolidation ratio in cloud computing system.Journal of Information Hiding and Multimedia Signal Processing,4(3), 192-200. Chang, B., Tsai, H. F., Chen, C. M. (2013). Evaluation of virtual machine performance and virtualized consolidation ratio in cloud computing system.Journal of Information Hiding and Multimedia Signal Processing,4(3), 192-200. Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., Farash, M. S. (2015). Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.Journal of Medical Systems,39(6), 1-11. Dugan, D., Pruski, B. A. (2013). Remote Desktop Services in Windows Server 2008 R2. Durumeric, Z., Kasten, J., Bailey, M., Halderman, J. A. (2013, October). Analysis of the HTTPS certificate ecosystem. InProceedings of the 2013 conference on Internet measurement conference(pp. 291-304). ACM. Farash, M. S., Attari, M. A. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile clientserver networks.The Journal of Supercomputing,69(1), 395-411. Ferrari, M. (2015). Release: Red Hat Enterprise Virtualization 3.4.Red,2015. Jani, A. J., Jbara, W. A. (2013). Securing Website by Secure Sockets Layer in WirelessNetwork using Windows Server 2008.International Journal of Information and Electronics Engineering,3(1), 49. Kirsch, D. M. (2014).U.S. Patent No. 8,825,362. Washington, DC: U.S. Patent and Trademark Office. Little, H. A., Adams, N. P., Brown, M. S. (2013).U.S. Patent No. 8,499,045. Washington, DC: U.S. Patent and Trademark Office. Lobanov, M. Y., Suvorina, M. Y., Dovidchenko, N. V., Sokolovskiy, I. V., Surin, A. K., Galzitskaya, O. V. (2013). A novel web server predicts amino acid residue protection against hydrogen-deuterium exchange.Bioinformatics, btt168. Loschen, W. A., Stewart, M. A., Lombardo, J. S. (2014). Public Health Applications in the Cloud.JOHNS HOPKINS APL TECHNICAL DIGEST,32(4), 745. Mavrogiannopoulos, N., Trmac, M., Hat, R., Preneel, B. (2013). A Linux kernel cryptographic framework: Decoupling cryptographic keys from applications [extended version]. Merlin, M. (2013, November). Live upgrading thousands of servers from an ancient Red Hat distribution to 10 year newer Debian based one. InLISA(pp. 105-114). Minasi, M., Greene, K., Booth, C., Butler, R., McCabe, J., Panek, R., ... Roth, S. (2013).Mastering Windows Server 2012 R2. John Wiley Sons. Panek, W. (2015).MCSA Windows Server 2012 R2 Installation and Configuration Study Guide: Exam 70-410. John Wiley Sons. Pascal, B. D., Willis, S., Lauer, J. L., Landgraf, R. R., West, G. M., Marciano, D., ... Griffin, P. R. (2012). HDX workbench: software for the analysis of H/D exchange MS data.Journal of the American Society for Mass Spectrometry,23(9), 1512-1521. Pires, C. G., Pinto, F. M., Teixeira, V. D., Freitas, J., Dias, M. S. (2012). Living Home CenterA personal assistant with multimodal interaction for elderly and mobility impaired e-inclusion.Proc. PROPOR. Coimbra. Prahlad, A., May, A., Pittaluga, I., Alexander, J., Schwartz, J. A. (2014).U.S. Patent No. 8,655,846. Washington, DC: U.S. Patent and Trademark Office. Shen, G. (2013). Construction of Windows Server 2008 web server based on.Electronic Test,5, 081. Shinder, T. W., Diogenes, Y., Shinder, D. L. (2013).Windows server 2012 security from end to edge and beyond: Architecting, designing, planning, and deploying windows server 2012 security solutions. Newnes. Stidley, J. (2012).MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide: Exam 70-643. John Wiley Sons. Tidrow, R., Boyce, J., Shapiro, J. R. (2015).Windows 10 Bible. John Wiley Sons. Weisbecker, F., Hat, R. (2013). Keynote Talk Present and Future of Linux dynticks.OSPERT 2013, 4. Whitaker, H., Young, A., Wagner, R., Haque, S., Parrott, B., Fagan, R. (2016). Second Creek Monitoring. Williams, D. R., Tang, Y. (2013). Impact of office productivity cloud computing on energy consumption and greenhouse gas emissions.Environmental science technology,47(9), 4333-4340. Xu, F., Liu, Y., Moscibroda, T., Chandra, R., Jin, L., Zhang, Y., Li, Q. (2013, June). Optimizing background email sync on smartphones. InProceeding of the 11th annual international conference on Mobile systems, applications, and services(pp. 55-68). ACM. Xu, Z. X. (2016). Practices to Administration of Windows Server 2012 and 2012 R2.Scholar Works, SJSU. Zhu, D., Yang, L., Lovinger, D. (2014). Building High Performance Storage for Hyper-V Cluster on Scale-Out File Servers using Violin Windows Flash Arrays.