Tuesday, December 31, 2019

Same-Sex Marriage Essay - 1633 Words

For over four hundred years, African Americans have faced discrimination in the United States, and it took them more than ten years to find some sort of equality. Women have also faced discrimination for hundreds of years and it took them over fifty years to earn minimal rights. While the issue of homosexuality is relatively new to our country, the fight for rights started almost immediately, and people today are still struggling to earn civil liberties, like same-sex marriage. If some change isn’t made now, their struggle for rights could last even longer than other minorities have endured. Since there is no national ruling made to abolish same-sex marriage, each state sets its own laws regarding gay marriage. Currently in the US, five†¦show more content†¦For one person to have further rights and opportunities than another, based solely on who they are married to, is unconstitutional and immoral. Legal rights that gay couples are being denied, since they cannot be f ormally married, include joint parenting and adoption, joint insurance policies and leases, the ability to be stated as next-of-kin, divorce protections, employment benefits, and policies involving inheritances, among many others (Robinson). So now, not only are laws prohibiting same-sex marriage denying a gay couple from officially expressing their love, they are also making it harder to adopt a child or to receive medical benefits. US Senator Chris Dodd feels that marriage should be about rights and responsibilities, and mostly love, and believes for these reasons, every American should have an equal opportunity to marry (Dodd). Our country stands as a nation that protects minorities and offers equal benefits, but something as simple as a piece of paper that declares a marriage between a couple is not being allowed to gay couples, one of our nation’s highly significant and quickly growing minorities. Gay individuals have earned individual rights, like the â€Å"Don’ t Ask, Don’t Tell† policy that allows them to serve with an undisclosed sexuality in the military. And in 2003, a Supreme Court ruling in Lawrence v. Texas established a right to privacy for homosexuals (Freedman). Not only are same-sex marriage laws preventing certainShow MoreRelatedSame Sex Marriage And Marriage948 Words   |  4 PagesSame-sex marriage and same-sex parenting are comparatively new controversial topics in today’s world and its â€Å"mainstream† morality. I was not exposed to any homosexual â€Å"lifestyle† while growing up. I know that I am strongly traditional in my theological views, nevertheless, I vigorously believe that traditional marriage and parenting are devotional commitments between a man and a woman. Therefore, same-sex marriage and parenting are to me, issues of a society with strong traditional cultural identitiesRead MoreSame Sex Marriage754 Words   |  4 Pages 11/8/06 Argument Essay Same-Sex Marriage: Not a Match for Society Marriage, as defined by Merriam-Webster, is â€Å"the legal relationship into which a man and a woman enter with purpose of making a home and raising a family† (358).Although most people in the United States, including myself, agree on that definition, there are a select few who do not. Some feel same-sex marriage should be legalized; I disagree! I disagree because of its effects on children, its unnaturalness, and its religious immoralityRead MoreSame Sex Marriage1418 Words   |  6 PagesGay Couples Should Have the Same Rights As Married Couples Professor PHI 210 June 6, 2013 Same-sex marriage is a topic that has become increasingly more debatable throughout time. America has been said to be the â€Å"land of the free,† but when it comes to homosexual couples, it is far from that. If same-sex marriage was legalized, many positive outcomes could emerge from it; the society would be closer to equality, adoption would increase, gained social support for families would developRead Moreno to same-sex marriage!894 Words   |  4 Pageseverything builds up. I Corinthians 10:23 Against Same Sex Marriage - The Six Point Case Each of these six points against same sex marriage will be explained in detail in the following articles. Click on each link for more explanation. Natural marriage is the foundation of a civilized society. Homosexual behavior is inherently destructive. The law is a great teacher, and it encourages or discourages behavior. Government-backed same-sex marriage would encourage and normalize homosexual behaviorRead MoreSame-Sex Marriage 962 Words   |  4 Pagescaucasian because of laws passing interracial marriages around the 20th century due to Loving V. Virginia (Melina Patria). By the 1960s, the women’s rights movement was in full motion switching male and female roles drastically(Human right’s watch). The home may have no longer been spacious and big with the stock market crash of 1929(First Member Century). Its 2013 and there may be another possible alteration; same sex marriage. Even though same sex marriage may be a sensitive issue with people, as aRead MoreSame Sex Marriage1152 Words   |  5 PagesBiological Sex-Marriage: â€Å"An Alteration to Humanity† Submitted by: Ellicia Jiona Candelaria Submitted to: Mrs. Joan Bataclan ABSTRACT Biological Sex-Marriage: â€Å"An Alteration to Humanity† This study describes the advantages and also the disadvantages of couples of the same sex being married. It aims to explore how it affects the society and most importantly the church. Same-sex marriage, popularly known as gay marriage, is a socially or legally reorganized wedlock between two persons of similarRead MoreSame Sex Marriage884 Words   |  4 PagesSame Sex Marriage Is the definition of marriage being threatened in the United States? President Bill Clinton signed the federal Defense of Marriage Act into law on September 21, 1996. This Act defined marriage at the federal level as between a man and a woman. The federal DOMA statute ensured that no state would be forced to recognize gay marriages performed in other states and prevented same-sex couples from receiving federal protections and benefits given to married heterosexual couples. OnRead MoreSame Sex Marriage990 Words   |  4 PagesSupporters of gay marriage argue around the concept of equality in America. Our country is said to be found on the principle that all men are created equal, so that make it hypocritical to deny the rights of homosexuals, as it was hypocritical to deny freedom to African Americans or to prohibit women s suffrage. Supporters also believe that Gays should be allows the same benefits as regular married couples. For instance, only through marriage do same sex couple s have the rights to their partnerRead MoreSame Sex Marriage1120 Words   |  5 PagesSame sex marriage has been a topic on the rise throughout the U.S. It is what some of us may consider one of the more important topics of discussion for this time period. So far 17 states out of 50 have declared same sex marriage legal (States, 2013). Same sex marriage should be legal throughout the U.S. because same sex couples have a civil right to get married, along with a right to have access to the same benefits as heterosexual couples, and to be treated as equals without fear of discriminationRead MoreSame-sex Marriage604 Words   |  2 Pages in the media, same sex marriage has been widely discussed and debated. Some feel it should be legalized, while others believe that it is a sin and should remain illegal. Their are many pros and cons on both sides of this argument, however there are main points leading to why gay marriage should be legal. Legalizing gay marriage will not harm heterosexual marriages or family values, and society will continue to function normally. This is a true statement, because when two people get

Monday, December 23, 2019

The Effectiveness Of Animal Protection Laws Essay

The Effectiveness of Animal Protection Laws in the United States Almost eight million dogs and cats are surrendered to local shelters each year. Of those nearly three million are euthanized in the U.S. according to the ASPCA. There are only three federal laws in the nation regarding animals, The Animal Welfare Act (AWA), Humane Methods of Slaughter Act, and the Twenty-Eight Hour Act of 1877. The AWA specifies regulation for domesticated pets, while the other two are for livestock and humane killings, but these don’t even include chickens! States are responsible for any other animal laws, while in the European Union (EU), fifteen countries implement and provide legislation on proper animal care across the board. Why is it that the United States hasn’t passed any federal legislation since 1966? Are states laws really enough? Federal domestic animal law should be more stringent. Many owners regard their pets as children. There are an unsurmountable amount of laws regarding the treatment and wellbeing of a child. However, because these animals are seen as personal property, the same type of effort has not been placed forth for the â€Å"fur babies†. Laws are instituted for the protection of humanity; however, this planet is shared with many other species who deserve even the simplest of protections. Legislation focuses heavily on the proper care and treatment of pigs, sheep, and cows; but, not man’s best friend? Legislation for the humane treatment of pets only exists at the stateShow MoreRelatedPros And Cons Of Animal Testing1288 Words   |  6 Pagesâ€Å"Each animal bred or used for research, whether a mouse, fish, or monkey, is an individual capable of experiencing pain, suffering, and distress† (â€Å"Animal† 2013). The advancements in technology today had sparked a debate worldwide on whether it is right or wrong to use animals for experimentation in laboratories. With newly advanced scientific technology, experts are able to utilize advanced technology to simulate functions of the human body on a much smaller scale, including microchips of humanRead MoreAnimal Testing And Its Effects On Human Health1146 Words   |  5 PagesMillions of animals suffer and die unnecessarily each year as they become subjects for medical testing and other horrendous experiments. Although some people believe such activities are necessary to progress in medical research, in reality it does very little to improve human health and development. For decades, drug and chemical safety assessments have been based on laboratory experimentations involving rabbits, dogs, rodents, and other animals. Consequently, nine out of ten drugs proven safeRead MoreAnimal Testing Should Be Banned From Our Society874 Words   |  4 PagesAnimal Rights Demand Protection My thesis is that animal testing should be banned from our society altogether. Animal rights advocates argue that testing is a subject that has been argued countless amount of times in medical journals, and it has shown that it is a waste of animal lives. Subsequently, processing of a single drug requires more than 50 trials and use of as many as 12,000 animals. Moreover, regardless of the ethical issues that derive from animal testing, the infliction of physical/psychologicalRead MoreAnimal Testing Should Be Banned1509 Words   |  7 PagesAnimal testing is intended to express the use of animals in scientific research. Every year more than 115 million animals around the world have been used in laboratory experiments (Human Society International,2012). They include animals that are generally used in medical research such as cats, dogs, guinea pigs, mice, rats and monkeys. This experience has a major role in the progress of medicine. For example, it has been used in the development of drugs and surgical procedures and artificialRead MoreDepartment Of Homeland Securitys Emergency Operation Plan1176 Words   |  5 PagesOrganized for Potential Emergencies† in 1972 (FIRESCOPE, n.d., p. 1). This program was essentially a mutual aid agreement that represents all facets of local, rural, and metropolitan fire departments, the California Department of Forestry, and the fire protection, and federal fire agencies (FIRESCOPE, n.d.). Incident Command System is a standardized on-scene incident management concept designed specifically to allow responders to provide a span of control through an integrated organizational structure equalRead MoreCopyright Laws Of The United States1600 Words   |  7 PagesA copyright is a form of protection provided by the laws of the United States to authors of original works of authorship. â€Å"Copyright law in the United States is based on the Copyright Act of 1976, a federal statute that went into effect on January 1, 1978,† according to FindLaw. FindLaw also states that, â€Å"Individual states cannot enact their own laws to protect the same rights provided by the Copyright Act. Original multimedia works are protected by Copyright.† Literary, dramatic, musical, artisticRead MoreEvent Medical Staff Training Summary1073 Words   |  5 PagesHealth Insurance Portability and Accountability Act (HIPAA). HIPAA, which works to reduce costs while protecting patients and providing better medical care, is a major piece of health care regulation and was instituted to improve the efficiency and effectiveness of the health care system. The Centers for Disease Control and Prevention (CDC) in Atlanta examines public health and warns of possible health threats from infectious diseases. The CDC monitors birth defects, disabilities, diseases and conditionsRead MoreAnimal Testing Should Be Banned1656 Words   |  7 Pagestext] 1 Prejean The use of animals in research is a widely controversial topic in today?s scientific community and raises an important ethical issue. Do animals make appropriate research subjects and is it absolutely necessary to use animals to test the safety of products? Animal testing can be referred to in a number of ways including animal research and animal experimentation, all of which involve experiments performed on animals to test the safety and effectiveness of things ranging anywhereRead MoreAnimal Testing And Its Effects On Society1393 Words   |  6 Pagesdistinguished for being time consuming, costly and complex. However, this timely manner is beneficial for society as it meant to provide an efficient and safe medication. Concerns regarding when animal studies are necessary compared to clinical trials has been a debatable topic among society. For over a decade, animal research has served as a fundamental component in many medical findings. Mousses are commonly used in laboratories, as we as humans share nearly 95% of our genes, making them a useful andRead MoreAnimal Cruelty And Animal Abuse1572 Words   |  7 PagesIII. LITERATURE REVIEW 5 China, US and the EU 5 A. Research Connections to Animal Cruelty and Abuse 6 B. Alternatives to Animal Testing 6 IV. SUMMARY AND CONCLUSION 7 V. REFERENCES 8 â€Æ' I. INTRODUCTION The abuse and cruelty by humans towards animals have been on the rise as producers and retailers of cosmetics and drugs rush to position their products in the global markets. Scientific tests remain a leading player in animal abuse, especially due to the controlled environment while being experimented

Sunday, December 15, 2019

B-Tec Sport Risk Factors Free Essays

Figure 1: Head injuries (e.g. concussion, unconsciousness), spinal injuries, simple and compound fractures, joint injuries (e. We will write a custom essay sample on B-Tec Sport Risk Factors or any similar topic only for you Order Now g. dislocations, tennis and golf elbow, torn cartilage, twisted ankle), soft tissue, cuts, grazes and blisters, dehydration and hypothermia. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Lack of warm-up Football Pulled muscles e.g. pulled hamstring, pulled quadriceps etc†¦ The short term affect of a lack of warm up is that it you could pull your muscles. The time that you are out of action for will depend on the extent of the injury. The normal period of time that you will be out for with pulled muscles is 2-3 weeks. The long term affects of a lack of warm up is that it could take longer for you to recover from any injuries that you might have. A constant lack of warm up will result in you being out of action for a longer period when you are injured in the future. Lack of cool down Football Cramp The short term affect of a lack of cool down is that it can cause a build up of lactic acid which will lead to cramp. To prevent this, all you need to do is do a short cool down at the end of each physical activity e.g. light jog around the playing area. The long term affects of a lack of cool down is that you will be required to warm up more than usual to loosen up any tight muscles before participating in any future physical activities. Constant lack of cool down may cause you to get cramp persistently. Poor physical fitness/physique Football Pulled muscles e.g. calf strain, pulled quadriceps The short term affect of poor physical fitness and a poor physique is that it will cause pulled muscles. To prevent this, all that is required is for you to stay in shape by doing regular exercise. The exercise does not have to be done at a high intensity level as long as you exercise regularly. The long term affects of poor physical fitness and a poor physique is that it will take you longer to recover from injuries. For example if you get a hamstring injury, it will normally take you two weeks to recover from it. However, if you have poor physical fitness and a poor physique, it might take you 3-4 weeks. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Inadequate diet Boxing Back strain, dehydration, unconsciousness. The short term affect of having an inadequate diet is that can cause injury. Carrying extra weight can cause you to get a back strain. It can also cause you to perform poorly. Sports stars especially boxers need to have a good diet consisting of carbohydrates, calcium, fats (not too much), fibre, minerals, proteins and vitamins. The long term affects of having an inadequate diet is that it can limit the amount of time that you are involved in sport at the highest level. If you eat too much fatty foods it will lead to weight gain, which will then be harder to get rid of as you get older. Over dehydrating can also cause you to fall unconscious. This can be a big risk to your general health. Misuse of alcohol drugs Boxing Unconsciousness, drowsiness, dehydration etc†¦ The short term affect of misuse of alcohol and drugs is that it can cause drowsiness and dehydration. Too much alcohol and drugs could even lead to you fainting. There are not many negative short term affects of taking performance enhancing drugs. However, there are negative long term affects. For misuse of alcohol and drugs. The long term affects of misuse of alcohol and drugs are that it can cause permanent damage to organs in the body which can affect performance in sport. Too much alcohol can cause damage to the liver which can make it difficult for the athlete to perform. Misuse and overuse of alcohol and drugs can also result in decrease in stamina. Stamina is one of the most important aspects of a boxer. Drinking alcohol and taking drugs excessively can also slow down your reactions. Environment Football Cuts, grazes and dislocations. The short term affect of an environment with dangerous surroundings is that you could injure yourself e.g. if a player slid into the advertisement boards he could get cut etc†¦ The long term affect of an environment with dangerous surroundings such as advertisement boards is that you can dislocate a part of your body which can result you being out of action for a while. Poor technique Rugby Dislocations, broken arm, broken leg, bruising etc†¦ The short term affect of poor technique can be a minor injury such as bruising. This might keep you out of action for about a week depending on the extent of the bruising. If a rugby player has not been taught the correct way to tackle, he could injure himself as well as the opposing player. The long term affects of poor technique are that it can cause a serious injury. These injuries can include a dislocated shoulder, broken arm, broken leg etc†¦ These injuries can keep you out for quite a long time. Another long term affect is that until you don’t work on your technique, you will continue to cause injury and you will also be a technically poor athlete. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Lack of skill Basketball Twisted ankle, ligament damage. The short term affect of a lack of skill is that you can get an injury such as a twisted ankle. If a basketball player tries to a slam dunk but he lands awkwardly he might twist his ankle. The long term affects of a lack of skill is that you can get ligament damage. This is the type of injury that can affect your future performances even when you have fully recovered. Inappropriate clothing Rugby Torn ligaments, broken leg. The short affect of inappropriate clothing is that it can affect your performance. For example if you make good runs but you have a loose t-shirt, an opposing player is likely to take advantage by constantly pulling you t-shirt which will prevent you from playing your best. The long term affects of inappropriate clothing is that it can cause serious injury. If you have a loose t-shirt on and an opposing player pulls your t-shirt and you fall down in an awkward position you could get seriously injured. You could get torn ligaments there is even a possibility of you breaking you leg. This will keep you out for a long time. Overtraining Football Pulled hamstring, pulled quadriceps, cramp, muscle fatigue. The short term affect of overtraining if muscle fatigue and cramp. Overtraining is bad for the body. You should only train according to how much your body can endure. This will prevent muscle fatigue and cramp. The long term affect of overtraining is also muscle fatigue. If continue to persistently over train, your body will finally give in and you will have to take a long break from any physical activity. Constantly overtraining can also cause you to pull you muscles such as pulled quadriceps. Weather conditions Football Twisted ankle, ligament damage. The short term affect of poor weather conditions is that it can have a negative affect on your performance. If the football pitch is waterlogged, it will be difficult to play well. The long term affect of poor weather conditions is that you can get injured. The weather might be so poor that it might affect the pitch in a bad way which can cause the players to get injuries such as twisted ankles and ligament damage. Playing surface Football Twisted ankle, ligament damage. The short term affect of a poor playing surface is that can affect your performance in the game. If the pitch has lumps and big patches of mud, players will find it difficult to perform well. The long term affect of a poor playing surface is that it can cause injury. Your foot might get caught in the ground which can result in a twisted ankle or ankle ligament damage. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Lifting and carrying procedures for specialist equipment Rugby Back strain, twisted ankle. The short term affect of not using the correct procedure when lifting something is injuring yourself as well as the player you are lifting. The correct way of lifting something or someone is to bend your knees and back. The long term affect of not using the correct procedure when lifting something or someone is permanent damage. If you lift something or someone in an incorrect way you could do some permanent damage to your back. This will limit what you can do in future physical activities. Inappropriate or lack of specialist sporting equipment Rugby Bruising, cuts, concussion. The short term affect of having a lack of specialist sporting equipment is that it can cause injury. For example If a rugby player is not wearing a mouth-guard, he could get his teeth knocked out. The long term affect of having a lack of specialist sporting equipment is that can affect your performance and it can cause you to get injured more often. Misuse of protective equipment Boxing Groin injury, concussion etc†¦ The short term affect of misuse of protective equipment is that you will be more prone to injuries. For example if a boxer needs to wear a foul protector but he doesn’t he will get injured if he gets punched in the groin. The long term affect of misuse of protective equipment is that you will get injured very easily. If you don’t use a mouth guard when boxing, you could get damage to the mouth. Faulty and damaged equipment Football Twisted ankle, bruising to the shin, shin splits etc†¦ The short term affect of using faulty and damaged equipment is that it might cause injury. If you don’t wear shin pads, you will come out with bruising to the shin in the least possible scenario. The long term affect of using faulty and damaged equipment is that you can get seriously injured. If a player tackles you with a lot of force on your shins, you can split your shins. This is a very painful injury and will keep you out of action for a while. Behaviour of other participants endangering others Football Bruising, cuts, grazes, concussion etc †¦ The short term affect of this is that you will pick up an injury that will probably keep you out of physical action for about a couple of weeks. The long term affect of this is that you might get permanent scaring or cuts if players start going out of order e.g. fighting. How to cite B-Tec Sport Risk Factors, Papers

Saturday, December 7, 2019

Network Design Effective Role and Helps Organization

Question: Starting from the logical design of the network that you completed in Assessment item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received in Assessment Item 1. In order to undertake your physical design, you may need to make further justifiable assumptions. You also have to complete your final network design report. In this process, you are expected to participate in the weekly discussions and find the answers to the recommended discussion questions. Discussion questions have been selected and created not only to gradually increase your knowledge and skills in this course but also to help produce the final network design report. The students who do not attempt weekly discussion questions would very likely produce a report that would not satisfy the requirements and/or that cannot be justified. Answer: 2.0 Introduction 2.1 introduction In technology era, computer network plays an effective role and helps organization to communicate form source to destination end in effective and successful manner. A computer network is group of computer devices such as hardware devices that is connected with the help of communication channel to offers resource sharing and communication among wide range of organizations as well as clients (Shinde, 2009). Thus as per the case study it has been seen that the organization that is based upon the Australia specializes in designing and creating an effective network local as well as global. This organization presently won the contract to design an effective as well as secure computer network of new Philippines based hotels. The hotel has five floors and each floor contains 80 rooms. The organization has to develop network in such a manner that each staffs of hotels communicate effectively with each others. Furthermore as per the given case study, it has been gained that the organization ne eds to create network for one big island and three small surroundings islands. As per the study, it has been seen that the main islands have LTE (long-term evolution) and connected with other island using optical fiber that contains 200Mbps speeds. 2.2Project Goal The aims and goal of the present project is to design an effective as well as most secure network of hotels that is situated in Philippines. Furthermore, the objective of present project is to evaluate the design with the help of testing procedure and analyze the effectiveness of proposed network. As per the given scenario, it has been obtained that company has hotel and that hotel have 5 floors and each floor have 80 rooms we need to design network for 5 floors and also need satellite tower for wireless devices. In addition to this, in present research researcher build such type of computer network that helps the organization i.e. hotels to communicate with one staffs members to others though wireless communication process. 2.3 Business Goals The main goals of the organization or business to build a secure network that helps the organization to communicate with source to destination ends in effective as well as successful manner. In addition to this, the organization wants to communicate with their staffs members, tourists as well as torus guides should have phone communication and internet access from anywhere on these island. Furthermore, it has been seen that an area where hotel is situated known for shark attacks and the surfers should be make available with wireless communication devices that helps them to communicate with the lifeguards easier manner. The goal of this business is connectivity between hotel all 5 floors and big island with three small island. The terrains of all four island need to Access Island currently uninhabited. The network design contacted of your company includes the designs of the network for the hotel on the big island and the internet and phone service on all four islands the tourists and hotel staff and tour guides should have internet access and phone communication from anywhere in the island to the rest of the world. 2.4 Design requirement In order to design an effective as well as secure network firstly designer needs to implements and plans needs to software as well as hardware requirements. In order to build an effective network organization needs to routers, computers, switches and others devices that helps them in communication process. In addition to this, it has been observed that the company wants to secure their clients as well as their own data and information; thereby to gain this company needs to implements firewall techniques. Furthermore, the company requires to server that helps the organization to communicate with each others in effective manner. Moreover, organization needs to purchase internet protocol address that helps them to communicate with one device to others in easier manner. 2.4.1Business Goals If you keep in mind the changes in business strategies and enterprise networking discussed in the previous sections, it becomes possible to list some typical network design business goals: Increase revenue and profit Increase market share Expand into new markets Increase competitive advantages over companies in the same market Reduce costs Increase employee productivity Shorten product-development cycles Use just-in-time manufacturing Plan around component shortages Offer new customer services Offer better customer support Open the network to key constituents (prospects, investors, customers, business partners, suppliers, and employees) Build relationships and information accessibility to a new level, as a basis for the network organizational model Avoid business disruption caused by network security problems Avoid business disruption caused by natural and unnatural disasters Modernize outdated technologies Reduce telecommunications and network costs, including overhead associated with separate networks for voice, data, and video Proper execution of network management system can be cooperative to gain weighty profits from business perspectives. Some of those assumed benefits are as follows A network management system can have profound company-wide benefits. After all, your network consists of more than just computers. You also must consider your phone system, fax machine, printers and plotters, payroll system, and even your invoicing system. And if your business operates in more than one location, youll be dealing with several computers and peripherals at each location. With a network management system solution, every piece of equipment communicates with your computer system. More importantly, you can control your entire business operation from a central computer. Not only is a network management solution cost effective it can also dramatically improve efficiency and productivity. Here are three ways in which your business will benefit from a quality network management system: 2.4.2 List of network assumption Save Money Instead of several IT managers monitoring each network at every location, youll only need one sys admin at a single location to control and monitor your entire network. As a result, you can spend your hiring dollars where you need it on research development, customer support, advertising, new equipment, and additional inventory. Save Time A network management system will allow you to give each of your IT provider's direct access to any information they need to do their jobs efficiently. Say goodbye to walking reports around the office from one data entry location to another. Also, you wont have to worry about any more missed emails or interoffice memos. Each of your team members can enter and retrieve data right from their own workstation, and access can be controlled by your network manager. Increase Productivity With a quality network management system, you can monitor all aspects of your office network including hardware, software, and peripherals. All of these components need to be able to communicate with each other. Should one go down, the whole system could be impacted? The minute theres an issue, your network management system detects it so that theres no data loss or productivity slowdown. 2.5 Networking Requirements Application availabilityNetworks carry application information between computers. If the applications are not available to network users, the network is not doing its job. Reliability and security:- The primary purpose of the company to secure network in effective manner thereby to gain this in effective manner the users needs to implements an effective data protection security devices i.e. firewalls that helps the company to secure their network in effective manner (Chao Liu, 2007). On the other hand, reliable is most effective that helps the company to achieve consistence better quality of network related services. 2.6 The Design Problem: Optimizing Availability and Cost In general, the network design problem consists of the following three general elements: Environmental givensEnvironmental givens include the location of hosts, servers, terminals, and other end nodes; the projected traffic for the environment; and the projected costs for delivering different service levels. Performance constraintsPerformance constraints consist of network reliability, traffic throughput, and host/client computer speeds (for example, network interface cards and hard drive access speeds). Networking variablesNetworking variables include the network topology, line capacities, and packet-flow assignments. The goal is to minimize cost based on these elements while delivering service that does not compromise established availability requirements. You face two primary concerns: availability and cost. These issues are essentially at odds. Any increase in availability must generally be reflected as an increase in cost. As a result, you must weigh the relative importance of resource availability and overall cost carefully 2.7 Networks Must Make Business Sense The primary purpose of the company to build an effective network design that helps the company to communicate with the staffs as well as tourism in most effective manner. In addition to this as per the case study it has been seen That the areas where hotels situated known for Shark attacks thus with the help of implements an effective network or wireless communication devices the staffs member communicate effectively if any problem happened in those areas. With the economic downturn that followed the Internet boom, there is an increased need to choose technologies that solve business problems. Although many companies made "technology for technology's sake" choices during the boom, this is no longer the case. Business leaders are more involved in Information Technology (IT) decisions than they once were, and IT managers rely on business managers to help them prioritize and fund IT projects. Network upgrades are made not because some new technology sounds interesting to the engineers, but because it will help an enterprise increase profits, productivity, market share, and cash flow. Network designers must choose solutions that solve a business manager's problem. Network applications have become mission critical. Despite this trend, large budgets for networking and telecommunications operations have been reduced at some companies. Many companies have gone through difficult reengineering projects to reduce operational costs, and are still looking for ways to manage networks with fewer people and reduce the recurring costs of WAN circuits. As the head count at many corporations remains flat or shrinks, there's a renewed focus on using network applications to increase individual productivity in all departments, not just within the networking and IT departments. One result has been the emergence of web-based productivity tools. Most enterprises streamline their business processes, applications, and protocols, and standardize on Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP and web-based applications for selling products and supporting customers have risen in popularity, as have web-based applications for supporting employees and suppliers. Streamlining processes and protocols has also led to an increased use of IP telephony and to the continued convergence of voice and data networks. To save money and to reduce the need for specialized data or voice engineers, companies continue to adopt IP telephony technologies. Until recently, telecommunications and voice networks were separate. Telecommunications engineers knew little about data networks, and networking engineers didn't know the difference between a TDM and a Tandem Switching System (TSS). In today's environment, voice, data, and video networks are merging. In traditional voice and data terminal/mainframe networks, data flow and throughput were predictable. Closed communications systems were the norm, and data sources were well known. In today's networks, Internet surfing is ubiquitous. It is hard to predict data flow and the timing of bursts of data when users are jumping from one website to another, possibly downloading videos or animation files. In addition to web surfing, the move to a network organizational model where the network is used by both inside and outside users affects network data flow. Network design practices must keep pace with these changes in business practices. 2.8 The Need to Support Mobile users Notebook computers have finally become small enough to carry around, and workers now expect to get work done at home, on the train, in hotels, in meeting rooms, at customer sites, and even while having their morning latte at the local coffee shop. These days almost every notebook computer ships with wireless networking built in to facilitate users getting work done outside the office. It shouldn't matter (to the user anyway) where data is and in what format. Network users expect network performance to be uniform, regardless of where the user or data resides. A user should be able to read e-mail on a cell phone, for example, and read voice mail from a web browser while sipping coffee in an Internet cafe. Users should have secure and reliable access to tools and data wherever they are. The challenge for network designers is to build networks that allow data to travel in and out of the enterprise network from various wired and wireless portals without picking up any viruses and without being read by parties for whom it was not intended. One of the biggest trends in network design is virtual private networking, where private networks make use of public service networks to get to remote locations or possibly other organizations. Customers getting involved in VPN projects have concerns about security, reliable and predictable performance, and data throughput requirements. VPNs are covered in Chapter 5, "Designing a Network Topology." Network architectures are taking on a virtual and ubiquitous form for users, while remaining highly structured and managed from the network engineers' point of view. The designer is challenged to develop secure, resilient, and manageable solutions that allow users to work efficiently, wherever they are physically located. 2.9 The Importance of Network Security and Resiliency Network security has filtered to the top of the list of business goals at many companies. Although security was always important, it has become even more important as networks become indispensable and as tools for breaking into networks become ubiquitous. Enterprises must protect their networks from both the unsophisticated "script kiddies" and from more advanced attacks launched by criminals or political enemies. There is also a continued requirement to protect networks from Trojan horses and viruses. Many enterprise managers now report that the network must be available 99.999 percent of the time. Although this goal may not be achievable without expensive redundancy in staff and equipment, it may be a reasonable goal for companies that would experience a severe loss of revenue or credibility if the network were down for even very short periods. This goal is linked to goals for security, as the network cannot be available if security breaches and viruses are disabling network device s and applications (Chao Liu, 2007). When security and operational problems occur, networks must recover quickly. Networks must be resilient. More than ever, IT and business managers require high-availability and resiliency features for their network equipment and protocols, as they realize the extent to which network downtime can jeopardize business success. Thus the primary objective of the organization is to secure network in effective and efficient manner. 2.10 Network Design Project One of the first steps in starting a network design project is to determine its scope. Some of the most common network design projects these days are small in scopefor example, projects to allow a few people in a sales office to access the enterprise network via a VPN. On the other hand, some design projects are large in scope. Ask your customer to help you understand if the design is for a single network segment, a set of LANs, a set of WAN or remote-access networks, or the entire enterprise network. Also ask your customer if the design is for a new network or a modification to an existing one. Explain to your customer any concerns you have about the scope of the project, including technical and business concerns. Subsequent sections in this chapter discuss politics and scheduling, which are tightly linked to the scope of a network design project. (Many network designers have learned the hard way what happens when you don't help your customers match the schedules of their projects to the scope.) Make sure your customers tell you everything they can about the network and the design project. You may want to poke around outside the stated scope of the project; just to make sure nothing essential has been omitted. Double-check that you have gathered all the requirements and that you have accurate information about sites, links, and devices. If the project addresses network security, make sure you know about all external links, including dial-in access. When analysing the scope of a network design, you can refer to the seven layers of the OSI reference model to specify the types of functionality the new network design must address. For example, you might decide that the design project is concerned only with network layer concerns such as routing and IP addressing. Or you might decide that the design also concerns the application layer because the focus is on voice applications, such as Interactive Voice Response (IVR), which directs customers to the correct location in a call centre, or unified messaging, where e-mail can be retrieved via voice mail and text messages can be converted into speech. Figure 1-3 shows the OSI reference model. Open Systems Interconnection (OSI) Reference Model In addition to using the OSI reference model, this book also uses the following terms to define the scope of a network and the scope of a network design project: Segment:- A single network based on a particular Layer 2 protocol. May have one or more Layer 3 protocols associated with it, although most networks are standardizing on IP.Building network. Multiple LANs within a building usually connected to a building-backbone network.Campus network. Multiple buildings within a local geographical area (within a few miles), usually is connected to a campus-backbone network.Remote access. Networking is the solutions that support individual remote users or small remote branch offices to accessing the network.WAN. A geographically is dispersed network including point-to-point, Frame Relay, ATM, and other long-distance connections.Enterprise network. A large and diverse network, are consisting of campuses, remote-access services, and one or more WANs or long-range LANs. An enterprise network is also called an internetwork. 2.11 Network Applications For "Name of Application," simply use a name that your customer gives you. This could be an industry-standard name, such as Lotus Notes, or it could be an application name that means something only to the customer (especially for a home-grown application). For new applications, the name might be a code name for a software-development project. For Type of Application, you can use any appropriate text that describes the type of application, or you can classify the application as one of the following standard network applications: Electronic mail File transfer, sharing, and access Database access and updating Groupware Web browsing Network game Remote terminal Calendar Medical imaging Videoconferencing Video on demand (VoD) Scheduled multicast video Surveillance and security camera video Internet or intranet voice (IP telephony) Internet or intranet fax Sales order entry Management reporting Sales tracking Computer-aided design Document imaging Inventory control and shipping Telemetry Interactive Voice Response (IVR) Unified messaging Desktop publishing Web publishing Electronic whiteboard 3.0 Logical diagram 3.1 The logical network diagram In order to build an effective network design organization needs to implements high-speed communication technology that helps them to connect one device to others in effective manner. Furthermore, in present scenario it has been seen that the organization want to communicate with four island where main island connected with others using fiber optics. Thereby to communicate between one devices to other organization implements routers that helps them to communicate between different network. Furthermore, developer users switch routers as well as several peripheral devices within the network that helps them to protect as well as communicate from one island to others in easier manner. Wireless communication from source to destination end has been done effective manner with the help of antenna (Goralski, 2009). Routers work within the Network with the help of IP address and the organization gain unique IP address from internet service providers. In addition to this router, helps to transf er the packets from one end to other end using shortest route. Switch helps to communicate one devices to others using MAC address. 3.2 Justification of logical diagram: The main motive to design this logical network is to offer access system services to the users. Use of different kinds of web servers is helpful to mitigate the network abuse from the business system. Implementation of this kind of network system contributes to sending useful data and information to the different ports and devices of the network system. Present aim of the Hotels organization to build such type of network that helps their staffs as well as tourists to communicate effective manner. In order to perform this job organization implements router devices that help them to connect different devices or network within one network (Goralski, 2009). The main purpose of selection of router devices is that it connects different type of computer network with one and helps the organization to send data and information from source to destination end effective as well as easier manner with the help of shortest path algorithm. Apart from that the organizaiaton implements antenna that he lps them to communicate wireless devices i.e. as per the study it has been observed that the areas where organization i.e. hotels situated are suffered from shark attacks thus for some reason if any problems has been indentified then staffs members easily communicate with each other using wireless devices. To protect the network in secure manner organization implements firewall techniques that helps them to secure their network from unauthorized users in easier and effective manner. 3.3 protocol mechanism and Security mechanism: Border Gateway Protocol: Border Gateway Protocol(BGP) is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems.BGPis a Path Vector Protocol (PVP), which maintains paths to different hosts, networks and gateway routers and determines the routing decision based on that (Kuhn, Sriram, Montgomery, 2007). Open Shortest Path First (OSPF): Open Shortest Path First(OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It isdefinedasOSPFVersion 2 in RFC 2328 (1998) for IPv4 Enhance Interior Gateway Routing Protocol: Enhanced Interior Gateway Routing Protocol(EIGRP) is an advanced distance vector routing protocol based on the principles of the Interior Gateway Routing Protocol (IGRP).EIGRPis a successor to the Interior Gateway Routing Protocol (IGRP). Both are owned by Cisco and operate only on their devices. Routing Information Protocol: Routing Information Protocol(RIP) is a dynamicprotocolused to find the best route or path from end-to-end (source to destination) over a network by using a routingmetric/hop count algorithm. 3.4 The list of security mechanisms Firewall: Generally thefirewallhas two network interfaces: one for the external side of the network, one for the internal side. Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most basic level,firewallscan block traffic intended for particular IP addresses or server ports In order to secure network well effective manner the company implements firewall techniques that helps the company to secure their network from unauthorized users (Judd, 2009). Furthermore with the help of proxy sever the organization also secure their network successfully manner. Moreover, network access control procedure employed in bolstering the computer network security. It helps the organization to employ the mechanism of not allowing or blocking free available network. 4.0 Physical network design 4.1 Cost of network devices The network is a strategic element in your overall information system design. As such, the cost of your network is much more than the sum of your equipment purchase orders. View it as a total-cost-of-ownership issue. You must consider the entire life cycle of your networking environment. A brief list of costs associated with networks follows: Equipment hardware and software costsconsider what is really being bought when you purchase your systems; costs should include initial purchase and installation, maintenance, and projected upgrade costs. Performance trade-off costsConsider the cost of going from a 5-second response time to a half-second response time. Such improvements can cost quite a bit in terms of media selection, network interfaces, networking nodes, modems, and WAN services. Installation costsInstalling a site's physical cable plant can be the most expensive element of a large network. The costs include installation labor, site modification, fees associated with local code conformance, and costs incurred to ensure compliance with environmental restrictions (such as asbestos removal). Other important elements in keeping your costs to a minimum include developing a well-planned wiring-closet layout and implementing color-code conventions for cable runs. Expansion costsCalculate the cost of ripping out all thick Ethernet, adding additional functionality, or moving to a new location. Projecting your future requirements and accounting for future needs saves time and money. Support costsComplicated networks cost more to monitor, configure, and maintain. Your network should be no more complicated than necessary. Costs include training, direct labor (network managers and administrators), sparing, and replacement costs. Additional costs that should be considered are out-of-band management, SNMP management stations, and power. Cost of downtimeEvaluate the cost of every minute that a user is unable to access a file server or a centralized database. If this cost is high, you must attribute a high cost to downtime. If the cost is high enough, fully redundant networks might be your best option. Opportunity costsEvery choice you make has an opposing alternative option. Whether that option is a specific hardware platform, topology solution, level of redundancy, or system integration alternative, there are always options. Opportunity costs are the costs ofnotpicking one of those options. The opportunity costs of not switching to newer technologies and topologies might be lost competitive advantage, lower productivity, and slower overall performance. Any effort to integrate opportunity costs into your analysis can help make accurate comparisons at the beginning of your project. Sunken costsYour investment in existing cable plant, routers, concentrators, switches, hosts, and other equipment and software is your sunken costs. If the sunken costs are high, you might need to modify your networks so that your existing network can continue to be utilized. Although comparatively low incremental costs might appear to be more attractive than significant redesign costs, your organization might pay more in the long run by not upgrading systems. Too much reliance on sunken costs can cost your organization sales and market share when calculating the cost of network modifications and additions. 4.2 Estimating Traffic: Workload Modeling Empiricalworkload modelingconsists of implementing a working network and then monitoring traffic for a given number of users, applications, and network topology. Try to characterize activity throughout a normal workday in terms of the type of traffic passed, level of traffic, response time of hosts, time to execute file transfers, and so on. You can also observe utilization on existing network equipment over the test period. If the tested network's characteristics are similar to a prospective network, you can try extrapolating to the prospective network's number of users, applications, and topology. This is a best-guess approach to traffic estimation given the unavailability of tools to characterize detailed traffic behavior. In addition to passive monitoring of an existing network, you can measure activity and traffic generated by a known number of users attached to a representative test network and then extrapolates findings to your anticipated population. One problem with modeling workloads on networks is that it is difficult to accurately pinpoint traffic load and network device performance as functions of the number of users, type of application, and geographical location. This is especially true without a real network in place. Consider the following factors that influence the dynamics of the network: The time-dependent nature of network accessPeak periods can vary; measurements must reflect a range of observations that includes peak demand. Differences associated with type of trafficRouted and bridged traffic place different demands on network devices and protocols; some protocols are sensitive to dropped packets; some application types require more bandwidth. The random (nondeterministic) nature of network trafficExact arrival time and specific effects of traffic are unpredictable. 4.3 Explanation of physical network design LAN configuration IP big island: 192.1.0.0/23 Usable range 192.1.0.1 usable host 192.168.0.255 Subnet ID: 192.1.0.0/23 Broadcast ID: 192.0.1.256/26 IP big island: 192.1.1.0/23 Usable range 192.1.1.1 usable host 192.168.1.255 Subnet ID: 192.1.1.0/23 Broadcast ID: 192.0.1.256/26 Small island1 LAN: 192.1.2.0/26 192.1.2.63 Broadcast ID: 192.168.168.64/276 Small island2 LAN: 192.1.3.0/27 Network devices Routers and switch:- Network routers helps in forwarding and delivering packets form sources to destination end effective manner with the help of transmission control protocol or internet protocol. Furthermore, router has an effective ability to provide security on the network by authenticating and verifying clients accessing the computer network devices. Switch provides the communication between devices using MAC address. Scalability, cost as well as reliability are obtained effectively manner with the help of switch devices. Telephone: Telephones plays an significant roles in gaining and obtaining the distance end node intended for an effective communication. In order to communicate more effective in present network developer users the telephones devices that are connected or communicated with wireless devices. 5.0 Final document 5.1 Testing procedure 5.1.1 Systems Development Life Cycles Systems analysis students are familiar with the concept that typical systems are developed and continue to exist over a period of time, often called a systems development life cycle. Many systems analysis books use the acronym SDLC to refer to the life cycle, which may sound strange to networking students who know SDLC as Synchronous Data Link Control, a bit-oriented, full-duplex protocol used on synchronous serial links, often found in a legacy Systems Network Architecture (SNA) environment. Nevertheless, it's important to realize that most systems, including network systems, follow a cyclical set of phases, where the system is planned, created, tested, and optimized. Feedback from the users of the system causes the system to then be re-created or modified, tested, and optimized again. New requirements arise as the network opens the door to new uses. As people get used to the new network and take advantage of the services it offers, they soon take it for granted and expect it to do more. In this book, network design is divided into four major phases that are carried out in a cyclical fashion: Analyze requirements.In this phase, the network analyst interviews users and technical personnel to gain an understanding of the business and technical goals for a new or enhanced system. The task of characterizing the existing network, including the logical and physical topology and network performance, follows. The last step in this phase is to analyze current and future network traffic, including traffic flow and load, protocol behavior, and quality of service (QoS) requirements. Develop the logical design.This phase deals with a logical topology for the new or enhanced network, network layer addressing, naming, and switching and routing protocols. Logical design also includes security planning, network management design, and the initial investigation into which service providers can meet WAN and remote access requirements. Develop the physical design.During the physical design phase, specific technologies and products to realize the logical design are selected. Also, the investigation into service providers, which began during the logical design phase, must be completed during this phase. Test, optimize, and document the design.The final steps in top-down network design are to write and implement a test plan, build a prototype or pilot, optimize thenetwork design, and document your work with a network design proposal. These major phases of network design repeat themselves as user feedback and network monitoring suggest enhancements or the need for new applications. Figure 1-1 shows the network design and implementation cycle. 5.1.2 Test Planning Now that you and your client clearly understand and agree on the test scope, objectives, and criteria for success, it is finally time to roll up your sleeves and start working on the test plan. As always, it is important to collaborate with the stakeholders on the test plan to determine specifics regarding the application characteristics, behaviors, and new features that are expected of the new system. The prototype network system, equipment specifications, test cases, test tools, data to be collected, and results format must also be discussed and agreed upon. This is an important step in the process because it requires many decisions and significant teamwork. 5.2 Design the Functional Prototype Network System For most types of tests, a working prototype network system of the intended design will serve as the platform upon which functionality, operation, and performance of the new system will be evaluated. A prototype network system is commonly illustrated in a set of network topology diagrams that represent a miniaturized version of the end-state network. 5.3 Identifying the Test Suites and Test Cases A test case in the context of internetworking is a set of conditions or variables under which a tester will determine whether or not a design element (network service, component, or feature) is working correctly. Test cases are the essence of the test plan, and they are sometimes collected or aggregated into test suites. Identifying the right test cases and expected output is an art form in itself, often requiring a series of conversations with the project stakeholders, architects, and operators of the network? A simple description of the test cases you expect to run, and accompany the network topology diagram you have prepared, is sufficient to begin the test plan dialog. Your client may already have some ideas of the kinds of tests they want to see, so you should request their input right away. However, some clients have no idea on how testing is conducted; in these situations, you need to rely on your own testing experience and an understanding of the design goals, test triggers, and motivations for the testing. Table 4-1. Example Test Suites and High-Level Test Cases Test Suite # Test Suite Test Case 1 Open Shortest Path First (OSPF) Routing ABR Summarization Default Route Announce OSPF NSSA Redistribution BGP to OSPF Timer Optimizations 2 Border Gateway Protocol (BGP) Routing Data Center iBGP Optimizations CE-PE eBGP Optimizations BGP Aggregation BGP Policy (Communities and Local-Pref) 3 Quality of Service (QoS) Marking Queuing Traffic Shaping Policing Remarking at CE-PE to MPLS QoS Transparency Across MPLS CoPP 4 Cisco Wide Area Application Services (WAAS) WCCP Redirects CIFS/FTP Acceleration 5 LAN Campus Switching Branch Switching HSRP 6 Multicast PIM Sparse Mode AnyCast RP with MSDP MVPNMPLS 7 Cisco Performance Routing (PfR) Fast Reroute Load Balancing Interop with WAAS 8 Cisco Group Encrypted Transport VPN (GET VPN) Group Member at Branch and WAN Distribution Cooperative Key Servers 9 Network Management SNMP SSH AAA NTP Logging NetFlow 10 Performance/Scalability Branch Router Performance (RFC 2544) WAN Route Saturation WAAS Scale 11 Negative Testing Circuit Path Failover Line Card Failover Route Processor Failover Power Failures MPLS Cloud Hard Failures MPLS Cloud Soft Failures BGP Flapping Testing of pc connectivity Testing using packet tracer References Convery, S.Network Security Architectures. Indianapolis, Indiana: Cisco Press; 2004. Edney, J. and Arbaugh, W.Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Reading, Massachusetts: Addison-Wesley; 2003. Fleck, B. and Potter, B.802.11 Security. Cambridge, Massachusetts: O'Reilly; 2002. Flickenger, R.Wireless Hacks. Cambridge, Massachusetts: O'Reilly; 2003. Kaeo, M.Designing Network Security. Indianapolis, Indiana: Cisco Press; 1999. O'Hara, B. and Petrick, A.IEEE 802.11 Handbook. Piscataway, New Jersey: IEEE Press; 2005. Peikari, C. and Fogie, S.Maximum Wireless Security. Indianapolis, Indiana: Sams Publishing; 2002. Roshan, P. and Leary, J.802.11 Wireless LAN Fundamentals, Indianapolis, Indiana: Cisco Press; 2003. Shankar, K., Sundaralingam, S., Balinsky, A., and Miller, D.Cisco Wireless LAN Security. Indianapolis, Indiana: Cisco Press; 2005. Swaminatha, T.M. and Elden, C.R.Wireless Security and Privacy: Best Practices and Design Techniques. Reading, Massachusetts: Addison-Wesley; 2002. Vladimirov, A.A., Gavrilenko, K.V., and Mikhailovsky, A.A.Wi-Foo: The Secrets of Wireless Hacking. Reading, Massachusetts: Addison-Wesley Professional; 2004. Chao, H. Liu, B. (2007).High performance switches and routers. Hoboken, N.J.: Wiley-Interscience. Goralski, W. (2009).The illustrated network. Amsterdam: Elsevier/Morgan Kaufmann Publishers. Huang, S., MacCallum, D., Du, D. (2010).Network security. New York: Springer. Judd, C. (2009).Firewall. New York: Saint Martin's Press Inc. Kizza, J. (2013).Guide to computer network security. London: Springer. Kuhn, D., Sriram, K., Montgomery, D. (2007).Border Gateway Protocol security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology. Lee, R. (2012).Software and network engineering. Berlin: Springer. Perez, A. (2014).Network Security. London: ISTE. Shinde, S. (2009).Computer network. New Delhi: New Age International Ltd.