Sunday, January 26, 2020

Firewall Effects on Network Performance | Evaluation

Firewall Effects on Network Performance | Evaluation In an age where our society relies so heavily on electronic communication, the need for information security is constantly increasing. Given the value and confidential nature of the information that exists on todays networks, CIOs are finding that an investment in security is extremely beneficial. Without security, a company can suffer from theft or alteration of data, legal ramifications, and other issues that all result in monetary losses. [The Best Damn Firewall Book Period] Corporations are realizing the need to create and enforce an information security policy. As a  result, IT professionals are constantly being challenged to secure their networks by installing firewalls that provide more secure [Cisco Security Specialists Guide to PIX Firewall]. Firewalls are essential components in improving network security. Most firewalls are deployed at the edge of the network to filter legitimate traffic, and can be deployed in the core of the network to further supplement and protect the capability of the network and the application running over the network to deliver required services to the end user. Firewalls have become increasingly complex, evolving from offering traditional firewall capabilities to protect networks, to offering application-aware processing of several Internet protocols. Brief literature review: Firewalls are the first front line defense mechanism against intruders ,a firewall system can operate at five of the seven layers of the OSI reference model. However, most firewall systems operate at only four layers: the data link, network, transport, and, possibly, application layers. Based on the simplicity or complexity of a firewall product or solution, the number of layers covered varies. For example, a standard IP access control list (ACL) on a Cisco router functions at OSI Layer 3, and an extended IP ACL functions at Layers 3 and 4. [cisco press cisco router firewall security] Firewalls work by inspecting different fields in headers of the packet, finding the matching rule and doing the action specified in the rule. Common firewalls (and rules) examine at least IP addresses, next protocol type (TCP or UDP) and in case of TCP or UDP their respective port numbers. That usually gives five different variables (source destination address, protocol, source destination port) to work with. [Optimizing firewall performance]. [Performance analysis of the Linux firewall in a host]. As example ,a firewall that operates at only Layers 3 or 4 can filter only on IP protocol information, IP addresses, and TCP or UDP port numbers; it cannot filter on application information such as user authentication or commands that a user enters. Therefore, the more layers a firewall can process information from, the more granular it can be in its filtering process. [cisco press cisco router firewall security] There are many considerations that organizations should include in their firewall selection and planning processes. Organizations need to determine which network areas need to be protected, and which types of firewall technologies will be most effective for the types of traffic that require protection. [ Guidelines on Firewalls and Firewall Policy]. In addition, Incorporating a firewall into a network structure is likely to increase processing and even create bottlenecks [Evaluation of Firewall Effects on Network Performance] ,whereas Each rule that a firewall has to analyze results in additional processing overhead. This means that the more rules a firewall has, the longer it will take for the firewall to determine whether or not the packet in question may pass through. [Firewalls Overview and Best Practices]. As result Firewalls are one key factor in network performance. If they cant process their rules fast enough then the whole network slows down. [ Optimizing firewall performance] Some studies shows that the firewall is sensitive to the number of rules, the type of filtering, and the transmission rate. The results of our first scenario demonstrate that for each type of filtering, latency increases linearly as the number of rules increase. [Performance analysis of the Linux firewall in a host] Scope and limitation of the study: There are some points may represent the scope and limitation of the study, including: This project focus on evaluating the effect of firewall performance using an OPNET Modeler network simulator and analyzing on different scenarios and to compare the performance impact when firewall applied. This project also focusing on effects of firewall filtering on network performance. In this study we are going to select special type of firewall application firewall The number of workstation is limited which wont exceed 200 nodes. The result will be collected is based on the simulation so may be this result will not be applicable in real hardware. Statement of the research problem: This research reports on the evaluation of using firewall in three different scenarios, which can show the impact of applying the application firewall on the performance of the network. Therefore, the research addresses the following research problem: How can we make trade-off between the security and performance? Essentially I argue that in order to investigate the feasibility of getting the trade-off of using the firewall, its necessary to compare the result when the firewall applied in different scenario, it might be depends on the policy or function nodes. Research questions: To address the research problem identified in the previous section, the following research questions have been designed: What are negative aspects of firewall? What are positive aspects of combined security and performance? What are the effects of firewall in the link utilization? What are the effects of firewall in the Real time application? Research objectives: The main objective of this research is to investigate the impact of firewall policy on the performance of the network. To identify negative aspects of firewall. To determine positive aspects of combined security and performance. To examine the effects of firewall in the link utilization. To identify the impact of firewall in real-time application. To compare the result from different scenario to estimate the effects of policy. Significance of the study: The growing Demand for using firewall by the internet users and companies to provide more protection for them and the influence of apply firewall policy in the network performance gave the impetus for this study. To verify that we propose here three different scenarios, CNTs as the one of the components of MMIC transmission lines to enhance the electrical performance. This material offer some remarkable characteristics for microelectronics applications and their large kinetic inductance (skin effect), long mean free paths, high current carrying capability and high thermal conductivity made them ideal candidates for RF/microwave applications as transmission lines. Research methodology: The research methodology work will go through four stages namely: theoretical stage, data analysis and design stage, lab stage, and evaluation stage. Theoretical stage: The objective of the theoretical stage is to constitute a theoretical frame to enable the success of the lab stage through that frame. Data analysis and design stage: In this stage, all related data obtained in the theoretical stage will be analyzed and then a selection process will be done in order to get the high quality CNT and the right design for CNT-based TLs to be able to accomplish the research questions through synthesis and characterization process. Lab stage: At this stage, firstly, the growth parameters will be optimized by using chemical vapor deposition growth method In order to produce large scale and well-aligned CNTs. Next, the characterization process will be done on the samples. SEM, FESEM, and HRTEM techniques will be used to study the morphology of the samples. XRD and EDEX techniques are used to study the samples crystallographic structures and composition elements in the samples respectively. For electrical characterization, I-V and resistivity measurements using four point probes will be applied for low frequency. Lastly, in the implementation process, the determined high quality CNT will be used to fabricate transmission lines, and then RF characterization will be done using VNA at different frequencies. Evaluation stage: The experimental results are analyzed to evaluate the effectiveness of the new variables in order to get the best CNT for the TLs. Current Stage: For device applications, the orientation of the CNT is particularly important. Therefore currently, the growth parameters are optimized by using chemical vapor deposition growth method and then, scanning electron microscopy (SEM) is used to study the morphology of the samples in order to get large scale and well-aligned CNTs. The fabrication of CNTs on P-type silicon substrates; size 1 cm by 1 cm were done using nickel (Ni) as catalyst. The first process is to remove any impurity and oxidization on the Si substrate surface. The substrate will go through stages of cleaning process, starting with acetone, methanol and then rinsed with deionized water to remove organic contaminants and particles. Then, the Si wafer was cleaned by hydrogen gas to remove natural oxide. Next, a thin Ni film was deposited on a substrate as catalyst using Electron-Beam evaporator and the substrate was placed on alumina boat before placed inside a double-heater TCVD. The first heater was set at 1000 °C to decompose methane, while the second was set at 800 to 1000 °C for pre-treatment of the catalytic film. As A. Awang Teh et. al. proposed [41] a precursor of ammonia and methanol solution at ratios of 5:8 was used to enhance the growth of CNT in methane ambient. The second heater was first switched in flowing Argon at 100 sccm. When the temperature of the second heater reached setting point and stayed stable, first heater was then switched on and methane gas was flown at flow rate of 10-50 sccm. The total growth time of the CNTs varied from 30 to 3 hours. Finally, methane gas was turned off and the furnaces were cooled down to room temperature in flowing Argon at 100 sccm to avoid carbon oxidation. After fabrication is completed, The CNT morphology was examined using SEM. Figures 1- 6 show the growth of CNTs on Si substrate using Ni with different thicknesses and subjected to methane ambient at 850 oC for 2 hours. One of the first things to note is that the catalyst thickness affects the diameter and density of the CNT. The catalyst film thicker, the larger diameter and more density CNT we can get. Also, it can be seen clearly this relationship from the SEM results shown in fig.11 to 14. Furthermore, from the SEM image shown in figure 4 the least nickel or carbon nanoparticles protrude from the nanotubes was observed. These conductive nanoparticles cause electrical shorts between interconnects for device fabrication. For this reason we can consider that the optimum nickel catalyst thickness in our case is 10 nm. A final point to note is that there is no CNT at all in figure 1. It means that the catalyst film thickness is very thin and after recombination the size of catalyst nanoparticles is too small to synthesis CNTs. Another key parameter to affect CNT growth is temperature gradient. As we can see from the SEM results shown in figures 7-20, by controlling the growth temperature we can increase the growth efficiency and purity. At reaction temperature 900 °C, the growth of clean CNTs was observed. However, no CNTs were formed when the growth temperature exceeded 900 °C. Instead, amorphous carbon was observed on the surface of the substrate. Besides catalyst and temperature gradient, carbon source flow rate also plays an important role in the CNT growth. It can be stand out from experimental results shown in figures 21 to 28 that a higher flow rate will increase the decomposition rate, and consequently the growth rate of CNT. However, when the flow rate of Ni was 10 sccm there is not enough reactant to react with the catalyst and just catalyst nanoparticles were observed. The gas flow rate affects not only CNT density but also nanotubes diameter. The higher gas flow rate, the larger diameter of nanotubes will grow. However, after a critical point, increasing the flow will change the carbon product from CNTs to carbon nano-fibers (CNFs), as it was observed from the result. The last growth parameter we have optimized is syntheses time. From experimental results shown in figures 29 to 32 we can find the relationship between the syntheses time and the length on nanotubes. Longer synthesis time with longer catalyst lifetime, longer CNT we can get. More optimization and characterizations must be done on the samples in order to get well-aligned and density MWCNT, before transmission line fabrication. Preview of the thesis: This thesis is organized into five chapters. Chapter One serves as an introduction to this study, providing the theoretical framework, research objectives and significance of the present study. It also offers a brief overview of the methodology that is employed. Definitions and delimitations that map out the boundaries for the present study are also outlined. Chapter Two provides the literature review for this study and serves to develop key issues related to the theoretical framework. The third chapter is on methodology. This study approaches the issues of fabrication, simulation and modulation. The fourth chapter reports the results of the content analysis and discusses the findings. The fifth chapter reviews the research questions and summarizes the thesis. This chapter also provides suggestions for future research. Network Security is one of the most important fields dealing with the Internet. The ability to access and transfer information in a few seconds allows the government, companies, educational institutions, and individuals to accelerate the decision process or simply be informed. However, information can be very valuable and there is a need for better and faster security systems to protect information and networks. Therefore, it is best to limit the number of rules to no more than 30-50. However, for best performance, less than 25 rules are recommended. Also, firewalls process their rule base from the top down. As soon as the firewall finds a rule that applies to a particular packet, the rule is applied and the packet is processed (either allowed to continue or dropped). It is recommended that the most important and most utilized rules should be at the top of the rule list. This prevents the firewall from having to process through a number of rarely used rules to finally get to rules that apply to the majority of the network traffic. Determining the correct order of rules for a particular implementation is an ongoing process. Initially, there is a significant amount of testing and trial-and-error involved in determining the correct order that the rules should be in. Also, the rule base should be reviewed periodically to see if the organizations requirements or network usage has changed that wou ld require the reordering of existing rules as well as adding or removing rules. Finally, one should make sure to keep the number of domain objects in the rule base to a minimum, and also make sure that these objects are kept towards the bottom of the rule base list. Firewalls Overview and Best Practices There are many aspects to firewall management. For example, choosing the type or types of firewalls to deploy and their positions within the network can significantly affect the security policies that the firewalls can enforce. Policy rules may need to be updated as the organizations requirements change, such as when new applications or hosts are implemented within the network. Firewall component performance also needs to be monitored to enable potential resource issues to be identified and addressed before components become overwhelmed. Logs and alerts should also be continuously monitored to identify threats-both successful and unsuccessful. Firewall rulesets and policies should be managed by a formal change management control process because of their potential to impact security and business operations, with ruleset reviews or tests performed periodically to ensure continued compliance with the organizations policies. Firewall software should be patched as vendors provide updates to address vulnerabilities. [ Guidelines on Firewalls and Firewall Policy] The firewall can become a bottleneck. All network traffic that passes between the Internet and the DMZ, the DMZ and the private network, and potentially, the Internet and the private network, must be inspected by the firewall. This can result in the firewall becoming a bottleneck and reducing the performance between the network and the Internet.

Saturday, January 18, 2020

Morality and the crucible Essay

Morality is the distinction between right and wrong. It is the determination of what should be done and what should not be done; or what is right and what is wrong. Morals deal with behaviors as well as motives. All humans live by some set of morals especially religious people. In The Crucible by Arthur Miller, this is clearly evident. It is about the puritan town of Salem, Massachusetts and the hunt for witches. Many people are falsely accused of witchcraft. Throughout this account of history key characters have to make choices that challenge their beliefs and ethics. They must decide whether to do what is right, and fight against a lie, or do what’s wrong and give in to the lie to save their own lives. Elizabeth Proctor is one of those who fought for the truth, therefore she; in my opinion is the most moral character in the story. Elizabeth is the wife of John Proctor; reserved, honest, slow to complain, and dutiful. She and her husband share a similarly strict adherence to justice and moral principles. She has great confidence in her own morality and in the ability of a person to maintain a sense of righteousness even when this principle conflicts with strict Christian doctrine. She is well known throughout the village for being a very Christian woman, knowing all her commandments. Whenever her husband is confused or indecisive about something, she leads him onto the path of justice. For example, she urges him to stop the witch trials by revealing the truth about Abigail’s sinful, deceitful ways. When Her husband has to decide whether to be killed or confess to witchcraft, she doesn’t want him to give into a corrupt and unjust society. Although she doesn’t wish to lose her husband, she still doesn’t sidestep her morals and beliefs. Even at the end, when Proctor decides to die instead of signing a confession that would have been a lie, she doesn’t try to fight his decision but shows respect for his righteous choice when she says, â€Å"He have his goodness now. God forbid I take it from him! † This shows that not only her own, but her husbands morals as well, were important to her. Out of all the characters in the Crucible, Elizabeth proved to be the most moral. In a society where it’s either, accuse or be accused, she chose to stick to her morals even if it meant her demise. She made a decision that was righteous in her eyes. â€Å"Often in true tests of moral character where people are tempted to deceive, be dishonest, or take advantage of each other, there are few who truly succeed. † This statement proved true, especially during the witch hunt, but Elizabeth Proctor was able to come out as one who succeeded in standing her grounds and protecting her morality.

Thursday, January 9, 2020

Federalism Is The Power Divided Between The State And...

In May 31 2014, two twelve year old girls stabbed a classmate to appease the fictional character Slender Man. The crime happened in Waukesha, Wisconsin and the case is being handled in the Wisconsin courts. With this, that means the crime is being handled at the state level. With this revelation, there has been many questions on how the girls’ case should be handled. This brings Federalism into question of how much federalism should being used in our country when it comes to crime. Federalism is the power divided between the state and national government. This means that laws can be made by the state for their specific state, even though there are national laws that all states have to follow. There are people who feel that there should be less federalism when it comes to crime as there is a lot of freedom when it comes to states making laws. Laws such as how old you need to be to be tried as an adult are decided by the state and some feel that it something as important as that law should be decided nationally, not by the state. Laws as important as when juveniles should be charged as adults are brought into question during cases like the Slender Man stabbing case. The Slender Man stabbing case is a crime that happened back in 2014 when two twelve year old girls tried to kill their classmate, Payton Leutner, by inviting her to a sleepover. Then, they led the victim into the woods and proceeded to stab her nineteen times. The girls named, Morgan Geyser and Anissa Weier,Show MoreRelatedEssay on Federalism1371 Words   |  6 PagesFederalism Federalism is a widely accepted system of government in North American cultures. To many North Americans it seems to be the obvious choice for all world governments, but this is not the case. In all honesty, federalism is a fairly unique form of government. Out of approximately two hundred nations on the earth one hundred and eighty states practice unitary forms of government, leaving only twenty or so as federal nations (Winchester, 1999). Unitary forms of government consistRead MoreRelationship Between State And Federal Governments825 Words   |  4 Pages Relationship Between State and Federal Governments Jasmine Rollins Lake Erie College Abstract Write the abstract here. Write a concise summary of the key points of your research. (Do not indent.) Your abstract should contain at least your research topic, research questions, participants, methods, results, data analysis, and conclusions. You may also include possible implications of your research and future work you see connected with your findings. Your abstract should be a singleRead More Federalism From Its Beginning To The Present Essay643 Words   |  3 PagesConstitution to its state today. The United States system of federalism has changed greatly through landmark court decisions, congressional decisions, and strong presidential influence. The next few paragraphs will go through the history of federalism in the United States. The Federal System began when the Framers wrote the Constitution. The Constitution set up the basic outline of the federal system. This system divided the powers between the national government and the state governments. Also, it boundRead MoreThe Federalist Paper, By Alexander Hamilton, James Madison, And John Jay1297 Words   |  6 Pagesargued the reasons why the Articles of Confederation should be strengthened. These articles support the new constitution as well as seek ratification from the states. On November 7, 1787 John Jay published The Fourth Federalist Paper. In The Fourth Federalist Paper John Jay explains that the U.S should be unified under a central government rather than function as multiple independent bodies. The U.S would be better able to obviate from foreign aggressors, trade with other countries, and the countryRead MoreEssay on United States Government and Federalism1473 Words   |  6 PagesUnited States has grappled with the idea of federalism. While former President James Madison had a very concrete understanding of that form of governance, â€Å"In the compound republic of America, the power surrendered by the people is first divided between two distinct governments, and then portion allotted to each subdivided among distinct and separate departments† (Madison, 1788, p. 67), the United States has never had a conclusive division of power between the state and the US Federal Governments. InsteadRead MoreThe first pair I will define and state the significance are separation of powers and federalism.700 Words   |  3 Pagesfirst pair I will define and state the significance are separation of powers and federalism. Separation of powers was conceived because of concerns over the thought that the majority would oppress the minority. Instead of giving all power to one, for fear of tyranny and concentrated power, it was divided into three branches which include Legislative, Executive, and Judicial. Each branch has their separate po wer in their domain and act independently. Separation of powers was also created to help promoteRead More Evolving Federalism Essay1022 Words   |  5 Pages Evolving Federalism Pre-Class Assignment nbsp;nbsp;nbsp;nbsp;nbsp;Federalism by definition is the division of power between a central government and its participating members. How that power is divided is the subjective aspect of federalism that was before the framers of the United States. Through compromise and necessity the seeds for a strong central government were planted alongside already strong state governments. Over time the seeds for strong central government grew; wars, economicRead MoreThe Pros And Cons Of Federalism, Unitary And Confederal Systems1310 Words   |  6 PagesBhaumik Mehta POS 2041: American National Government Fall 2017 Instructor: Douglas Rivero Analyze the pros and cons of federalism, unitary and confederal systems. Explain to me whether you believe that we should keep our federal system or whether we should abandon it in favor of a different one. Before discussing the pros and cons of different governmental systems, let’s know about the federal, unitary, and confederal systems? There are three systems of government exist today: federal, unitary, andRead MoreWhat is Federalism and How Does It Relate to State Governments and Other Forms of Governance?851 Words   |  4 PagesFederalism could be portrayed in three general ways, unitary, con-elected, or a hybrid of the two (Bardes, Shelley II, Schmidt, 2011). In the United States, we like a cream between unitary and con-chose schemas, which we insinuate as a chose skeleton. To better like our system we ought to first assess interchange sorts. An unitary skeleton is described as a system in which general force is controlled by a robust central government (Bardes, Shelley II, Schmidt, 2011). The con-chose model embodiesRead MoreFederal Power Vs. Federal Government1206 Words   |  5 PagesUnited States was born out of a fight for liberty, and Americans continue to fight for those very rights today. Part of this fight is the constant power struggle between the States and Federal Government. Federal power evolved throughout history and has acquired many different shapes. Ultimately, the goal is to properly distribute powers between the Government and the States (Dautrich Yalof, 2013). The Constitution elucidates who holds what powers to balance their distribution. This power distribution

Wednesday, January 1, 2020

Importance Of Henrietta Lackss Cells - Free Essay Example

Sample details Pages: 3 Words: 875 Downloads: 2 Date added: 2019/08/07 Category Medicine Essay Level High school Tags: Henrietta Lacks Essay Did you like this example? The purpose of this paper is to inform readers, about the immortal life of Henrietta Lacks and the importance of her cells. In 1951, Henrietta died of cervical cancer at John Hopkins hospital. Henrietta cells were taken without any knowledge and used to form a cell line called HeLa. No one ever knew about her personally, just only about the cells, they took from her. Scientists were using HeLa cells to develop a vaccine for polio during her time. Continuously, over time they still use these cells to find other vaccines. On August 1, 1920, Loretta Pleasant was born in Roanoke, Virginia. In 1924 after the death of her mother, she was sent to live with her grandfather where she shared a room with her first cousin David Day Lacks. When Loretta was 14, her and her cousin David had their first child who they named Lawrence. Four years later the couple had their second child, a daughter who they named Elsie. In 1941, they finally married and she decided to change her name to Henrietta Lacks. A few months after they became married, they packed all there things and moved out to Maryland. Once they arrive, they had three more children named David Jr., Deborah, and Joseph. They had to move their first daughter, Elsie, into a Hospital for the Insane because she was developmentally disable. Don’t waste time! Our writers will create an original "Importance Of Henrietta Lackss Cells" essay for you Create order At the end of 1950, Henrietta started experiencing abnormal pain and bleeding in her abdomen. She went to John Hopkins Hospital on January 29, 1951 to finally diagnose her pain. Physician Howard Jones was quick to diagnose her with cervical cancer. Two cervical samples were removed during her radiation treatment without her knowledge. Later on October 4, 1951, Henrietta died at Johns Hopkins Hospital but the cells from her tumor made its way to the laboratory of researcher Dr. George Otto Grey long before then. This was were he noticed, that unlike most cells that could only survive a few days, Henrietta cells were far more durable. He singled out and multiplied a specific cell and made a cell line. He named the sample HeLa, derived from Henrietta Lacks. Since then, over thousands of patents involving the HeLa cells have been registered. Multiple researchers use the cells to study disease and to test new products and substances(Henrietta Lacks Biography). These researches brought of the problem of ethics because she was never informed about the research. Informed consent is the patient granting they know the possible outcome when it comes to there treatment they are receiving or the surgery they are going to have. If they do not get consent it goes against the code of ethics. It is considered unethical to go through with the procedure if a patient has not okayed it or if a guardian/caretaker has made a decision. Doctors must describe the advantages of the surgery or the disadvantages of the surgery. The doctor must also get a written consent from the patient or the patients guardian/ caretaker.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Many believe that the Lacks family should not be compensated due to the fact that it was their mother who contributed to the research that America has today; they had nothing to do with it. Many would also say that the cells taken from Henrietta could have been taken from anyone else. Those who believe that, in our opinion, are wrong. The cells taken from Henrietta were taken from her tumor, not her body. General human cells, divide up to 40-50 times while Henriettas cells continue to divide. Henriettas cells have improved scientist health medication and helped human bodies for decades. The family should be compensated because of Henriettas contribution. They should also be compensated because the doctors did not ask for consent upon taking her cells.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   HeLa cells were very important in scientific and medical breakthroughs. These cells lead to some of the best scientific breakthroughs of the century. HeLa cells were useful in the research of the vaccine for Polio and other developments to help fight flu, cancer, and Parkinsons disease. Along with research came cloning and mapping genes. All of these medical breakthroughs would not be possible if not for a nearly 60 year old woman, Henrietta Lacks. Henrietta was a poor black 30 year old woman who was suffering from cervical cancer. This cancer is how HeLa was made. The doctors took cells from her tumor and started their research without her permission.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Was what the doctors did ethical? Just taking someones cells without asking for permission? Well if you did not know, every time you give blood or give some skin to any doctor they can use that for medical research. That doesnt seem ethical using peoples cells and dna without them knowing. However, scientists do it and publish there findings everywhere without most patients knowing. Ethical or not it still happens and most people never know.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Henrietta Lacks should not be known just for her cells. She was a mother and wife before anything. The way researchers did her, couldve been avoided. If they would of informed her about this earlier, than maybe the family would of reacted differently. We always have the right to anything that belongs to us. The HeLa cells did impact science in a huge way and for that we should all give big thanks to Henrietta Lacks.