Monday, December 30, 2019

Barbary Lion Facts and Figures

Name: Barbary Lion; also known as Panthera leo leo, the Atlas Lion and the Nubian Lion Habitat: Plains of northern Africa Historical Epoch: Late Pleistocene-Modern (500,000-100 years ago) Size and Weight: Up to seven feet long and 500 pounds Diet: Meat Distinguishing Characteristics: Large size; thick mane and fur About the Barbary Lion Tracking the evolutionary relationships of the various subspecies of modern lion (Panthera leo) can be a tricky affair. As far as paleontologists can tell, the Barbary Lion (Panthera leo leo) evolved from a population of European Lions (Panthera leo europaea), which themselves descended from Asiatic Lions (Panthera leo persica), which are still extant, albeit in dwindling numbers, in modern-day India. Whatever its ultimate heritage, the Barbary Lion shares one dubious honor with most lion subspecies, having been wiped off the face of the earth by human encroachment and the dwindling of its once-expansive habitat. Like many other recently extinct mammals, the Barbary Lion has a distinctive historical pedigree. Medieval Britons had an especial fondness for this big cat; during the Middle Ages, Barbary Lions were kept in the menagerie at the Tower of London, and these big-maned beasts were star attractions at swanky British hotels. In the latter part of the 19th century, while the species was being hunted to extinction in northern Africa, Britains surviving Barbary Lions were transferred to zoos. In northern Africa, even in historical times, Barbary Lions were prized gifts, sometimes being offered in lieu of taxes to the ruling families of Morocco and Ethiopia. Today, in captivity, a few surviving lion subspecies harbor remnants of Barbary Lion genes, so it may yet be possible to selectively breed this big cat and reintroduce it into the wild, a program known as de-extinction. For example, researchers with the International Barbary Lion Project plan to recover DNA sequences from various mounted Barbary Lion specimens in natural history museums, and then compare these sequences with the DNA of living zoo lions, in order to see how much Barbary. so to speak, remains in these felines. Males and females with a high percentage of Barbary Lion DNA would then be selectively mated, as well as their descendants on down the lion, the ultimate goal being the birth of a Barbary Lion cub!

Sunday, December 22, 2019

The Conflict Of A Genocide - 1587 Words

A genocide usually starts when people of one race or religion want to dispose of people of another race or religion. The underlying causes of conflict, which result in acts of genocide, often have deep historical roots. Stereotypes between groups develop over centuries. Ethnic and cultural differences often result in the formation of in-group and out-group thinking. Members of different races, religions, or cultures start to view each other as separate, alien, and â€Å"different.† In many regions, members of these different groups develop conflict prevention methods because they feel threatened. Relations begin to degrade because of this feeling of threat. This leads one group to become convinced that many of the problems they face are the other groups’ fault. One group then begins to believe that all their problems would be resolved if the other group no longer existed. A desire to exterminate the other group arises because coexistence and power sharing are not consid ered to be options. The group committing the crimes will believe that extermination is justified. This then leads to the violent acts of genocide. The Syrian crisis began in early 2011 when Syrian President Bashar al-Assad began a brutal crackdown on protests throughout the country. In March 2011, security forces opened fire on protesters at a â€Å"Day of Rage† rally in the southern city of Deraa, triggering violence and civilian death. The Syrian government’s violent response led to military personal leaving theShow MoreRelatedThe Conflict Of The Rwandan Genocide1864 Words   |  8 PagesKant’s philosophical perspective, humans are moral agents due to their ability to rationalize, reason and be autonomous. In order to make the claim that the international community is morally unjustified in their lack of action regarding the Rwandan genocide is because humanitarian intervention can be regarded as a perfect duty when approached from a Kantian perspective. This ideology is challenging for many critics because if this is a perfect duty then comes the question of who is to claim such responsibilityRead MoreT he Conflict Of The Rwandan Genocide1511 Words   |  7 PagesSometime in April 1994, during the Rwandan Genocide, Father Athanase Seromba helped lure 2,000 Tutsi men, women, and children into his church where they thought they would be safe. One day, Seromba began clearing out the Communion chalices. A refugee in the church begged him to leave the Eucharist so that they could hold a final mass. However, Seromba refused, telling the congregation that the building was no longer a church. Another refugee asked the priest if he would pray for them. He answeredRead MoreRwandan Genocide And Ethnic Conflict3296 Words   |  14 Pages the state of Rwanda was hurled into chaos as genocides took the lives of 800,000 people . Began by the Hutu political elite and its military support, their main targets were the Tutsi, and Hutu moderates. Many have claimed â€Å"ethnic hatred† as the reason of the Rwanda Genocide and while an ethnic split existed in Rwanda during the conflict, the cau ses for the genocide are numerous and complicated. In examining the Rwanda Genocide as an ethnic conflict it is crucial that ethnicity be inspected as itRead MoreThe Conflict Of The Rwandan Genocide2091 Words   |  9 PagesFinding the Right Way to Intervene: Sovereignty Paper In the spring and summer of 1994, Rwanda experienced a genocide that killed hundreds of thousands of innocent people. After seeing the tragedies that took place in Nazi Germany, one would expect the international community to respond quickly and effectively in the case of the Rwandan genocide. However, the killings were largely pushed aside or ignored by the rest of the world, begging the question of when states have the right or duty to betrayRead MoreRwandan Genocide Report On The Conflict Essay1809 Words   |  8 PagesRwandan Genocide Report Summary of the conflict In 1894 German colonization resulted in Tutsis being put into roles of responsibility over Hutus due to the Tutsis more closely resembling Europeans. After Germany lost its colonies after World War One Belgium took over control in Rwanda. The Belgians distributed identification cards throughout the population, unknowingly beginning the genocide process. They also gave all the leadership roles to the Tutsi, upsetting the Hutus. When Rwanda fought forRead MoreThe Rwandan Genocide And Ethnic Conflict1768 Words   |  8 PagesINTRODUCTION AND BACKGROUND 1.0 Introduction The Rwandan genocide has been a topic of discussion and study by many scholars, researchers and humanitarian bodies seeking to find the root cause of its happening. Some found out that deterioration in the political climate was the possible cause. Others argued that the Hutu elite were only safeguarding their political power from the Tutsis who had, under the colonial rule, oppressed the Hutus. The genocide was seen to be the best platform for settling scoresRead MoreEssay on Conflicts in Sudan: Genocide in Darfur1547 Words   |  7 Pagesa state of crisis. Darfur, in western Sudan, is in the middle of the worst humanitarian crisis in the world right now. They are on the brink of genocide, the deliberate killing of a very large number of people from a particular ethnic group or background. Like Most civil wars the incidents have been occurring for over twenty years. The armed conflict began to get serious in February of 2003. It was then that the Sudanese government in cohorts with the Janjaweed militia engaged in civil strifeRead MoreThe Conflict Of The Rwandan Genocide Under The Clinton Administration975 Words   |  4 PagesIn 1994, one of the most brutal genocides of all time took place in the small country of Rwanda. Over the span of approximately 100 days, 800,000 Rwandans were killed—an average of 8,000 people per day— with Tutsis being the primary target. The staggering numbers called for international intervention, yet the action taken across the world was slim. Samantha Power’s â€Å"Bystanders to Genocide† reveals that the U.S.’s handling of the Rwandan genocide under the Clinton Administration was both minimalisticRead MoreThe Conflict Between Rwanda And The Rwandan Genocide Essay1276 Words   |  6 PagesBodies lying i n the streets. People hacking each other with machetes and other bladed weapons. Blood splattering the ground. Such was the scene in the spring of 1994 in the African country of Rwanda. The Rwandan Genocide claimed the lives of hundreds of thousands of lives over the course of 100 days because of racial tensions between the Hutus and the Tutsis. Over twenty years later, the two tribes live together, but it is an uneasy peace. Tensions between the Hutus and the Tutsis can be tracedRead MoreThe Rwandan Conflict : Genocide Or War? International Journal On World Peace891 Words   |  4 PagesDominic. The 1994 Rwandan Conflict: Genocide or War? International Journal on World Peace. Vol XXX No. 3(2013). 31-54. Print. The Article by Olaifa and Dominic, provides background and general information about the Rwandan Conflict of 1994 which relates to the concept of genocide and is to determine its relationship with war as a concept. The authors present an investigation of the reasons of Rwandan tragedy and justifies the difference between concepts of war and genocide by explaining their deep

Saturday, December 14, 2019

The Purpose of This Study Free Essays

string(92) " activities even when there is no true physiological dependence or physiological addiction\." THE INTERNET’S EFFECT ON TEENAGERS Joshua Benjamin Mr. Ferraro Cooper City High School Last Revised: January 31, 1999 INTRODUCTION The purpose of this study is to determine the effect of internet usage on a user’s life. Internet addiction is a serious complication effecting America’s teenagers. We will write a custom essay sample on The Purpose of This Study or any similar topic only for you Order Now An abundance of support, self-help, and anonymous therapy web sites are available to the public, but there has not been much distinguished attention given to the matter by media other than the Internet. A myriad of collegiate surveys (see references cited) exhibit static results of the Internet’s effect based on the participant’s age, gender, race, and lifestyle. Many people find the Internet to be the ideal place to socialize with others because of it’s faceless medium and effortless ways to find others with similar interests; through the many ways of communication over the Internet, the common prejudices of life are not evident. A significant issue, are the obscured inconveniences one may encounter during their day-to-day internet experiences. As companies ‘snaz up’ their websites more and more, the user is required to wait for more data to download. The common user does not care to wait for all the attractions and wishes to view what that they come looking for, information. Discomfort is endured as the user sits, and waits for minutes at a time as a status bar slowly progresses to the 100% complete mark. Over time, slightly disturbing events such as this build upon one another and it is hypothesized that it can impose on a user’s psychological health over time. Some studies emphasize on internet usage in relation to social and civic interaction. Others highlight the similarities and differences between internet addiction and other addictions. Still others stress on what the user does online and how that affects him or her. One college researcher’s study focuses on Internet users’ in relation to their various daily tasks. He states, â€Å"Buying products cheaper over the Internet is not a big concern of the questionnaire respondents. The Internet seems extremely attractive to the questionnaire participants. Only ten percent decreased their internet usage last year. More than fifty percent answered that Internet use from time to time, often or always replaces watching TV. 0% of the respondents considered themselves as addicted to or dependent on the Internet. The results show a significant difference in the answers from addicted versus non-addicted users. This leads to the conclusion that addictive behaviour can exist in Internet usage. On the other hand, the answers based on the common symptoms of addiction que stions are not so strong in the addicted group that one can speak of an addiction, in which for example continued, persistent use of the Internet appears in spite of negative consequences. (Egger, 1996) Whether the Internet is increasing or decreasing social involvement could have enormous consequences for society and for people’s personal well-being. In an influential article, Putnam documented a broad decline in civic engagement and social participation in the United States over the past 35 years. Citizens vote less, go to church less, discuss government with their neighbors less, are members of fewer voluntary organizations, have fewer dinner parties, and generally get together less for civic and social purposes. At the individual level, social disengagement is associated with poor quality of life and diminished physical and psychological health. When people have more social contact, they are happier and healthier, both physically and mentally. As one might suspect, these activities do not have the same appeal to teenagers and adults alike. The most prominent contrasts by age were not surprising. Teenagers were more likely to use the Internet for schoolwork and for getting educationally-oriented information. It is perhaps less obvious that adults rather than teenagers were more likely to use the Internet to get product information, to purchase items, to read the news, and to view sexually-oriented materials. Teenagers were more likely to use the Internet to play games, to listen to music, and to meet new people. Compared to other groups, both adult women and teenage boys were especially likely to report using the Internet for advertising, for selling, and for making money. † (Kraut, Lundmark, Patterson, Kiesler, Mukopadhyay, Scherlis, Zdaniuk, Thielke, Patterson, 1998. ) Some may view addiction as when a task becomes a necessary part of a user’s life. â€Å"While the online experience can enrich and expand people’s lives, it can also seduce the vulnerable into ignoring the real world. It demonstrates how a bright young man who is doing well in school and who has real-life friends can easily go through a period when things are more interesting on the Net than off. This is what leads him to see his online experiences as a â€Å"genuine† part of his life. He still had a life offline, but at the time of our conversation, events there were not going so well. From this perspective, the comment about real life not being his best window seems a bit less sinister. † (Turkle, 1996) â€Å"Frustration with the sluggish speed of a browser is about the most serious psychological pitfall that most of us face when surfing the World Wide Web. But for as many as five million Americans, experts say, the Internet has become a destructive force, its remarkable benefits overshadowed by its potential to disrupt the lives of those who can’t resist the lure of round-the-clock social opportunities, entertainment, and information. For such people, work, friends, family, and sleep are replaced by a virtual world of chat rooms and games. Only recently, however, have psychologists begun devising strategies to wean on-line addicts from their endless browsing and chatting. † (Potera, 1998) â€Å"While drug and internet addiction have a lot in common, there are, of course, significant differences. Drug addiction is a physical dependence whereas the Internet is not. The Internet has been called a behavioral addiction. A behavioral addiction is one in which an individual is addicted to an action and not necessarily a substance. People can become addicted to activities even when there is no true physiological dependence or physiological addiction. You read "The Purpose of This Study" in category "Essay examples" This basically means that behavioral addicts do not have any kind of physical dependence to the Internet. Any activity can be addicting if done to extreme. For example, some of the normal everyday activities that can be addicting are jogging, eating, sexual activity, work, etc. Everyone has heard of the workaholic, well that is a behavioral addiction just like the Internet. If it â€Å"changes your emotional state in some way† then it can be classified as a behavioral addiction. This type of addiction is actually very common. Someone with the ability to recognize what type of addiction they have is helpful, but what about those people who don’t even know they’re addicted? Internet addiction, like any other addiction, has signs and symptoms. One sure sign that person is addicted is if they deprive themselves of sleep in order to spend more time on-line. Usually an addict will average less than five hours of sleep. Another sign that someone might be addicted is if they neglect other important activities such as work, family and friends, or socializing in general to surf the Internet. Other symptoms include: losing track of time while on-line, or people close to you complain about the amount of time spent on-line, logging on while already busy with something else (work, family time, etc. ). These are just some of the many signs that point to addiction to the Internet. Once it is determined by the symptoms that a person is addicted, look for side effects of the addiction. † (Cochran, 1996) One individual has evaluated, to quite an extent, the effects of Internet use on a population as well as internet addiction. She has published her conclusive results on the Internet. An excerpt from one of her reports states, â€Å"Especially vulnerable, Young [Dr. Kimberly S. Young, assistant Professor of Psychology, University of Pittsburgh at Bradford] believes, are those who are lonely, bored, depressed, introverted, lack self esteem, or have a history of addictions. Research among sociologists, psychologists, or psychiatrists has not formally identified addictive use of the Internet as a problematic behavior. This study investigated the existence of internet addiction and the extent of caused by such potential misuse. On the basis of this criteria, case studies of 396 dependent Internet users (Dependents) and a control group of 100 nondependent Internet users (Non-Dependents) were classified. The length of time using the Internet differed substantially between Dependents and Non-Dependents. Among Dependents, 17% had been online for more than one year, 58% had only been on-line between six months to one year, 17% said between three to six months, and 8% said less than three months. A total of 83% of Dependents had been online for less than one full year which might suggest that addiction to the Internet happens rather quickly from one’s first introduction to the service. In many cases, Dependents had been computer illiterate and described how initially they felt intimidated by using such information technology. However, they felt a sense of competency and exhilaration as their technical mastery and navigational ability improved rapidly. It is important to note that estimates were based upon the number of hours spent â€Å"surfing the Internet† for pleasure or personal interest (e. g. , personal e-mail, scanning news groups, playing interactive games) rather than academic or employment related purposes. Dependents gradually developed a daily internet habit of up to ten times their initial use as their familiarity with the Internet increased. In contrast, Non-Dependents reported that they spent a small percentage of their time on-line with no progressive increase in use. This suggests that excessive use may be a distinguishable characteristic of those who develop a dependence to on-line usage. (Young, 1996) Astoundingly, internet subscribers and websites continue to proliferate exponentially, as the following excerpt describes, â€Å"The Web currently has about 16,000,000 users a year, with a growth rate predicted as doubling annually. Lycos estimates some 80,000,000 Web pages currently and expects to see the billionth Web page in 1997. Advertisers seem to make money on the Web – at least those selling Web advertising. Jupiter Communications issued a study indicating that Web based advertising revenue reached $312,000,000 in 1996 and predicted $51,000,000,000 by the year 2000. (Searcher, 1997) The Internet’s effect on human culture is much like other forms of technology have exhibited in the past, as one researcher justifies. â€Å"Psychologists are not even sure yet what to call this phenomenon. Some label it an â€Å"Internet Addiction Disorder. † Let’s not forget the very powerful, but now seemingly mundane and almost accepted addiction that some people develop to video games. Video games are computers too†¦ very single-minded computers, but computers nevertheless. Or how about telephones? People get addicted to those too, and not just the sex lines. Like computers, telephones are a technologically enhanced form of communication and may fall into the category of â€Å"computer mediated communication† – as the researchers are dubbing internet activities. In the not too distant future, computer, telephone, and video technology may very well merge into one, perhaps highly addictive, beast. A teenager who plays hooky from school in order to master the next level of Donkey Kong may be a very different person than the middle aged housewife who spends $500 a month in America Online chat rooms – who in turn may be very different from the businessman who can’t tear himself away from his finance programs and continuous Internet access to stock quotes. Some cyberspace addictions are game and competition oriented, some fulfill more social needs, some simply may be an extension of workaholism. † (Suler, 1996 Rev. 1998) One researcher believes the Internet is and continues to become more of a crucially integral part of our lives. There are obvious parallels today. Predictions abound about how the Internet will, or won’t change the way we shop, vote, bank and think. Like the telegraph, its true effects are likely to be subtle, long-term, and no less dramatic in the context of history. The Internet may well take the telegraph one step further, connecting the global community and defining an international ethos. Yet for now, as starry-eyed internet advocates promise spectacular and immediate social change and the occasional skeptic pooh-poohs its impact, the Net’s ability to generate hyperbole and ho-hum reactions seems to be mimicking its revolutionary ancestor. The historical similarities are instructive. † (Harris Adler, 1995) Based on the above literature, the researcher hypothesizes that interactive chat with people, probably would provoke most teenagers’ extreme use of the Internet. Unrestrained use of the Internet should produce a negative effect on those that use it excessively. METHODS There were 125 participating responses which consisted of worldwide Internet users between the ages of 12 and 20 years old. The study was conducted via a survey that was available on the Internet’s World Wide Web, at the address . A link to the survey was placed on a frequently visited website. Approximately 149 responses were received throughout the collection period, 24 of the 149 received were discarded due to incomplete information resulting in the 125 complete surveys used for evaluation. The survey asked questions regarding the subjects’ Internet use and how it affects his or her personal life. Since the survey was conducted online, all entries were by Internet users only. Procedure: †¢ 1. Compose survey in a HTML (Hypertext Markup Language) creator. The answers should be in the outline of form functions (pop-up menu, radio buttons, selection list). Name the file â€Å"survey. shtml†. †¢ 2. Create a warning webpage perchance the viewer is sensitive to material contained in the survey, create a link to the survey (survey. shtml), so the viewer can follow it to the survey. You may want the link to explain that you are not liable if the material harms them. Name the warning page, â€Å"index. html† (the file named â€Å"index. html† is the webpage that is automatically loaded as the default page when someone visits a website). †¢ 3. Find a UNIX-based server for serving the survey webpage. †¢ 4. Upload the warning and survey webpages onto the UNIX server in your website folder using a FTP (file transfer protocol) client. 5. Download the â€Å"TECform† CGI script, available at , then upload it to your UNIX server. The program allows results to be E-mailed to you. †¢ 6. Make a request to the administrator of your UNIX server to setup the TECform CGI script for you. If this cannot be done, follow the instructions that come with the script an d configure it on your own. †¢ 7. Configure the questionnaire webpage using the instructions that came with the TECform script so webpage and the program may interact so the results can be E-mailed to you. †¢ 8. Inform classmates that use the Internet, and Internet users worldwide (via internet chat, newsgroups, and any other form of advertising) of the location of the online survey and request that they complete and submit it. RESULTS The ages of the subjects that participated in the study were in their mid-teens. 98. 5% of the respondents were male and 1. 5% were female. Most of the subjects were age 16 (20%), only 1. 6% of the respondents were age 12. 89. 6% of the subjects currently reside in the United States of America (including it’s external regions), there was also a scant amount of Canadian subjects (7. 0%) and an irrelevant one subject each from the following countries: Japan, Finland, Sweden, and Brazil. The subjects’ unweighted GPAs (Table 1. 2) demonstrated consistency with national statistics; the mean of the subjects’ GPAs were A’s, B’s and C’s, most had a B average. Of the 125 responses, 0% of the respondents had a failing GPA (one t hat rounded to O in the nearest tenth). The amount of respondents with A+ and D grades were about the same; 5. 5% of the respondents had an A+ average; 4. 8% of the respondents had a D average. The study reveals that as connection speed increased (waiting time for a website decreased), the actual time spent online per day increased (Table 2. 1). An average of 5. 33 hours was spent online daily by the respondents (Table 2. 1). Time spent online ranged from a low of 4 hours to a high of 6. 55 hours per day. Intriguingly, the poles of the subjects’ GPAs exhibited quite excessive amounts of time on the Internet, about 7. 7 hours per day (Table 2. 2). Those with A+ grades spent approximately 6. 72 hours online per each day. Those with a GPA score of C spent about 6. 31 hours online per day. Subjects with D grades spent around 8. 7 hours online per day; together the C and D grades’ hours averaged to about 7. 5 hours per day. Again, there were no responses with a failing GPA. As Table 2. 3 explains, about 38% of the subjects replied that they were negatively effected by their Internet use, 62% answered that they were not effected negatively. Notwithstanding, whether they said they were effected negatively or not, the subjects’ context of use is very similar. The two areas of use that differed the most were chat and web surfing. 36% of those that responded â€Å"yes† and 29% of those that responded â€Å"no† said they spent most of their online time in chat. 8% of those that responded â€Å"yes† and 33% of those that responded â€Å"no† said they spent most of their online time surfing websites. The respondents that thought they were effected negatively were the ones that chatted 6% more often and surfed the web 7% less. CONCLUSION The higher speed connection one has to the Internet, the more they can do at a time. One of the fastest connections, 10 Megabyte per second (shared T3) connections are extremely costly (about $25,000 / month) and most plausibly, a subject with access to a T3 would be a part of an educational institute in which the school would pay for Internet access. Figure 1. 1 illustrates that those with higher speed connections use the Internet for longer periods of time. It is a possibility that those who get a ‘rush’ by using the Internet may be prepared to invest in higher speed connections. Figure 1. 2 illustrates that those who create Internet media spend the most time online per day and those who read newsgroups spend the least amount of time online per day. Internet users that create internet media most likely spend their full time online doing so, as opposed to others who use multiple areas of the Internet in their sessions. Subjects that mainly chat online also spend a great deal of time online (5. 5 hours/day). This backs up the hypothesis which puts forth that internet chat instigates a habit. As Figure 1. 3 conveys, most of those who create internet media (such as websites and advertisements) do not think that their Internet use affects their health negatively, it is sound to gather that they do not believe it affects them negatively because they may consider their use as part of their job. Figure 1. 3 also indicates that those who think they are effected egatively by the Internet generally chat more often than those that browse the World Wide Web. It can be assumed that those who chat excessively believe that their Internet use affects their life in a negative way. Thus, the researcher’s hypothesis is correct. This is striking, the Internet’s exponential growth first began with the popularity of America Online and it’s chat rooms. The Internet was not perceived to be used social ly for chat as much as it is today. The majority of subjects do not think their Internet use has a negative effect on their social habits or emotional well-being (Figure 1. ). This is typical, heeding that any type of addiction is seen as an abnormality among a civilization. However, there was a definite group that believe it does effect them negatively. If these teenagers proceed with their net habits and current circumstance, a major disorder may develop over ensuing years. The study provides an awareness to the community regarding overuse of the Internet among the emerging society of adults. It points out the different components of the Internet that the majority of teenage addicts are liable to obsess on. Overuse of the Internet can genuinely restrain teenagers’ experiences in life, their performance academically, overall happiness, and physiological well-being. The term ‘addiction’ is used loosely in this study; withstanding, society’s perception to this growing problem can be flexible depending on how varieties of people view the definition of addiction. The WordNet dictionary defines addiction as, â€Å"being abnormally dependent on something that is psychologically or physically habit-forming. † One researcher has termed the study of internet addiction as â€Å"Psycho technology. The Internet most certainly can be psychologically habit-forming, becoming a part of one’s daily practices. To improve this study, the researcher would have restricted the ages of the subjects even slimmer, perhaps to ages 16-18. Also, the researcher would have redefined certain questions on the survey for worthier comprehension among the subjects, in particular t he final one which stated, â€Å"Does your internet usage affect your social or mental health in a negative way? † A more appropriate question could have been, â€Å"Do you believe your internet usage may obstruct the achievement of your personal goals? Then a separate follow up, â€Å"If so, do you think using the Internet is worth more than achieving your goals? † The researcher suspects the results regarding daily use may have been biased because the link to the survey was placed on a website that could be categorized as directed to more advanced users than basic or intermediate. This, however, cannot be confirmed, the results stand rational. Lastly, the researcher suggests including a personal comment field in the survey, quotes of intensely effected users would be a good addition to the study. ACKNOWLEDGEMENTS Notably, I thank the respondents of the survey for taking the time out of their active day to fill it out completely and in their best efforts, without you, this study would be completely inaccurate and not worthwhile. Second, I thank my parents for fully supporting my interests and pursuits. I also thank Dr. Young and Carnegie Mellon University for publishing their research, studies, and links to other articles on the Internet. Thanks to Rob J. Meijer for programming the comprehensive script used to process the survey results. Acknowledgements to Apple Computer, Inc. for developing a stable system and word processor to work in without fear of losing my manuscript (though I still save the document every 20 seconds). Finally, Mr. D. Ferraro for providing an abundance of answers to my countless questions and hours of helpful input. I hope each and every Internet user finds my study helpful to their enrichment and studies. REFERENCES CITED Internet Behaviour Questionnaire and Addiction Egger, 1996 HomeNet Project Study by: Kraut, Lundmark, Patterson, Kiesler, Mukopadhyay, Scherlis, Zdaniuk, Thielke, Patterson, Carnegie Mellon University, 1998. The Psychology of Cyberspace Turkle, 1996 Trapped in the Web Psychology Today; Potera, 1998 Research Over Internet Addiction Cochran, 1996 Internet Addiction: The Emergency of a New Disorder Dr. Young, 1996 Internet/Web Growth Exponential as Usual Searcher, 1997 Psychology of Cyberspace – Computer and Cyberspace Addiction Suler, 1996 revised 1998 Creation of a E-nation Canadian Geographic; Harris-Adler, 1995 WordNet Dictionary – Version 1. 6 How to cite The Purpose of This Study, Essay examples

Friday, December 6, 2019

Internwtworking Via TCP/IP Model

Question: Describe about the Internwtworking for Via TCP/IP Model. Answer: 1. The differences between the repeater, switches and a router are described below. Repeater: Each and every transmission media create signal losses while transmitting data. After a particular distance, the signal travelling through the transmission media will lose all the energy and hence identification of that signal and the identification of the data brought by that signal will be difficult. So signal cannot be transmitted after a certain distance in any transmission media. Repeaters are used to remove this distance limitation. Repeaters are the devices used to regenerate the weak signals to its original energy level so that the signal can be transferred some more distance (McQuerry, 2004). The repeater can be used a as a noise remover. One cannot say it is an amplifier but it is a regenerator (McQuerry, 2000). Repeaters cannot split the host domain. It doesnt have the filtering capacity. It cannot differentiate the analog signal and digital signal while doing repeater functionality. Based on the signal type the repeaters can send the data (McQuerry, 2004). It works in the physical link later in OSI model. It checks logical link control and packets of the sender segment and receiver segment. If they are same in both segments then repeater can send the data. The collision stopping power in repeater is limited. It cannot filter the signal too (McQuerry, 2000). Switch: This device is used to transfer data from one host to another host. In another words switch can do one-to-one data transfer between devices. It operates in layer-2 of OSI model usually. Intelligent switches can operate in layer-3. It can learn and store the MAC address of the devices connected with the switch and that data will be used to do one-to-one data communication. It can split the collision domain and hence avoids collision in the network. Filtering capacity is limited. It wont do broadcasting but it got the capability (McQuerry, 2000). Router: Routers are layer-3 devices, used to communicate between two different networks. IP Address is the important addressing parameter in routers (McQuerry, 2004). Routers can create communication between devices of different protocols and architectures. Router does pocket forwarding. It can exchange protocol related information too. Routers got the filtering capabilities. It avoids collision. It controls the traffic and filters the type of traffic. Using routers the traffic can be denied using routing tables. Routers are using special type of protocols called routing protocols. Usually routers are more costlier than most of the other networking devices (McQuerry, 2000).. Some of the differences are listed below (McQuerry, 2000). Repeater Switch Router It doesnt have any knowledge about the devices connected with the device. It got limited small level of intelligence about the devices connected with the switch. It got more knowledge about the devices connected with the router. Layer-1 device Layer-2 device mostly Layer-3 device Multicasting Initially broadcasting. Then unicasting and multicasting follows. Initially broadcasting. Then unicasting and multicasting follows. Does not remember any data (McQuerry, 2004) Remember MAC addresses of the devices in the lookup table. Switch can learn the new incoming MAC addresses (McQuerry, 2004) It remembers the IP addresses and stores them in routing tables (McQuerry, 2004). Data collision occurs Low collision possibilities Low collision possibilities are there Speed range can be 100 MBPS Speed range is upto 1000 MBPS Speed range is upto 80 MBPS No routing decision is taken For complex network , a delayed routing will be done Faster routing decision will be taken. No NAT operation possible No NAT operation possible Can do NAT operation LAN device LAN device LAN and WAN device Mostly few ports will be there Number of ports will be more. Number of ports will be less Slow Faster in LAN switching Faster in WAN/MAN routing A router is more complex and expensive than a switch: Routers are more complex because of its functionality and the complexity. Router is a WAN device mainly. It is used to connect two different networks. It collects the location information and hop information about the network nodes in multiple networks, analyse them, forms routing tables and routes the incoming pocket based on the routing table. Routers take care of filtering operation too. Routers are providing security like firewalls. It can do NATing too (McQuerry, 2004). Since router is exposed to internet, the security level of the router must be high. Router decides the routing path based on routing protocols. So router OS got the capabilities to understand routing algorithms and to take decision (McQuerry, 2004). Switch is a LAN device. It collects the MAC address details of the devices connected with the switch and got the details of who is who. Switch forwards the data from the sender to receiver. Switch will not provide the best path from the sender to the receiver. It simply broadcasts. Switch cannot be used to control the internet access (McQuerry, 2004). A switch is more complex and expensive than a repeater: The switches are intelligent devices. It learns and memorizes the MAC addresses. It stores the MAC address values in its switching table. Usually switches are Layer 2 devices. Layer 3 switches are doing more than usual Layer-2 switches. Layer-3 switches can do part of routing operation too. It can understand the IP address details too. Switches got buffers to control the data flow. It controls the data transfer too. Switch got the capabilities to stop the collisions too (McQuerry, 2004). Repeater cannot do all the above activities. It just boosts the energy level of the signal and forwards to the output node. It is a layer-1 device. It will not store and memorize any data for the future use. It will not do anything to stop collisions. Collisions are very much possible in repeater traffic. Switch is capable of managing the traffic on the transmission line and splits the collision domain of the host, whereas a repeater can send the packets only to the next segment and it creates collisions on the network. This is because, a series of repeaters are connected on the same collision domain (McQuerry, 2004). The switch must know the MAC address of each end devices that are connected on the port of the switch to send the message to its end devices. Therefore, the switches are more complex than the repeaters. On the other hand, the repeater allows only one transmission at a partic ular time. Thus, switches are more expensive and complex than the repeaters. 2. For these IP Address calculations (Cowley, 2012) The Network address of the ISP is150.80.0.0/16. It is a class B network. It got 16 host bits and 16 network bits. It got 2^16-2 IPs = 65534 Its Network ID is 150.80.0.0 and SNM=255.255.0.0 From the IP Requirements the Required IPs(Min) can be 200*128+400*16+2000*4 = 40000 For providing 40000 IPs at least 16 host bits are needed. Remaining 16 bits will go as a network bits. Since 16 bits can give 65534 IPs out of which only 40000 can be used, Remaining IPs will be free IPs. Free IPs = 65534 40000 = 25534 Segment 1 needs 200*128 = 25600 IPs. 15 host bits are needed to provide these IPs. Segment 2 needs 400*16=6400 IPs. 13 host bits are needed to provide these IPs. Segment 3needs 2000*4=8000 IPs. 13 host bits are needed to provide these IPs. Segment 1 sub block can be = I stgroup sub block=150.80.0.0/17 Segment 2 sub block can be = II nd group sub block=150.80.0.0/19 Segment 3 sub block can be = III rd group sub block=150.80.0.0/19 Class B IP range starts from 128.X.X.X to 192.X.X.X and hence 150.X.X.X falls under class B. So by default the given IP and ISP's network address 150.80.0.0/16 falls in class B (Cowley, 2012). Class B can give 2^16-2 IPs. The IPs in which all the host bits are zero will act as a net id and the host ip in which all the host bits are 1 act as a broadcast IP. Hence these two IPs cannot be used for host computers. So 2 IPs are deducted from 2^16. As the required IPs is only 40,000 and the available IPs are 65534. The remaining free IPs is calculated by deducting 40000 from 65534. So 25534 IPs are free IPs available in ISP's hand. All the 2^16-2 IPs can be used very efficiently by doing sub netting. While doing sub netting host bits will be less than 16. It cannot be 16 as it will leads to classful Class B IP (Cowley, 2012).. So host bits can be made 15,14,13,12...1 like that. And the number of IPs resulting from this wills as if that IPs belongs to a separate network. Number of host bits in sub netted IP address depends on the requirement. Hence for the segment 1 where the requirement is 25600. Hence 15 host bits can give this IP address count. Hence segment 1 can use 17 network bits. Similarly the segment 2 can use 19 network bits. Sub blocks are calculated accordingly (Cowley, 2012). 3. R1 and R2 both routers are forming a big network. If R1 goes down, then R2 handles the routing between the hosts. If R2 goes down then R1 handles the routing. But H3 and H6 hosts are dropped down from the network when R1 goes down. In case if R2 goes down, one host H4 gets drops down from the network. Since the type of traffic and purposeof the traffic are not known , the frequency of the traffic also not known. Hence it is very difficult to tell which router is important (Singh, 2010). As a general view the router which causes maximum damage to the network when it is failed will be considerered as an important router. Hence R1 is considered as an important router. 4. The distance vector routing (Cs.bu.edu, 2016) knows the cost of best path and neighbour route address. It updates the routing table when Distance Vector route changes. So, it updates frequently. The distance vector and link-state are the two primary classes of routing protocol. The distance vector routing comprises of two factors they are, distance and direction. The Link-state routing (Cs.bu.edu, 2016) has the knowledge of all the nodes and routers on the network. It uses Dijikstras algorithm (Cs.bu.edu, 2016) to update all information on the switch. Link-state routing performs reliable flooding. This is the process of sending information to all the nodes on the network. When all nodes collect the information on the network it will lead to stop the flooding. Link-state routing contains four fields. They are ID of the node, sequence number, address list of all the connected nodes, time to live (TTL) of the packet(Singh, 2010). Link-state routing needs more memory space. Because it should have knowledge of the whole network topology. It does not need frequent update. It requires more processing power because of its knowledge about topology on the network (Cs.bu.edu, 2016) The Distance vector routing changes the information in an iterative manner. It changes local link cast and update Distance Vector. When the Distance vector changes that time only the node notifies the neighbour. First, the routing determines the cost of neighbours then estimate the least cost of all. All the time the Distance Vector sends to the neighbours and updates. Each time of transmission the neighbour estimate and determine the least cast path. All neighbours contain distance on its list. In this routing, the router table initially set the distance at infinity. Then, the router receives packet and determine the destination. Then only it finds least cast path or shortest path on the network. Each time the router checks the neighbour routes cost or distance. It also sets the path to known after visiting each link on the network. Due to its routing table updates at all time this require more bandwidth than the Link-state routing. But it did not require more memory space. Because it did not needs to know about the overall topology of the network (Singh, 2010). The below table explains the differences (Graziani and Johnson, 2008) (Cs.bu.edu, 2016) Distance Vector Routing Link-State Routing In distance vector routing, router needs only the information of the next hop. In link state routing, router knows the complete information of all other host. It need not know the complete network topology. It must know the complete network topology to make sure the reachable paths by all the other routers in the network. It advertises the complete routing table. It can be difficult to configure the routing table. Management is not required in distance vector routing. More management is required for link-state routing. It requires more bandwidth. It requires less bandwidth. It uses direct addressing method to find the best path on the network. It uses the reachable paths on the network. It is mainly used for identifying the best destination path in the network. It also used for identify the best destination path in the network. It doesnt support classless routing. Classless routing supports to link-state routing. It updates the routes frequently. It makes use of triggered routing updates. Broadcast is used to update the routing. Multicast is used to update the routing. Routing is performed in a decentralised manner. Routing is performed in a centralised manner. It affects the routing loops. It less affects the routing loops. Only routing table is created. It creates neighbour table, topology table and routing table. It can be easily configured. It requires more processing power for configuration. It requires less memory and CPU usage. It requires more memory and CPU usage. It requires less processing power. It only forwards and advertises the information about the network topology to the directly connected links and adjacent routers. Best destination path is calculated by Bellman-Ford algorithm. Best destination path is calculated by Shortest Path First algorithm. 5. Role of ICMP (Internet Control Message Protocol) in IP protocol Architecture: The ICMP is a communication protocol in between the two connected systems of IP protocol. The Internet Protocol (IP) is not a reliable protocol in communication environment. It does not guarantee to deliver the packets on the required destination. Sometimes the destinations have the problem of missing packets. So, high level protocol is required to meet the problem of missing packets. The ICMP protocol is used to report the errors, if any packets miss on the destination device. (Cisco, 2016) Figure: ICMP Header Various tasks are performed by ICMP protocol. ICMP is used to report the routing failures. It helps in testing the node reachability within the internet. It helps to redirect the ICMP messages to the source IP address. It helps to generate the ICMP Time Exceeded message and various other messages. (Cisco, 2016) ICMP is used by the hosts and routers to communicate with the network-level information. ICMP creates and sends messages to the source IP address. The ICMP message consists of router and the IP address. Any IP network device has the capability to send, receive or process ICMP messages (Cisco, 2016). The ICMP lets denotes the internet gateway through router, service or a host. This is used in case if it the packets are not delivered to the destination. Figure: ICMP Error Message Purpose of IP header and first 8 bytes of datagram data The Internet Protocol has a format of 8bytes in the header part which is used to send the error messages to the sender. It contains an error message and an IP address of the sender. It helps the sender to match the error message of the host (Cisco, 2016) Figure: IP Datagram Structure ("The IP datagram structure", 2016) An ICMP message consists of 8 bytes long in every transmission to the sender if error occurs on the network. The IP datagram header contains at least 20 bytes. The ICMP message received by the sender performs Path MTU Discovery to identify the IP address of the destination packet, which caused the error (Singh, 2010). References Cisco. (2016).TCP/IP Overview. [online] Available at: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13769-5.html [Accessed 4 Sep. 2016]. Cowley, J. (2012).Communications and networking. Heidelberg: Springer. Cs.bu.edu. (2016).Distance-Vector Routing. [online] Available at: https://www.cs.bu.edu/fac/byers/courses/791/F99/scribe_notes/cs791-notes-990923.html [Accessed 4 Sep. 2016]. Graziani, R. and Johnson, A. (2008).Routing protocols and concepts. Indianapolis, Ind.: Cisco Press. McQuerry, S. (2000).Interconnecting Cisco network devices. Indianapolis, IN, USA: Cisco Press. McQuerry, S. (2004).Introduction to Cisco networking technologies (INTRO). Indianapolis, Ind.: Cisco Press. Singh, V. (2010).Computer networking course. New Delhi: Computech Publications. Tuxgraphics.org. (2016).network address calculator / ip address calculator. [online] Available at: https://tuxgraphics.org/toolbox/network_address_calculator_add.html [Accessed 4 Sep. 2016].