Recent orders
Challenges Faced by Transgender Yong Adults
Challenges Faced by Transgender Yong Adults
Student’s Name
Institution of Affiliation
Date
Identity crisis is a common problem among young adults, especially transgender people who experience changes later in their lives. Gender dysphoria is phycological distress that results from an incongruence between an individual’s sex that is assigned at birth and one’s gender identity which they developed later in life. Young adults are at a stage in life that poses a major psychological problem in which a person fails to relate to either socially acceptable gender – male and female. While a person may be born female, and transform later in life to be a male, they may undergo psychological and hormonal changes that they previously not experienced. As a result, most transgender people are vulnerable to symptoms of depression and anxiety as they are not sure whether they will be fully adopted by society for what they have chosen to be and what they were previously. For this assignment, I will analyze the poem, “A letter to the girl I used to be” by Ethan Smith to help understand the challenges that young adults pass through especially those experiencing gender changes.
The text, “A letter to the girl I used to be,” highlights the story of a young man in his early 20’s narrating the changes and challenges that he faced when transforming from a female to a male. According to the poem, Ethan describes how it feels to be trapped inside the wrong body. He writes to a young girl, a female version of his younger self named Emily. Previously, he was a girl, but presently, he is a male. In the poem, Ethan goes back to the days when he was Emily, and here he experiences numerous challenges. For example, he states that every time she goes to watch baseball, a voice he no longer recognizes whispers “Ethan, do you remember? When you were gonna be the first girl in the major leagues-Seattle Mariners. Rally Cap.” By this, Ethan is referring to him as a young girl who reminds him of the time, he was young and wanted to be the first girl baseball league player. When Ethan was Emily, he wanted to be a baseball player, but maybe his ambitions have changed since transforming from a female to a male, and this is why he is conflicted about his past and present interests.
References
Ethan Smith. “A Letter to the Girl I Used to Be.” Retrieved from: https://youtube.be/Lkn06Y8prDU
Motorola mission is to provide integrated communications and embedded electronic solutions to the customer.
Motorola
Motorola mission is to provide integrated communications and embedded electronic solutions to the customer. This includes two-way radio, messaging, satellite products systems, networking and Internet-access products, semiconductor applications, and cellular communication products and systems. Motorola also manufactures and sells automotive and industrial electronics, printed circuit boards, energy storage systems, and ceramic/quartz electronic components (Multex.com, 2000, p. 1). Motorola strives to be the global leader in all aspects of telecommunication applications.
Maintaining the lead in the telecommunications industry requires innovation, motivation, and discipline to stay focused on the mission. Accomplishing the mission is extremely important to Motorola and its shareholders. Motorola has set four main objectives to keep the company focused as the industry leader in the new millennium.
The first objective is global leadership in core businesses. Motorola shifted from “product to market organizations” to putting the customers first. In addition, Motorola employed external leadership talent to key positions, and reassigned thousands of engineers to higher-growth businesses. The realignment of personnel increased the digital wireless telephone unit sales by 85 percent (Motorola, 2000, p. 16).
The second objective is total solutions through alliances. Many of these key business alliances are enabling Motorola to bring the Internet to the wireless arena. Motorola led the development of the Wireless Application Protocol (WAP), which standardized the way wireless telephones access and displays Internet content. WAP is supported by more than 175 of the world’s leading telecommunications and software companies.
Motorola has merged with General Instrument Corporation, which integrates broadband technologies to deliver the vast potential of video, voice and data networking to the home. The merger was valued at $17 billion dollars, and was completed on January 5, 2000. The merger also acquired the majority ownership of Next Level Communications, which provides digital subscriber line (DSL) technology. With the formation of SpectraPoint Wireless, Motorola and Cisco Systems has entered the market for broadband access through Local Multipoint Distribution Service (LMDS), which uses point-to-point microwave systems (Motorola, 2000, p. 17).
The third objective is platforms for future growth. This means building expandable telecommunications architectures upon which other companies can build and add value. This feature is extremely vital due to the fast pace of technological innovations. Some of these platforms include Aspiraä that deals with third-generation wireless systems to DigitalDNAä platforms designed to make Motorola a leader in the embedded electronics market place. Motorola has also teamed up with Lucent Technologies with the platform application of StarCore ä concerning digital signal processing (Motorola, 2000, p. 17-18).
The fourth objective is performance excellence. This is measured by providing first class service to customers and financial results. Customer complaints have decreased by 22 percent by implementing a customer-care training program to the sales staff. Financial results for 1999 are also in positive territory. Sales in 1999 rose five percent to $30.9 billon and net earnings were 817 million dollars compared to a one billion dollar loss in 1998. Motorola’s debt-to-equity ratio is improved to 10.1% in 1999 from 26.8% in 1998 (Motorola, 2000, p. 18-19). Performance excellence balances Motorola’s financial results with measures of customer and employee satisfaction, and market share.
Motorola has many strengths, the first and foremost is brand recognition. The name Motorola is known worldwide for quality products. Another strength is the P/E ratio, which is calculated by taking the price per share and dividing it by the earnings per share. The ratio for Motorola is at 68 times, compared to Motorola’s peer group at 62 times (Multex.com, 2000, p. 3). The higher the number shows the confidence shareholders have in the company.
Logistics is another asset that Motorola has in its favor. Motorola owns 126 facilities (manufacturing, sales, service and office), 65 of which are located in the United States, and 61 located in other countries. Motorola also leases 756 such facilities, 385 are located in the United States, and 371 in other countries. In Scotland, Motorola has three manufacturing plants, which employee over 6500 workers, and an additional 3500 workers employed elsewhere in the United Kingdom (Meares, 2000). Motorola has a strong foothold in the United States and overseas to produce and distribute products quickly and efficiently. .
Motorola has been on top of the telecommunications industry for many years. Being on top for a long time can lead to complacency. New innovations and equipment designs by other competitors have reduced Motorola’s market share. For Motorola to stay competitive they must employ the best personnel available and empower them to innovate and create new products and systems.
Another weakness is investing in questionable ventures. This happened to Motorola on the Iridium project. Iridium is company that provided satellite phone service for customers covering the entire globe. The Iridium system consisted of 66 satellites in orbit providing phone coverage no matter where a customer was located. This service is very appealing, but the down side to having this service was the price of the phone, which ranged from three to ten thousand dollars and the usage fee per minute was a little over ten dollars. For some customers this was the perfect service, but Iridium could not generate enough customers to stay solvent. The explosion of the wireless industry and low cellular coverage rates was the downfall of Iridium. Motorola had an 18 percent stake in Iridium and lost over two billion dollars. The Iridium satellite service was turned-off in April of 2000 and Motorola will gradually let the 66 satellites burn up in the earth’s atmosphere. Neither iridium nor Motorola could find a buyer for the Iridium system (Kaiser, 2000).
The state of the economy is in great shape and the technology industry is growing at a rapid pace. Motorola’s stock price has surged over a 150 dollars a share this year and is one of the most actively stocks traded on the NASDAQ (Multex.com, 2000). This insurgence of funds through the sale of stock is an excellent opportunity for Motorola to invest heavily in research and development and buyout smaller competitors. Motorola needs to show extreme caution when investing in research or buying out a competitor since they incurred a tremendous lost with Iridium.
Another opportunity Motorola can expand on is sales overseas. The European market makes up twenty-one percent of sales and Asia-Pacific region only makes up ten percent of Motorola’s sales (Motorola, 2000). These two regions are prime areas to increase market share, the technology boom in these areas are expanding rapidly just like the United States.
The booming economy has been favorable to Motorola, but many of Motorola’s competitors have also reaped the same rewards. Motorola’s four main competitors are Ericsson, Qualcomm, Nokia, and Advanced Micro Devices. Advanced Micro Devices primarily is a manufacturer of semiconductors. Ericsson, Qualcomm, and Nokia primarily deal with cellular phones and systems (Multex.com, p. 2). In fact, Nokia cell phones are taking the market share aware from Motorola due to the new modern designs and features. Qualcomm has developed and patented Code Division Multiple Access (CDMA) technology, which is what current cell phones use. Qualcomm receives royalties off this technology for every cell phone sold.
The government is also a threat to Motorola. The Federal Communication Commission (FCC) regulates and allocates bandwidth. Motorola and other firms must get permission to use certain frequencies. In other countries, the rules and regulations are more lax or they do not have any at all. That is why companies to include Motorola have many manufacturing plants overseas, so they do not have to deal with the stringent rules in the United States.
There are many strategies Motorola can implement to be more successful. Horizontal Integration is one strategy. Horizontal Integration seeks ownership or control over competitors. As stated earlier, Motorola has done this with the acquisition of General Instrument Corporation. This strategy can also backfire, as did the venture with Iridium. Extensive research must be done when a company is looking to expand.
Another strategy that can be implemented is the Join Venture strategy. This strategy involves two or more firms forming a separate organization. Motorola and Cisco Systems accomplished this by forming SpectraPoint Wireless. This strategy is good when risk is involved, losses or profits will be split between the two companies. However, if each firm can provide a unique service or product the other does not have, this alliance can be very powerful.
The Product Development strategy is another alternative Motorola can use to be successful. This strategy increases sales by improving or modifying existing products or services. Motorola has shown improvement with its customer service department and digital cell phone division, but Nokia and Qualcomm are gaining ground with their new products and ideas. Advances in technology happen everyday, if this strategy is not addressed, Motorola will be a follower instead of a leader.
For Motorola to maintain their position as a global leader in the telecommunications industry, the Product Development strategy needs to be implemented. Motorola’s main competitors are developing new products and systems, which are outperforming and selling Motorola products and systems. Money has to be allocated for research and development of new and existing products and systems. Once the quality and performance of the products and systems are improved, sales will increase and consumer and shareholder confidence will rise. This confidence will enable Motorola to focus on overseas sales, especially Europe and the Asia-Pacific region where sales figures are low. The Y2K bug has come and gone, Motorola needs to step up to the forefront of technology and not be the stereotypical brick and mortar company that got passed by in the new millennium.
Bibliography:
References
Kaiser K. (2000). Motorola still hopes to find a buyer for Iridium.
[On-line]. Available: http://biz.yahoo.com/rf/000501/ik.html
Meares R. (2000). Update2-Motorola spends $2 billion on Scottish chips.
[On-line]. Available: http://www.ameritrade.com/cgi-bin/login.cgi
Motorola. (2000). 1999 Summary Annual Report.
[On-line]. Available: http://www.mot.com/General/Finacial/Annual_Report/1999/99annual
Multex.com. (2000). Motorola, Inc. Stock Snapshot.
[On-line]. Available: http://www.multexinvestor.com/download.asp?docid=1346436&ticker
=mot
Quicken. (2000). Motorola Inc. Company Profile.
[On-line]. Available: http//quicken.elogic.com/sec_key.asp?ticker=MOT
Advanced Networking Proposal and Network Diagrams – Proposal
Advanced Networking Proposal and Network Diagrams – Proposal
Name:
Instructor:
Course:
Date:
Table of Contents
Executive Summary —————————————————————————3
Project Plan ————————————————————————————5
Components/Network Configurations——————————————————–5
Network Operating System ——————————————————————-6
Data Communication Media ——————————————————————-6
Common Carriers and Service Usage ——————————————————–7
Hardware Needs ——————————————————————————-8 IT Policy ————————————————————————————–9
Network Diagram —————————————————————————-11
Budget —————————————————————————————–12
References ————————————————————————————1
Executive Summary
The Western Count Bank is exponentially growing in size on a Daily basis. However, the bank equipment with old computers approximately five years old has presented problems with the active employees. Moreover, customers and employees have been uncomfortable with some of services offered by bank such as unwitting breakdowns in their systems, lack of support to online banking, and lack of support to mobility. An unreliable networking scheme has attributed to the comprehensive reliance of personal connection between computers for sharing of the ink jet printer. The Western County Bank also only has two routers, one for connection to the Wide Area Network and another for internet connection. This has led to inconveniences in company operations as attributed recently when the routers were under maintenance hence denying the employees access the internet. Owing to this problem, the bank intends to refurbish the networking scheme by introducing redundant connections between the wide area network and the internet connections to avoid occurrence of such problems in future. It also intends to keep its ARIN-assigned (American Registry for Internet Numbers) public Internet Protocol (IP) block and use two internet service providers to ensure network connection reliability. Another problem faced by the bank is that the network routers not only breakdown, but also have problems with minimal filtering in the OSI layers 2-4 of the network. This has prompted the bank to implement security products that can filter OSI layers and ensure that the seven layers of the OSI remain protected from common network attacks. The bank also intends to have a datacenter that has client’s information and applications that every employee can easily access. The Bank also intends to incorporate measures that will ensure that Employees can easily share laser printers and that the datacenter has enough storage capacity for both the current and future operations of the company. The purchased multiprotocol storage area network (SAN) arrays will provide this service.
The Western County Bank intends to implement a simple guest wireless access point in their main office protected through simple pre-shared key authentication and provides internet access in the headquarters database to any interfacing apps. Moreover, each employee will possess a company email, which employees may use for financial purposes accessible by outside systems and networks through an internet connection. In addition to upgrading equipment and implementing a network, the bank intends to have an integrated authentication through Microsoft Active Directory (AD) infrastructure that will establish employee authentication before delegating network access to any mobile device. Lastly, the bank faces limited power supply especially in locations wireless access points are to be deployed. The solution for this problem will involve implementation of Power over Ethernet (PoE) at the access layer of the switched infrastructure.
Implementing this network proposal assures the bank of a reliable renewal from their previous computer systems and network infrastructure. Firstly, old operation systems will undergo complete reinstallation and vital information maintained in the new network system. Following this is the creation of new configurations and network designs that conform to the standards set by the company detailed in occasions of rolling out new computers layouts, connection equipment, and peripherals. When the configuration and design is established, a suitable network Operating system will be selected to control, manage, and share the company apps and information. The configurations, design and network operating systems form the key components of a prosperous network. Therefore, the wide and the local area network, types of media communication, and components will undergo examination and documentation in the network design phase to establish how the different parts of the network link and function. The new network services will be managed by corporate IT policy compiled by company network consultants, directors and owners. Lastly, the budget penned at the end of this proposal should give the West County Bank a rough estimate of the work time and network installation costs.
Project plan
Components/ Network Configuration
The West County Bank raises the question: “is there a need for the network?” clearly, the network needs to be established if the organization is to fulfill their intentions of using a network that can share apps, information, or software and particularly, to achieve the notion of utilizing a datacenter. A logical network topology setup with the provided information and the intentions of the company would require the utilization of a star topology. Star topology, utilizing a server-based network scheme, will provide access to centrally polled accounts and file storage servers enabling easier, cardinal access hence allowing the staffs use single account authentications (Newman, 2010). Employees need to have access to all services and files simultaneously. This calls for utilizing a server, which will process several requests of similar data without deterioration in its performance. This design will also allow client computers, server, and laser printers to be linked to a cardinal switch that can share data across the local area network (LAN) and the wide area network (WAN). Redundant routers, connected to a modem, will give access to the wide area network and the internet source ISP (Tian et.al, 2004). The server purposes will include hosting the bank’s database of client files, a server for various desired printers, and hosting all employees’ bank e-mail accounts. Nevertheless, despite the star topology ability to provide the staff with enhanced and flexible network architecture for a formidable working environment, it remains susceptible to probable downfalls. Physically wiring the system to link the various computers utilizing star topology requires extra workforce and cabling for installation. Requirement of the cabling to run via tight enclosures, ceilings, or under the carpet can be strenuous and time consuming. Considering the growth rate encompassed for West County Bank necessitated by employment of a server-based network, it should suffice for the difficulties involved in the setup and utilization of the new network.
Network operating system
The star topology network, client computers, and the server configuration management and governance will be designated to Microsoft’s latest edition of server operating system that is Windows Server 2008 Enterprise Edition. With the implementation of the Windows 2008 server, along with windows operating systems for the network terminals, the networks services of the bank, its office production apps, security software, and specialization software will operate effectively for the bank staff. This will ensure compatibility with programs such as windows based elective services that include SQL 2005, Exchange Server 2007, or share point server. Productivity programs of the office such as spreadsheets, word processors, and presentation software will be availed for staff use with the installment of Microsoft’s Office 2007 suite. Operating systems of Microsoft and their programs work perfectly and possess high-level file compatibility. Third-party business software for accounting such as Sage Simply Accounting, MYOB Business essentials, works well across networks based on windows and with software for Office Productivity.
Data communication media
Updating the computer equipment will also encompass implementation of new communication media. CAT6 Ethernet cable best suit the specs of the new computers, network equipment, and servers. All the new units have gigabit transfer compatible NICs (network interface cards) and because CAT6 is the only UTP (unshielded twisted pair) cable that can handle gigabit transfer, it is the best choice for the communication media. Gigabit network cards and CAT6 cables will allow the management and employees access to files, server resources, and provide a reliable channel for communication to business agendas. Stationary computers of the bank Utilizing CAT6 cabling enjoy comprehensive network access (Tian et.al, 2004). The main office and the other two branch offices will have a wireless access network to meet the needs of the employees who carry laptops and tablets and other guests who might come for consultancy and auditions. Simple pre-shared key authentication will provide security for the wireless network that gives access to the internet and other interfacing apps in the datacenter. The wireless access points will enhance the business’s laptops and tablets mobility capabilities. Employees with tablets and laptops, while in office, will chose to either connect to the wireless network or plug CAT6 UTP cables to access the network resources of the business.
Common carriers and services usage
Every staff is set to be equipped with a computer that is connected to the network to necessitate access and use of office resource and communications. Two internet service providers will install the internet access of the bank. The selected services will be supplied a business connection speeds of 10Mbps for download and 2Mbps for Upload. The network access will be accessible only to the management and the staff with no exception to the outside public. Business employees as arbitrators between clients and the bank’s services will handle any services or requests by clients. The staff will access the services of the company via their laptop, tablet, or workstations, link to the server that contains the desired information, and use the company software to meet the requests of the client. All employees will be required to possess login passwords for their accounts to give them clearance to access client/bank information. The staff will then select the best software to complete the client request with software installed either on their personal laptop or on network software.
Hardware needs
The new proposal is a server-client network that primarily relies on the main server and its given service. The chosen hardware for the network configuration is from Dell’s business solutions. Dell’s PowerEdge 2800 III will manage the resource and the services of the bank. This server normally utilizes an 8 GB 677 MHz RAM, two Intel 2.0GHz Xeon Quad Core processors, and a storage of two 500GB SATA 3Gbps HDD (hard disk drives). Storage of the server will be supported by the already purchased multiprotocol storage area network (SAN) array. The disk arrays will ensure that the bank does exhaust storage space by consecutively replacing full disks. With these configurations and specs, the server will have the ability to process many request simultaneously for all the bank’s employees with slight or no loss in performance. Dell’s OptiPlex 755computers will replace the old stationary computers used by employees. Every computer will be equipped with Widows Vista Business, which utilizes 2 GB 667 MHz DDR2 RAM, 2.33 core 2 Duo processor, and an 80GB SATA 3Gbps HDD. These computers together with the server and the desktop towers have expandable memory slots for future upgrades. Laptops availed for employee mobile services are Latitude D630 generations that have 4GB RAM 667 MHz RAM, Intel 2.2 GHz Core 2 Duo processors, and 320 GB storage capacity. Their high RAM capacity essentially had little significance to operation specifications but only provided relevance to the computers of the present age. To receive internet connection from local ISP, two D-Link Gigabit routers will be put between the internet access media and backbone switch. This backbone switch will manage and control all the local network traffic and will be a combination of four Dell PowerConnect 2724 48-port Gigabit switches. All the tablets, laptops and personal Smartphones connect to a wireless access point, Linksys for instance, to access the internet and network services. Four switches were picked to support 1 server, 3 wireless access points, 3 laser printers, 2 Dell Color Laser 3110cn, 50 laptops and computers, and still have excess ports available for any upgrade required in future.
Due to limited power supply faced by the bank, especially in areas that wireless networks are to be deployed, the various networks switches mentioned above are PoE enabled. This implies that the need for power will be catered for and employees do not have to connect their devices to a power source and at the same time to the cables (Tian & Cox, 2004).
Corporate IT policy
Network resource and internet availability for any business, specifically businesses dealing with personal and customer data, are key tools to assist in business operations. However, networks are susceptible and require constant control and monitoring (Riles, 2001). Internet access of the business will be availed by two local ISPs to ensure business efficiency and to ensure that resources of the network will be open to its management and staff with no constraints related to time of application. This does not mean that the network is not going to be checked but rather creates an environment suitable for the staff in their work place. Monitoring network and transfer of data will be done to preserve the integrity of customer data, protect employee wellbeing, and maintain integrity of operating business systems. The bank staff will use the internet during working hours to serve business operations, but during breaks or after working hours, they are allowed to utilize the internet for their own desires. Management and employee emails will undergo intense checking before authentication. In fact, management and employee authentication will be done via Microsoft Active Directory (AD) infrastructure. This also applies to their mobile devices to mitigate security concerns. Emails will firstly undergo complete scan of any attachments to locate the possibility of any threats towards the banking system before allowing employees read the contents of the email. Every employee has the responsibility to inform the IT management in case the employee receives questionable email.
Security is essential especially in the deployment of any network having an internet connection. The latest protection and bandwidth checking software will be used to ensure that unauthorized third parties do not access bank information and data files (Peterson & Davie, 2011). The preferred software for this task is the Microsoft Active Directory (AD). The management and the staff will have passwords and user accounts with administrative rights and specific security clearance. Only the IT manager will have full control and access to client/strict bank information. There is needs for a backup system to cater for any outages in the network. The most vital information requiring back up is on the bank’s older computers since loss of information as delicate as banking information could bring problems to the organization. Since the bank wants to utilize the new network as a system facilitating the staff gain access and share resources, the information will be stored on the central server (Riles, 2001). Cloud computing will also be adopted by the bank for storage of its vital information and avoid problems that come with outages (Riles, 2001).
The server and information systems will undergo a weekly backup of system configurations and information. This length of the chosen period was short because it is easier to perform system rollback as compared to long period rollbacks. Employees and client accounts will be stored on servers in both local and remote locations. Finally, Western County Bank is interested in integrating their main internal web-based application with a “Software as a Service” (SaaS) provider that specializes in online banking services. The web-based application was designed to easily integrate into a cloud-computing environment.
Software as a Service and Virtualization is a key trend in many businesses today. Businesses are virtualizing their operations to way a tame cybercrime that is on the rise. In addition to cloud computing, the network topology will allow for virtualization and online banking services provided by a SaaS company of choice (Antonakos & Mansfield, 2009).
Network diagram
The diagram below is a basic layout of how the new network system will appear and operate. However, the diagram does not illustrate the actual measurements and positions of the equipment. Routers displayed do not show the redundancy that the new network intends implement. The connections correctly show the network peripherals and computers, however, the laptop and desktop computers are all directly linked. The illustration below shows only some computers to prevent consumption of large space.
Budget
The proposed budget for the new rollout will include the cost of the software, hardware, labor, and external resources. The budget includes a five-week time span for complete installation.
Week 1
Oder software, network peripherals, hardware, and internet services
Information backup form old computers
Start office organization to conform to the bank’s new network
Week 2
Arrival of ordered materials
Removal of old computers and other hardware at the discretion of the bank
Installation of internet by two ISPs
Week 3
Setting up and configuration server and backbone network setups
Wiring the backbone switches to workstations and wireless access points for laptops, tablets and Smartphones
Week 4
Installation of computers and laptops with Operating Systems, software, and other configurations
Linking all computers to network and testing
Week 5
Training IT managers on the usage of specific network set ups
Training employees too
Finalizing and troubleshooting any possible issues and cleaning p any excess materials
The cost for training employees and installation will be averaged at $150 dollars per hour. There will be 35 hours per week spent on network installation. This generates 175 total hours, and the cost of the total services is $ 26250.
Software and hardware description Cost Per Unit Total Cost
2 Dell PowerEdge 2900 III Servers w/
Windows Server 2008
w/30 CALS and Symantec
Multi-Server Security Suite $7,833 $15,666
35 Dell OptiPlex 755 Desktop
Computers w/Windows Vista Business
licenses & Microsoft Office 2007 $1,849 $64,715
15 Dell Latitude D630 Laptops
w/Windows Vista Business licenses $1,735 $26,025
4 PowerConnect 2724
24 Gigabit Ports $369 $1,476
2 D-Link Gigabit Router $90.50 $181.0
3 Linksys Wireless-N Access Point $155.99 $467.97
2 Dell 3110cn Color Laser Printer
w/Network Ready Capabilities $549 $1,098
2000ft. CAT6 Ethernet Cable $298 $298
QuickBooks Enterprise Solutions
50 Users $7,000 $7,000
Sage Enterprise Simply Accounting $2,000 $2,000
Two Cable Internet Access Initial Startup
& then $160 per month $180.00 $180
Total
(including $26250
installation services) $145,356.97
References
Antonakos, J. L., & Mansfield, K. C. (2009). Computer networking for LANs to WANs: Hardware, software and security. Clifton Park, N.Y: Cengage Delmar Learning.Newman, M. E. J. (2010). Networks: An introduction. Oxford: Oxford University Press.
Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach. Burlington: Elsevier Science.Riles, A. (2001). The network inside out. Ann Arbor [Mich.: University of Michigan Press.
Tian, K. Q., & Cox, D. C. (2004). Mobility management in wireless networks: Data replication strategies and applications. Dordrecht: Kluwer.