Monday, December 30, 2019

Critical analysis of health Free Essay Example, 1000 words

Black (1980) claims that, medical model of health inclines to consider health in provision of freedom from a clinically discoverable disease. Critics says that it has no immediate benefit as it does not focuses on prevention of disease and only focuses on treatment and management of healthy. Social Model Social model of health denies the impartiality and scientific pretensions of the medical model and considers dependence upon the scientific method as only one way to determine health. Social model of health admits that illness and health are developed socially and that the health we experience is related to how societies are organized. Gillespie and Gerhardt (1995) were on the view that, health has a cultural, social and historical context and cannot be understood until we appreciate this. The weakness social model is that it does not treat illness once it has developed. Pathogenic Health’s Concept This theoretical concept for the American health experts was developed by Williamson and Pearse. Pathogenesis is the process for analysing causes and possible sources of disease. Pathogenesis begins with the examination of sickness and disease, subsequently it works with understanding the nature of disease and to determine the way someone can manage, avoid, and eliminate that frailty or disease. We will write a custom essay sample on Critical analysis of health or any topic specifically for you Only $17.96 $11.86/pageorder now Pathogenesis in a balancing fashion focused on detecting the causes and antecedents of disease and identification of the disease risk factors. Pathogenesis might be regarded optimistic because it presumes that humans to be healthy, but not for preventable problems or difficulties. Approval of the pathogenic model of health by most traditional health professionals has dictated that disease preclusion, cure, and management are the ways to better health (Deep, 1999). Salutogenic Health In contrast to pathogenesis, salutogenesis is the examination of health causes and origins, initiates by considering health and looks future at the ways utilised to develop and excel mental, physical and social well-being. Salutogenic model suggests that the goal of research in health should be to identify, determine, and illustrate factors, pathways and the possible causes of positive health to enhance our knowledge regarding the ways to deal, handle as well as to prevent pathogenesis (negative health). Salutogenesis is a framework focused on finding the causes and predecessors of health and describing health or salutary factors. The presumption of salutogenesis are, that action requires to occur to move someone toward better health, motivates experts to be proactive as their focus is on developing a new advanced state of health than is presently being experienced (Becker, Glascoff & Felts, 2010).

Saturday, December 21, 2019

Feminism in The History of Rasselas, Prince of Abyssinia

Samuel Johnsons The History of Rasselas, Prince of Abyssinia and Its Feminist Conclusion, in which Nothing is Concluded Feminism is described in many ways, but mainly it can be gathered as a movement against oppression, which fights for the civil and political equality of women and men, and towards the opportunity of self-independence. During the eighteenth century, Great Britains society offered little opportunity for women to take part in the active roles of the male dominated world. Women were unable to participate in political, economic or social dealings. Society understood that women were supposed to be submissive to men, that their natural destiny was marriage, and that women needed only minimal education. Denying women a†¦show more content†¦There is nothing new in his teachings and counseling. Rasselas knows he needs something new in his life and that he needs to learn the knowledge of others in the outside world. Inside the valley, Rasselas meets Imlac, who teaches him new knowledge. Imlac tells Rasselas his life story and how he came to live in the valley. Rasselas seems t o be infatuated with Imlac and his adventures throughout the world. Imlac knows that life outside of the valley will not be what Rasselas expects, but still he leads him on, because he knows that Rasselas has to learn things for himself and by himself. Imlac introduces him to tales he never could have imagined: of violent oppression, cruelty, robbery, envy, pride, power and even poetry. He also spoke to him about people and the human condition. When Imlac speaks about he Europeans, Johnson introduces one of his most important themes, which is education. ‘They are more powerful, sir than we, answered Imlac, ‘because they are wiser; knowledge will always predominate over ignorance, as man governs the other animals. But why their knowledge is more than ours, I know not what reason can be given, but the insearchable will of the Supreme Being (91). Nevertheless, Johnson individualizes the nations regarding their felicity, disregarding the European belief, by emphasizing that knowledge is by all resources an instrument towards pleasure and that with

Friday, December 13, 2019

Foundation and Empire 19. Start Of The Search Free Essays

string(218) " and they say she had the most tha-rilling escape – had to go through the blockade, and all – and I do wonder she doesn’t write a book about it, these war books being so popular these days, you know\." The lonely planet, Haven – only planet of an only sun of a Galactic Sector that trailed raggedly off into intergalactic vacuum – was under siege. In a strictly military sense, it was certainly under siege, since no area of space on the Galactic side further than twenty parsecs distance was outside range of the Mule’s advance bases. In the four months since the shattering fall of the Foundation, Haven’s communications had fallen apart like a spiderweb under the razor’s edge. We will write a custom essay sample on Foundation and Empire 19. Start Of The Search or any similar topic only for you Order Now The ships of Haven converged inwards upon the home world, and only Haven itself was now a fighting base. And in other respects, the siege was even closer; for the shrouds of helplessness and doom had already invaded Bayta plodded her way down the pink-waved aisle past the rows of milky plastic-topped tables and found her seat by blind reckoning. She eased on to the high, armless chair, answered half-heard greetings mechanically, rubbed a wearily-itching eye with the back of a weary hand, and reached for her menu. She had time to register a violent mental reaction of distaste to the pronounced presence of various cultured-fungus dishes, which were considered high delicacies at Haven, and which her Foundation taste found highly inedible – and then she was aware of the sobbing near her and looked up. Until then, her notice of Juddee, the plain, snub-nosed, indifferent blonde at the dining unit diagonally across had been the superficial one of the nonacquaintance. And now Juddee was crying, biting woefully at a moist handkerchief, and choking back sobs until her complexion was blotched with turgid red. Her shapeless radiation-proof costume was thrown back upon her shoulders, and her transparent face shield had tumbled forward into her dessert, and there remained. Bayta joined the three girls who were taking turns at the eternally applied and eternally inefficacious remedies of shoulder-patting, hair-smoothing, and incoherent murmuring. â€Å"What’s the matter?† she whispered. One turned to her and shrugged a discreet, â€Å"I don’t know.† Then, feeling the inadequacy of the gesture, she pulled Bayta aside. â€Å"She’s had a hard day, I guess. And she’s worrying about her husband.† â€Å"Is he on space patrol?† â€Å"Yes†. Bayta reached a friendly hand out to Juddee. â€Å"Why don’t you go home, Juddee?† Her voice was a cheerfully businesslike intrusion on the soft, flabby inanities that had preceded. Juddee looked up half in resentment. â€Å"I’ve been out once this week already-â€Å" â€Å"Then you’ll be out twice. If you try to stay on, you know, you’ll just be out three days next week – so going home now amounts to patriotism. Any of you girls work in her department? Well, then, suppose you take care of her card. Better go to the washroom first, Juddee, and get the peaches and cream back where it belongs. Go ahead! Shoo!† Bayta returned to her seat and took up the menu again with a dismal relief. These moods were contagious. One weeping girl would have her entire department in a frenzy these nerve-torn days. She made a distasteful decision, pressed the correct buttons at her elbow and put the menu back into its niche. The tall, dark girl opposite her was saying, â€Å"Isn’t much any of us can do except cry, is there?† Her amazingly full lips scarcely moved, and Bayta noticed that their ends were carefully touched to exhibit that artificial, just-so half-smile that was the current last word in sophistication. Bayta investigated the insinuating thrust contained in the words with lashed eyes and welcomed the diversion of the arrival of her lunch, as the tile-top of her unit moved inward and the food lifted. She tore the wrappings carefully off her cutlery and handled them gingerly till they cooled. She said, â€Å"Can’t you think of anything else to do, Hella?† â€Å"Oh, yes,† said Hella. â€Å"I can!† She flicked her cigarette with a casual and expert finger-motion into the little recess provided and the tiny flash caught it before it hit shallow bottom. â€Å"For instance,† and Hella clasped slender, well-kept hands under her chin, â€Å"I think we could make a very nice arrangement with the Mule and stop all this nonsense. But then I don’t have the†¦ uh†¦ facilities to manage to get out of places quickly when the Mule takes over.† Bayta’s clear forehead remained clear. Her voice was light and indifferent. â€Å"You don’t happen to have a brother or husband in the fighting ships, do you?† â€Å"No. All the more credit that I see no reason for the sacrifice of the brothers and husbands of others.† â€Å"The sacrifice will come the more surely for surrender.† â€Å"The Foundation surrendered and is at peace. Our men are away and the Galaxy is against us.† Bayta shrugged, and said sweetly, â€Å"I’m afraid it is the first of the pair that bothers you.† She returned to her vegetable platter and ate it with the clammy realization of the silence about her. No one in ear-shot had cared to answer Hella’s cynicism. She left quickly, after stabbing at the button which cleared her dining unit for the next shift’s occupant. A new girl, three seats away, stage-whispered to Hella, â€Å"Who was she?† Hella’s mobile lips curled in indifference. â€Å"She’s our coordinator’s niece. Didn’t you know that?† â€Å"Yes?† Her eyes sought out the last glimpse of disappearing back. â€Å"What’s she doing here?† â€Å"Just an assembly girl. Don’t you know it’s fashionable to be patriotic? It’s all so democratic, it makes me retch.† â€Å"Now, Hella,† said the plump girl to her right. â€Å"She’s never pulled her uncle on us yet. Why don’t you lay off?† Hella ignored her neighbor with a glazed sweep of eyes and lit another cigarette. The new girl was listening to the chatter of the bright-eyed accountant opposite. The words were coming quickly, â€Å"-and she’s supposed to have been in the Vault – actually in the Vault, you know – when Seldon spoke – and they say the mayor was in frothing furies and there were riots, and all of that sort of thing, you know. She got away before the Mule landed, and they say she had the most tha-rilling escape – had to go through the blockade, and all – and I do wonder she doesn’t write a book about it, these war books being so popular these days, you know. You read "Foundation and Empire 19. Start Of The Search" in category "Essay examples" And she was supposed to be on this world of the Mule’s, too – Kalgan, you know – and-â€Å" The time bell shrilled and the dining room emptied slowly. The accountant’s voice buzzed on, and the new girl interrupted only with the conventional and wide-eyed, â€Å"Really-y-y-y?† at appropriate points. The huge cave lights were being shielded group-wise in the gradual descent towards the darkness that meant sleep for the righteous and hard-working, when Bayta returned home. Toran met her at the door, with a slice of buttered bread in his hand. â€Å"Where’ve you been?† he asked, food-muffled. Then, more clearly, â€Å"I’ve got a dinner of sorts rassled up. If it isn’t much, don’t blame me.† But she was circling him, wide-eyed. â€Å"Torie! Where’s your uniform? What are you doing in civvies?† â€Å"Orders, Bay. Randu is holed up with Ebling Mis right now, and what it’s all about, I don’t know. So there you have everything.† â€Å"Am I going?† She moved towards him impulsively. He kissed her before he answered, â€Å"I believe so. It will probably be dangerous.† â€Å"What isn’t dangerous?† â€Å"Exactly. Oh, yes, and I’ve already sent for Magnifico, so he’s probably coming too.† â€Å"You mean his concert at the Engine Factory will have to be cancelled.† â€Å"Obviously.† Bayta passed into the next room and sat down to a meal that definitely bore signs of having been â€Å"rassled-up.† She cut the sandwiches in two with quick efficiency and said: â€Å"That’s too bad about the concert. The girls at the factory were looking forward to it. Magnifico, too, for that matter.† She shook her head. â€Å"He’s such a queer thing.† â€Å"Stirs your mother-complex, Bay, that’s what he does. Some day we’ll have a baby, and then you’ll forget Magnifico.† ‘Bayta answered from the depths of her sandwich, â€Å"Strikes me that you’re all the stirring my mother-complex can stand.† And then she laid the sandwich down, and was gravely serious in a moment. â€Å"Torie.† â€Å"M-m-m?† â€Å"Torie, I was at City Hall today – at the Bureau of Production. That is why I was so late today.† â€Å"What were you doing there?† â€Å"Well†¦Ã¢â‚¬  she hesitated, uncertainly. â€Å"It’s been building up. I was getting so I couldn’t stand it at the factory. Morale just doesn’t exist. The girls go on crying jags for no particular reason. Those who don’t get sick become sullen. Even the little mousie types pout. In my particular section, production isn’t a quarter what it was when I came, and there isn’t a day that we have a full roster of workers.† â€Å"All right,† said Toran, â€Å"tie in the B. of P. What did you do there?† â€Å"Asked a few questions. And it’s so, Torie, it’s so all over Haven. Dropping production, increasing sedition and disaffection. The bureau chief just shrugged his shoulders – after I had sat in the anteroom an hour to see him, and only got in because I was the co-ordinator’s niece – and said it was beyond him. Frankly, I don’t think he cared.† â€Å"Now, don’t go off base, Bay.† â€Å"I don’t think he did.† She was strenuously fiery. â€Å"I tell you there’s something wrong. It’s that same horrible frustration that hit me in the Time Vault when Seldon deserted us. You felt it yourself.† â€Å"Yes, I did.† â€Å"Well, it’s back,† she continued savagely. â€Å"And we’ll never be able to resist the Mule. Even if we had the material, we lack the heart, the spirit, the will – Torie, there’s no use fighting-â€Å" Bayta had never cried in Toran’s memory, and she did not cry now. Not really. But Toran laid a light hand on her shoulder and whispered, â€Å"Suppose you forget it, baby. I know what you mean. But there’s nothing-â€Å" â€Å"Yes, there’s nothing we can do! Everyone says that – and we just sit and wait for the knife to come down.† She returned to what was left of her sandwich and tea. Quietly, Toran was arranging the beds. It was quite dark outside. Randu, as newly-appointed co-ordinator – in itself a wartime post – of the confederation of cities on Haven, had been assigned, at his own request, to an upper room, out of the window of which he could brood over the roof tops and greenery of the city. Now, in the fading of the cave lights, the city receded into the level lack of distinction of the shades. Randu did not care to meditate upon the symbolism. He said to Ebling Mis – whose clear, little eyes seemed to have no further interest than the red-filled goblet in his hand – â€Å"There’s a saying on Haven that when the cave lights go out, it is time for the righteous and hard-working to sleep.† â€Å"Do you sleep much lately?† â€Å"No! Sorry to call you so late, Mis. I like the night better somehow these days. Isn’t that strange? The people on Haven condition themselves pretty strictly on the lack of light meaning sleep. Myself, too. But it’s different now-â€Å" â€Å"You’re hiding,† said Mis, flatly. â€Å"You’re surrounded by people in the waking period, and you feel their eyes and their hopes on you. You can’t stand up under it. In the sleep period, you’re free.† â€Å"Do you feel it, too, then? This miserable sense of defeat?† Ebling Mis nodded slowly, â€Å"I do. It’s a mass psychosis, an unprintable mob panic. â€Å"Ga-LAX-y, Randu, what do you expect? Here you have a whole culture brought up to a blind, blubbering belief that a folk hero of the past has everything all planned out and is taking care of every little piece of their unprintable lives. The thought-pattern evoked has religious characteristics, and you know what that means.† â€Å"Not a bit.† Mis was not enthusiastic about the necessity of explanation. He never was. So he growled, stared at the long cigar he rolled thoughtfully between his fingers and said, â€Å"Characterized by strong faith reactions. Beliefs can’t be shaken short of a major shock, in which case, a fairly complete mental disruption results. Mild cases-hysteria, morbid sense of insecurity. Advanced cases – madness and suicide.† Randu bit at a thumbnail. â€Å"When Seldon fails us, in other words, our prop disappears, and we’ve been leaning upon it so long, our muscles are atrophied to where we can not stand without it.† â€Å"That’s it. Sort of a clumsy metaphor, but that’s it.† â€Å"And you, Ebling, what of your own muscles?† The psychologist filtered a long draught of air through his cigar, and let the smoke laze out. â€Å"Rusty, but not atrophied. My profession has resulted in just a bit of independent thinking.† â€Å"And you see a way out?† â€Å"No, but there must be one. Maybe Seldon made no provisions for the Mule. Maybe he didn’t guarantee our victory. But, then, neither did he guarantee defeat. He’s just out of the game and we’re on our own. The Mule can be licked.† â€Å"How?† â€Å"By the only way anyone can be licked – by attacking in strength at weakness. See here, Randu, the Mule isn’t a superman. If he is finally defeated, everyone will see that for himself. It’s just that he’s an unknown, and the legends cluster quickly. He’s supposed to be a mutant. Well, what of that? A mutant means a ‘superman’ to the ignoramuses of humanity. Nothing of the sort. â€Å"It’s been estimated that several million mutants are born in the Galaxy every day. Of the several million, all but one or two percent can be detected only by means of microscopes and chemistry. Of the one or two percent macromutants, that is, those with mutations detectable to the naked eye or naked mind, all but one or two percent are freaks, fit for the amusement centers, the laboratories, and death. Of the few macromutants whose differences are to the good, almost all are harmless curiosities, unusual in some single respect, normal – and often subnormal – in most others. You see that, Randu?† â€Å"I do. But what of the Mule?† â€Å"Supposing the Mule to be a mutant then, we can assume that he has some attribute, undoubtedly mental, which can be used to conquer worlds. In other respects, he undoubtedly has his shortcomings, which we must locate. He would not be so secretive, so shy of others’ eyes, if these shortcomings were not apparent and fatal. If he’s a mutant.† â€Å"Is there an alternative?† â€Å"There might be. Evidence for mutation rests on Captain Han Pritcher of what used to be Foundation’s Intelligence. He drew his conclusions from the feeble memories of those who claimed to know the Mule-or somebody who might have been the Mule – in infancy and early childhood. Pritcher worked on slim pickings there, and what evidence he found might easily have been planted by the Mule for his own purposes, for it’s certain that the Mule has been vastly aided by his reputation as a mutant-superman.† â€Å"This is interesting. How long have you thought that?† â€Å"I never thought that, in the sense of believing it. It is merely an alternative to be considered. For instance, Randu, suppose the Mule has discovered a form of radiation capable of depressing mental energy just as he is in possession of one which depresses nuclear reactions. What then, eh? Could that explain what’s hitting us now – and what did hit the Foundation?† Randu seemed immersed in a near-wordless gloom. He said, â€Å"What of your own researches on the Mule’s clown.† And now Ebling Mis hesitated. â€Å"Useless as yet. I spoke bravely to the mayor previous to the Foundation’s collapse, mainly to keep his courage up – partly to keep my own up as well. But, Randu, if my mathematical tools were up to it, then from the clown alone I could analyze the Mule completely. Then we would have him. Then we could solve the queer anomalies that have impressed me already.† â€Å"Such as?† â€Å"Think, man. The Mule defeated the navies of the Foundation at will, but he has not once managed to force the much weaker fleets of the Independent Traders to retreat in open combat. The Foundation fell at a blow; the Independent Traders hold out against all his strength. He first used Extinguishing Field upon the nuclear weapons of the Independent Traders of Mnemon. The element of surprise lost them that battle but they countered the Field. He was never able to use it successfully against the Independents again. â€Å"But over and over again, it worked against Foundation forces. It worked on the Foundation itself. Why? With our present knowledge, it is all illogical. So there must be factors of which we are not aware.† â€Å"Treachery?† â€Å"That’s rattle-pated nonsense, Randu. Unprintable twaddle. There wasn’t a man on the Foundation who wasn’t sure of victory. Who would betray a certain-to-win side.† Randu stepped to the curved window and stared unseeingly out into the unseeable. He said, â€Å"But we’re certain to lose now, if the Mule had a thousand weaknesses; if he were a network of holes-â€Å" He did not turn. It was as if the slump of his back, the nervous groping for one another of the hands behind him that spoke. He said, â€Å"We escaped easily after the Time Vault episode, Ebling. Others might have escaped as well. A few did. Most did not. The Extinguishing Field could have been counteracted. It asked ingenuity and a certain amount of labor. All the ships of the Foundation Navy could have flown to Haven or other nearby planets to continue the fight as we did. Not one percent did so. In effect, they deserted to the enemy. â€Å"The Foundation underground, upon which most people here seem to rely so heavily, has thus far done nothing of consequence. The Mule has been politic enough to promise to safeguard the property and profits of the great Traders and they have gone over to him.† Ebling Mis said stubbornly, â€Å"The plutocrats have always been against us.† â€Å"They always held the power, too. Listen, Ebling. We have reason to believe that the Mule or his tools have already been in contact with powerful men among the Independent Traders. At least ten of the twenty-seven Trading Worlds are known to have gone over to the Mule. Perhaps ten more waver. There are personalities on Haven itself who would not be unhappy over the Mule’s domination. It’s apparently an insurmountable temptation to give up endangered political power, if that will maintain your hold over economic affairs. â€Å" â€Å"You don’t think Haven can fight the Mule?† â€Å"I don’t think Haven will.† And now Randu turned his troubled face full upon the psychologist. â€Å"I think Haven is waiting to surrender. It’s what I called you here to tell you. I want you to leave Haven.† Ebling Mis puffed up his plump checks in amazement. â€Å"Already?† Randu felt horribly tired. â€Å"Ebling, you are the Foundation’s greatest psychologist. The real master-psychologists went out with Seldon, but you’re the best we have. You’re our only chance of defeating the Mule. You can’t do that here; you’ll have to go to what’s left of the Empire.† â€Å"To Trantor?† â€Å"That’s right. What was once the Empire is bare bones today, but something must still be at the center. They’ve got the records there, Ebling. You may learn more of mathematical psychology; perhaps enough to be able to interpret the clown’s mind. He will go with you, of course.† Mis responded dryly, â€Å"I doubt if he’d be willing to, even for fear of the Mule, unless your niece went with him.† â€Å"I know that. Toran and Bayta are leaving with you for that very reason. And, Ebling, there’s another, greater purpose. Hari Seldon founded two Foundations three centuries ago; one at each end of the Galaxy. You must find that Second Foundation.† How to cite Foundation and Empire 19. Start Of The Search, Essay examples

Thursday, December 5, 2019

BP’s Handling of Oil Spill off the Gulf of Mexico and CEO Actions

Question: Discuss about the BPs Handling of Oil Spill off the Gulf of Mexico and the CEO Actions in the Wake of the Disaster. Answer: Introduction Public Relation (PR) is an essential element of any prosperous organization, business enterprise, government, and company. It is used by most companies to shape their image in the public eye and therefore acting as a tool of status elevation. The manner in which a company conducts its public relations determines immensely how customers will respond to its business. As such, the aim of this report will be to analyse some of the PR errors made by a company is handling crisis. The company to be analysed in this case is BP on how it handled the crisis of the Oil spill off the Gulf of Mexico. It will pay close consideration on the conduct of BPs Chief Executive Officer and how these actions affected the companys general image. In making that analysis, the report will provide rely on the theory of PR and how it could be put to use. It will also provide a practical consideration of the theory. The Excellence Theory of PR The Excellence theory is known for making organizations effective on how they are run. It explains organizational conditions, environments organizational friend and accounts for the financial value of PR to an organization. This theory was founded by James Gruing. Gruing believed that organizations that maintain good relations with their strategic public tend to achieve their goals (Grunig, 2013). It is therefore important that companies identify their strategic publics create lasting connections by engaging it in symmentrical communications. Gruing found four categories of good PR. First, there has to be empowerment PR functions; second, PR executive should be given communicators roles like managerial and administrative roles; organizational communication function should be an integrated PR role; and organizations must use the PR models (Dozier, Grunig, and Grunig, 2013). The theory is based on the concept of goal attainment, systems, strategic constituencies and competing values. G oal attainment requires that every individual understand the aims of the company hence understand their role in ensuring that is achieved. Von Bertalanffy developed the open system theory which proposed that a system is a made up of interacting elements and an open system is one where there export and import. That said, it should be appreciated that organization associate with their environment in such a manner (Coombs and Holladay 2011). Furthermore, strategic constituencies acknowledge that there are element of the environment affect organizations positively or negatively depending on how it relates with this elements. Based on Gruings situational theory of publics, people should be defined and classified according to their problem awareness and how they seek to find information to solve problems (Kim and Grunig 2011). It is necessary for the organization make communications at various levels whether it is employees, customers, employees and customers, and governments or inter-org anizational communication (Edwards 2012). Each level is essential because it will determine the kind of effect the information will have on the organization. This theory presupposes that all organizations should embrace principle of good PR. These principles are honesty, trustworthiness, openness, integrity, respect, fair-mindedness, and effective communication. It is also important to ensure that companies use their PR policies effectively, they engage the public and other key stakeholders, and there is coherency and consistency in information disseminated. Furthermore, Gruing expressed that there has to be a differentiation between dissemination and communication since communication requires that they receive and understand the information (Grunig 2013). The excellence theory is also used alongside other theories like the Personal Influence Theory (PIT) and the Global Theory of PR (GTPR) (Kim and Grunig 2011). The GTPR suggest that practices that are common can be used in any nation of the world. It however proposes that practices in various countries can be different considering issues like culture, economic system, political system, and nature of activism in a country, media system (Bardhan and Weaver 2011; and Edwards and Hodges 2011). For instance, the UKs political; culture, activism, and legal systems are different for that of the US. PIT encourages companies to build influence of stakeholders like the media, governments, and other organization so to be able to get help in case they ran into a problem. BPs PR Error in Oil Spill One of the crucial indicators of effective PR is that one is able to persuade another into believing or accepting what they are saying. One has to know what the audience want hence being able to convince them for mutual benefit. However, the representation by BP that the spill was controllable was a manipulation which later came to be known to the public. This resulted in them losing credibility and public sympathy (Warner 2010). The public felt that they were being played by the companys management hence numerous protests. The companys stocks also fall. The company even tried to down play the damage caused by the spill by saying that it was not as bad as it seem and that everything was under control. They has reported to the media that the company would have the whole mess under cleared in a weeks time only for the CEO to report that the company was doing all it could but it more time was needed (McClam and Weber 2010). As explained by the Excellence theory, good PR requires opens a nd not manipulation of the audience. Once the audience feels that it is being plaid, it starts cast doubt of the companys ability to handle a crisis hence discontentment. Dishonest damages the images of many organizations. BP executives gave an exaggeration their ability to tame the damage and all they did was give contradicting view. Even though the Excellence theory propose open communication, BP did not acknowledge that repairing the leakage was difficult. All they said was that the main leak had been stopped and only few area were left (Warner 2010). The assertion by Suttles that spill would be reduced to a tick was found to be a lie used to downplay the reality of the situation. There were also contradicting figures in the amount of oil level spilled resulting in the perception of people that the government and the company were dishonest. The company later came up with ads purporting to help people enquiring on the situation get the real pictures. However, people believe that this is away driving the off the balance. In as much they are trying to contain information follow, they are going against the goal of winning peoples trust (McClam and Weber 2010). Lack of recognizing the importance the medi a, customer and environmental system may cost their business. The fact that the CEO and the chairman were saying two difference thing means that there was lack of proper co-ordination. there was also lose of respect for the audience and the press system. Failing to appreciate the value of the environmental system showed that BP fall short of the excellence theory (Gruing 2013). The CEO Action during the Disaster The GTPR suggests that the culture of different countries differ and therefore each case should be approached differently. However, the CEO of BP failed to understand this. Instead of going to the US and making what people considered disrespectful remarks, he should have let the America team of BOP hand the issue. For instance, he noted for having told a reporter what was consider offensive (McClam and Weber 2010). His remark that he wanted his life back meant that he did not care about the life of the people who died in the spill. All he wants was to have the crisis go away and no considering what harm it has to the environment. At the same time, he failed to give the exact figures of how the company would compensate the affected fishermen (Associated Press 2010). Even though the chairman of BP America had said $20 billion would be used as compensation, the CEO had no definitive answer to the Congressional committee which meant that they had not agreed (McClam and Weber 2010). These shows how there were many loopholes in BPs actions. Lacking proper understanding of the American culture meant that the CEO should leave the crisis to BP Americas team (Macnamara 2012). Conclusion PR is an essential part that should not be ignored by any organization. The failure of the BP can be said to have resulted from poor communication. The image of the company was badly damage according to Harlow, Brantley, and Harlow (2011), it will be costly for BP to reclaim it lost glory and image. Winning such trust requires huge investment. It also fail to manage the flow of information. Its PR strategies were not integrated and therefor lacking uniformity. The failure to acknowledge the reality of the situation revealed how it PR was poor and weak. It can therefore be concluded that failure to work as an organization was as a result of poor co-ordination hence inability to win the trust of the people. Recommendations I would recommend that in future, BP should integrate its PR department so as to ensure that all information released is uniform. This will help to save the companys image and also elevate its status. Secondly, they should learn to appreciate the difference in systems of different parts of the world by decentralizing the management so that each subsidiary handles all it problem. That will ensure that the correct people solve problem due to the experience in that area. Reference Associaed Press (2010). BP Spill Response Plans Severely Flawed. [online] Fox News. Available at: https://www.foxnews.com/us/2010/06/09/ap-impact-bps-error-prone-spill-response-plans-overstate-preparedness.html [Accessed 30 Apr. 2017] Bardhan, N. and Weaver, C.K. eds., 2011. Public relations in global cultural contexts: Multi-paradigmatic perspectives. Routledge Coombs, W.T. and Holladay, S.J. eds., 2011. The handbook of crisis communication (Vol. 22). John Wiley Sons Dozier, D.M., Grunig, L.A. and Grunig, J.E., 2013. Manager's guide to excellence in public relations and communication management. Routledge Edwards, L. and Hodges, C.E. eds., 2011. Public relations, society culture: Theoretical and empirical explorations. Taylor Francis Edwards, L., 2012. Defining the objectof public relations research: A new starting point. Public Relations Inquiry, 1(1), pp.7-30 Grunig, J.E., 2013. Excellence in public relations and communication management. Routledge Harlow, W.F., Brantley, B.C. and Harlow, R.M., 2011. BP initial image repair strategies after the Deepwater Horizon spill. Public Relations Review, 37(1), pp.80-83. Kim, J.N. and Grunig, J.E., 2011. Problem solving and communicative action: A situational theory of problem solving. Journal of Communication, 61(1), pp.120-149 Macnamara, J., 2012. The global shadow of functionalism and Excellence Theory: An analysis of Australasian PR. Public Relations Inquiry, 1(3), pp.367-402 McClam, E. and Weber, H. (2010). BPs failures made worse by PR mistakes. [online] msnbc.com. Available at: https://www.nbcnews.com/id/37647218/ns/business-world_business/t/bps-failures-made-worse-pr-mistakes/#.WQXLijpRV0t [Accessed 30 Apr. 2017] Warner, J. (2010). The Gulf of Mexico oil spill is bad, but BP's PR is even worse. [online] Telegraph.co.uk. Available at: https://www.telegraph.co.uk/finance/newsbysector/energy/oilandgas/7839136/The-Gulf-of-Mexico-oil-spill-is-bad-but-BPs-PR-is-even-worse.html [Accessed 30 Apr. 2017]

Thursday, November 28, 2019

A Rose for Emily free essay sample

Beyond these two similarities the stories differ greatly. One of the most notable differences between the two stories is the tense with which they are written. Poe takes us into the mind of the main character using the first person. In this way we learn about the insults perpetrated against the main character along with the intimate reasoning he uses to justify his act of murder. On the contrary, Faulkner writes his story in the third-person omniscient voice and defines the main character through a myriad of supporting characters and dynamic imagery. This use of tense functions well and reinforces the writers plot design. The two writers create very different environments in which the action takes place. Faulkner opens his short story setting up a gloomy, dark stage by describing a derelict Victorian home in a denigrated neighborhood. In the case of Poe’s short story the first clear description of the environment comes later in the story and describes the tunnels leading to the cask of Amontillado. We will write a custom essay sample on A Rose for Emily or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This cramped setting appears to reinforce the cramped space in which Fortunato is ultimately entombed. These settings work well to create a mysterious and tense plot. Faulkner uses many characters in his story where Poe restricts himself to just two. In Faulkner’s story the protagonist is defined through the eyes of many characters thus creating an air of mystery that surrounds the main character, Miss Emily. Miss Emily is known only through the minds others. Conversely, Poe restricts his story to include only the aggressor and victim. This minimal cast, combined with the first person tense, keeps the reader focused exactly where Poe intended. This diverse use of characters adds greatly to the tension prevalent in these two dynamic stories. The creative use of tense, environment and characters make these two stories stand out. The first person tense takes you deep into the mind of a killer in one story and 2 in the other a portrait is painted by a diverse group of characters. Two very different settings reinforce an air of mystery. The dynamic use of these techniques makes these two short stories stand out as industry standards. 3

Monday, November 25, 2019

Essay Gathering Solutions

Essay Gathering Solutions Essay Gathering Solutions Gathering Solutions My company is a liquor, wine, and a beer distributor. My job, as a sales representative is to sell all the programs possible and sell as many cases as I can. All the managers, category managers, and chain managers help me in every possible way to accomplish my goals. Every month, I am given a quota number to hit and my manager always follows up on that. So, everything is related to the sales numbers. After I talked to 5 colleagues, I found out that the main stressor comes from the wineries in California. Wineries provide us with the best deals and programs they can and we are supposed to implement on it. If our sales numbers are not up from last year or consistent, we are in the danger of losing that brand and they might go with our competitors. Anytime in the year, the winery can come up with some very special deals for a limited time and we have to make sure we sell it. Most of the times, the managers said that they are not given enough notice and it gets hard to get those programs together and get an urgent meeting scheduled with the sales team. It’s like that you are supposed to leave everything else, and just get on to that job. It was felt amongst everyone that if there is proper planning in place and enough notice is given, we could do a much better job in selling all the program. One of the colleagues felt that certain people could ease the stress by not over react ing too quickly to a situation. They need to think about what they are going to say rather than taking snap decisions. Communication was the other source of stressor. All my colleagues argued back and forth that people

Thursday, November 21, 2019

Market Potential Case Study Example | Topics and Well Written Essays - 1000 words

Market Potential - Case Study Example The savings that arise from the 20% of the high income groups can then be used to facilitate the small scale businesses to develop in the rural areas, making them flourish and reducing the stark disparity between the two income classes. 2) With 65% of the population living in the rural areas, there is an opportunity to set up industries that can make the country self-sufficient in the creation of goods that it imports at present like iron, steel, telecommunication equipment etc. in this way the gap between exports and imports can be widened, improving the overall economy of the country. Rural areas can be honed to cultivate the lands by the use of locally developed modern machinery to cut down the imports of industrial inputs through backward integration. In this way new avenues can be utilized to improve the income distribution’s polarity. 3) With the HDI of 0.72 the country shows that the indicators are better and there is a potential of urbanizing the rural populations. This means that life expectancy, education and income levels are increasing in the country making people adopt a different mindset and have an increase in purchasing power. Thus, Shopping malls and brands could have a potential scope in the country and it wouldn’t be wrong to foresee a demand for such goods in the future. These brands could be developed locally as well; for example, one of the major exports of Serendib is shoes. If the focus is on creating and developing its own brand and then stepping into the international arena, there is a chance of leveraging out the lost income in form of provision of unbranded footwear to big brands abroad. 4) While the HDI of 0.72 indicates a good standard of living in the country, this can be seen as an opportunity to provide opportunities to the people. When there are adequate facilities and ample resources available, there is a scope for investment. Serendib can be profitable for technological business

Wednesday, November 20, 2019

Fairtrade Essay Example | Topics and Well Written Essays - 2500 words

Fairtrade - Essay Example Introduction The tourism industry on the international level is booming. For instance, in the year 2012, total number of tourist figures reached a whooping figure of 1 billion and in the year 2013, the tourism industry anticipates to develop by three percent thereby contributing an aggregate of US$6.8 trillion or nine percent of the global GDP. Further, it is estimated that the tourism industry offers employment for more than 266 million around the world which connote that one in every eleven jobs on the planet is being offered by the tourism industry. While the significance of economic involvement cannot be refuted, many research studies have demonstrated that international tourism industry is not immune from inherent defects and could be the major contributor for the cultural, social and environmental issues. (Fairtrade Centre 2013). This research study will analyse how fair-trade certification helps the tourism industry of the respective nation helps to contribute the economy, soc iety and social welfare in a detailed manner. Fair Trade Tourism – An Analysis As per research study carried over by Tearfund (2002,p.7) , the shoppers are eager to pay more for products that are manufactured or produced in a friendly way , which connotes that they benefit the nation in which they are manufactured or produced. ... Thus, FT main aim is to work with oppressed workers and producers, thus assisting them to recover from a condition of susceptibility to prosperous and economic self-sufficiency. FT‘s aim is to encourage the abolition of poverty and to enhance the dignity of workers and producers. FT offers high-quality product wide range and variety of quality products. FT currently offers a wide range of about 5000 to 7000 quality products all around the globe. Fair-Trade tourism refers to the process of sharing the advantages and disadvantages of tourism in a fairer manner observing ethical, economic and environmental features. (Avara & Matkailu, 2004). The chief aim of FTT (Fair-Trade Tourism) is to capitalize the advantages from tourism for the local beneficiaries mainly through equitable and mutual partnerships between international and national tourism stakeholders. (Tourism Concern, 1999, p.2). According to Pluss (2013), FTT is mainly focussed on the magnitude to which the application of fair trade as regards to consumer awareness , trading partnerships and certification which can elucidate tourism development in overseas and at tourism destination. FTT concept has materialised as a mean to readdress the inequality and sustainability issues that linger in the tourism industry. (Boluk, 2011, p.29). FTT attempts to establish cultural, social and economic advantages for local citizen at the respective tourist destination. FTT is to stick to local laws, create vibrant consultation structures, should be translucent, should include social accounting, sustainability and ecological safeguards and should revere human rights. The other key elements of FTT are

Monday, November 18, 2019

Report Essay Example | Topics and Well Written Essays - 3000 words - 3

Report - Essay Example After World War II Nestlà © saw a boom period and since then it grew at a faster pace leaving behind all the competitors of the market. Nestlà © is also listed on the Swiss Stock Exchange. It is also ranked at the number 1 position in the Fortune 500 companies in 2011. Nestlà © is serving over 150 countries at this time with almost 461 factories or operations in 83 countries. With the help of these facts and figures we can imagine the huge network of Nestlà ©. The basic key factor behind the foundation of Nestlà © Company was the research to find out the alternative for the infants whom mothers cannot feed. This was an intense social thinking and thus we can say that from its origin Nestlà © Company is aimed to work for the people and not for gaining profits. Nestlà © have taken many steps in the social concerns. They always try to satisfy their customer base not only with their products but also with the communication skills. Through this way they give value to the potential customers. Customer and supplier relationship management is an important tool to create a good company name. Nestlà © has always differentiated itself as the company focusing on the people who are very much health and nutrition conscious (Raza 2013). As per recent information, Nestlà © has announced to expand its research and development centre in Singapore. The primary focus of this R & D centre will be health and nutrition. The Nestlà © team also says that th e core aim of their company’s presence is to enhance the quality of people’s lives every day. This is also shown If we consider the world wide operations then there are almost 8000 brands which have been offered by Nestlà ©. As a result they have captured a huge market share and thus achieve success as compare to many other competitive firms. According to a news report Nestlà © is such a biggest company in the food industry that its financial results can predict the

Friday, November 15, 2019

Features of Transport Layer Security (TLS)

Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: Features of Transport Layer Security (TLS) Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: