Saturday, January 25, 2020

Wide Area Networks, Observer Management and Monitoring Tools

Wide Area Networks, Observer Management and Monitoring Tools Abstract In this report the concepts of different network management principles will be explored with a view to demonstrating how Observer manages wide area networks. The report will explore the issues with WAN and how Observer overcomes these problems. Introduction Wide area networks are becoming far more complex and far wider spread than ever before, this of course leads to some big problems for the network managers of these large scale networks. Most of these networks are huge in size and can easily encompass an entire city, whereas most of them are transcontinental. This poses the first of many problems for a network manager, they may not be in the same continent as a large proportion of their network. This makes the use of network management software essential, such as Observer. Using network management software means the network manager would not have to leave their desk to find any fault in the network whether it was in the next room or half way across the globe. Literary Review The most useful literary text the author found was from the new owners of Observer, the software used in this report. The new owners ViaviSolutions have published a white paper on using   Observer Analyser, their latest version of the observer suite as a security tool. (anon, 2014) The journal by Liu et al. (2014) provided a lot of insight into where wide area networks are going, and their optimisation. It contains interesting formulae for network optimisation using the Gauss-Newton method of nonlinear least squares. This principally agrees with the first text in this review about the nature and make up of a wide area network. Ahmed Boutaba, (2014) goes on to agree in part with the rest of the journals about the nature of a WAN but goes on to discuss the fact that traditional controllers can cause bottle necks in the network and that opting for SDN (Software Defined Network) allows for a faster network and a higher level of quality overall. Ahmedi Mitrevski, (2014) looks at possibly the only real area of disagreement with regards to WANs and that is how much they cost. The relative cost of implementing and the monthly upkeep of a network seems to be the only area where professionals disagree about these networks. Anon (2008). This seminar outlined the principles of network management that are considered as industry standard. Cahn, (1998). This journal looks at the design of WANs and their benefits, and this also agrees with the principles outlined in the previous articles mentioned, including the ambiguous nature of the costing of a network. It outlines there are only three important numbers when considering a WAN, these are the cost, either monthly up keep, total set up cost or a mixture of both, the reliability and the response times, and goes on to say these are all directly proportional to each other, as in if you reduce the amount of money spent the response time goes up which brings the reliability down. Dian Septama et al., (2015). In this journal there is lots of information regarding providing a high quality of service, one of the main areas a network manager faces the biggest struggles and can cause the biggest issues aside from security. Feng et al.,( 2014) this journal explores the real world application of a WAN and covers the issues in using traditional methods against new technologies which are opting for more automation and utilising programs and algorithms to manage the trivial day-to-day running of a network which frees up the human element to focus their time on more important tasks. Geer,( 2013)this journal focuses more on the security and current state of the internet, but in essence the internet is just a very large WAN and so its management and security are relevant here (Langer et al., 2010) this journal uses the example of a healthcare organisation utilising the fast and secure delivery methods of a WAN to transport confidential patient files and details across the WAN to remote geographical locations, the main example used is radiology images. These are now digital images and are large in size due to the resolutions required to accurately use them for medical diagnosis. Malhotra et al., (2011) this journal replicates closely the experiment that was carried out by the author of this report, the main differences are this journal experiments with a LAN and uses OPNET to generate the usage. Shin et al., (2007) this journal agrees with Ahmed Boutaba, (2014) and Feng et al.,( 2014) in so much as they state that a network should be monitored and managed by an algorithm based on the existing SNMP framework. Tiropanis et al., (2015)this journal explores the development of networks and their respective sciences and how these have evolved, specifically into internet science and web science. And how each of these areas are evolving in their own areas and how each of them has an impact on the others. Travostino et al., (2006) this journal outlines another real world application of WANs for the distribution of virtual machines and how they can be utilised to compute large tasks aver the network instead of only using local resources. Wang et al., (2014) this journal documents an experiment into the future of how security of a WAN could be implemented. It outlays an idea of sending the authentication key across the network securely but not via mathematical encoding to deter eavesdroppers but by quantum physics. The system uses high frequency lasers beamed down fibre optic cables which are encoded by the transmitter and then decoded by a receiver, the encryption is encoded into the specific frequency of the lasers architecture and photon length. Each transmitter and receiver contain sophisticated monitoring circuitry which monitor the incoming traffic and actively scan for Trojan horse photons from the channel. Observer and wide area networks For the purposes of this report the author created a simulated WAN to utilise the software Observer to implement network management. The network simulated three terminals situated in three cities around the world. The console was simulated as being in London, one was in Paris and the other was in New York Fig 1: Showing Simulated Geographical Location of Console (Circled) Fig 2: Showing Simulated Geographical Location of Second PC (Circled) Fig 3: Showing Simulated Geographical Location of Third PC (Circled) Once the author had set up the WAN they opened Observer on each of the machines connected to the virtual WAN. The machine simulated as London was selected as the machine to be the console for the purpose of managing the network and so was configured to collate the data generated by the network. The other two machines utilised the inbuilt traffic generation tool in Observer. Although the software produces traffic this is of a CBR style and so the data received is evidently simulated but for the purpose of this report this is acceptable. The traffic generator in Observer comes with a plethora of options. The default option sends a small group of packets through on a broadcast channel (ff:ff:ff:ff:ff:ff) the author altered this setting to generate the top talkers and pair matrix graphs as on a broadcast channel all the traffic appeared to be generating and received by the switchs MAC address which wasnt the case. The size of the packet and the transmission length were also altered to gi ve a larger test sample. The author also tried to generate random traffic which is one of the options but this seemed to have no effect on the traffic generated as it was constant bit rate style simulation traffic. Fig 4: observer running on first PC (Simulated location Paris) Fig 5: Observer running on third PC (simulated location New York) Fig 6: Traffic Generation on second PC (Paris) Fig 7: Traffic Generation on third PC (New York) On the console PC observer was running several of its functonal windows, first of which was the top talkers windows. This window is utilised to identify the staations on the network with the highest traffic volumes. This is particularly usefull from a management perspective as to monitor the personality of the network in order to maintain smooth operation, and identify potential security threats. (Anon, 2016) the top talkers screen provides a huge amount of information about the different stations attached to the network, including the amount of traffic generated and received by the node in both packets and bytes, its MAC address, its IP address . From this screen the network manager can monitor all the nodes on the network and diagnose issues as they happen. If a node suddenly starts generating large amounts of traffic for no apparent reason the network manager can have observer set up an alert and even have it send a SMS message or email reporting the issue. This ensures the networ k manager can stay on top of all aspects of the network regardless of time or location. If any issues arise the network manager can deploy a resource from the technical team to resolve the problem swiftly so as not to impact upon the quality of service. Fig 8: Observer Top Talkers window with Paris PC selected Fig 9: Observer Top Talkers window with New York PC selected Looking at the top talkers window identifies that the two Traffic generating PCs were indeed the ones with the heaviest traffic flow, followed by the swiches and hub that connected them all together. A network manager looking at this screen can monitor all machines connected to the network regardless of geographical location, even wireless connections are shown and can be monitored. (Liu et al., 2014) Another window on the console pc is the paired matrix screen. With this tool the network manage can monitor the pathways the network traffic is taking on the network. Through this analysis the network manager can optimise the network through routing manipulation. If a particular router is getting the brunt of the network traffic a second router can be installed to share the traffic burden and reduce the utilisation of the initial router and theoretically improve the quality of service. (Anon, 2016), (Anon, 2008) Fig 10: the Pair Matrix window showing traffic from the Paris PC the the New York pc and then to conslolePC Fig 11: Paris and New York PCs traffic going straight to Consloe PC The final tool used by the author is the packet capture window. The first attempts at packet capture by the author demonstrated the need for checking the settings thouroughly as the buffer for capture was very small and so the captured line on the graph was tiny to start with untill this was increased by the author. After increasing the buffer size the graphs look much better and the data far more usable. After increaseing the buffer hugely the traffic was restarted and the capture began again. The packet capture showed the traffic being generated as it monitors all traffic on the network, but will only capture a certain amount for analysis. Fig 12: Packet Capture window showing the current traffic on the network (yellow line shows packets captured, blue line is total packets on network) Fig 13: Packet cature after buffer increased Fig 14: Dialogue box from Observer detailing total packets and ability to save the range for later reference Through the packet capture the network manager can observe the networks personality again to monitor for threats and general maintenance of the network. (Anon, 2016) Results After running the experiment the data collected showed exactly how powerful the observer tool can be, although there was only three machines the scope of observers abilities is evident and can easily be imagined for a network of three thousand machines. The interface can be de-cluttered to show only relevant information so the network manager wouldnt get bogged down with an information overload. Looking at the paired matrix graphs there are several lines on the screen all of which are communiquà ©s between nodes on the network, not all of these are PCs most of them are routers and switches along which the WAN is established. The thickness of each line denotes the amount of traffic it has dealt with. These lines show both incoming and outgoing traffic and the lines connect the source to its destination address. The labels are a combination of the assigned name, normally the name assigned in the NIC and its MAC address EG. Broadcom[5A:7C:09] the label for the console PC. As shown in fig 11 the packets do not have to be routed to or even through the console PC for Observer to pick the packets up and display them. The data collected from the packet capture can be used to manually calculate the utilisation of the network, although this can also be worked out by Observer automatically. The packet capture screen is in a graph format with time across the bottom and the amount of packets per second up the side. There are three coloured lines on the graph blue which denotes the total packets on the network, yellow which are the packets captured by Observer and red which denotes the amount of dropped packets. In the data captured there were no dropped packets, and a peak of approximately 500 packets per second. This flow rate lasts for five minutes with no dropped packets, showing the networks utilisation was within acceptable ranges. if there had been dropped packets it would show that the network was working too hard and there for would mean it had a high utilisation and would prompt the network manager to address the utilisation, and to optimise the efficiency of the network. Looking at the top talkers table in fig 9, in this data it is evident which nodes on the network receive the most and also which transmit the most. This information is highly important to the network manager as these are essential to the security and effective maintenance of the network. For example if there was an employee using the companys network to watch movies on their workstation the network manager would see within Observer a radical change to the stoichiometry of the network and its personality would change. Once this change had been brought to the network managers attention they could look on Observer at the top talkers and paired matrix charts and identify which terminal was using an abnormal amount of the networks bandwidth and then take action against the offending party in line with the companys IT policy. Conclusion This report has looked at the management techniques used in applying wide area networks, their future, their application in the real world and their design and deployment, it is the opinion of the author that the general consensus is that the IT community seem to be in agreement about most concepts of wide area networks, apart from the cost of them, and how to control them. Although the majority of newer reports (Shin et al., 2007), (Ahmed Boutaba, 2014), and (Feng et al., 2014) are swayed towards having the majority of the control handed over to algorithms and evolution programs, there is also still call for there to be a human element to be involved in the management process.  Ãƒâ€šÃ‚   After looking through the papers used in the research for this report it is the opinion of the author that the application of a well managed WAN is far more beneficial than any other communication option, considering the internet is in reality just a huge WAN its self, a WAN can run everythi ng in a business or academic environment, from physical security like door locks and fire alarms through to phones (Dian Septama et al., 2015) and lighting, there are even applications to control environmental conditions. With the introduction of automated network managers, the buildings air conditioning could be being controlled by a computer thousands of miles away. With the development of encrypted laser communications utilised in QKD making networks virtually completely secure the control of more sensitive systems may fall under the control of larger WANs and possibly a large central, global WAN to control all the mundane systems around the globe. To conclude this report the author believes in view of the huge advances in using automated network management options and the amount of non communications based areas controlled by nodes on the network, coupled with the advancements made in artificial intelligence the role of the human network manager could become extinct as we know it. The role could progress to either being an overseer of the AI or completely redundant altogether. Bibliography Ahmed, R. Boutaba, R. (2014) Design considerations for managing wide area software defined networks. IEEE Commun. Mag., 52 (7), pp.116-123. Ahmedi, B. Mitrevski, P. (2014) On The Development of Methodology for Planning and Cost-Modeling of A Wide Area Network. IJCNC, 6 (3), pp.71-90. Anon (2008) 10th IEEE/IFIP Network Operations and Management Symposium (NOMS2008). IEICE Communications Society Magazine, 2008 (7), pp.7_12-7_15. Anon (2014) USING A NETWORK ANALYZER AS A SECURITY TOOL. 1st ed. Minnetonka. Available from: [Accessed 17 December 2015]. Cahn, R. (1998) Wide area network design. San Francisco, Calif., Morgan Kaufmann. Dian Septama, H., Ulvan, A., Hlavacek, J. Bestak, R. (2015) High Available VoIP Server Failover Mechanism in Wide Area Network. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13 (2), p.739. Feng, Y., Cui, D., Li, Y., Zhang, J. Li, J. (2014) Contrasting Meteorological Wide-Area Networks and Evolutionary Programming. AMM, 687-691, pp.2557-2560. Geer, D. (2013) Resolved. Communications of the ACM, 56 (6), p.48. Langer, S., French, T. Segovis, C. (2010) TCP/IP Optimization over Wide Area Networks: Implications for Teleradiology. Journal of Digital Imaging, 24 (2), pp.314-321. Liu, L., Ling, Q. Han, Z. (2014) Decentralized Gauss-Newton method for nonlinear least squares on wide area network. IOP Conf. Ser.: Mater. Sci. Eng., 67, p.012021. Malhotra, R., Gupta, V. K. Bansal, R. (2011) Simulation and Performance Analysis of Wired and Wireless Computer Networks. International Journal of Computer Applications, 14 (7), pp.11-17. Shin, K., Jung, J., Cheon, J. Choi, S. (2007) Real-time network monitoring scheme based on SNMP for dynamic information. Journal of Network and Computer Applications, 30 (1), pp.331-353. Tiropanis, T., Hall, W., Crowcroft, J., Contractor, N. Tassiulas, L. (2015) Network science, web science, and internet science. Communications of the ACM, 58 (8), pp.76-82. Travostino, F., Daspit, P., Gommans, L., Jog, C., de Laat, C., Mambretti, J., Monga, I., van Oudenaarde, B., Raghunath, S. Yonghui Wang, P. (2006) Seamless live migration of virtual machines over the MAN/WAN. Future Generation Computer Systems, 22 (8), pp.901-907. Wang, S., Chen, W., Yin, Z., Li, H., He, D., Li, Y., Zhou, Z., Song, X., Li, F., Wang, D., Chen, H., Han, Y., Huang, J., Guo, J., Hao, P., Li, M., Zhang, C., Liu, D., Liang, W., Miao, C., Wu, P., Guo, G. Han, Z. (2014) Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express, 22 (18), p.21739.

Friday, January 17, 2020

Introduction to the Human Body Level 3

Anatomy and Physiology Introduction to the Human body Introduction The human body is such an interesting machine, the way it is structured and how it works is educational. There is so much to learn about the human body and up until today scientists are still under going medical research. There are a lot of questions people would like to know about how their body works. The report will include the following structures: †¢ Deoxyribonucleic Acid (DNA) †¢ An Organelle †¢ The cell membrane It will also evaluate the functions of the following structures: †¢ The cell †¢ Body tissue Body system Findings 1. 1Deoxyribonucleic Acid (DNA) 1. 2An Organelle 1. 3The Cell Membrane 2. 1 The Cell 2. 2 Body Tissue 2. 3 Body System 3. 1 Ultrasound 3. 2 Gastroscopy 3. 3 Similarities, benefits and risks of the two procedures 4. 1 Cloning 1. 1 Deoxyribonucleic Acid (DNA) Deoxyribonucleic Acid is a molecule, which passes down information, required for the growth, development and reproduction of an organism. It is passed from adults to their childre n (offspring). DNA is found inside the nucleus of the cell and due to there being a lot of DNA molecules inside a cell; each molecule must be tightly packed.This then becomes a chromosome. DNA found in the cell nucleus is referred to as nuclear DNA, a human’s complete set of nuclear DNA is called its genome. A genome consists of 23 pairs of chromosomes; these chromosomes together consist of 3. 1 billion bases of DNA sequence. DNA consists of chains called nucleotides. Theses are made up of three parts: a phosphate group, a sugar group and one of four types of nitrogen bases. The four types of nitrogen bases found in nucleotides are: adenine (A), thymine (T), guanine (G) and cytosine (C). The order or sequence these bases come in, is due to that specific strand of DNA .Each ladder in the DNA is made of two-linked bases. Only (A) and (T) can link together and (G) and (C) can link together. Adenine and Guanine are purines. Purines are double ringed structures. Cytosine and Thymi ne are singled ringed structures and are known as pyramidines. Each DNA sequence that contains instructions, to make a protein, is known as a gene. DNA is used to make proteins in a two-step process. Enzymes read the information in a DNA molecule and then transcribe it into an intermediary molecule called messenger ribonucleic acid (RNA), or mRNA.Next the information in the molecules is translated into the â€Å"language† of amino acids, which are the building blocks of proteins. (Appendix i) 1. 2 An Organelle An organelle is a discrete structure within a cell, as chloroplast or acentriole. It is characterised by having specialised functions, a usually distinctive chemical composition and an identifying molecule structure: often found in large numbers in aparticular cell. Organelles have specific roles to play in how cells work. Some organelles are separated from the rest of the cell by lipid bi-layers similar in structure to the cell membrane.An example of an organelle is ri bosomes. The function of ribosomes is the assembly of proteins, in a process called translation. Ribosomes do this by catalysing the assembly of individual amino acids into polypeptide chains; this involves binding a messenger RNA and then using this as a template to join together the correct sequence of amino acids. (Appendix ii) 1. 3 The Cell Membrane All cells are surrounded by a cell membrane, and its primary purpose is to keep the contents of the cell all together. Cell membranes are like many other organelles of a cell because they exist for a specific job.This job is to monitor and control everything that enters and leaves the cell. The cell membrane is made up of lipid molecules called phospholipids. These molecules all have one polar head and two hydrocarbon tails according to cellupedia. There are three main classes of lipid molecules, which make up a cell membrane. These classes include phospholipids, glycolipids and cholesterol. The particular amount of these lipids vari es across different membranes. The cell membrane is mobile and moves along â€Å"groves† which are set paths the membrane follow.Membranes are composed phospholipids, proteins and carbohydrates arranged in a fluid mosaic structure. The phospholipids form a thin, flexible sheet, while the proteins float in the phospholipids sheet and the carbohydrates extend out from the proteins. (Appendix iii) 2. 1 The Cell A cell is the smallest unit of living matter. All living things including plants and animals are made up of cells. Cells are made of atoms, which are the smallest units of matter. There are many different kinds of cells. All cells have a â€Å"skin† called plasma membrane, protecting it from the outside environment.The cell membrane regulates the movement of water, nutrients and wastes into and out of the cell. Inside of the cell membrane are the working parts of the cell. At the centre of the cell is the cell nucleus. The cell nucleus contains the cell’s DN A, the genetic code that coordinates protein synthesis. In addition to the nucleus, there are many organelles inside of the cell, small structures that help carry out the day to day operations of the cell. Organelles are groups of complex molecules that help a cell survive. There are many functions that the cell has to carry out: molecule transport, reproduction, energy conversion and many more.I have chosen to discuss reproduction as one of the cells functions. Reproduction One of the main purposes of human beings and living creatures is to survive. To be able to do this the cells must be able to reproduce. Reproduction allows a species of cells to increase its population and have a higher competitive advantage. Second, sexual reproduction can help introduce genetic variation into specie which can be beneficial in the long run. Example of this might be the difference in looks between individuals. Cells can reproduce in two ways, mitosis and meiosis.In mitosis, the resulting daughte r cell is an identical clone of the original cell. Mitosis is mostly used by somatic cells (cells of the body). Meiosis however, is the form of sexual reproduction and only occurs in gametes (reproductive cells). Mitosis If an organism is to live and grow up it must reproduce. Cell division serves an important role in organisms’ health and growth. Cell division begins with interphase, when the cell replicates all of its genomic and cytoplasmic material and prepares for division. After the cell enters the 4-phased mitosis.To see the similarities between mitosis and meiosis see appendix. (Appendix IV) 2. 2 Body Tissue Body tissue is a layer of cells that perform a function. Different types of tissues have different structures that are specific to that function. Tissues can be held together by a sticky coating called an â€Å"extracellular matrix†. The Latin word for tissue is derived from the verb texere, â€Å"to weave†. The major tissue types in the human body: †¢ Connective †¢ Muscular †¢ Nervous System †¢ Lymphatic The type of tissue that has been selected is muscle tissue. Muscle TissueMuscle tissue contains a number of microfilaments composed of actins’ and myosin, which are contractile proteins. There are three types of tissue: Cardiac muscle, skeletal muscle and visceral (smooth) muscle. Cardiac muscle is found in the heart. The cells are joined to one another by intercalated discs which allow the synchronisation of the heartbeat. Skeletal muscle is attached to the bones by tendons. Skeletal muscle is striated muscle. Unlike cardiac muscle, the cells are not branched. Visceral muscle is found in: the arteries, the bladder, the digestive tract and in many other organs.Visceral muscle contracts slower than skeletal muscle, but the contraction can be sustained over a long period of time. (Appendix v) 2. 3 Body System There are 11 systems in the body they are as follows: The Circulatory system Digestive system Endocrine system Immune system Lymphatic system Muscular system Nervous system Reproductive system Skeletal system. (Appendix VI) The system that has been selected is ‘The Reproductive System’. Reproductive System Females have sex organs of: ovaries, fallopian tubes, uterus and vagina. Whereas the males sex organs are: vas deferens, seminal vesicles, prostate and the penis.In the reproductive system a female needs a male to fertilise her egg. There are two types of sex cells known as gametes, the male gamete is sperm and the females’ gamete is the egg. The females’ vagina has several functions: used for sexual intercourse, the pathway that the baby comes out at childbirth, as the route for the menstrual blood (period) to leave the body from the uterus and for a tampon to be used during the menstrual cycle. The menstrual cycle lasts for around 28 days, during this cycle a egg is released from the females’ ovaries once every month and goes down the fa llopian tubes to be fertilised.If the egg does not get fertilised it dries up and two weeks later leaves the body through the vagina, which causes the female to have her period. A period is forms of blood and tissue from the inner lining of the uterus. A period can last anything up to 5 days or longer. Females will not have a period until they have started puberty; puberty usually starts when females and males are aged around 11-14. If the male and female sex cell are fertilised the egg that is released will not dry up and the female will not have a period. The egg will then make its way to the uterus and grow into a foetus. Appendix vii) 3. 1 1st diagnostic procedure- Ultrasound Ultrasound is a non-invasive technique that may be used during pregnancy for finding out the sex of the foetus and whether there is more than one foetus, ultrasound also identifies the measurements of the foetus. The sonographer, is the person who carries out the procedure, she or he can usually tell you ho w many weeks old your foetus is. The mother usually has an ultrasound twice in nine months, the first at 3 months and the second at 5 months. Usually at the second scan you will be able to find out if the baby is a boy or a girl.Ultrasound can find any complications or problems that the baby might have during the pregnancy. They put a cold gel on the mothers’ bump and press the transducer across the bump to see inside of the belly. Having experienced this procedure confirms that ultrasound is a very accurate method of confirming all of the above. (Appendix viii) 3. 2 2nd diagnostic procedure- Gastroscopy Gastroscopy is used if a person is suffering problems, such as severe heartburn or indigestion. An individual may then be required to have a Gastroscopy. It is a diagnostic procedure that allows doctors to look at the upper part of the digestive system.The doctor uses a tiny camera on the end of a flexible tube which is called an endoscope. It is then fed down your throat and down through the tube that carries your food to your stomach which is called oesophagus. It is then into your stomach. Once in place the camera shows the image onto a screen for the doctor to diagnose any problems. It usually takes between 5-20 minutes to perform the procedure. It is usually performed at an outpatient department, which means you can go home the same day. You should not eat anything for six hours before the procedure as the stomach needs to be empty. (Appendix ix) . 3 Similarities, benefits and risks of the two diagnostic procedures The two diagnostic procedures are only similar in a few ways. When both procedures are performed you get to leave the hospital the same day. Both procedures take no less than 5 minutes and no longer than 20 minutes. There should be no pain in either of the procedures performed. However, Ultrasound does not have any risks whereas Gastroscopy has a few risks. Some of the benefits of having an Ultrasound are: †¢ There are no needles or injections and the procedure is painless †¢ Ultrasound imaging uses no ionizing radiation Causes no health problems †¢ Gives a clear picture of soft tissues, that do not show up in an x-ray †¢ There are no risks Some of the risks for having a Gastroscopy are: †¢ The individual may have a sore throat for a day or two afterwards, this is caused if the endoscope scrapes your throat †¢ Small risk that the endoscope could tear your stomach which is known as perforation †¢ Risk of chest infection or pneumonia is slightly higher than normal †¢ When the endoscope is removed your likely to gag or rench (Appendix x) 4. 1 Cloning This is the topic which has been selected to discuss.There are 4 types of cloning: Recombinant DNA technology or DNA cloning, reproductive cloning and therapeutic cloning. People are most familiar with reproductive cloning when it comes to talk about cloning. Reproductive Cloning Reproductive Cloning is a technology used to generate an animal that has the same DNA as an existing animal or a previous existing animal. Scientists transfer genetic material from the nucleus of a donor adult cell to an egg whose nucleus has been removed. The DNA from the reconstructed egg must be treated with chemicals or electric current in order to stimulate cell division.This process is known as â€Å"somatic cell nuclear transfer†. Once the cloned embryo reaches a suitable stage, it is then placed into the animals’ uterus where it continues to grow until birth. Scientists have bee cloning animals for many years since 1952; hundreds of cloned animals such as sheep and cows exist today. Scientists are hoping to be able to use cloning by generating tissues and organs to use for transplants. To do this the patient waiting for a transplant, would have DNA extracted from their body. This would then be inserted into an enucleated egg.After the DNA starts to divide, embryonic stem cells that can be transformed into a tissu e would then be harvested. The stem cells would then be used to generate an organ or tissue, which is a genetic match to the patient Reproductive cloning is contentious as it seeks to create a duplicate of an existing animal. Until the birth of Dolly the sheep in 1996, there was doubt that this would work in mammals, but now some scientists are trying to clone a human. Many ethical arguments against human cloning are caused by misconceptions.Many people seem to think that clones will have the same sort of characteristics and personalities as the person from which they were cloned. Also some people seem to believe that clone will be both physically and behaviourally the same as the donor. Many people also believe that cloning would lead to the loss of individuality however; cloned people have their own personality that is dissimilar from whom they were cloned according to the House Judiciary Committee. Signature: Date:

Thursday, January 9, 2020

Concepts In Organizational Behavior Essay - 1432 Words

Organizational behavior is the study of the many factors that have an impact on how people and groups act, think, feel, and respond to work and organizations and how organizations respond to their environments. (George Jones, 2005) Organizational behavior is particularly important to managers, who are responsible for supervising the activities of one of more employees. A manager has four principal functions or duties of management. These include; the process of planning, organizing and leading an organizations human, financial, material, and others resources to increase its effectiveness. (George Jones, 2005) Planning involves establishing the organizations strategy and deciding how to best allocate and use resources to achieve†¦show more content†¦(Clawson, 2005) Every employee at Aberdeen is assigned to a team. A team leader is chosen by the team from among volunteers. Team leaders are an important part of team organization. One Aberdeen team leader describes the role in this way; Team leaders facilitate. If there is a problem, you dont solve it, you get the team together in a meeting to solve it. Success is the teams responsibility, not the team leaders. One thing that works against this process is when people just dont want that responsibility and withhold from involving themselves. (Clawson, 2005) FMC Aberdeen is working under the principle of self-managed teams. This type of management could also be utilized by the FMC Green River facility. Self Ââ€"managed teams are groups of employees who are given the authority and responsibility to manage many different aspects of their own organizational behavior. (George Jones, 2005) Despite the large number of workers employed by Green River this concept could still be useful as the number of teams would simply be increased. Organizational Commitment Organizational commitment relates to feelings and beliefs about the employing organization as a whole. Affective commitment exists when employees are happy to be members of an organization, believe inShow MoreRelatedOrganizational Concepts Of Organizational Behavior2210 Words   |  9 Pages Organizational behavior application Today’s organizations are constantly facing the challenges of different behaviors and their impact on the lives of people involved in the daily grind in seeking best possible ways to deal with issues confronting them as they work on accomplishing assigned tasks. When leaders have the knowledge and capacity to handle the many intricacies of organizational behaviors, it will be easier for them to find solutions to said issues and follow the path to success. As IRead MoreOrganizational Behavior Terminology and Concept779 Words   |  4 PagesOrganizational Behavior Terminology and Concept When small business owners start the concept of what type of business one would like to own, an array of critical thinking starts and a business owner has to consider questions that will make or break his or her success. Owners, who pay attention to the current rise and fall of stock for his or her chosen business, will have the upper hand against competitors. An owner who knows his or her competitors is a small part in the grand scheme of owning anRead MoreOrganizational Behavior and Its Key Concepts1130 Words   |  5 PagesOrganization Behavior and its Key Concepts To understand organizational behavior you must understand its key concepts and terminology. Organizational behavior â€Å"is a multidisciplinary field devoted to understanding individual and group behavior, interpersonal processes and organizational dynamics.† (Schermerhorn, 2005 p. 3). An organization’s behavior is significant in determining its success as a business and with its employees. Working conditions, production and employee performanceRead MoreOrganizational Behavior, Terms, and Concepts997 Words   |  4 PagesOrganizational Behavior, Terms, and Concepts Nemo MGT307 October 25, 2011 R.R. Organizational Behavior, Terms, and Concepts For a business to be successful there must be a well-built foundation amongst its human resources. These workers must be kept content. In turn, they work hard and increase productivity. Organizational behavior is a way to observe the employees, while Organizational culture aids in bringing the people of the firm together. This is done by letting theRead MoreOrganizational Behavior Terminology and Concepts751 Words   |  4 PagesOrganizational Behavior Organizations have been described as groups of people who work interdependently toward some purpose. This definition clearly indicates that organizations are not buildings or pieces of machinery. Organizations are, indeed, people who interact to accomplish shared objectives. The study of organizational behavior (OB) and its affiliated subjects helps us understand what people think, feel and do in organizational settings. For managers and, realistically, all employees, thisRead MoreOrganizational Behavior Management Concepts 2891 Words   |  12 PagesKotter’s Leading Change Concepts/ Organizational Behavior Management Concepts XXXXXXXX Webster University MNGT 5590 Dr. Victoria Bohrer May 11, 2011 Abstract This paper compares and contrasts the concepts found on John P. Kotter’s, Leading Change (1996), book and the concepts presented by John M. Ivancevich, Robert Konopske and Michael T. Mattenson’s Organizational Behavior and Management text book. Kotter emphasizes in each step the importance of dealing with human emotions and howRead MoreOrganizational Behavior And Concepts Essay970 Words   |  4 Pagesculture. Organization culture â€Å"is the set of shared values, beliefs, and norms that influences the way employees think, feel, and behave toward each other, and toward people outside the organization† (George, Jones, 2005, p.33). One can observe organizational culture when they enter into a boutique to buy clothing. Usually immediately people are greeted by the customer service employees, and asked if they can be helped. Without this form of customary customer service, the business will likely failRead More Organizational Behavior Terminology And Concepts Ess ay975 Words   |  4 PagesUnderstanding organizational behavior is important for everyone involved in an organization, not just the leadership and management teams. By gaining and understanding this knowledge each employee should be able to realize how their individual actions contribute to the big picture of the company. In order to understand this there are some key concepts and terminology that must be explained to make the learning process more manageable. Organizational Behavior What is organizational behavior? AccordingRead MoreOrganizational Behavior Terminology and Concepts Paper850 Words   |  4 PagesOrganizational Behavior Terminology and Concepts Paper The following essay will be described the organizational behavior terminology and concepts applied in the organization. The following topics will be presented: Organization culture as internal and external environment of control. Diversity as of individual differences based on gender, race and ethnicity, age, disabilities, and sexual orientation. As the last subject communication as the human skill that helps the organization to work well withRead MoreEssay on Organizational Behavior Terminology and Concepts1024 Words   |  5 PagesOrganizational Behavior Terminology and Concepts   Ã‚  Ã‚  Ã‚  Ã‚  The behavior of employees within any organization is paramount to the success or failure of that organization. The study of organizational behavior is a science with its own vocabulary and terminology. This essay will describe some of the more common key concepts and terminology and relate those to the modern United States Navy.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"An organization is, simply, a body of people organized for some specific purpose† (communication, 2005)

Wednesday, January 1, 2020

Cost Accounting and Decision Making Essay - 822 Words

ACC2CAD COST ACCOUNTING AND DECISION MAKING SEMESTER 1, 2011 MINI CASE STUDY 1 DISCLOSURE OF CONFIDENTIAL INFORMATION; ETHICS Page 1 Recommendation Page.3 Executive summary Page.4 Introduction Page.5 Analysis Page.6 Recommendations and conclusion Page.7 Appendix 1 – Code of Ethics for Professional Accountants Page.8 References Page.9 Page 2 Recommendation Erin should notify Smart Worx of the postponement as it is consistent with ethical principles of integrity and professional competence. As Erin is complying with these codes of ethics, she has nothing to lose or suffer as she followed the guidelines of the code and therefore cannot be†¦show more content†¦She must not take action which would conflict with these principles. If Rob Rodent postpones the new order, Erin should notify Smart Worx’s managers due to fact she has to comply with the code of ethics for professional accountants, If Erin does not notify the managers it would conflict with principle of integrity and professional competence and due care. However she could remain confidential and not disclose information about Rodent’s postponement of the new order however Smart Worx’s managers would find out eventually. Erin could argue that she had complied with the principle of confidentiality and did not disclose important information of Rodent. The accounting professional and ethical standards also include safeguards against threats and intimidation. The situation between Erin and Jim could be resolved via formal dispute resolution process, obtaining advice from organisation or seeking legal advice. Page 6 Recommendation and conclusion It is recommended that Erin should comply with the principle of integrity and professional competence and notify her company of the potential jeopardy of their new product. Page 7 Appendix 1- Code of Ethics for Professional accountants Section 110 Integrity 110.1 - The principle of integrity imposes an obligation on all Members to be straightforward and honest inShow MoreRelatedEssay about Role of Managerial Accounting1112 Words   |  5 Pagesbusiness costs down which involve internal and external actions. For internal control, the accountant has a responsibility to monitor finances of a company. Other responsibilities include keeping track of liabilities, duties and taxes. Furthermore, analyses of measurement data on creditors or stockholders are also provided by an accountant. This essay will seek to prove that through principles of financial accounting, cost accounting and cost management, accountants can control the cost of businessRead MoreIntroduction to Management Accounting Terms and Examples1202 Words   |  5 PagesManagement Accounting Terms and examples Accounting is the process of analyzing and recording transactions for the purpose of preparing reports for statutory reporting, decision making and control.    Types of accounting Bookkeeping is the recording of financial transactions. Transactions include sales, purchases, income, receipts and payments by an individual or organization. Bookkeeping is usually performed by a bookkeeper. Bookkeeping should not be confused with accounting. The accounting processRead MoreManagement Accounting : The Father Of Accounting1415 Words   |  6 PagesIntroduction Accounting has be defined in various ways however almost every definition will describe it as a process that identifies, measures, analysis, and report data. Management accounting has not been the same since business started; it has come a long way from early member of civilisation using stone tablets for bookkeeping. Management accounting is used to aid managers make business decisions based on predicted figures and comparisons with actual figures. To follow is a detailed evaluationRead MoreThe Role of Cost Accountants in Small Scale Manufacturing Industries in Nigeria1259 Words   |  6 Pagesproper accounting system employed by these industries (Akande, 2011). Manufacturers employ various system of accounting which requires a timely, relevant and accurate measure of cost, resources consumed in manufacturing their product and managerial decision making. Since the system of accounting used by industries is one of the key things that determine industrial growth and profitability, they must make use of a system of accounting which will enable them determine the volume of sales, cost of productRead MoreDecision Making With Managerial Accounting1563 Words   |  7 PagesDecision Making with Managerial Accounting Accounting is the process charged with the identification, measurement and the communication of economic information in the aim of allowing the desired users in making the correct decisions and judgments. Accounting has two branches depending on the users. Managerial accounting isuseful to core users unlike financial accounting which is more essential to exterior users. Management accounting is, therefore, the identification, analysis, recordRead More Cost Accounting: Its role and ethical considerations Essay1054 Words   |  5 PagesCost Accounting: Its role and ethical considerations Introduction: Accounting is the process of identifying, measuring, and communicating economic information about an entity for the purpose of making decisions and informed judgements. The major areas of within the accounting are: Financial Accounting, Managerial Accounting/Cost Accounting and Auditing- Public Accounting Managerial accounting is concerned with the use of economic and financial information to plan and control the activitiesRead MoreRoles And Activities Of Management Accounting Essay1568 Words   |  7 PagesChanges in roles and activities of management accounting due to rapid changes in technology, can be described on following points: a. Changes in activities of data collection and control With advanced in technology, most companies are using accounting software or even Enterprise Resource Planning (â€Å"ERP†) system (such as SAP, Oracle, etc.) has the potential to have significant impact on the work of management accountants, as it reduces routine information gathering and the processing of informationRead MoreFinancial Accounting And Managerial Accounting1613 Words   |  7 PagesIntroduction: Both financial accounting and managerial accounting provide important information about the business process. On the one hand, financial accounting provides only financial information to its internal users and external users. On the other hand, managerial accounting basically communicates about financial and non-financial information with internal users such as managers, employees and owners of the company. In other words, managerial accounting provides information to managers who directRead MoreManagement Accounting : A Portion Of The Total Information System899 Words   |  4 Pages1a. Management Accounting is a portion of the total information system in a business or an organization. (p.22) Management accounting as well as other forms of accounting is concerned with the collecting and analysing financial information and then communicating the information to the people in charge of the decision-making. (p.16) Its features are the identification, recording, analysis and reporting of information. Its role is to provide the information to those making decisions, usually the managersRead MoreRole of Cost Accounting and Ethical Consideration1090 Words   |  5 PagesRole of Cost Accounting and Ethical Consideration Role of Cost Accounting and Ethical Consideration Introduction Cost accounting is used to help management understand how much it cost to run a business. Understanding the role of cost accounting is important when one is trying to put together a team of managers to help run the company. The CEO of a merchandising organization needs to hire a CFO to run the accounting system, but the CEO has little understanding of cost accounting. The CEO