Friday, February 14, 2020

Network Topology Assignment Example | Topics and Well Written Essays - 750 words

Network Topology - Assignment Example OSPF and EIGRP and RIP routers functions as the interface between the laboratory fund raising and biology laboratory (Shoniregun, 2007). File servers will be storing the files of volunteer’s data, which include network-attached storeroom. The figure indicates an outline of the internetwork routing system. RIP network EIGRP-Network Router-EIGRP Router OSPF Router RIP Router-EIGRP, RIP and performs route redeployment amid the EIGRP and RIP networks. Similarly, router OSPF, RIP redistributes routes amid biology lab and fundraising office (Shoniregun, 2007).    The tangential router of Fund raising and research lab requires redistribution amid EIGRP and OSPF. 2. What information will you redistribute between routing protocols? When we have a network where multiple routing protocols are present, we    go through a process of route redistribution. The diverse segments of network erudite routes based on the protocol that is configured on them (Shoniregun, 2007). Route redistribut ion aids in the spread this knowledge in an understandable manner, by other segments. The roue leaned by EIGRP to RIP should be redistributed in a way that it is explicit by RIP and vice versa. Default-metric or definition of a metric is applied for specific posting. 3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute. Essentially, efficiency is fundamental in any network. Single metrics pose a challenge in the attainment of optimal performance. Multiple metrics should be integrated into the internet protocol system to ensure, apt internet performance. On the other hand, the concept of security is primarily connected to the exigency of protecting sensitive data from unauthorized access (Shoniregun, 2007). It is notable that, significant security issues arise during the designation of an internet protocol due to minimal or non-existent of authentication mechanisms In addition, the ad hoc routing protocols used in designing i nternet protocols systems are susceptible to security issues due to lack of security design features (Shoniregun, 2007). This renders the protocols vulnerable for attacking. It is noteworthy that, poor security measures during internet designing may lead to an inefficient network, for instances, chances of wrong messaging and redirection to unintended nodes is likely to occur. 4. Explain how you will overcome the problems. This concept of network protocol security is significant for any network to perform. The ever-changing technological trends in commercial applications have complicated the approach of solving protocol security issues (Shoniregun, 2007). It is imperative to note that quality of service (QoS) in the internet has emerged as a cornerstone for numerous network services (Shoniregun, 2007). The data origin authentication and data veracity for IP, control, and routing protocols remains paramount in ensuring a secure and efficient network. The language used in designing an internet protocol has remained a key challenge in ensuring internet protocol security (Shoniregun, 2007). The security issues can be easily avoided by ensuring high standards of authentication of identity of IP and routing protocols. More over, the language used should be apt in integrating with the internet protocol specifications and the with the authorization policy. To solve problems arising from metrics, the designer should ensure usage of fixed metrics. This is because, the

Sunday, February 2, 2020

Organic Solar cells Essay Example | Topics and Well Written Essays - 1000 words

Organic Solar cells - Essay Example In 1954, three scientists called Chapin, Fuller and Pearson developed the first solar cell in a lab. It was until the 1970s when the physics community caught up with them by working on a series of researches in the field of solar energy. Eastman Kodak became the first commercial organisation to create an organic cell in 1986. The device was made by an analyst called Tang, who worked for the organisation. More research continued to be done in the field and by 2007; a high efficient solar cell was created at a spectrolab. It had values of about 40.7%, which was a great improvement from Chapin and his colleagues’ 6% (Rivers 96). Currently, more research is underway in the field in order to boost outcomes. Solar cells are a used in electronic devices like calculators and laptops. Satellite images heavily rely on these materials for carrying out their roles. One is also likely to find the products in remote locations where no connections to power grids exist. However, they are yet to be regarded as a reliable source for electricity for electricity distribution. The cost of making solar energy from these materials is also prohibitive on a large scale. It costs four times, as much money, to generate 1 KWh of electricity from solar energy in comparison to conventional methods (Iyer 17). These typical methods include cycle gas turbines and remote diesel generation. Organic cells could be the answer to reduction of costs and elimination of other prohibitive factors in solar cell technology. Organic solar cells have low cost processing and high throughput. This implies that it is relatively easy to spray, vaporise, spin coat and print them. They capture light efficiently due to high absorption rates. The devices can even be processed in solution form at room temperature. Silicon-based solar cells are unlikely to go down in terms of prices, but this is untrue for organic ones. Additionally, they