Computer Science homework help

PSEUDOCODE

MUST BE COMPLETED TODAY AT 9PM EST!!!!!

1. Train Ticket

Train Ticket for one person. Write a program that reads a person’s age, then computes and displays the price the person needs to pay for the train ride according to the following rules:

  • Children younger than 6 years old ride for free.
  • If the ticket is bought at the train station:
    • A person over 70 years old pays $5.20
    • Everyone else pays $11.50.
  • If ticket is bought inside the train, there is an extra charge of 15% compared to train station prices.

Note that a person’s age is within the range of 0 to 120 years. Other inputs are considered error conditions.

1.1- Inputs, Outputs and Error Conditions

In the space below, determine the inputs, outputs and error conditions for the problem.

1.2- Algorithms
In the space below, write your algorithm using pseudocode

1.3- Test cases

In the space below, list a thorough set of test cases for your program. Write in the following format [inputs], where the inputs are separated by commas. [inputs][output]

2. Bank

A bank charges fees and/or gives interest based on the balance of a customer. Write a program that reads the customer balance then calculates and displays the new balance after the application of fees and or interest based on the following rules:

• A negative balance incurs a $50 overdraft fee. • A balance below $500 (but positive) incur on a $10 maintenance fee. • A balance from $500 to $1000 (inclusive) gain 0.1% interest. • A balance over $1000 will gain 2% interest.

2.1-Input, Output, Error Conditions

In the space below, determine the inputs, outputs and error conditions for the problem.

2.2- Algorithm

In the space below, write your algorithm using pseudocode

2.3- Test cases

In the space bellow, list a thorough set of test cases for your program. Write in the following format [inputs], where the inputs are separated by commas. [inputs][output]

3. Count Operations – WCS111 FM

WCS111 FM, a radio station by computer scientists for computer scientists. The station runs a contest where listeners win prizes based on how many hours they spend programming in Java. The following program displays the listener prize based on the number of hours spent programming.

3.1- Minimum

What is the minimum number of operations that can be executed in the code?

3.2- Maximum

What is the maximum number of operations that can be executed in the code?

4. Count Operations – Lucky Twos

Lucky Twos determines and displays the number of digits that are 2s in a whole number. For example, the number of 2s in 3487 is 0, while the number of 2s in 272521 is 3. Note: whole numbers are non-negative integers starting at zero 0, 1, 2, 3, 4. Assume that the fractional part is discarded in the division: 10 / 4 = 2 8 / 5  = 1 20 / 3 = 6

4.1- Let n be the number of digits of the whole number. What is the number of operations that are executed in the code in terms of n?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Communications And Computer Network homework help

Data Communications And Computer Network homework help

Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States

 

 

S E V E N T H E D I T I O N

Data Communications and Computer Networks A Business User’s Approach

Curt M. White DePaul University

Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States

 

 

Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White

Editor-In-Chief: Joe Sabatino

Senior Acquisitions Editor: Charles McCormick, Jr.

Senior Product Manager: Kate Mason

Editorial Assistant: Courtney Bavaro

Marketing Director: Keri Witman

Marketing Manager: Adam Marsh

Senior Marketing Communications Manager: Libby Shipp

Marketing Coordinator: Suellen Ruttkay

Media Editor: Chris Valentine

Art and Cover Direction, Production Management, and Composition: PreMediaGlobal

Cover Credit: © Masterfile Royalty Free

Manufacturing Coordinator: Julio Esperas

© 2013 Course Technology, Cengage Learning

ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher.

For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706.

For permission to use material from this text or product, submit all requests online at cengage.com/permissions.

Further permissions questions can be e-mailed to permissionrequest@cengage.com.

Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers.

Library of Congress Control Number: 2011942796

ISBN 13: 978-1-133-62646-6

ISBN 10: 1-133-62646-7

Instructor Edition:

ISBN 13: 978-1-133-62721-0

ISBN 10: 1-133-62721-8

Course Technology 20 Channel Center Street Boston, MA 02210 USA

Microsoft, the Office logo, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Course Technology, a part of Cengage Learning, is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. UNIX® is a registered trademark of The Open Group

Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.

iPhone, iPad, iPod, Nano, and Mac OS X Server are registered trademarks of Apple Inc.

Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice.

Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: www.cengage.com/global

Printed in the United States of America 1 2 3 4 5 6 7 15 14 13 12 11

 

 

To Kathleen, Hannah Colleen, and Samuel Memphis—it’s never boring

Data Communications And Computer Network homework help

 

This page intentionally left blank

 

 

Brief Contents

PREFACE xv

1 Introduction to Computer Networks and Data Communications 1

2 Fundamentals of Data and Signals 29 3 Conducted and Wireless Media 63 4 Making Connections 103 5 Making Connections Efficient:

Multiplexing and Compression 121 6 Errors, Error Detection, and Error Control 149 7 Local Area Networks: Part 1 175 8 Local Area Networks: Part II 207 9 Introduction to Metropolitan Area

Networks and Wide Area Networks 241 10 The Internet 269 11 Voice and Data Delivery Networks 307 12 Network Security 339 13 Network Design and Management 373

GLOSSARY 401

INDEX 415

v

 

 

This page intentionally left blank

 

 

Contents

PREFACE xv

1 Introduction to Computer Networks and Data Communications 1 The Language of Computer Networks 3 The Big Picture of Networks 4 Communications Networks—Basic Layouts 5

Microcomputer-to-local area network layouts 6 Microcomputer-to-Internet layouts 7 Local area network-to-local area network layouts 7 Personal area network-to-workstation layouts 8 Local area network-to-metropolitan area network layouts 9 Local area network-to-wide area network layouts 9 Wide area network-to-wide area network layouts 10 Sensor-to-local area network layouts 10 Satellite and microwave layouts 11 Cell phone layouts 11 Terminal/microcomputer-to-mainframe computer layouts 12

Convergence 13 Network Architectures 14

The TCP/IP protocol suite 15 The OSI model 18 Logical and physical connections 20

Network Layouts in Action 22 The TCP/IP Protocol Suite in Action 23 Summary 24 Key Terms 26 Review Questions 26 Exercises 26 Thinking Outside the Box 27 Hands-On Projects 27

vii

 

 

2 Fundamentals of Data and Signals 29 Data and Signals 31

Analog vs. digital 32 Fundamentals of signals 35

Converting Data into Signals 39 Transmitting analog data with analog signals 40 Transmitting digital data with digital signals: digital encoding schemes 40 Transmitting digital data with discrete analog signals 45 Transmitting analog data with digital signals 48

Data Codes 51 EBCDIC 53 ASCII 54 Unicode 55

Data and Signal Conversions in Action: Two Examples 56 Summary 58 Key Terms 58 Review Questions 59 Exercises 59 Thinking Outside the Box 60 Hands-On Projects 61

3 Conducted and Wireless Media 63 Conducted Media 64

Twisted pair wire 64 Coaxial cable 69 Fiber-optic cable 70

Wireless Media 74 Media Selection Criteria 91 Conducted Media in Action: Two Examples 94 Wireless Media in Action: Three Examples 96 Summary 99 Key Terms 99 Review Questions 100 Exercises 100 Thinking Outside the Box 101 Hands-On Projects 102

4 Making Connections 103 Interfacing a Computer to Peripheral Devices 104

Characteristics of interface standards 105 An early interface standard 106 Universal Serial Bus (USB) 106 Other interface standards 108

Data Link Connections 110 Asynchronous connections 110 Synchronous connections 112 Isochronous connections 113

Terminal-to-Mainframe Computer Connections 113 Making Computer Connections in Action 115 Summary 116 Key Terms 117 Review Questions 117 Exercises 118 Thinking Outside the Box 118 Hands-On Projects 119

viii Contents

 

 

5 Making Connections Efficient: Multiplexing and Compression 121 Frequency Division Multiplexing 122 Time Division Multiplexing 125

Synchronous time division multiplexing 125 Statistical time division multiplexing 130

Wavelength Division Multiplexing 131 Discrete Multitone 133 Code Division Multiplexing 134 Comparison of Multiplexing Techniques 136 Compression—Lossless vs. Lossy 137

Lossless compression 138 Lossy compression 140

Business Multiplexing in Action 144 Summary 145 Key Terms 146 Review Questions 146 Exercises 146 Thinking Outside the Box 147 Hands-On Projects 148

6 Errors, Error Detection, and Error Control 149 Noise and Errors 151

White noise 151 Impulse noise 152 Crosstalk 152 Echo 153 Jitter 153 Attenuation 154

Error Prevention 154 Error Detection 155

Parity checks 156 Arithmetic checksum 158 Cyclic redundancy checksum 159

Error Control 161 Toss the frame/packet 162 Return a message 162 Correct the error 168

Error Detection in Action 170 Summary 171 Key Terms 172 Review Questions 172 Exercises 173 Thinking Outside the Box 173 Hands-On Projects 174

7 Local Area Networks: Part 1 175 Primary Function of Local Area Networks 176 Advantages and Disadvantages of Local Area Networks 178 The First Local Area Network: The Bus/Tree 180 A More Modern LAN 182

Contention-based protocols 184

Contents ix

 

 

Switches 186 Isolating traffic patterns and providing multiple access 190 Full-duplex switches 190 Virtual LANs 191 Link aggregation 192 Spanning tree algorithm 192 Quality of service 194

Wired Ethernet 194 Wired Ethernet Frame Format 197 LANs in Action: A Small Office Solution 198 Summary 201 Key Terms 202 Review Questions 203 Exercises 203 Thinking Outside the Box 204 Hands-On Projects 205

8 Local Area Networks: Part II 207 Wireless Ethernet 209

Wireless LAN standards 211 Wireless CSMA/CA 212 CSMA/CA frame format 214

Network Operating Systems 215 Network Operating Systems Past and Present 216

Novell NetWare 217 Microsoft Windows NT and Windows Server 2000, 2003, and 2008 220 UNIX 223 Linux 223 Mac OS X Server 224

Servers 225 Client/server networks vs. peer-to-peer networks 227

Network Support Software 227 Utilities 228 Internet software 230

Software Licensing Agreements 230 LAN Support Devices 232 Lan Software in Action: A Small Company Makes a Choice 234

Primary uses of current system 234 Network maintenance and support 234 Cost of the NOS 235 Any unique hardware choices affecting NOS decision 235 Single location or multiple locations 235 Political pressures affecting decision 236 Final decision 236

Wireless Networking in Action: Creating a Wireless LAN for Home 236 Summary 237 Key Terms 238 Review Questions 239 Exercises 239 Thinking Outside the Box 240 Hands-On Projects 240

x Contents

 

 

9 Introduction to Metropolitan Area Networks and Wide Area Networks 241 Metropolitan Area Network Basics 242

SONET vs. Ethernet 244

Wide Area Network Basics 247 Types of network clouds 249 Connection-oriented vs. connectionless network applications 252

Routing 254 Dijkstra’s least-cost algorithm 256 Flooding 257 Centralized vs. distributed routing 258 Adaptive vs. fixed routing 260 Routing examples 261

Network Congestion 261 The problems associated with network congestion 262 Possible solutions to congestion 262

WANs in Action: The Smartphone 264 Summary 265 Key Terms 266 Review Questions 266 Exercises 267 Thinking Outside the Box 268 Hands-On Projects 268

10 The Internet 269 Internet Protocols 271

The Internet Protocol 272 Internet Protocol version 6 277 The Transmission Control Protocol 280 The Internet Control Message Protocol 282 User Datagram Protocol 282 The Address Resolution Protocol 283 The Dynamic Host Configuration Protocol 284 Network Address Translation 284 Tunneling protocols and virtual private networks 285

The World Wide Web 286 Locating a document on the Internet 287

Internet Services 289 Electronic mail (e-mail) 289 The File Transfer Protocol 290 Remote login (Telnet) 292 Voice over IP 292 Listservs 295 Streaming audio and video 295 Instant messages, tweets, and blogs 295

The Internet and Business 296 Cookies and state information 297 Intranets and extranets 297

The Future of the Internet 298 The Internet in Action: A Company Creates a VPN 299 Summary 301 Key Terms 302 Review Questions 303

Contents xi

 

 

Exercises 303 Thinking Outside the Box 304 Hands-On Projects 304

11 Voice and Data Delivery Networks 307 The Basic Telephone System 308

Telephone lines and trunks 308 The telephone network before and after 1984 310 Telephone networks after 1996 311 Limitations of telephone signals 312 Dial-up Internet service 313

Digital Subscriber Line 314 DSL basics 315 DSL formats 316

Cable Modems 317 T-1 Leased Line Service 318 Frame Relay 319

Committed information rate or service level agreements 321

Asynchronous Transfer Mode 322 ATM classes of service 323 Advantages and disadvantages of ATM 325

MPLS and VPN 325 Summary of the Data Delivery Services 326 Convergence 327

Computer-telephony integration 328 Unified communications 330

Telecommunications Systems in Action: A Company Makes a Service Choice 330

Prices 330 Making the choice 330

Summary 333 Key Terms 335 Review Questions 335 Exercises 336 Thinking Outside the Box 337 Hands-On Projects 337

12 Network Security 339 Standard System Attacks 340 Physical Protection 343 Controlling Access 344

Passwords and ID systems 346 Access rights 347 Auditing 349

Securing Data 350 Basic encryption and decryption techniques 350

Securing Communications 359 Spread spectrum technology 359 Guarding against viruses 361 Firewalls 362 Wireless security 365

Security Policy Design Issues 365 Network Security in Action: Making Wireless LANs Secure 367

xii Contents

 

 

Summary 368 Key Terms 370 Review Questions 370 Exercises 371 Thinking Outside the Box 371 Hands-On Projects 372

13 Network Design and Management 373 Systems Development Life Cycle 374 Network Modeling 376

Wide area connectivity map 377 Metropolitan area connectivity map 378 Local area connectivity map 378

Feasibility Studies 379 Capacity Planning 382 Creating a Baseline 385 Network Administrator Skills 388 Generating Usable Statistics 389 Network Diagnostic Tools 390

Tools that test and debug network hardware 390 Network sniffers 391 Managing operations 391 Simple network management protocol 392

Capacity Planning and Network Design in Action: Better Box Corporation 394 Summary 396 Key Terms 397 Review Questions 398 Exercises 398 Thinking Outside the Box 399 Hands-On Projects 399

GLOSSARY 401

INDEX 415

Contents xiii

Data Communications And Computer Network homework help

 

This page intentionally left blank

 

 

Preface

Today’s business world could not function without data communications and computer networks. Most people cannot make it through an average day without coming in contact with or using some form of computer network. In the past, this field of study occupied the time of only engineers and technicians, but it now in- volves business managers, end users, programmers, and just about anyone who might use a telephone or computer! Because of this, Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition maintains a business user’s perspective on this vast and increasingly significant subject.

In a generic sense, this book serves as an owner’s manual for the individual computer user. In a world in which computer networks are involved in nearly every facet of business and personal life, it is paramount that each of us under- stands the basic features, operations, and limitations of different types of com- puter networks. This understanding will make us better managers, better employees, and simply better computer users. As a computer network user, you will probably not be the one who designs, installs, and maintains the network. Instead, you will have interactions—either direct or indirect—with the indivi- duals who do. Reading this book should give you a strong foundation in com- puter networks, which will enable you to work effectively with network administrators, network installers, and network designers.

Here are some of the many scenarios in which the knowledge contained in this book would be particularly useful:

■ You work for a company and must deal directly with a network specialist. To better understand the specialist and be able to conduct a meaningful dia- log with him or her, you need a basic understanding of the many aspects of computer networks.

■ You are a manager within a company and depend on a number of network specialists to provide you with recommendations for the company’s network. You do not want to find yourself in a situation in which you must blindly accept the recommendations of network professionals. To ensure that you can make intelligent decisions regarding network resources, you need to know the basic concepts of data communications and computer networks.

■ You work in a small company, in which each employee wears many hats. Thus, you may need to perform some level of network assessment, administration, or support.

xv

 

 

■ You have your own business and need to fully understand the advantages of using computer networks to support your operations. To optimize those advantages, you should have a good grasp of the basic characteristics of a computer network.

■ You have a computer at home or at work, and you simply wish to learn more about computer networks.

■ You have realized that to keep your job skills current and remain a key player in the information technology arena, you must understand how different computer networks work and become familiar with their advantages and shortcomings.

Audience Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition is intended for a one-semester course in business data commu- nications for students majoring in business, information systems, management information systems, and other applied fields of computer science. Even computer science departments will find the book valuable, particularly if the students read the Details sections accompanying most chapters. It is a readable resource for computer network users that draws on examples from business environments.

In a university setting, this book can be used at practically any level above the first year. Instructors who wish to use this book at the graduate level can draw on the many advanced projects provided at the end of each chapter to cre- ate a more challenging environment for the advanced student.

Defining Characteristics of This Book The major goal of this seventh edition is the same as that of the first edition: to go beyond simply providing readers with a handful of new definitions, and in- stead introduce them to the next level of details found within the fields of com- puter networks and data communications. This higher level of detail includes the network technologies and standards necessary to support computer network systems and their applications. This book is more than just an introduction to advanced terminology. It involves introducing concepts that will help the reader achieve a more in-depth understanding of the often complex topic of data com- munications. It is hoped that once readers attain this in-depth understanding, the topic of networks and data communications will be less intimidating to them. To facilitate this understanding, the book strives to maintain high stan- dards in three major areas: readability, a balance between the technical and the practical, and currency.

Readability Great care has been taken to provide the technical material in as readable a fashion as possible. Each new edition has received a complete rewrite, in which every sentence has been re-examined in an attempt to convey the concepts as clearly as possible. Given the nature of this book’s subject matter, the use of ter- minology is unavoidable. However, every effort has been made to present terms in a clear fashion, with minimal use of acronyms and even less use of computer jargon.

Balance Between the Technical and the Practical As in the very successful first edition, a major objective in writing Data Communications and Computer Networks, Seventh Edition was to achieve a good balance between the more technical aspects of data communications and its everyday practical aspects. Throughout each chapter, there are sections entitled

xvi Preface

 

 

“Details,” which delve into the more specialized aspects of the topic at hand. Should readers not have time to explore this technical information, they can skip these Details sections without missing out on the basic concepts of the topic.

Current Technology Because of the fast pace of change in virtually all computer-related fields, every attempt has been made to present the most current trends in data communica- tions and computer networks. Some of these topics include:

■ Introduction to Thunderbolt interface ■ Updated information on IPv6 ■ Spanning tree algorithm, link aggregation, and quality of service for LANs ■ Latest wireless technologies ■ Updated examples on multiplexing techniques ■ Greater emphasis on switching in local area networks ■ Advanced encryption standards ■ Compression techniques ■ Current LAN network operating systems (Windows Server®, UNIX®and

Linux®) ■ Introduction to cloud computing

It is also important to remember the many older technologies still in preva- lent use today. Discussions of these older technologies can be found, when appropriate, in each chapter of this book.

Organization The organization of Data Communications and Computer Networks, Seventh Edition roughly follows that of the TCP/IP protocol suite, from the physical layer to the upper layers. In addition, the book has been carefully designed to consist of 13 chapters in order to fit well into a typical 15- or 16-week semester (along with any required exams). Although some chapters may not require an entire week of study, other chapters may require more than one week. The in- tent was to design a balanced introduction to the study of computer networks by creating a set of chapters that is cohesive but at the same time allows for flexibility in the week-to-week curriculum.

Thus, instructors may choose to emphasize or de-emphasize certain topics, depending on the focus of their curriculums. If all 13 chapters cannot be covered during one term, it is possible for the instructor to concentrate on certain chapters. For example, if the curriculum’s focus is information systems, the instructor might concentrate on Chapters 1, 3, 4, 6–8, 10, 12, and 13. If the focus is on the more technical aspects of computer networks, the instructor might concentrate on Chapters 1–11. It is the author’s recommendation, however, that all chapters be covered in some level of detail.

Features To assist readers in better understanding the technical nature of data communi- cations and computer networks, each chapter contains a number of significant features. These features are based on older, well-tested pedagogical techniques as well as some newer techniques.

Opening Case Each chapter begins with a short case or vignette that emphasizes the main con- cept of the chapter and sets the stage for exploration. These cases are designed to spark readers’ interest and create a desire to learn more about the chapter’s concepts.

Preface xvii

 

 

Learning Objectives Following the opening case is a list of learning objectives that should be accom- plished by the end of the chapter. Each objective is tied to the main sections of the chapter. Readers can use the objectives to grasp the scope and intent of the chapter. The objectives also work in conjunction with the end-of-chapter summary and review questions, so that readers can assess whether they have adequately mastered the material.

Details Many chapters contain one or more Details sections, which dig deeper into a particular topic. Readers who are interested in more technical details will find these sections valuable. Since the Details sections are physically separate from the main text, they can be skipped if the reader does not have time to explore this level of technical detail. Skipping these sections will not affect the reader’s overall understanding of a chapter’s material.

In Action At the end of each chapter’s main content presentation is an In Action example that demonstrates an application of the chapter’s key topic in a realistic environ- ment. Although a number of In Action examples include imaginary people and organizations, every attempt was made to make the hypothetical scenarios as representative as possible of situations and issues found in real-world business and home environments. Thus, the In Action examples help the reader visualize the concepts presented in the chapter.

End-of-Chapter Material The end-of-chapter material is designed to help readers review the content of the chapter and assess whether they have adequately mastered the concepts. It includes:

■ A bulleted summary that readers can use as a review of the key topics of the chapter and as a study guide.

■ A list of the key terms used within the chapter. ■ A list of review questions that readers can use to quickly check whether or

not they understand the chapter’s key concepts. ■ A set of exercises that draw on the material presented in the chapter. ■ A set of Thinking Outside the Box exercises, which are more in-depth in na-

ture and require readers to consider various possible alternative solutions by comparing their advantages and disadvantages.

■ A set of Hands-On Projects that require readers to reach beyond the material found within the text and use outside resources to compose a response. Many of these projects lend themselves nicely to writing assignments. Thus, they can serve as valuable tools for instructors, especially at a time when more and more colleges and universities are seeking to implement “writing across the curriculum” strategies.

Glossary At the end of the book, you will find a glossary that includes the key terms from each chapter.

Student Online Companion The student online companion for this book can be found at www. cengagebrain.com, and search by title, author name, or ISBN. It contains a number of features, including:

■ Hands-on labs that allow students to practice one or more of the chapter concepts ■ A set of more in-depth discussions on older topics such as X.21, dial-up

modems, ISDN, Dijkstra’s algorithm, SDLC, and BISYNC ■ Suggestions for further readings on numerous topics within the book

xviii Preface

 

 

This Web site also presents visual demonstrations of many key data commu- nications and networking concepts introduced in this text. A visual demonstration accompanies the following concepts:

■ Chapter One: Introduction to Computer Networks and Data Communications— Layer encapsulation example

■ Chapter Four: Making Connections—RS-232 example of two modems establishing a connection

■ Chapter Five: Making Connections Efficient: Multiplexing and Compression— Example of packets from multiple sources coming together for synchronous TDM, and a second example demonstrating statistical TDM

■ Chapter Six: Errors, Error Detection, and Error Control—Sliding window example using ARQ error control

■ Chapter Seven: Local Area Networks: Part One—CSMA/CD example with workstations sending packets and collisions happening

■ Chapter Seven: Local Area Networks: Part One—Two LANs with a bridge showing how bridge tables are created and packets routed; a second example shows one LAN with a switch in place of a hub

■ Chapter Nine: Introduction to Metropolitan Area Networks and Wide Area Networks—Datagram network sending individual packets; and virtual circuit network first creating a connection and then sending packets down a prescribed path

■ Chapter Ten: The Internet—Domain Name System as it tries to find the dotted decimal notation for a given URL

Changes to the Seventh Edition In order to keep abreast of the changes in computer networks and data commu- nications, this Seventh Edition has incorporated many updates and additions in every chapter, as well as some reorganization of sections within chapters. Here’s a summary of the major changes that can be found in each of the following chapters:

Chapter One, Introduction to Computer Networks and Data Communications, introduces an update on the many types of computer network connections, along with many of the major concepts that will be discussed in the following chapters, with an emphasis on the TCP/IP protocol suite followed by the OSI models. The topic of convergence has been introduced in this first chapter and will be revisited as needed in subsequent chapters.

Chapter Two, Fundamentals of Data and Signals, covers basic concepts that are critical to the proper understanding of all computer networks and data communications.

Chapter Three, Conducted and Wireless Media, introduces the different types of media for transmitting data. The section on cellular telephones was updated to include the latest cell phone technologies.

Chapter Four, Making Connections, discusses how a connection or interface is created between a computer and a peripheral device, with a stronger emphasis on the USB interface.

Chapter Five, Making Connections Efficient: Multiplexing and Compression, introduces the topic of compression. Lossless compression techniques such as run-length encoding are discussed, as well as lossy compression techniques such as MP3 and JPEG. Examples of multiplexing have been updated.

Chapter Six, Errors, Error Detection, and Error Control, explains the actions that can take place when a data transmission produces an error. The concept of arithmetic checksum, as it is used on the Internet, is included.

Chapter Seven, Local Area Networks: Part One, is devoted to the basic con- cepts of local area networks. These two chapters on local area networks have been reorganized. The topics of minimum spanning tree, link aggregation, and

Preface xix

 

 

quality of service have been introduced. The local area network switch has been given more prominence, to reflect its current importance in the industry.

Chapter Eight, Local Area Networks: Part Two, introduces wireless local area networks and discusses the various network operating systems and other network software, with updated material on Microsoft, Linux, Unix, and the MAC OS X Server.

Chapter Nine, Introduction to Metropolitan Area Networks and Wide Area Networks, introduces the basic terminology and concepts of both metropolitan area networks and wide area networks. Cloud computing is also introduced.

Chapter Ten, The Internet, delves into the details of the Internet, including TCP/IP, DNS, and the World Wide Web. Additional information on IP addresses and IPv6 has been included. A discussion on the topic of Voice over IP is included, as well as the material on MPLS, service level agreements, and convergence.

Chapter Eleven, Voice and Data Delivery Networks, provides a detailed introduction to the area of telecommunications—in particular, networks that specialize in local and long-distance delivery of data. The topic of basic dial-up telephone service was reduced to better reflect its diminishing importance in today’s technology markets.

Chapter Twelve, Network Security, covers the current trends in network security. The topic of firewalls was updated.

Chapter Thirteen, Network Design and Management, introduces the systems development life cycle, feasibility studies, capacity planning, and base- line studies, and shows how these concepts apply to the analysis and design of computer networks.

Teaching Tools The following supplemental materials are available when this book is used in a classroom setting. All of the teaching tools available with this book are provided to the instructor on a single CD-ROM. Many can also be found at the Cengage Web site (login.cengage.com/sso).

Electronic Instructor’s Manual—The Instructor’s Manual that accompanies this textbook includes additional instructional material to assist in class preparation, including Sample Syllabi, Chapter Outlines, Technical Notes, Lecture Notes, Quick Quizzes, Teaching Tips, Discussion Topics, and Key Terms.

ExamView®—This textbook is accompanied by ExamView, a powerful testing software package that allows instructors to create and administer printed, computer (LAN-based), and Internet exams. ExamView includes hundreds of questions that correspond to the topics covered in this text, enabling students to generate detailed study guides that include page references for further review. The computer-based and Internet testing components allow students to take exams at their computers and also save the instructor time by grading each exam automatically.

PowerPoint Presentations—This book comes with Microsoft PowerPoint slides for each chapter. These are included as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Instructors can add their own slides for additional topics they introduce to the class.

Acknowledgments Producing a textbook requires the skills and dedication of many people. Unfortu- nately, the final product displays only the author’s name on the cover and not the names of those who provided countless hours of input and professional advice. I would first like to thank the people at Course Technology for being so vitally

xx Preface

 

 

supportive and one of the best teams an author could hope to work with: Charles McCormick, Jr., Senior Acquisitions Editor; Kate Mason, Senior Product Manager; and Divya Divakaran, Content Product Manager.

I must also thank my colleagues at DePaul University who listened to my problems, provided ideas for exercises, proofread some of the technical chapters, and provided many fresh ideas when I could think of none myself.

Finally, I thank my family: my wife Kathleen, my daughter Hannah, and my son Samuel. It was your love and support (again!) that kept me going, day after day, week after week, and month after month.

Curt M. White

Preface xxi

 

 

This page intentionally left blank

 

 

Chapter 1 Introduction to Computer Networks and Data Communications

MAKING PREDICTIONS is a difficult task, and predicting the future of computing is no exception. History is filled with computer-related predictions that were so inaccurate that today they are amusing. For example, consider the following predictions:

“I think there is a world market for maybe five computers.” Thomas Watson, chairman of IBM, 1943

“I have traveled the length and breadth of this country, and talked with the best people, and I can assure you that data processing is a fad that won’t last out the year.” Editor in charge of business books for Prentice Hall, 1957

“There is no reason anyone would want a computer in their home.” Ken Olsen, president and founder of Digital Equipment Corporation, 1977

“640K ought to be enough for anybody.” Bill Gates, 1981

“We believe the arrival of the PC’s little brother [PCjr] is as significant and lasting a develop- ment in the history of computing as IBM’s initial foray into microcomputing has proven to be.” PC Magazine, December 1983 (The PCjr lasted less than one year.)

Apparently, no matter how famous you are or how influential your position, it is very easy to make very bad predictions. Nevertheless, it is hard to imagine that anyone can make a prediction worse than any of those above. Buoyed by this false sense of optimism, let us make a few forecasts of our own:

Someday before you head out the door, you will reach for your umbrella, and it will tell you what kind of weather to expect outside. A radio signal will connect the umbrella to a local weather service that will download the latest weather conditions for your convenience.

Someday you will be driving a car, and if you go faster than some predetermined speed, the car will send a text message to your parents informing them of your “driving habits.”

Someday we will wear a computer—like a suit of clothes—and when we shake hands with a person, data will transfer down our skin, across the shaking hands, and into the other person’s “computer.”

Sometime in the not too distant future, you will place some hot dogs and hamburgers on the grill and then go inside to watch the ball game. Suddenly, you will get a message on your cell phone: “Your food is done cooking.”

OBJECTIVES After reading this chapter, you should be able to:

Ê Define the basic terminology of computer networks

Ê Recognize the individual components of the big picture of computer networks

Ê Recognize the basic network layouts

Ê Define the term “convergence” and describe how it applies to computer networks

Ê Cite the reasons for using a network architecture and explain how they apply to current network systems

Ê List the layers of the TCP/IP protocol suite and describe the duties of each layer

Ê List the layers of the OSI model and describe the duties of each layer

Ê Compare the TCP/IP protocol suite and OSI model, and list their differences and similarities

1

 

 

Someday you will have a car battery that, when the power in the battery gets too weak to start the car, will call you on your cell phone to inform you that you need a replacement or a charge.

One day you will be in a big city and place a call on your cell phone to request a taxi. The voice on the other end will simply say, “Stay right where you are. Do you see the taxi coming down the street? When it stops in front of you, hop in.”

Someday you will be driving in a big city and your phone or Global Positioning System (GPS) device will tell you where the nearest empty parking spot on the street is.

Do these predictions sound far-fetched and filled with mysterious technologies that only scientists and engineers can understand? They shouldn’t, because they are not predictions. They are scenar- ios happening today with technologies that already exist. What’s more, none of these advances would be possible today were it not for computer networks and data communications.

INTRODUCTION

The world of computer networks and data communications is a surprisingly vast and increasingly significant field of study. Once considered primarily the domain of network engineers and technicians, computer networks now involve business managers, computer programmers, system designers, office managers, home computer users, and everyday citizens. It is virtually impossible for the average person on the street to spend 24 hours without directly or indirectly using some form of computer network.

Ask any group, “Has anyone used a computer network today?,” and more than one-half of the people might answer, “Yes.” Then ask the others, “How did you get to work, school, or the store today if you did not use a computer net- work?” Most transportation systems use extensive communication networks to monitor the flow of vehicles and trains. Expressways and highways have computer- ized systems for controlling traffic signals and limiting access during peak traffic times. Some major cities are placing the appropriate hardware inside city buses and trains so that the precise location of each bus and train is known. This information enables the transportation systems to keep the buses evenly spaced and more punc- tual, and allows the riders to know when the next bus or train will arrive.

In addition, more and more people are using satellite-based GPS devices in their cars to provide driving directions and avoid traffic hotspots. Similar systems can unlock your car doors if you leave your keys in the ignition and can locate your car in a crowded parking lot—beeping the horn and flashing the headlights if you cannot remember where you parked.

But even if you didn’t use mass transit or a GPS device in your car today, there are many other ways to use a computer network. Businesses can order parts and inventory on demand and build products to customer-designed specifi- cations electronically, without the need for paper. Online retail outlets can track every item you look at or purchase. Using this data, they can make recommen- dations of similar products and inform you in the future when a new product becomes available. Twenty-four-hour banking machines can verify the user’s identity by taking the user’s thumbprint.

In addition, cable television continues to expand, offering extensive pro- gramming, pay-per-view options, video recording, digital television and music, and multi-megabit connectivity to the Internet. The telephone system, the oldest and most extensive network of communicating devices, continues to become more of a computer network every day. The most recent “telephone” networks can now deliver voice, Internet, and television over a single connection. Cellular telephone systems cover virtually the entire North American continent and allow

2 Chapter 1

 

 

users to upload and download data to and from the Internet, send and receive images, and download streaming video such as television programs. That hand- held device you are holding can play music, make phone calls, take pictures, surf the Web, and let you play games while you wait for the next train.

Welcome to the amazing world of computer networks! Unless you have spent the last 24 hours in complete isolation, it is nearly impossible to not have used some form of computer network and data communications. Because of this growing integration of computer networks and data communications into business and life, we cannot leave this area of study to technicians. All of us— particularly information systems, business, and computer science students—need to understand the basic concepts. Armed with this knowledge, we not only will be better at communicating with network specialists and engineers but also will become better students, managers, and employees.

THE LANGUAGE OF COMPUTER NETWORKS

Over the years, numerous terms and definitions relating to computer networks and data communications have emerged. To gain insight into the many subfields of study, and to become familiar with the emphasis of this textbook, let us examine the more common terms and their definitions.

A computer network is an interconnection of computers and computing equipment using either wires or radio waves and can share data and computing resources. Computer networks that use radio waves are termed wireless and can involve broadcast radio, microwaves, or satellite transmissions. Networks span- ning an area of several meters around an individual are called personal area networks (PANs). Personal area networks include devices such as laptop com- puters, personal digital assistants, and wireless connections. Networks that are a little larger in geographic size—spanning a room, a floor within a building, a building, or a campus—are local area networks (LANs). Networks that serve an area up to roughly 50 kilometers—approximately the area of a typical city— are called metropolitan area networks (MANs). Metropolitan area networks are high-speed networks that interconnect businesses with other businesses and the Internet. Large networks encompassing parts of states, multiple states, countries, and the world are wide area networks (WANs). Chapters Seven and Eight concentrate on local area networks, and Chapters Nine, Ten, and Eleven concentrate on metropolitan area networks and wide area networks.

The study of computer networks usually begins with the introduction of two important building blocks: data and signals. Data is information that has been translated into a form more conducive to storage, transmission, and calculation. As we shall see in Chapter Two, a signal is used to transmit data. We define data com- munications as the transfer of digital or analog data using digital or analog signals. Once created, these analog and digital signals then are transmitted over conducted media or wireless media (both of which are discussed in Chapter Three).

Connecting devices to a computer, or a computer to a network, requires in- terfacing, a topic covered in Chapter Four. Because sending only one signal over a medium at one time can be an inefficient way to use the transmission medium, many systems perform multiplexing. Multiplexing is the transmission of multiple signals on one medium. For a medium to transmit multiple signals simulta- neously, the signals must be altered so that they do not interfere with one an- other. Compression is another technique that can maximize the amount of data sent over a medium. Compression involves squeezing data into a smaller package, thus reducing the amount of time (as well as storage space) needed to transmit the data. Multiplexing and compression are covered in detail in Chapter Five.

When the signals transmitted between computing devices are corrupted and errors result, error detection and error control are necessary. These topics are discussed in detail in Chapter Six.

Introduction to Computer Networks and Data Communications 3

 

 

Once upon a time, a voice network transmitted telephone signals, and a data network transmitted computer data. Eventually, however, the differences between voice networks and data networks disappeared. The merging of voice and data networks is one example of convergence, an important topic that will be presented later in this chapter and further developed in subsequent chapters.

Computer security (covered in Chapter Twelve) is a growing concern of both professional computer support personnel and home computer users with Internet connections. Network management is the design, installation, and sup- port of a network and its hardware and software. Chapter Thirteen discusses many of the basic concepts necessary to support properly the design and improvement of network hardware and software, as well as the more common management techniques used to support a network.

THE BIG PICTURE OF NETWORKS

If you could create one picture that tries to give an overview of a typical computer network, what might this picture include? Figure 1-1 shows such a picture, and it includes examples of local, personal, and wide area networks. Note that this picture shows two different types of local area networks (LAN 1 and LAN 2). Although a full description of the different components constitut- ing a local area network is not necessary at this time, it is important to note that most LANs include the following hardware:

■ Workstations, which are personal computers/microcomputers (desktops, laptops, netbooks, handhelds, etc.) where users reside

■ Servers, which are the computers that store network software and shared or private user files

■ Switches, which are the collection points for the wires that interconnect the workstations

■ Routers, which are the connecting devices between local area networks and wide area networks

Figure 1-1 An overall view of the interconnection between different types of networks

User A

WAN 1 Modem

Microwave Tower

LAN 1 LAN 2

PAN 1

Web Server

PDA Workstations

Routers

Switch

WAN 2

Routers

4 Chapter 1

 

 

There are also many types of wide area networks. Although many different technologies are used to support wide area networks, all wide area networks include the following components:

■ Nodes, which are the computing devices that allow workstations to connect to the network and that make the decisions about where to route a piece of data

■ Some type of high-speed transmission line, which runs from one node to another

■ A subnetwork, or cloud, which consists of the nodes and transmission lines, collected into a cohesive unit

To see how the local area networks and wide area networks work together, consider User A (in the upper-left corner of Figure 1-1), who wishes to retrieve a Web page from the Web server shown in the lower-right corner. To do this, User A’s computer must have both the necessary hardware and software required to communicate with the first wide area network it encoun- ters, WAN 1—User A’s Internet service provider. Assuming that User A’s com- puter is connected to this wide area network through a DSL telephone line, User A needs some type of modem. Furthermore, if this wide area network is part of the Internet, User A’s computer requires software that talks the talk of the Internet: TCP/IP (Transmission Control Protocol/Internet Protocol).

Notice that no direct connection exists between WAN 1, where User A resides, and LAN 2, where the Web server resides. To ensure that User A’s Web page request reaches its intended receiver (the Web server), User A’s soft- ware attaches the appropriate address information that WAN 1 uses to route User A’s request to the router that connects WAN 1 to LAN 1. Once the request is on LAN 1, the switch-like device connecting LAN 1 and LAN 2 uses address information to pass the request to LAN 2. Additional address information then routes User A’s Web page request to the Web server, whose software accepts the request.

Under normal traffic and conditions, this procedure might take only a frac- tion of a second. When you begin to understand all the steps involved and the great number of transformations that a simple Web page request must undergo, the fact that it takes only a fraction of a second to deliver is amazing.

COMMUNICATIONS NETWORKS—BASIC LAYOUTS

The beginning of this chapter described a few applications of computer net- works and data communications that you encounter in everyday life. From that sampling, you can see that setting out all the different types of jobs and services that use some sort of computer network and data communications would gener- ate an enormous list. Instead, let us examine basic network systems and their layouts to see how extensive the uses of data communications and computer networks are. The basic layouts that we will examine include:

■ Microcomputer-to-local area network ■ Microcomputer-to-Internet ■ Local area network-to-local area network ■ Personal area network-to-workstation ■ Local area network-to-metropolitan area network ■ Local area network-to-wide area network ■ Wide area network-to-wide area network ■ Sensor-to-local area network ■ Satellite and microwave ■ Cell phones ■ Terminal/microcomputer-to-mainframe computer

Introduction to Computer Networks and Data Communications 5

 

 

Microcomputer-to-local area network layouts Perhaps the most common network layout today, the microcomputer-to- local area network layout is found in virtually every business and academic environment—and even in many homes. The microcomputer—which also is com- monly known as the personal computer, PC, desktop computer, laptop computer, notebook, netbook, or workstation—began to emerge in the late 1970s and early 1980s. (For the sake of consistency, we will use the older term “microcomputer” to signify any type of computer based on a microprocessor, disk drive, and memory.) The LAN, as we shall see in Chapter Seven, is an excellent tool for pro- viding a gateway to other networks, software, and peripherals. In some LANs, the data set that accompanies application software resides on a central computer called a server. Using microcomputers connected to a LAN, end users can request and download the data set, then execute the application on their computers. If users wish to print documents on a high-quality network printer, the LAN con- tains the network software necessary to route their print requests to the appropri- ate printer. If users wish to access their e-mail from the corporate e-mail server, the local area network provides a fast, stable connection between user worksta- tions and the e-mail server. If a user wishes to access the Internet, the local area network provides an effective gateway to the outside world. Figure 1-2 shows a diagram of this type of microcomputer-to-local area network layout.

Figure 1-2 A microcomputer lab, showing the cabling that exits from the back of a workstation and runs to a LAN collection point

Metal Conduit

Cables

LAN Collection Point

Workstations

Cables

One common form of microcomputer-to-local area network layout in the business world is the client/server system. In a client/server system, a user at a microcomputer, or client machine, issues a request for some form of data or service. This could be a request for a database record from a database server or a request to retrieve an e-mail message from an e-mail server. This request travels across the system to a server that contains a large repository of data and/or programs. The server fills the request and returns the results to the client, displaying the results on the client’s monitor.

A type of microcomputer-to-local area network layout that continues to grow in popularity is the wireless layout. A user sitting at a workstation or laptop uses wireless communications to send and receive data to and from a wireless access point. This access point is connected to the local area network and basically serves as the “bridge” between the wireless user device and the wired network. Although this setup uses radio frequency transmissions, we still consider it a microcomputer-to-local area network layout.

6 Chapter 1

 

 

Microcomputer-to-Internet layouts With the explosive growth of the Internet and the desire of users to connect to the Internet from home (either for pleasure or work-related reasons), the microcomputer-to-Internet layout continues to grow steadily. Originally, most home users connected to the Internet via a dial-up telephone line and a modem. This arrangement allowed for a maximum data transfer rate of roughly 56,000 bits per second (56 kbps). (The connections do not actually achieve 56 kbps, but that is a discussion we will have in Chapter Eleven.) No longer is the dial- up modem the most often used layout. Today, a majority of home users either connect to the Internet using digital subscriber line (DSL) or access the Internet through a cable modem service. All of these telecommunications services will be examined in more detail in Chapter Eleven. (In comparing the various data transfer rates of services and devices, we will use the convention in which lower- case k equals 1000. Also as part of the convention, lowercase b will refer to bits, while uppercase B refers to bytes.)

To communicate with the Internet using a dial-up, DSL, or cable modem connection, a user’s computer must connect to another computer already com- municating with the Internet. The easiest way to establish this connection is through the services of an Internet service provider (ISP). In this case, the user’s computer needs to have the necessary software to communicate with the Inter- net. The Internet “talks” only TCP/IP, so users must use software that supports the TCP and IP protocols. Once the user’s computer is talking TCP/IP, a connection to the Internet can be established. Figure 1-3 shows a typical microcomputer-to-Internet layout.

Figure 1-3 A microcomputer/ workstation sending data over a DSL line to an Internet service provider and onto the Internet Modem

Internet Service Provider

High-Speed Line

Internet

Router

Modems

Local area network-to-local area network layouts Because the local area network is a standard in business and academic environ- ments, it should come as no surprise that many organizations need the services of multiple local area networks and that it may be necessary for these LANs to communicate with each other. For example, a company may want the local area network that supports its research department to share an expensive color

Introduction to Computer Networks and Data Communications 7

 

 

laser printer with its marketing department’s local area network. Fortunately, it is possible to connect two local area networks so that they can share peripherals as well as software. The devices that usually connect two or more LANs are the switch and router.

In some cases, it may be more important to prevent data from flowing between local area networks than to allow data to flow from one network to another. For instance, some businesses have political reasons for supporting multiple networks—each division may want its own network to run as it wishes. Additionally, there may be security reasons for limiting traffic flow between networks; or allowing data destined for a particular network to traverse other networks simply may generate too much network traffic. Devices that connect local area networks can help manage these types of services as well. For example, the switch can filter out traffic not intended for the neighboring net- work, thus minimizing the overall amount of traffic flow. Figure 1-4 provides an example of two LANs connected by a switch.

Figure 1-4 Two local area networks connected by a switch

Hub

LAN A

Switch

LAN B Hub

Personal area network-to-workstation layouts The personal area network was created in the late 1990s and is one of the newer forms of computer networks. Using wireless transmissions with devices such as personal digital assistants (PDAs), laptop computers, and portable music players, an individual can transfer voice, data, and music from handheld devices to other devices such as microcomputer workstations (see Figure 1-5). Likewise, a user can download data from a workstation to one of these portable devices. For example, a user might use a PDA to record notes during a meeting. Once the meeting is over, the user can transmit the notes over a wireless connection from the PDA to his or her workstation. The workstation then runs a word processor to clean up the notes, and the formatted notes are uploaded to a local area network for corporate dissemination. Another example is the hands-free Bluetooth-enabled connection that people hang on their ear so they can converse with their cell phone without placing the cell phone up to their ear. It is also very common now to transfer digital photos and videos from cameras to micro- computers using short-range, wireless signals.

8 Chapter 1

 

 

Figure 1-5 A user transferring data from a personal digital assistant via a personal area network to a workstation attached to a local area network

Local Area

Network

WorkstationPersonal Area

Network

Local area network-to-metropolitan area network layouts Toward the end of the twentieth century, a new form of network appeared that interconnected businesses within a metropolitan area. Typically, this intercon- nection uses only fiber-optic links at extremely high speeds. These new networks are labeled metropolitan area networks. A metropolitan area network is a high- speed network that interconnects multiple sites within a close geographic region, such as a large urban area. For example, businesses that require a high-speed connection to their Internet service providers might use a metropolitan area net- work for interconnection (see Figure 1-6). As we shall see in more detail in Chapter Nine, metropolitan area networks are a cross between local area networks and wide area networks. They can transfer data at fast LAN speeds but over larger geographic regions than typically associated with a local area network.

Figure 1-6 Businesses interconnected within a large metropolitan area via a metropolitan area network

Fiber-Optic System

Businesses

Internet Service Provider

Local area network-to-wide area network layouts You have already seen that the local area network is commonly found in business and academic environments. If a user working at a microcomputer connected to a local area network wishes to access the Internet (a wide area

Introduction to Computer Networks and Data Communications 9

 

 

network), the user’s local area network must have a connection to the Internet. A device called a router is employed to connect these two networks. A router converts the local area network data into wide area network data. It also performs security functions and must be properly programmed to accept or reject certain types of incoming and outgoing data packets. Figure 1-7 shows a local area network connected to a wide area network via a router.

Figure 1-7 Local area network- to-wide area network layout

Wide Area

Network

Workstations

Hub or Switch Router

Wide area network-to-wide area network layouts The Internet is not a single network but a collection of thousands of networks. In order to travel any distance across the Internet, a data packet undoubtedly will pass through multiple wide area networks. Connecting a wide area network to a wide area network requires special devices that can route data traffic quickly and efficiently. These devices are high-speed routers. After the data packet enters the high-speed router, an address in the network layer (the IP address) is extracted, a routing decision is made, and the data packet is for- warded on to the next wide area network segment. As the data packet travels across the Internet, router after router makes a routing decision, moving the data toward its final destination. We will examine the Internet in more detail in Chapter Ten, then follow up with a discussion of several other types of wide area network technologies in Chapter Eleven.

Sensor-to-local area network layouts Another common layout found in everyday life is the sensor-to-local area network layout. In this type of layout, the action of a person or object triggers a sensor—for example, a left-turn light at a traffic intersection—that is connected to a network. In many left-turn lanes, a separate left-turn signal will appear if and only if one or more vehicles are in the left-turn lane. A sensor embedded in the roadway detects the movement of an automobile in the lane above and triggers the left-turn mechanism in the traffic signal control box at the side of the road. If this traffic signal control box is connected to a larger traffic control system, the sensor is connected to a local area network.

Another example of sensor-to-local area network layout is found within manufacturing environments. Assembly lines, robotic control devices, oven tem- perature controls, and chemical analysis equipment often use sensors connected to data-gathering computers that control movements and operations, sound alarms, and compute experimental or quality control results. Figure 1-8 shows a diagram of a typical sensor-to-local area network layout in a manufacturing environment.

10 Chapter 1

 

 

Figure 1-8 An automobile moves down an assembly line and triggers a sensor

Wiring to LAN Sensors

Wiring to LAN

Robot Arm

Satellite and microwave layouts Satellite and microwave layouts are continuously evolving technologies used in a variety of applications. If the distance between two networks is great and running a wire between them would be difficult (if not impossible), satellite and microwave transmission systems can be an extremely effective way to connect the two networks or computer systems. Examples of these applications include digital satellite TV, meteorology, intelligence operations, mobile maritime telephony, GPS navigation systems, wireless e-mail, worldwide mobile telephone systems, and video conferencing. Figure 1-9 shows a diagram of a typical satellite system.

Figure 1-9 Example of a television company using a satellite system to broadcast television services into homes and businesses

Homes

Satellite Dish

Television Company

Home

Business

Satellite

Cell phone layouts One of the most explosive areas of growth in recent years has been cell phone networks. Figure 1-10 shows an example of a handheld PDA that, along with making telephone calls, can transmit and receive data. The PDA has a modem installed, which transmits the PDA’s data across the cell phone network to the

Introduction to Computer Networks and Data Communications 11

 

 

cell phone switching center. The switching center then transfers the PDA’s data over the public telephone network or through a connection onto the Internet. Many newer handheld devices have combined data accessing capabilities with a cell phone and can transfer data over cell phone connections.

Figure 1-10 An example of a user with a smart cell phone transmitting and receiving data

Telephone Company

Land-Based Telephone Line

Wireless Transmission

Tower

Smart Cell Phone

Terminal/microcomputer-to-mainframe computer layouts Today, many businesses still employ a terminal-to-mainframe layout, although the number of these systems in use is not what it used to be. During the 1960s and 1970s, the terminal-to-mainframe layout was in virtually every office, manufacturing, and academic environment. These types of systems are still being used for inquiry/response applications, interactive applications, and data-entry applications, such as you might find when applying for a new driver’s license at the Department of Motor Vehicles (Figure 1-11).

Figure 1-11 Using a terminal (or thin client workstation) to perform a text-based input transaction

Computer Terminal

Next!

Cable Connecting to Mainframe

12 Chapter 1

 

 

The terminal-to-mainframe layouts of the 1960s and 1970s used “dumb” terminals because the end user was doing relatively simple data-entry and retrieval operations, and a workstation with a lot of computing power and storage was not necessary. A computer terminal was a device that was essen- tially a keyboard and screen with no long-term storage capabilities and little, if any, processing power. Computer terminals were used for entering data into a system, such as a mainframe computer, and then displaying results from the mainframe. Because the terminal did not possess a lot of computing power, the mainframe computer controlled the sending and receiving of data to and from each terminal. This required special types of protocols (sets of rules used by communication devices), and the data was usually transmitted at relatively slow speeds, such as 9600 or 19,200 bits per second (bps).

During this period, many of the same end users who had terminals on their desks also now found a microcomputer there (and thus had very little room for anything else). In time, terminal-emulation cards were developed, which allowed a microcomputer to imitate the abilities of a computer terminal. As terminal emulation cards were added to microcomputers, terminals were removed from end users’ desks, and microcomputers began to serve both functions. Now, if users wished, they could download information from the mainframe computer to their microcomputers, perform operations on the data, and then upload the information to the mainframe. Today, one rarely sees dumb computer terminals. Instead, most users use microcomputers and access the mainframe using either a terminal emulation card, a Web browser and Web interface, Telnet software (more on this in Chapter Ten), or a thin client. A thin client workstation is similar to a microcomputer but has no hard drive storage.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab 9 – READ INSTRUCTIONS Assignment

Assessment Worksheet

Developing Disaster Recovery Backup Procedures and Recovery Instructions Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you applied the same concepts of disaster recovery backup procedures and recovery instructions to your own data. You explained how you can lower recovery time objectives (RTOs) with proper backup and recovery procedures, you defined a process for IT system and application recovery procedures, you identified a backup solution for saving your own data, and you tested and verified your backups for RTO compliance.

Lab Assessment Questions & Answers

1. How do documented backup and recovery procedures help achieve RTO?

 

2. True or false: To achieve an RTO of 0, you need 100 percent redundant, hot-stand-by infrastructure (that is, IT systems, applications, data, and so on).

 

3. What is most important when considering data backups?

 

4. What is most important when considering data recovery?

 

5. What are the risks of using your external e-mail box as a backup and data storage solution?

 

 

 

75

 

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

 

 

6. Identify the total amount of time required to recover and install the Lab Assessment Worksheet(s) and to open the file(s) to verify integrity. (Calculate your timed RTO using your computer clock and your documented instructions.)

 

7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower?

 

8. What are some recommendations for lowering the RTO for retrieval and access to the backup data file?

 

9. If you drive RTO lower, what must you do to streamline the procedure?

 

10. Why are documenting and testing critical to achieve a defined RTO?

 

11. Why is it a best practice for an organization to document its backup and recovery steps for disaster recovery?

 

12. What can you do to cut down on the recovery time for accessing, copying, and recovering your Lab Assessment Worksheets to achieve the RTO?

 

13. What will encryption of a disk or data in storage do to the RTO definition when attempting to retrieve and recover cleartext data for production use?

 

14. How many total steps did your backup and recovery procedures consist of for this lab exercise? Are there any that can be combined or streamlined?

 

 

 

 

 

15. If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system administrator logon credentials, what additional step would be required in the recovery phase?

 

 

  1. Course Name and Number:
  2. Student Name:
  3. Instructor Name:
  4. Lab Due Date:
  5. Text92:
  6. Text93:
  7. Text94:
  8. Text95:
  9. Text96:
  10. Text97:
  11. Text98:
  12. Text99:
  13. Text100:
  14. Text101:
  15. Text102:
  16. Text103:
  17. Text104:
  18. Text105:
  19. Text106:
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Programming Principle Assignment Help

Programming Principle Assignment Help

In this  assignment,  you will  be analyzing sequence,  selection,  and loop,  the relational comparison operators,  precedence when combining AND  and OR  operators,  and the case structure. Instructions: Part I. 1. 2. 3. 4. 5. Design a program  in which,  from  a date  entered by  keyboard with the format DAY,  MONTH,  YEAR,  the date of  the following day  is  obtained. Write a program  that  asks  the user  to enter  two numbers.  If  the first  number entered is  greater  than the second number,  the program  must  print  the message “The first  number  is  the  largest”,  otherwise the  program  must  print  the message “The first  number  is  the  smallest”.  Consider  the case that  both numbers  are equal  and print  the  corresponding message. Write a program  that  simulates  the normal  operation of  a modern elevator  with 25 floors  (levels)  and that  has  two buttons:  UP  and DOWN,  except  on the lower floor  (level),  that  there  is  only  a call  button to  UP  and the  last  floor  (level)  that only  exists  DOWN  button. Write a program  that  selects  the arithmetic  operation to be executed between two numbers  depending on the value of  a variable called selectionOp. Write an algorithm  that  displays  the next  double message: Enter  a month (1 for  January,  2 for  February,….…) Enter  a day  of  the month

The algorithm  accepts  and stores  a number  in the “month”  variable  in response to the  first  question and accepts  and stores  a number  in the “day”  variable in response to the second question.  If  the  month entered is  not  between 1 and 12 inclusive,  an information message should be displayed  to  the user  warning that the number  entered is  not  valid as  a month;  in the same  way  we proceed with the number  that  represents  the day  of  the month if  it  is  not  in the range between 1 and 31.   Modify  the  algorithm  to alert  the  user  to no  enter  numbers  with decimals. Part II. 1.  In the  following pseudocode,  what  percentage raise will  an employee in Department  8 receive? if  department  <  5  then   raise =  SMALL_RAISE else    endif if  department  <  14  then raise  =  MEDIUM_RAISE else    endif if  department  <  9  then raise  =  BIG_RAISE endif 2.  Design a flowchart  or  pseudocode for  a program  that  accepts  two numbers from  a  user  and displays  one of  the following messages:  First  is  larger, second  is  larger,  numbers  are equal. 3.  Cecilia’s  Boutique wants  several  lists  of  salesperson data.  Design a flowchart or  pseudocode for  the  following: a.  A program  that  accepts  one salesperson’s  ID  number,  number  of items  sold in the last  month,  and total  value of  the items  and displays data message only  if  the salesperson is  a high performer—defined as a person who sells  more than 200 items  in the month.
b.  A program  that  accepts  the salesperson’s  data and displays  a message only  if  the salesperson is  a high performer—defined a person who sells  more than 200 items  worth  at  least  $1,000 in the month. 4.  The Dash  Cell  Phone  Company  charges  customers  a  basic  rate of  $5 per month to send text  messages.  Additional  rates  are as  follows: •  The first  100 messages  per  month,  regardless  of  message length,  are included in  the basic  bill. •  An additional  three cents  are charged for  each text  message after  the 100th message,  up to and including 300 messages. •  An additional  two cents  are charged for  each text  message after  the 300th message. •  Federal,  state,  and local  taxes  add a total  of  14 percent  to  each bill. Design a flowchart  or  pseudocode for  the following: a.  A program  that  accepts  the following data about  one customer’s messages:  area code (three digits),  phone number  (seven digits),  and number  of  text  messages  sent.  Display  all  the data,  including the monthend bill  both before and after  taxes  are added. b.  A program  that  continuously  accepts  data about  text  messages  until  a sentinel  value is  entered,  and displays  all  the details c.  A program  that  continuously  accepts  data about  text  messages  until  a sentinel  value is  entered and displays  details  only  about  customers  who send more  than 100 text  messages. d.  A program  that  continuously  accepts  data about  text  messages  until  a sentinel  value is  entered and  displays  details  only  about  customers  whose total  bill  with taxes  is  over  $10.  A  program  that  prompts  the user  for  a three-digit  area code from  which to select  bills.  Then the program continuously  accepts  text  message data until  a sentinel  value is  entered and  displays  data only  for  messages  sent  from  the specified area code. 5.  Black  Dot  Printing is  attempting  to organize  carpools  to save energy.  Each input  record contains  an employee’s  name and town of  residence.  Ten percent  of  the company’s  employees  live in  Wonder  Lake;  30 percent  live in the adjacent  town of  Woodstock.  Black  Dot  wants  to encourage employees who live in either  town to drive to  work  together.  Design  a flowchart  or pseudocode for  the following:
a.  A program  that  accepts  an employee’s  data and  displays  it  with  a message that  indicates  whether  the employee is  a candidate for  the carpool  (because he lives  in one of  the  two cities). b.  A program  that  continuously  accepts  employee data until  a sentinel  value is  entered and displays  a list  of  all  employees  who are carpool  candidates. Make sure  the decision-making process  is  as  efficient  as  possible. c.  A program  that  continuously  accepts  employee data until  a sentinel  value is  entered and displays  a list  of  all  employees  who are ineligible to carpool because they  do not  live in either  Wonder  Lake or  Woodstock.  Make sure the decision-making process  is  as  efficient  as  possible. Requirements: •  Show your  work  in a Word  document. o  Include all  your  work  for  each question. o  You can include screenshots  of  work  done on paper. •  For all  justification exercises,  remember  to use the definitions  and principles  that we have learned thus  far. •  You must  prepare a written work  where you respond to the programming exercises.  The work  must  comply  with APA  academic  writing standards.  You must  support  your  answer  using appropriate  sources  that  are properly  cited.    •  Minimum  four  pages  in length,  excluding the Title and Reference page. •  APA format,  including an in-text  citation for  referenced works. •  At least  three  resources.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

CSC101 Introduction to Computer Science Saint Martin’s University Professor: Teresa Escrig Module 1 Assignments Due September 6 Write Python code to solve the following problem:

1. Write a Python program that prompts the user for his/her amount of money, then reports how many Nintendo Wiis the person can afford, and how much more money he/she will need to afford an additional Wii.

Optional problems: 30. Write a Python program that will accept the base and height of a triangle and compute the area. 31. Write a Python program to compute the greatest common divisor (GCD) of two positive integers. 32. Write a Python program to get the least common multiple (LCM) of two positive integers. 38. Write a Python program to solve (x + y) * (x + y). Test Data : x = 4, y = 3 Expected Output : (4 + 3) ^ 2) = 49 40. Write a Python program to compute the distance between the points (x1, y1) and (x2, y2). Go to http://www.w3resource.com/python-exercises to see the solutions to the previous problems.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Analytics Lifecycle Assignment Help

Data Analytics Lifecycle Assignment Help

Read Chapter 2 – Data Analytics Lifecycle and answer the following questions.

1. In which phase would the team expect to invest most of the project time? Why? Where would the team expect to spend the least time?

2. What are the benefits of doing a pilot program before a full-scale rollout of a new analytical method- ology? Discuss this in the context of the mini case study.

3. What kinds of tools would be used in the following phases, and for which kinds of use scenarios?

a.Phase 2: Data preparation
b.Phase 4: Model building

Requirements:

– Typed in a word document.
– Each question should be answered in not less than 150 – 200 words.
– Follow APA format.
– Please include at least three (3) reputable sources.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python Code Assignment Help

Python Code Assignment Help

I need help with this project and I am very lost here.  Can anyone with coding knowledge and knows how to integrat C++ and Python please help?  The faster I receive this the better the tip will be.  If no one knows how to integrate these language and offer working code, please do not bother bidding.  I will attach put in the directions below and also load the starter/wrapper code in the attachments.  Also the input list is provided , but can provide the link if necessary.  Thanks.

Scenario

You are doing a fantastic job at Chada Tech in your new role as a junior developer, and you exceeded expectations in your last assignment for Airgead Banking. Since your team is impressed with your work, they have given you another, more complex assignment. Some of the code for this project has already been completed by a senior developer on your team. Because this work will require you to use both C++ and Python, the senior developer has given you the code to begin linking between C++ and Python. Your task is to build an item-tracking program for the Corner Grocer, which should incorporate all of their requested functionality.

The Corner Grocer needs a program that analyzes the text records they generate throughout the day. These records list items purchased in chronological order from the time the store opens to the time it closes. They are interested in rearranging their produce section and need to know how often items are purchased so they can create the most effective layout for their customers. The program that the Corner Grocer is asking you to create should address the following three requirements for a given text-based input file that contains a list of purchased items for a single day:

  1. Produce a list of all items purchased in a given day along with the number of times each item was purchased.
  2. Produce a number representing how many times a specific item was purchased in a given day.
  3. Produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased.

As you complete this work, your manager at Chada Tech is interested to see your thought process regarding how you use the different programming languages, C++ and Python. To help explain your rationale, you will also complete a written explanation of your code’s design and functionality.

Directions

One of Python’s strengths is its ability to search through text and process large amounts of data, so that programming language will be used to manage internal functions of the program you create. Alternatively, C++ will be used to interface with users who are interested in using the prototype tracking program.

Grocery Tracking Program
Begin with a Visual Studio project file that has been set up correctly to work with both C++ and Python, as you have done in a previous module. Remember to be sure you are working in Release mode, rather than Debug mode. Then add the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files, linked in the Supporting Materials section, to their appropriate tabs within the project file so that C++ and Python will be able to effectively communicate with one another. After you have begun to code, you will also wish to access the CS210_Project_Three_Input_File, linked in the Supporting Materials section, to check the functionality and output of your work.

As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors are missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.

  1. Use C++ to develop a menu display that asks users what they would like to do. Include options for each of the three requirements outlined in the scenario and number them 1, 2, and 3. You should also include an option 4 to exit the program. All of your code needs to effectively validate user input.
  2. Create code to determine the number of times each individual item appears. Here you will be addressing the first requirement from the scenario to produce a list of all items purchased in a given day along with the number of times each item was purchased. Note that each grocery item is represented by a word in the input file. Reference the following to help guide how you can break down the coding work.
    • Write C++ code for when a user selects option 1 from the menu. Select and apply a C++ function to call the appropriate Python function, which will display the number of times each item (or word) appears.
    • Write Python code to calculate the frequency of every word that appears from the input file. It is recommended that you build off the code you have already been given for this work.
    • Use Python to display the final result of items and their corresponding numeric value on the screen.
  3. Create code to determine the frequency of a specific item. Here you will be addressing the second requirement from the scenario to produce a number representing how many times a specific item was purchased in a given day. Remember an item is represented by a word and its frequency is the number of times that word appears in the input file. Reference the following to help guide how you can break down the coding work.
    1. Use C++ to validate user input for option 2 in the menu. Prompt a user to input the item, or word, they wish to look for. Write a C++ function to take the user’s input and pass it to Python.
    2. Write Python code to return the frequency of a specific word. It will be useful to build off the code you just wrote to address the first requirement. You can use the logic you wrote but modify it to return just one value; this should be a fairly simple change (about one line). Next, instead of displaying the result on the screen from Python, return a numeric value for the frequency of the specific word to C++.
    3. Write a C++ function to display the value returned from Python. Remember, this should be displayed on the screen in C++. We recommend reviewing the C++ functions that have already been provided to you for this work.
  4. Create code to graphically display a data file as a text-based histogram. Here you will be addressing the third requirement from the scenario: to produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased. Reference the following to help guide how you can break down the coding work:
    1. Use C++ to validate user input for option 3 in the menu. Then have C++ prompt Python to execute its relevant function.
    2. Write a Python function that reads an input file (CS210_Project_Three_Input_File, which is linked in the Supporting Materials section) and then creates a file, which contains the words and their frequencies. The file that you create should be named frequency.dat, which needs to be specified in your C++ code and in your Python code. Note that you may wish to refer to work you completed in a previous assignment where you practiced reading and writing to a file. Some of your code from that work may be useful to reuse or manipulate here. The frequency.dat file should include every item (represented by a word) paired with the number of times that item appears in the input file. For example, the file might read as follows:
      • Potatoes 4
      • Pumpkins 5
      • Onions 3
    3. Write C++ code to read the frequency.dat file and display a histogram. Loop through the newly created file and read the name and frequency on each row. Then print the name, followed by asterisks or another special character to represent the numeric amount. The number of asterisks should equal the frequency read from the file. For example, if the file includes 4 potatoes, 5 pumpkins, and 3 onions then your text-based histogram may appear as represented below. However, you can alter the appearance or color of the histogram in any way you choose.
      • Potatoes ****
      • Pumpkins *****
      • Onions ***
  5. Apply industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability and maintainability. Remember that you must demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency. This includes the following:
    1. Using input validation and error handling to anticipate, detect, and respond to run-time and user errors (for example, make sure you have option 4 on your menu so users can exit the program)
    2. Inserting in-line comments to denote your changes and briefly describe the functionality of the code
    3. Using appropriate variable, parameter, and other naming conventions throughout your code

Programming Languages Explanation
Consider the coding work you have completed for the grocery-tracking program. You will now take the time to think more deeply regarding how you were able to combine two different programming languages, C++ and Python, to create a complete program. The following should be completed as a written explanation.

  1. Explain the benefits and drawbacks of using C++ in a coding project. Think about the user-focused portion of the grocery-tracking program you completed using C++. What control does this give you over the user interface? How does it allow you to use colors or formatting effectively?
  2. Explain the benefits and drawbacks of using Python in a coding project. Think about the analysis portions of the grocery-tracking program you completed using Python. How does Python allow you to deal with regular expressions? How is Python able to work through large amounts of data? What makes it efficient for this process?
  3. Discuss when two or more coding languages can effectively be combined in a project. Think about how C++ and Python’s different functions were able to support one another in the overall grocery-tracking program. How do the two function well together? What is another scenario where you may wish to use both? Then, consider what would happen if you added in a third language or switched Python or C++ for something else. In past courses, you have worked with Java as a possible example. What could another language add that would be unique or interesting? Could it help you do something more effectively or efficiently in the grocery-tracking program?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

UFO Sightings- Building Website Assignment HelP

Do certain areas have higher concentrations of sightings?

What is the most common shape of a sighting?

What is the average duration of a sighting?

Is there a higher concentration of sightings at night?

Data sets are here:

https://www.kaggle.com/NUFORC/ufo-sightings/metadata (Century of data)Attached

http://www.nuforc.org/webreports/ndxe202004.html (April sightings 2020)

Sketch ideal visuals 

Bubble Map to view concentration levels of sightings (Leaflet)

example: https://www.d3-graph-gallery.com/bubblemap.html

Lollipop Chart to view the most common shapes of a sighting

example: https://www.d3-graph-gallery.com/lollipop.html

Violin Chart to view the bins of duration for a sighting

example: https://www.d3-graph-gallery.com/violin.html

Word Cloud of submitted summaries for each sighting (D3)

example: https://www.d3-graph-gallery.com/graph/wordcloud_size.html

Requirements: 

Your assignment should: 

Include A dashboard page with multiple charts that updates from the same data

Should include Json amCharts (https://www.amcharts.com/javascript-maps/)

Must include some level of user-driven interaction(e.g, menus, dropdowns. textboxes)

Main web page with navbar (possible separate pages for charts as well)

Main page with a filter for selected dates/locations with a collective chart change

Main Chart on top of screen – Map of locations (Bubble)

Secondary chart below or beside Bubble: Amchart pictorial

(This chart will show how many sightings per period selected)

Filtered charts per date or location:

Violin, Lollipop, Word Cloud

A combination of web scraping and Leaflet or Plotly 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Basic Charts

 

The Excel file accompanying this assignment (SuperDrugsPrescriptions) contains fictitious pharmaceutical sales information. Using this data, create a Tableau worksheet to answer each of the following questions:

FILE to use: SuperDrugsPrescriptions.xlsx

 

1. Exactly recreate the following visualization of the average prescription price over time:

 

 

2. Exactly recreate the following visualization of prescription quantity vs. profit. The color of each mark denotes the region, and the shape denotes the drug supplier:

 

Use the viz you just created to answer the following in a word document:

 

· What pharmacy and drug supplier represented the highest profit mark on this viz, across all regions?

· What pharmacy and drug supplier represented the highest profit mark on this viz in the East region?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

LAB 2 Assignment Help

LAB 2 Assignment Help

1. Question #2 – Page # 88, Use data P02_03.xlsx.

The file P02_03.xlsx contains data from a survey of 399

people regarding a government environmental policy.

a. Create a crosstabs and an associated column chart for

Gender versus Opinion. Express the counts as percentages

so that for either gender, the percentages add

to 100%. Discuss your findings. Specifically, do the

two genders tend to differ in their opinions about the

environmental policy?

b. Repeat part a with Age versus Opinion.

c. Recode Salary to be categorical with categories “Less

than $40K,” “Between $40K and $70K,” “Between $70K

and $100K,” and “Greater than $100K” (where you can

treat the breakpoints however you like). Then repeat

part a with this new Salary variable versus Opinion.

2.  Question #20 – Page #96, Use data P02_56.xlsx

The file P02_56.xlsx contains monthly values of indexes

that measure the amount of energy necessary to heat or cool

buildings due to outside temperatures. (See the explanation

in the Source sheet of the file.) These are reported for each

state in the United States and also for several regions, as

listed in the Locations sheet, from 1931 to 2000.

a. For each of the Heating Degree Days and Cooling

Degree Days sheets, create a new Season variable

with values “Winter,” “Spring,” “Summer,” and “Fall.”

Winter consists of December, January, and February;

Spring consists of March, April, and May; Summer

consists of June, July, and August; and Fall consists of

September, October, and November.

b. Find the mean, median, and standard deviation

of Heating Degree Days (HDD), broken down by

Season,

for the 48 contiguous states location (code

5999). (Ignore the first and last rows for the given location,

the ones that contain -9999, the code for missing

values.)

Also, create side-by-side box plots of HDD,

broken down by season. Comment on the results. Do they go in the direction you would expect? Do the

same for Cooling Degree Days (which has no missing data).

c. Repeat part b for California (code 0499).

d. Repeat part b for the New England group of states

(code 5801).

3.  Question #30 – Page #105, Use data P03_30.xlsx

rates of various currencies versus the U.S. dollar. It is of

interest to financial analysts and economists to see whether

exchange rates move together through time. You could find

the correlations between the exchange rates themselves,

but it is often more useful with time series data to check for

correlations between differences from day to day.

a. Create a column of differences for each currency.

b. Create a table of correlations between all of the original

variables. Then on the same sheet, create a second

table of correlations between the difference variables.

On this same sheet, enter two cutoff values, one positive

such as 0.6 and one negative such as 20.5, and

use conditional formatting to color all correlations (in

both tables) above the positive cutoff green and all

correlations below the negative cutoff red. Do it so

that the 1’s on the diagonal are not colored.

c. Based on the second table and your coloring, can you

conclude that these currencies tend to move together

in the same direction? If not, what can you conclude?

dRepeat part for Ratio2.

1. Question #49 – Page #125, Use data P03_22.xlsx

The file P03_22.xlsx lists financial data on movies

released from 1980 to 2011 with budgets of at least

$20 million.

a. Create three new variables, Ratio1, Ratio2, and

Decade. Ratio1 should be US Gross divided by

Budget,

Ratio2 should be Worldwide Gross divided by

Budget, and Decade should list 1980s, 1990s, or

2000s, depending on the year of the release date.

If either US Gross or Worldwide Gross is listed as

“Unknown,” the corresponding ratio should be blank.

(Hint: For Decade, use the YEAR function to fill in a

new Year column. Then use a lookup table to populate

the Decade column.)

b. Use a pivot table to find counts of movies by various

distributors. Then go back to the data and create one

more column, Distributor New, which lists the distributor

for distributors with at least 30 movies and lists

Other for the rest. (Hint: Use a lookup table to populate

Distributor New, but also use an IF to fill in Other

where the distributor is missing.)

c. Create a pivot table and corresponding pivot chart

that shows average and standard deviation of Ratio1,

broken down by Distributor New, with Decade in the

Filters area. Comment on any

d. Repeat part for Ratio2.

1.  Question #63 – Page #129, Use data P03_63.xlsx

63. The file P03_63.xlsx contains financial data on 85

U.S. companies in the Computer and Electronic Product

Manufacturing sector (NAICS code 334) with 2009

earnings before taxes of at least $10,000. Each of these

companies listed R&D (research and development)

expenses on its income statement. Create a table of correlations

between all of the variables and use conditional

formatting to color green all correlations involving

R&D that are strongly positive or negative. (Use cutoff

values of your choice to define “strongly.”) Then create

scatterplots of R&D (Y axis) versus each of the other

most highly correlated variables. Comment on any patterns

you see in these scatterplots, including any obvious

outliers, and explain why (or if) it makes sense that

these variables are highly correlated with R&D. If there

are highly correlated variables with R&D, can you tell

which way the causality goes?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!