Verified Document

Networking, System Support, And Virtualization Research Proposal

One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The research would also focus on promotion of objectivity and minimization of subjectivity. This is crucial to the development of effective and efficient hypothesis to offer valid testing to the theories and concepts of network security. It is also critical to uphold honesty in the execution and presentation of research findings and analysis. This research would focus on presenting data in accordance with the response of the population sample with the aim of promoting objectivity and openness in evaluation of the findings. The research would also follow the credible steps and procedures in relation to development of quality research design and processes. This is through adhering to the processes and design of qualitative research thus addressing of ethical aspect of research. The research would understand and adhere to legal requirements of the execution of a research. Critical Approaches vital for the improvement of the Research

In order to improve the quality and validity of the research, it would be ideal to define the research questions precisely in order to offer critical direction to the development of the study. This involves elimination of ambiguity that would arise during the adoption and implementation of the research question. It is also vital to apply quality and effective research instruments to enhance the process of collecting data in relation to the research question. It is also essential to eliminate limitations that would hinder the achievement of valid and reliable information such as a reduction of biasness. It is also significant to adopt sufficient number of research agents or population sample in order to enhance the validity and reliability of the data. The research process would follow critical procedures for the development of the study. This is an indication of building the research on an effective literature review on relevant resources that would provide accurate information on the research question. It is also vital to maintain objectivity and openness in the execution and presentation of the...

This would provide the opportunity for other researchers to enhance or confirm the theories and concepts of the research. Adhering to the ethical guidelines would ensure that research is powerful and valid towards addressing the needs of the research question.
References

Sharma, P, & Bhadana, P 2010, 'An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures', International Journal on Computer Science & Engineering, 1, 5, pp. 1830-1835, Academic Search Complete.

Manangi, S, Chaurasia, P, & Singh, M 2010, 'Analysis of Security Features in 5 Layer Internet Model', International Journal on Computer Science & Engineering, 1, 3, pp. 777-781, Academic Search Complete.

Bhaya, W, & Alasadi, S 2011, 'Security against Spoofing Attack in Mobile Ad Hoc Networks', European Journal of Scientific Research, 64, 4, pp. 634-643, Academic Search Complete.

Singh, S, & Verma, H 2011, 'Security for Wireless Sensor Network', International Journal on Computer Science & Engineering, 3, 6, pp. 2393-2399, Academic Search Complete.

Ambhore, P, Meshram, B, & Wankhade, K 2010, 'Protection of Public Network Communication by using Internet Protocol Security', International Journal on Computer Science & Engineering, 1, 3, pp. 493-499, Academic Search Complete.

Pandey, S 2011, 'Modern Network Security: Issues and Challenges', International Journal of Engineering Science & Technology, 3, 5, pp. 4351-357, Academic Search Complete.

Papaj, J, Dobos, L, & izmar, a 2012, 'Opportunistic Networks and Security', Journal of Electrical & Electronics Engineering, 5, 1, pp. 163-166, Academic Search Complete.

Alshboul, a 2010, 'Information Systems Security Measures and Countermeasures: Protecting Organizational Assets from Malicious Attacks', Communications of the IBIMA, pp. 1-9, Academic Search Complete.

Ristov, S, Gusev, M, & Kostoska, M 2012, 'CLOUD COMPUTING SECURITY in Business INFORMATION SYSTEMS', International Journal of Network Security & Its Applications, 4, 2, pp. 75-93, International Security & Counter Terrorism Reference Center.

Lihua, H 2010, 'Network Security Policy', Modern Applied Science, 4, 7, pp. 201-203, Academic…

Sources used in this document:
References

Sharma, P, & Bhadana, P 2010, 'An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures', International Journal on Computer Science & Engineering, 1, 5, pp. 1830-1835, Academic Search Complete.

Manangi, S, Chaurasia, P, & Singh, M 2010, 'Analysis of Security Features in 5 Layer Internet Model', International Journal on Computer Science & Engineering, 1, 3, pp. 777-781, Academic Search Complete.

Bhaya, W, & Alasadi, S 2011, 'Security against Spoofing Attack in Mobile Ad Hoc Networks', European Journal of Scientific Research, 64, 4, pp. 634-643, Academic Search Complete.

Singh, S, & Verma, H 2011, 'Security for Wireless Sensor Network', International Journal on Computer Science & Engineering, 3, 6, pp. 2393-2399, Academic Search Complete.
Cite this Document:
Copy Bibliography Citation

Related Documents

Virtualization Virtual Networks the Creation
Words: 1138 Length: 4 Document Type: Term Paper

Three different types of basic switches can be built and utilized in a Hyper-V virtual network: internal, external and private switches (Virtuatopia, 2012). An external switch at the top layer of a Hyper-V virtual network and controls access to/routes transmissions in and out of the virtual network, maintaining communication between the virtual network and the external physical network (Virtuatopia, 2012). Once inside the network, an internal switch works much

Enterprise Saas ERP System for
Words: 2948 Length: 11 Document Type: Business Proposal

This is because it can provide and de-provide its resources dynamically, lead to a reduction of the unused capacity as well as maximize the available resources for improved efficiency. Efficient: The SaaS ERP system makes businesses to benefit from the shared hardware, familiar technologies as well as automated processes. This means that that system is able to effectively increase its peak-load capacity, provide access to organizational resources from almost everywhere

Network Support Technologies Case Study
Words: 1648 Length: 6 Document Type: Case Study

Network and IT Technologies and Programs to Improve Small-Firm Efficiency and Staff Satisfaction Company Overview The networking needs of a small organization are just as vital to that firm's operational success, and in many instances are even more essential to their efficiency and degree of employee satisfaction. At Knobs R Us, a lack of common technologies and basic network interfaces is creating an unnecessarily slow workflow, with inefficiencies that both limit the

Chef Delivery System: On-Premises and the Cloud
Words: 2991 Length: 8 Document Type: Chapter

Chef Delivery is a continuous and unified delivery service that provides enterprise DevOps teams with a new workflow framework in which they can better manage the continuous delivery of their infrastructure. In sum, Chef Delivery automates changes to infrastructure, runtime environments and applications, but it provides a useful framework in which automated testing and continuous integration and delivery can be achieved. In addition, Chef Delivery provides software developers with relevant

RAM and What It Does
Words: 1828 Length: 7 Document Type: Research Paper

RAM and What it Does Random Access Memory (RAM) Analysis and Overview The intent of this analysis and overview of Random Access Memory (RAM) is to define its various types and how they are used in system configurations. Included in this analysis is an overview of the operational characteristics of RAM including how to install and use dual in-line memory modules (DIMMs) and single in-line memory modules (SIMMs). Memory modules of

Vmware in Recent Years, There
Words: 2718 Length: 10 Document Type: Term Paper

Virtual infrastructure is far more flexible and easily managed than conventional physical servers, allowing administrators to manage and optimize services globally across the enterprise ("Making Your Business Disaster Ready With Virtual Infrastructure")." The picture on the left is a depiction of the VMware Infrastructure. As you can see, there are various levels of virtual management. This VMware infrastructure guarantees that the enterprise servers, network and storage are secure and accessible. VMware

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now