Tuesday, December 31, 2019

Terrorism The Threat Of Terrorism - 1788 Words

The civilian casualties pile up in what seems to be an endless war for peace. Mothers mourn the loss of their loved ones while children cry rivers of pain that never seems to stop flowing. Such a purge is occurring in many foreign countries being struck with the deadly plague known as terrorism. One would think it’s blasphemy that the United States does not help other countries to prevent such a polluted river from flowing, but we must take action because we are all humans and we deserve to live peacefully. Ignorance pours into people s blood by not even noticing how terrorism is beginning to give many presidential candidates a â€Å"boost.† While our government believes that it is better to not become more involved with the terrorism occurring in foreign countries due to the chance of getting caught in a ground war and putting at risk many of our soldiers, I argue that the U.S. should become more involved to establish a sense of peace and eliminate the threat of terro rism from the world. Our government is responsible for what we actually do and they need a good moment to think. Have we as a country done enough to help the people of this world who need it? Have we actually done enough if mothers are still mourning and children are wondering if they re siblings are coming back anytime soon? Picture this in your mind. Is it not heartbreaking? Because in the end we all bleed the same blood and the key to fixing these problems begins within the government who needs to put theirShow MoreRelatedTerrorism And The Threat Of Terrorism1014 Words   |  5 PagesTerrorism has continuously been an ongoing danger all over the world. Threats pertaining to international security seem to be loosely organized and self-financed groups or the extremist Islamist parties using religion as a pretext that pose threats to the U.S. and other allies. However, while most see terrorism as being international, domestic radicalism has become an ever increasing problem, spec ifically within the United States. Cross national links between specific terrorists groups are becomingRead MoreTerrorism : The Threat Of Terrorism Essay1098 Words   |  5 PagesThe threats of terrorism are growing globally and it is crucial in understanding the history of how terror is obtained to better prepare ourselves and possibly predict future threats. The behavioral pattern of the extremist can be a combination of qualities, acts, or beliefs. It is believed that all terrorist events have political objectives behind them, even though these extremist use religious symbolism to seek a wider audience and resort to violent acts to prove their point. The terrorist’s eventsRead MoreTerrorism : The Threat Of Terrorism898 Words   |  4 PagesTerrorism is defined in the word itself; to promote terror or fear. The goal of a terrorist is also to create the most damage, particularly mass casualties. Terrorists have a variety of ways to instill fear, but what Americans fear m ost is the use of WMDs. Terrorists have used WMDs as a tactics to induce fear for generations and in some cases they followed thru with their threats. After Pearl Harbor, Americans realized they could be attacked at home, but over time the memory of that day faded andRead MoreTerrorism Is A Threat Of Terrorism1846 Words   |  8 PagesWell known peace activist Mhatma Gandhi once preached, â€Å"Terrorism and deception are weapons not of the strong, but of the weak.† Ghandi dedicated his life to independence for each and every person on Earth. We live in a world where countries’ biggest fear is the threat of terrorism. To many, terrorism may only seem to be stories in the history books, but in reality in today’s world terrorism is a heightened menace. Terrorism, when defined by the Federal Bureau of Investigation, means any activitiesRead MoreTerrorism : The Threat Of Terrorism Essay701 Words   |  3 Pages The Threat of Terrorism in the U.S. Thomas McBrien Prof. Tomlinson FCIQ-101 Terrorism is a major, growing concern throughout the United States. Terrorism comes in different forms and also has different motives. The most common motives for terrorist attacks in the United States are different political and religious views. The United States is also a targeted country because they are very involved in other nations. As the terrorist threat continues to rise, the United States must haveRead MoreThe Threat Of Terrorism And Terrorism1979 Words   |  8 Pagesterrorist attack lingers in the minds of not only civilians, but business owners as well. All over the world there is an increased threat of terrorism that public, private and governmental companies face that requires companies to have an increased knowledge and understanding on how to manage the risk of terrorism. With not a single country being able to escape the threat of terrorism, how does a company manage the risk of something that is so hard to measure yet, one of the most catastrophic things a compan yRead MoreThe Threat Of Nuclear Terrorism1483 Words   |  6 Pages Nuclear Terrorism Introduction to Homeland Security Victor Reyes Valencia College Abstract Nuclear terrorism can take a variety of forms. The most frequently discussed form involves a terrorist group either stealing a nuclear weapon or building a nuclear device using stolen or illegally purchased nuclear material. This paper explores the dangers and threats of Nuclear Terrorism. It also goes in depth with how the government’s actions have prevented groups, countries and homegrownRead MoreTerrorism And The Terrorist Threat Essay1567 Words   |  7 Pageswithin counterterrorism, views regarding Islamist terrorism appear to be divided even among the experts. Bruce Hoffman and Marc Sageman, two of America’s leading theorists on terrorism and counterterrorism, held opposite views on how to deal with the Islamist terrorist threat, which erupted into a significant debate between the two in 2008. While Hoffman stressed that Al Qaeda is alive, resurgent and more dangerous than ever, Sageman argues that the threat no longer comes externally from organizationsRead Mo reThe Threat Of Nuclear Terrorism986 Words   |  4 PagesThe USA has reported Nuclear Terrorism as the number one issue that all Americans are facing today. Nuclear Terrorist attacks in Paris, San Bernardino, California, and New York have raised tension between the US and other countries, especially Islamic countries such as Iran. Nuclear terrorism has killed many innocent people around the globe. It has become the subject of debate in the USA since the terrorist attack of September 11, 2001 (Muller, 2016). Nuclear arms production is one of the rootRead MoreTerrorism: A Growing Threat898 Words   |  4 Pagesstruck fear in the eyes of many people by using threats and violence to further political beliefs. Terrorism can be shown in many different ways; however, there are only two main types of terrorism: international and domestic. International terrorism usually occurs outside the jurisdiction, or boundaries, of the United States. Domestic terrorism is the exact opposite, oc curring mostly within the jurisdiction of the United States. The violence of terrorism is usually comprised of assassination, destruction

Sunday, December 22, 2019

Modern Day Slavery - 808 Words

You might be wondering, what in the world is Modern-Day slavery, hadn’t the entirety of slavery been abolished years ago? Well no. Today there exists something known as human Sex Trafficking. Some might refer to this as prostitution, or rather sex working, but really, the word sex trafficking teaches refers to the inhumane and unfathomably abusive ways of our society. The State of California’s department of Justice refers to Human Trafficking as â€Å"controlling a person through force, fraud, or coercion to exploit the victim for forced labor, sexual exploitation, or both. The 2013 state ratings on Human Trafficking laws say that only 39 states passed new laws to fight human trafficking in the past year. Human Sex Trafficking has become too severe an issue for us to ignore it any longer. The sale of Women and girls has become as common as the selling of illegal drugs and weapons. The victims of Human Trafficking are brought into this trade because of their limited wa ys to support themselves. The non-governmental organizations, government legislation and individual efforts which vow to stop trafficking have not succeeded. Human Trafficking continues to exist today due to the environment and financial situation many people live in. One of the biggest reasons for the uprise in Human Sex Trafficking is reliant on our environment. If you think about it, our environment has a huge influence on our careers, the people we surround ourself with, as well as our future economicShow MoreRelatedModern Day Slavery And Slavery1992 Words   |  8 PagesModern Day Slavery Slavery has no single definition behind it because it is defined in so many different ways. It is best defined as confinement against a person s will. Slavery has existed in almost every region of the world. It dates back to before 500 BCE in Mesopotamia, Babylonia and Ancient Roman cultures. They have found records of sales, ownerships, and even rules and regulations for owning and selling slaves. Slavery has been an issue ever since civilization began. Slavery in India wasRead MoreModern Day Slavery1093 Words   |  5 PagesModern Day Slavery Most people believe that slavery was abolished when the Thirteenth Amendment was passed in 1865. What most do not know is that there are still many people being used for forced labor and sex illegally in the United States and across the world today. It has become an increasing problem in the last ten years, and the numbers are growing every day. According to the Polaris project in 2007, 27 million was the number of people being forced in this modern day slavery, with 80 percentRead MoreThe Modern Day Slavery1105 Words   |  5 Pagesmany different forms. Human trafficking by definition is the illegal trade of humans through recruitment or abduction, by means of force or fraud, for the purposes of forced labor, sexual exploitation or debt bondage. Human trafficking is the modern day slavery. There are an estimated 2.5 million people in forced labors caused by human trafficking. 1.4 million of them in just the Asian- Pacific area. South Asia, South East Asia, and Eastern and Souther n Europe are considered the epicenters. ThereRead MoreModern Day Slavery Essay1039 Words   |  5 PagesMason Moran Mrs. Davis Government Period 9 February 14, 2013 Research Project: Human Trafficking â€Å"Modern Day Slavery† â€Å"SLAVERY was abolished 150 years ago, right? While it is true that slavery is illegal almost everywhere on earth, the fact is there are more slaves today than there ever were†¦Ã¢â‚¬  Despite the grim reality described in this quote, I believe Robert Alan successfully undermines a common misconception held by Americans, both young and old. Although we are brought up thinking thatRead MoreModern Day Slavery Of Thailand1525 Words   |  7 PagesModern day Slavery in Thailand Every year, Thailand experiences high rates of human trafficking from its rural parts and from its the neighboring countries in the Greater Mekong Sub-region. Sex trafficking is not just described as the trade in humans for sexual slavery but also consists of forced marriages or even martyr organ donors. Trafficking is often seen through the hue of sexual slavery and it is critical to understand the social, political and economic reasons that contribute to the growthRead MoreA Modern Day Form Of Slavery Essay2107 Words   |  9 PagesLiterature Review While DMST is considered to be a modern-day form of slavery, history has recorded that the sexual exploitation of children has been practiced in America since its colonization. While slavery was abolished in the 19th century, it did not dissipate completely and it wasn’t until the beginning of the 20th century that the issue of child sex trafficking began to receive significant attention. This was in part due to the Trafficking Victim’s Protection Act (TVPA) that was passed inRead MoreModern Day Slavery: Human Trafficking 866 Words   |  4 Pagesviolated me again again.† (Gladys Lawson, Blood Borne Connections.) Human trafficking is the modern day slavery, it involves taking control over a person through force, fraud or coercion to exploit the victim for forced labor, sexual exploitation. or both (â€Å"What† par.1). This is become the sad reality for many, approximately three out of every 1,000 people worldwide are being forced into this such slavery. Victims of human trafficking are people of all backgrounds and ages, no one is safe from theRead MoreHuman Trafficking And The Modern Day Slavery Essay1006 Words   |  5 Pages Introduction This research paper is to discuss the provocative issue global issue in the field of criminal justice, and is known as the modern day slavery. This paper will also discuss the globalization in human trafficking. The study examines the impact of economic globalization on the human trafficking inflows around the world. This paper will begin by providing the definition of what human trafficking and globalization is, and how it works within the context of law enforcement. The history ofRead MoreHuman Trafficking : Modern Day Slavery1244 Words   |  5 Pages Human trafficking Around the world human trafficking happens around us without us noticing or realising what is happening. Modern-day slavery exists around the world and it is known today as human trafficking or trafficking in persons. So, what is human trafficking and why don t many people seek for help or go to athoughty ? Well human trafficking is modern-day slavery and involves the use of force, fraud, or coercion to obtain some type of labor or commercial sex act. Every year millions ofRead MoreHuman Trafficking And Modern Day Slavery Essay1390 Words   |  6 PagesHuman Trafficking There is an ever growing problem that is coursing the world. Every day 3,287 people are sold or kidnapped, and are forced into slavery. (Human Trafficking Statistics Reports 2012) Most people do not realize that modern-day slavery happens closer to home than they think. 14,000-17,500 is the estimated number of people trafficked into the United States each year. (Human Trafficking Statistics Reports 2012) The government has tried to reduce this problem as well as everyday people

Saturday, December 14, 2019

Ethical Issues in Business Free Essays

2. Ethical Issues in Business. It seems that every day in the news we are hearing of new company that has acted at least unethically and possibly illegally in the operation and financial reporting of their company’s business dealings. We will write a custom essay sample on Ethical Issues in Business or any similar topic only for you Order Now There are many ethical issues in business. One major issue that we see is over and under reporting net income. Companies like to show that every quarter the net income of the business has an increase or profit. In order to show this they adopt unethical or illegal means in the operation and financial reporting. One such method is the indiscriminate use of stock options for employees that enable companies to take employment costs off balance sheet and inflate earnings. With the recent ethical issues we have had companies over the years it is important that we pay close attention to financial reporting provided by companies. This method will reduce the equilibrium price and increase equilibrium quantity for this company’s products and services. The reason for this is that the wage is bill is shown lower than what it actually is. This causes the supply curve to shift to the right. With an increase in supply, if the firm is a monopoly/oligopoly/monopolistic competition, there will be a decline in the price of the product of the firm. In case the firm is operating in perfect competition, there will only be an increase in the quantity the company sells in the market. The scenario described above indicates that there is a shift in the supply curve, in other words the costs are shown to be lower than what they actually are at the time. The supply curve shift to its right but its elasticity is not affected. As the method described above does not relate to demand, the elasticity of demand is not directly affected. Any market structure, perfect, monopoly, oligopoly or monopolistic competition, the same ethical issues arise, the salary cost is underreported because of the use of stock options. This means costs are shown at a lower rate and profits are inflated. The decision to show inflated profits is unethical. From the deontological ethical perspective it is the duty of the management to show the correct profits and not inflated profits. Chapter 3, Question 14 Assuming that the demand and supply for premium coffees are in equilibrium, the price will be at a constant, without significant pressure from the market. If Starbucks introduced the world to premium blends, this would cause a positive shift in the demand curve. There a higher equilibrium price and higher quantity when demand increases and supply remain unchanged. As prices increase, and the market moves to a new equilibrium, we will see higher wages, more advances and investments in technology and infrastructure, and greater competition. As production become more efficient and competition becomes greater, supply will increase and cause prices to settle back down. There are several factors that will impact the long-term equilibrium, such as changes in supply. For example, if a hard freeze eliminated Brazil’s premium coffee crop, this would cause a negative shift in the supply curve. Assuming demand remains constant a negative shift in the supply curve will cause quantity to decrease and equilibrium price to increase. Research shows that in 2011 a frost occurred in Brazil’s southeastern coffee growing belt. Traders worried that next year’s yields could be hurt. At the same time, heavy rains during harvest forced Columbia to reduce its crop estimate for 2011. Understanding the impact of problems along the supply chain and how the changes in supply will impact prices in the market allows real world investors to make predictions of price in the future. This is important for businesses along the supply chain as well, in order to â€Å"stay ahead of the curve† when making strategic business decisions. ? Chapter 5, Question 17 Assuming there is a large rise in the demand for computer chips and potato chips. Potato chips manufacturers will be able to respond to a rise in demand quicker than a computer chip manufacturer. This is due to the fact that potatoes are more readily available, and the process for making potato chips is not as involved or difficult. The tools, materials and highly skilled labor force it takes to manufacture computer chips are more complex and will require more time to complete. Both manufacturers may attempt to ramp up production by adding another shift to the existing production line. Another option in the short run may be to contract another company to assist with the manufacturing as the demand increases or purchase/rent additional equipment to expand the production lines as needed to keep up with the demand and process request. In the overall big picture the positive shift in demand will put pressure on the market for increased competition. In order to maintain market share and maintain competitive advantage, both manufacturers will need to deliver value to the customer either in the form of a differentiated product or lower prices. In the long run, both of these priorities will be achieved through investment. A decision will have to be made that either investment in more efficient production and supply chain management, or more investment in a better product that stands out in the market. The long run success will also be dependent on the abilities of the entire supply chain to keep up with demand. If the demand is large but you are unable to meet the demand and supply the products it means nothing. The disadvantage of the potato chip company is that no matter how many potato chip factories you build, the manufacturer is still at the mercy of how many potato crops can be grown in a given season. How to cite Ethical Issues in Business, Essay examples

Friday, December 6, 2019

Satirical Essay Example For Students

Satirical Essay Baseball They say baseball is America’s favorite pastime, a decent, fun sport that everybody loves to play whether it is on an actual team or just playing for fun with friends. But, having watched just one Major league baseball game made me think about baseball and why people actually like it. It is the slowest sport I have ever seen and on top of that, a team might not score the whole entire game. Every year, the average time for each MLB baseball game increases each year. So, do Americans really enjoy watching this sport? This is my take on how an average baseball game is played. First off, the game is started off with the defensive team running fiercely onto the field. Then, they start practicing even more as the pitcher starts throwing warm up pitches. If you ask me, I am already starting to get bored. Next, the batter steps up to the plate and the pitcher picks out which pitch and then right before he is about to finally pitch the ball, the batter calls time out and starts fixing his batting gloves and take more practice swings. Really now, I could have already played an entire basketball game at this point it feels like. I know what you are thinking now, when will this game finally start? Well, next thing you know the batter is back in the box and the pitcher is ready to pitch. He throws the first pitch and the batter just watches it go by for a ball, then the batter steps out of the box, takes even more practice swings, fixes his gloves, and looks down at the third base coach all before the next pitch. So, if the next pitch is another ball or a strike, the same batter has to do that whole process again which just keeps dragging the game along. After this process is repeated for every single batter in that one half of an inning, the game already feels way to long. Yet, a baseball game is 9 innings which means each team needs to make 27 outs. Now you can see how baseball is slower than a turtle race. As the game goes on, the score should keep going up and up right? Well, in baseball, it is not uncommon for a team to score 0 points the whole game. 0 points! I have seen many scores where it is 1 – 0 after the 9 innings. Now doesn’t that sound exciting, you play for more than 3 hours to have 1 team score only 1 run. I would say the NBA averages at least 100 more points a game than the MLB, now that sounds like some more excitement. Another thing about baseball is that is a non-contact sport. Are players really scared to get close to each other? Where is the excitement in the baseball? Every single game is played the same and they are all around the same, long, boring length. People may say that my version of a baseball game is a little too slow and boring but when it comes down to it, that’s how games are really played. I’m just trying to tell everyone what the problem with baseball is so there can be changes. The MLB, (major league baseball) needs to do something to shorten the lengths of each baseball game. There are many options; they could shorten the game down from 9 innings which would take a good chunk off the game. Or, the umpires could work on speeding up the game by giving less time out to the batters and pitchers. Overall, baseball is America’s favorite pastime but it has just got to be too slow and too boring.

Friday, November 29, 2019

The Dispossessed free essay sample

Critical review of utopian science fiction novel by Ursula A Le Guin, contradictions inherent in creating perfect society.

Monday, November 25, 2019

Introduction To Cross

Introduction To Cross Cultural psychology Cultural psychology is defined by involving culture as a significant factor in determining psychological and behavioral elements in an individual. From this perspective, individuals derive behaviors from close association with the immediate cultural environment. Alternatively, culture is also established from a set of commonly held behaviors among people living under the same environmental conditions.Advertising We will write a custom essay sample on Introduction To Cross-Cultural Psychology Paper specifically for you for only $16.05 $11/page Learn More Cultural psychology involves studying how cultural practices evolve and affect human behavior and vice versa. In this regard, understanding how cultural psychology regulates an individual’s psychology is necessary to psychologists. In addition, learning behavioral tendencies acknowledged by another individual from similar cultural background is critical in cultural psychology. Howev er, cultural psychology does not involve psychological processes as compared to cross-cultural psychology. Cross-cultural psychology Cross-cultural psychology involves learning how different elements of a culture influence an individual’s behavior. From this perspective, this branch of psychology acknowledges that a culture is made up of various elements such as customs, values, stereotypes and attitudes. Moreover, cross-cultural psychology unearths the similarities and differences among world cultures, and how they are expressed by different groups of people. This justifies the commonality of behaviors replicated among diverse cultures. In this regard, cross-cultural psychology tries to define universal behaviors and how they impact individual behaviors, as well as family life and social experiences. Unlike cultural psychology, cross-cultural psychology involves the study of emotions, child development personalities, social behaviors and language acquisition. In cross-cultur al psychology, individuals’ behaviors are best understood from an ideological perspective. Therefore, understanding indigenous ideologies shared among people of the same culture is vital in this branch of psychology. Cross-cultural psychology evaluates the applicability of cultural diversity under several environmental situations. For example, understanding cultural diversity is essential in solving life challenges by applying same cultural behaviors among diverse groups of people. The relationship The relationship between cultural and cross-cultural psychology is from a definition point of view. In this regard, both definitions suggest that the relationship between cultures has an impact on human behavior and vice versa. However, cultural psychology examines cultural influences on individuals living within a predetermined region. On the other hand, cross-cultural psychology compares similarities and differences across diverse cultures from different regions. An in-depth anal ysis on cultural psychology reveals that cross-cultural psychology studies are based on data collected from cultural psychology.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More This means that data collected from cultural psychology provides a framework and a background to conduct a cross-cultural psychology study. Another relationship between cultural and cross-cultural psychology is evidenced by psychological processes. For example, cultural psychology depends on processes such as individual goals and cognitive ability at the individual level. Cross-cultural psychology is influenced by processes experienced at individual and interpersonal levels. Some of the processes evidenced at the interpersonal level include interpersonal communication skills, family and social influence. Cultural psychology focuses its study on the systematic link between a predetermined culture and a set of psychol ogical variables. On the other hand, a cross-cultural psychology study is only meaningful when a comparison of at least two cultures from different socio-cultural contexts is conducted. Critical thinking Critical thinking is crucial in providing the right approach and perspective towards problem solving. Cross-cultural psychology studies involve problem-solving procedures that are systematic and scientific in nature. In this regard, critical thinking is important in analyzing statistics and presenting findings as facts. In addition, critical thinking is used to assess formulated hypotheses as a matter of differentiating speculations from facts. Cross-cultural psychology involves using individual intellect when observing opinions and analyzing data. Consequently, this requires an intellectual perspective that understands the uniqueness of the underlying social phenomenon. Critical thinking is considered to be a meta-thought necessary in reducing biases evidenced in scientific studies . Critical thinking has the capacity of achieving accurate information and preventing general assumptions from affecting the research process. Methodology Research in a cross-cultural psychology study must achieve the predetermined objectives. In most cases, the objectives include description, interpretation, prediction and management. Quantitative and qualitative research methodologies are the most effective in cross-cultural psychology studies. Quantitative research methodology must constitute a measure of central tendency to establish variations and statistic relationships among variables. From this perspective, quantitative methodology provides the cross-cultural psychology study with a comparative perspective. However, qualitative methodologies are immeasurable and are effective when dealing with psychological phenomenon such as dreams. Quantitative research methodologies are effective when used to achieve a relationship or correlation between variables associated with human ac tivity. This is in consistency with the fact that cross-cultural psychology studies are based on correlation approaches. Other research methodologies suitable for cross-cultural psychology research include surveys, focus groups, interviews, questionnaires and experiments. However, each methodology is effective when used under the right conditions.Advertising We will write a custom essay sample on Introduction To Cross-Cultural Psychology Paper specifically for you for only $16.05 $11/page Learn More As indicated earlier, valuable data is critical in achieving the main research goals. From this perspective, statistical measurement of collected data must be conducted from a comparative approach using a quantitative methodology. Finally, qualitative research methodologies are most effective for experiments and when subjected to natural settings.

Thursday, November 21, 2019

A good leader Research Paper Example | Topics and Well Written Essays - 1000 words

A good leader - Research Paper Example Later in his adulthood, Lincoln moved to Illinois where he undertook various jobs including that of a postmaster, shopkeeper and surveyor. He joined politics, serving the Illinois legislature between 1834 and 1836, and later becoming an attorney. Lincoln married Mary Todd in 1842 with whom they raised four sons (White 9). In the 1850s, Lincoln went back to politics at a time of great concern over slavery in America. Leading the Republican Party, Lincoln was considered as being politically moderate. Though he lost the senatorial race in 1858, he stood out as a strong politician. In 1860, he won the presidency by about 400,000 popular votes, also carrying the Electoral College. He was re-elected into presidency in 1864 where he encouraged Southerners to drop their weapons and join in a reunion. An actor, John Wikes Booth, assassinated Lincoln on the Good Friday of 1865 because he thought that the president was helping the South (Keneally 17). The life of Lincoln in general inspires the recognition of a good leader in him. First, Abraham Lincoln was a people’s champion who preferred sharing first hand in the experiences of his people. In his four-year tenure as the president, Lincoln had most of his time spent with the troops. As insinuated by Drehle, he appreciated them as the people who would get the job done (113). His involvement ensured that he timely gained critical information to make appropriate decisions. He would meet with cabinet members and generals, not just in their offices, but also at their homes and the field so as to provide leadership and direction. This enabled him to build strong alliances which proved beneficial at both professional and personal level. This trait is also observed during his service as a lawyer in Springfield, Illinois, earning him the â€Å"natural wanderer† tag because he sought information and facts pertinent to the cases he

Wednesday, November 20, 2019

Can the aesthetic give us insights into the nature of International Essay

Can the aesthetic give us insights into the nature of International politics How - Essay Example This research will begin with the definition of aesthetics as the philosophical branch of inquiry that deals with principles underlying and guiding the work of art, beauty, perception, and appreciation. As a philosophy, aesthetics refers to the study of sensory values. Aesthetics deals more with seeing and sensing the world due to its ability to assume sensory levels and collective agreements regarding a contemporary matter such as international politics and beauty. Since aesthetic depends on factors like time and culture, this research paper will seek to assess whether aesthetic us the insights into the nature of international politics. It will resolve to determine, if yes, how it can give those insights. Since aesthetics is a philosophical branch studying creations, it can help us get insights into international politics since there are created and formed organizations, corporations, and societies internationally. The whole globe is feasible through created worldwide international communication systems regulated by international organizations like International Telecommunication Union, Universal Postal Union, and Intergovernmental Copyright Committee that exercises worldwide connection and integration by means of radio broadcasting, televising material, transferred mails, and books. The world also composes of created global systems of transportation that involves international airlines that operate under the watch of International Civil Aviation Organization. Additionally, the world, through formation, has internationally regulated social norms that encompass a variety of states and international groups’ interaction. All these integral relations show the will of aesthetic in international politics because aesthetic provides a strategic platform for philosophical evaluation of sensory values (Holloway and Beck, 2005:79). As a result, diplomats and signatories are undertaking the policy of creating international value for each other’s potent abili ty. Aesthetics revolve around our senses and our responses towards objects, ideas, and agreements. Therefore, it is giving us insights into international politics since we can see, hear, and feel the sense of international relations where nations are formalizing many structural expectations, involving written international agreements and contracts or treaties bearing and defining the obligations and rights of the cosigners. The most recent philosophical research shows that, aesthetic is making it possible for us to have insights on international politics since it is presenting us with philosophical beauty of determining the importance of international organization. We can objectively point out that, through aesthetic, the world can see international representation of groups through formalization of balanced capabilities, interests, and members wills (Constantinou and Oliver, 2008:118). By use of this sense, we can understand that, an internationally created group is a point of equil ibrium where a balance of values and

Monday, November 18, 2019

Tactics to reconstruct the completed buildings due to shifting of Case Study

Tactics to reconstruct the completed buildings due to shifting of project layout by the government agency - Case Study Example As the 5 individual buildings were privately owned and the external road works was under the auspices of the government, it means that the real situation at hand had to do with an amicable private-public sector engagement. A major climax of the private-public sector engagement came about when the client who is on the government side issued notice to the contractor to re-establish the settings of the all the 5 buildings to ensure that they do not conflict with the external road. It is important to note that construction had also started for all the buildings. Once the notice was received by the contractor to re-establish the settings of the road, he engaged with the owner and informed him about the demolition, a situation that merited claim for additional time and cost for the project. As a person tasked with the responsibility of Senior Contracts Administrator, I had a role of reporting to contractors Project Manager. This means that my role was very crucial in ensuring a successful engagements and negotiations between the owner and the contractor. The private-public sector engagement widened the stakeholder base of the project, giving rise to both external and internal stakeholders. Externally, representations from the GRA, beneficiaries of the external road, financiers and third party quality control administrators on the project were all stakeholders. Internally, the project owner, people living in the community, contractor, all employees under the cont ractor, including project manager, and other internal auditors and inspectors were part of the project’s stakeholders. Given the nature of the stakeholders, the stakeholder theory which sees the true ownership of a project as belonging to all people who may be directly or indirectly affected by the project applied. As part of the principles of construction and

Saturday, November 16, 2019

Environmental Changes and Economic Growth Relationship

Environmental Changes and Economic Growth Relationship CHAPTER 1 INTRODUCTION 1.0 Background of the Study Over the past two decades, the issue of climate change due to increased global warming has been a major environmental challenge. Rising levels of carbon dioxide emissions is considered one of the principal causes of global warming and climatic instability. In order to investigate the climate change concern, this research examines the cointegration and causal relationship between economic growths and carbon dioxide (CO2) emissions in selected five Association of Southeast Asian Nations (ASEAN) countries for the period 1980 to 2010 namely Indonesia, Malaysia, Philippines, Singapore and Thailand. The research focus on the relationship of these two variables, from the increasing effects of energy on economic development. This research aims to discover the linkage of these two variables as emissions and economic growth are related in contributing the global warming or climate change. This issues has been discussed frequently and become a bigger concern globally. The Research specifically focus on ASEAN five, and not to all ASEAN countries as these five countries sharing the similarity in the level of economics development since 1980 that coincided with significant increase in fossil fuel usage. The pressure exists for ASEAN five to achieve a balanced level of energy that control the CO2 emissions to the environment but at the same time ensuring the country’s sustainable economic growth. Thus, the issue regarding how increased fossil fuel consumption and economic growth influence carbon dioxide emissions is currently one of the most interesting topic. Over the past two decades, the menace of climate change due to increased global warming has been a major environmental challenge. Rising levels of carbon dioxide emissions is considered one of the principal causes of global warming and climatic instability Association of Southeast Asian Nations (ASEAN) includes almost all of the Southeast Asian countries. Its key position in the Asian Pacific proclaims dedication toward peace and stability in the region, these Region contributed a significant economic input through integrated energy management. ASEAN was first officially established in 1967 in Bangkok, Thailand, with the signing of the Bangkok Declaration by the five original member nations: Indonesia, Malaysia, Philippines, Singapore, and Thailand. Further on Brunei Darussalam, Vietnam, Lao People’s Republic, Burma/Myanmar, and Cambodia joined, making the ASEAN a group of 10. ASEAN region lies within the waters of the Pacific Ocean, Indian Ocean, Andaman Sea and South China Sea, and stretches more than 3,300 kilometres from north to south (latitudes 30 ° North to 11 ° South) and 5,600 kilometres from west to east (longitudes 92 ° West to 142 ° East). ASEAN borders from China to the north, India and Bangladesh to the northwest, and East Timor and Papua New Guinea to the southeast. ASEAN also has a long coastline, measuring about 173,000 kilometres in total, and is surrounded by major seas and gulfs such as the South China Sea, the Andaman Sea and the Gulf of Thailand. In view of its proximity to the equator, the region enjoys a warm and humid climate throughout the year according to Letchumanan (2008). In ASEAN from the period from 1980 to 1999, its economy grew by nearly 5 percent a year and energy consumption by 7.5 percent. The economy is expected to continue to grow at this rate over the period from 2000 to 2020, and it is estimated that annual energy supply must increase by 4.2 percent a year to sustain this growth, Balce et al. (2001). As Karki, Mann, Salehfar (2005) the Association of Southeast Asian Nations (ASEAN) is one of the most dynamic economic regions of the world. The economy in ASEAN is linked with its diverse energy resources, high-level urbanization, and rapid industrialization. ASEAN’s growing economy in the last two decades has increased the concern of sustainable development in the face of deteriorating energy security, environmental pollution, and economic hardship in energy investment. In the last two decades ASEAN’s faces a growing economy and it has increased the concern of sustainable development in the issues of deteriorating energy security, environmental pollution, and economic hardship in energy investment Karki et al. (2005). ASEAN-5, namely Malaysia, Indonesia, Singapore, Philippines and Thailand have progressed economically well compared to other members of ASEAN. Among the ASEAN countries (excluding Brunei), in terms of per capita income in 2008, Singapore (USD 39,991) ranked the highest followed by Malaysia (USD 8032), Thailand (USD 4103), Indonesia (USD 2245) and the Philippines (USD 1840). The average GDP growth of ASEAN-5 between 2004 and 2009 was 5.9% with Singapore and Indonesia recording over 5% growth rates. The rapid growth of the ASEAN-5, specifically for Singapore and Malaysia compared to the rest, poses an interesting question among policymakers. Thus, it is essential to investigate the long-run and short–run relationship and causality issues between the variables for these countries. Furthermore, according to ACE (2002) The ASEAN makes up one of the largest regional markets in the world, and contributing a combined gross domestic product (GDP) of US$578 billion in 2000.The region hosts approximately US$53 billion in direct US investment, and it is the third largest overseas market for US exports with two-way ASEAN–US trade totalling US$120 billion in 2001.The rapid economic growth for ASEAN can be seen since Hence, the environmental, social, and economic issues in the region are very significant and widespread for the rest of the world. 1.1 History of C02 Emissions in ASEAN ASEAN comprises of ten countries. These countries have contrasting energy demand profiles, levels of access to modern energy services, and energy resource endowments. The demand for energy in the region has continuously increased over the past four decades, driven essentially by high economic growth, underpinned by increased urbanisation and industrialisation. The development has resulted in increased greenhouse-gas emissions. A large proportion (approximately 60%) of these emissions have come from fossil-fuel combustion taken from WRI (2011). According to Sandu, Sharma, Vaiyavuth (2009) the historical development in CO2 emissions for the ASEAN countries over the period 1971 to 2009, show that: (1) population growth and increased levels of affluence are the largest contributors to emissions growth in most countries; (2) fossil fuels have increasingly become the major fuel source in the region despite recent global environmental pressures – reversing this trend will be a challenging task; (3) production structures for most countries have increasingly become concentrated towards energy-intensive industrial sector; (4) the region has achieved energy efficiency gains at both end-use and conversion levels – in fact this is the only factor that led to reduced emissions; and (5) the effect of changes in carbon intensity of primary energy was only negligible and no meaningful trend can be observed. As fossil fuel as a major CO2 contribution in the air, it is relevant to reinvestigate whether the CO2 emission have a causality effect to GDP and how these two variable react .My research will answer the direction interplay between CO2 and GDP. Notwithstanding the large growth in energy consumption, energy consumption per capita in the region (0.9 tonnes of oil equivalent), however it still considerably lower than the developed world average. Moreover, almost 30% of the population in the region still do not have access to electricity IEA (2009). With expected increases in population (by 30% by 2050; UN 2011), coupled with ever increasing urbanisation and industrialisation, energy demand is expected to increase substantially. Unless there are fundamental changes in the patterns of economic production and fuel-mix, the greenhouse-gas emissions are expected to became higher and grow significantly in the years to come. For example, according to IEA (2009), the region’s share of global emissions could reach 5% in 2030. Currently this share is around 3%. The implication of CO2 emissions comes in positive and negative manners respectively. One important detail to be considered is that the effect of this occurrence varies from one country to another depending on the level of social, economic as well as political developments. As such, it is important to analyse the history of CO2 emissions, according to specific country rather than assuming the impact as an overall. This section will discuss further the history of CO2 through the perspective of ASEAN countries. This current research focus on CO2 emission only because this emission is the most listed in the IPCC (revised in 1996) and most effect to climate changes according to world-nuclear (2014).Latest updates are 72% of the totally emitted greenhouse gases is carbon dioxide (CO2), 18% Methane and 9% Nitrous oxide (NOx). CO2 is inevitably created by burning fuels like e.g. oil, natural gas, diesel, organic-diesel, petrol, organic-petrol, ethanol. The emissions of CO2 have been gradual ly increased within the last 50 years and are still increasing by almost 3% each year. According to Luukkanen Kaivo-oja (2002) the general observation on the basis of decomposition analyses provided that development of energy sectors in ASEAN countries is to an increasing extent based on fossil energy use. Decomposition analyses is quantifying the contribution of each group of energy use to the aggregate index.This type of development is mainly due to the fact that the ASEAN countries are industrializing economies and are following the Western pattern of development. This summarize that each countries responsibilities and participate of the developing countries in emission reductions is central and for ASEAN countries economic constraints can deplete the environmental concerns. 1.1.1 History of CO2 in Malaysia Malaysia experienced a rapid economic growth from the past four decades. From the year of 1961 to 1997 (before financial crisis) Malaysia economic growth increased by an annual average growth rate of 7.26%.and from the year of 1999 to 2008 (before Asian financial crisis), Malaysia experienced 5.55% increase in its annual average growth rate. Malaysia are categorise as a high income developing country in South East Asia. From the statistics energy consumption in Malaysia increased by average annual growth rate of 6.76% in 2010 to settle at 72646 kilo tone of oil equivalent (ktoe) from 6093 ktoe in 1971 (World Bank, World Development Indicator). Chik, Rahim, Studies (2012) conclude that CO2 emission intensity in the energy sector, Electricity has contributed the highest CO2 emission, while in non-energy sector; Transportation has contributed the highest CO2 emission in 2005. Malaysia’s initiative to combat the environmental issue based on energy use is by limiting and minimize the new energy intensive sector but will promote the energy efficiency and high production industries. According to Saboori, Sulaiman, Mohd (2012) Malaysia has experienced rapid transformation from an agriculture based economy to industrialization, and a significant rise in pollutant emissions, specifically CO2 emissions. In 2007 CO2 emissions in Malaysia were at 7.32 metric tons per capita while the world average was only 4.63 tons. It is proven that real GDP per capita and per capita CO2 emissions move closely together over time, implying a long-run or cointegrating relationship between them, as such econometric testing has been applied in my research to evidence the existence of the relationship. Thus it is justifiable to investigate the cointegration and causality issues between these two variables. 1.1.2 History of CO2 emissions in the Philippines CO2 emissions started in Philippines is a archipelago located in Southeast Asia and as a country that is full of islands and a sensitive ecosystem, Philippines also no stranger to the effects of global warming. Slightly changes in the environment can give big environmental disasters in Philippines. In 1994, 10,603 ktons of CO2 were released Industry sector. A major fraction (86%) of the industrial CO2 emissions comes from the cement and metal industries .Those emissions comes directly from industrial processed associated with manufacturing cement and metals, and excluded the power generation activities of these industries which are already accounted for in the Energy sector. This is related to the combined effect of GHG emissions came from the four sectors of Energy, Industry, Agriculture, and Wastes, and the net uptake (sink) of from the greenhouse gas emissions. Globally, this national amount is still minimal relative to the CO2 emissions from other developed countries parties to the UNFCCC. The greenhouse gas emissions in the energy sector which is largely from CO2 come mainly from fuel combustion. From this sector alone emitted 50,038 kt tons of equivalent CO2 in 1994 by Bureau Resources (2004). Fabian (2009) reported that local air pollution problems and the impacts of climate change as well will continue to plague the Philippines unless a new program for land-use and transportation planning is implemented. In Philippines transportation sector plays a main role in economic development and cities are often cited as the â€Å"engines† of growth of a country. Recent estimates of CO2 and particulate (PM) emissions in the Philippines show that in 2008, emissions of CO2 totalled 30 million tons and 56 thousand tons of particulate matter. CO2emissions from the transport sector accounted for 38 per cent of the total from fuel combustion in 2000. If the business-as-usual scenario prevails, the number of motorized vehicles will become double before the year 2020. Indoor air pollution in ASEAN member countries caused by incomplete burning of biomass and coal while the people cook in traditional cook stoves. As much as 90% of the biomass is consumed in the household sector in Philippines as Bhattacharya, (2000). A study done by Bhattacharya (2000) shows that 29.1Mt of CO2 was emitted from biomass combustion, whereas 50.2Mt was emitted from fossil fuel combustion in the Philippines in 1995. The increasing high emissions from the cook stoves are due to low efficiency and high emission factors. The average efficiency of the most widely available cook stoves is about 16 percent, using charcoal as fuel. A typical cook stove used in Thailand has an efficiency around 14 percent and emission factors (g/kg of fuel used) of 26.4 CO, 1596 CO2, 10CH4, and 0.120 Nox Bhattacharya et al. (2002). The emissions are not only is the heat from the burning wasted, but because of poorly designed chimneys, the indoor air pollution is more severe 1.1.3 History of CO2 emissions in Singapor Kluver and Weber (2003) stated that Singapore, is an island country has existed since 1965, when it was separated from the newly formed Republic of Malaysia, as a result of a fear by Malays of Singapore’s dominant Chinese ethnic group as well as a strategy in order to keep communism at arm’s length. Singapore done very well in the past decades of the twentieth century to rise from an enter port centre to be a global city and finally become a developed nation country. It had resolved most of the issues relating to underdevelopment and had developed the needed institutions to prepare its survival in the twenty-first century. Tan, Lean, Khan (2014) indicate a significant rise in CO2 emissions as GDP rose. Another study on a possible turning point shows that continuous growth will be necessary for a long time before we experience any trickle-down effects on environmental pollution. The results of causality analysis conclude that CO2 emissions indeed have caused decline in Singapore’s growth. It is therefore argued that strict regulatory regimes on environmental protection in the city–state must remain in force. Tan, Lean, Khan (2014) indicate a significant rise in CO2 emissions as GDP rose over the years confirming a short-run trade-off between environment and growth. Furthermore according to Sam (2010) with the absence of any significant agricultural land or landfill sites, Singapore has no problems with methane gases. CO2 is the primary greenhouse gas emitted in the city state is produced by the use of fossil fuels in power generation. Singapore’s CO2 is produced by industry (54%), transportation (19%), buildings (16%) and consumer households (9%).CO2 emissions in Singapore rose from an average 5.26 million tonnes per capita between 1970s to 1980s to 10.29 million tonnes per capita in the mid-1990s, and stabilizing at an average of 10.19 million tonnes per capita for the period of 1995 to 2008. Comparing with total global emissions, CO2 emissions in Singapore accounted for less than 0.2% although Singapores contribution has increased from an average of 0.07% in the 1970s and 1980s to 0.17% in 1991 to 2008. For instance Singapore has been considered a high emitter of greenhouse gases. The Energy Information Administration (EIA), which provides energy statistics to the United States government, indicated in its 2006 data that Singapore emitted 141 million tonnes of CO2. The EIA ranked Singapore as the 33rd highest emitter of greenhouse gases among 215 countries. Bradshaw, Giam (2010) indicate that from the recent study ranks Singapore as the worst environmental offender among 179 countries in terms of proportional environmental impact. Singapores poor ranking is attributed to its drive for economic development and urbanization that has led to high proportional natural forest loss and greater release of CO2.

Wednesday, November 13, 2019

Liberal Education: Why is it important in todays workforce? Essay

Why do college students need courses in the liberal arts? Is it beneficial or just a waste of time? Will it make them or influence them to become better workers once they graduate or will it just go down the drain and be useless? Student loans are increasing every year, and each student just wants to finish their degrees at a lesser price and a quicker pace, so they can start working and pay for those debts. In today’s society where some to most students are very much career – driven, they decide to specialize early on their degrees which means taking all the classes that are required in their respective majors. Students are only required to take minimal courses or subjects in the liberal arts such as humanities, philosophy, communication, etc. Also, students are more keen to focus on what they think or believe can offer high salary base pays professions especially in this current state of our economy. Even though students specialize early in the degree that they have chosen has its advantages, college students would benefit more if they are required to take core classes in the liberal arts to develop not only a well – rounded education but also prepare them for the real world. By taking subjects in the liberal arts along with their field of specialty, students will develop strong critical thinking skills that will be beneficial in problem solving once they have a job. They will also have competent oral and written communication skills that are necessary in any organization, and their creativity and innovation will be enhanced. Now, let us define liberal arts or liberal education. According to Michael Lind, liberal arts should be understood in its original sense as â€Å"elite skills† (54). We all know that liberal arts include cour... ...ergraduates Specialize?† The Chronicle of Higher Education. 2006. Rpt. in Current Issues and Enduring Questions. Sylvan Barnet and Hugo Bedau. Boston: Bedford/St. Martin’s, 2011. 555-557. Print. Jones, Roberts T. "Liberal Education For The Twenty-First Century." Liberal Education 91.2 (2005): 32. MasterFILE Complete. Web. 24 May 2012. Lemann, Nicholas. "Liberal Education & Professionals." Liberal Education 90.2 (2004): 12. MasterFILE Complete. Web. 24 May 2012. Lind, Michael. "The Global Race for Knowledge: Why the Liberal Arts Still Matter." Wilson Quarterly Vol. XXX, No. 4. Autumn 2006: 52-58. SIRS Issues Researcher. Web. 24 May 2012. Menand, Louis. â€Å"Re-imagining Liberal Education.† Education and Democracy. 1997. Rpt. in Current Issues and Enduring Questions. Sylvan Barnet and Hugo Bedau. Boston: Bedford/St. Martin’s , 2011. 571-574. Print.

Monday, November 11, 2019

Live and Let Live

The Hitchhikers Guide to the Internet 1 The Hitchhikers Guide to the Internet Ed Krol [email  protected] cso. uiuc. edu Get any book for free on: www. Abika. com Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet 2 This document was produced through funding of the National Science Foundation. Copyright (C) 1987, by the Board of Trustees of The University of Illinois. Permission to duplicate this document, in whole or part, is granted provided reference is made to the source and this copyright is included in whole copies. This document assumes that one is familiar with the workings of a non-connected simple IP network (e. . a few 4. 2 BSD systems on an Ethernet not connected to anywhere else). Appendix A contains remedial information to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the â€Å"oral tradition† of the Internet to the point that that net can be connected to the Internet with little dang er to either. It is not a tutorial, it consists of pointers to other places, literature, and hints which are not normally documented. Since the Internet is a dynamic environment, changes to this document will be made regularly. The author welcomes comments and suggestions.This is especially true of terms for the glossary (definitions are not necessary). In the beginning there was the ARPAnet, a wide area experimental network connecting hosts and terminal servers together. Procedures were set up to regulate the allocation of addresses and to create voluntary standards for the network. As local area networks became more pervasive, many hosts became gateways to local networks. A network layer to allow the interoperation of these networks was developed and called IP (Internet Protocol). Over time other groups created long haul IP based networks (NASA, NSF, states†¦ ). These nets, too, interoperate because of IP.The collection of all of these interoperating networks is the Internet. Two groups do much of the research and information work of the Internet (ISI and SRI). ISI (the Informational Sciences Institute) does much of the research, standardization, and allocation work of the Internet. SRI International provides information services for the Internet. In fact, after you are connected to the Internet most of the information in this document can be retrieved from the Network Information Center (NIC) run by SRI. Operating the Internet Each network, be it the ARPAnet, NSFnet or a regional network, has its own operations center.The ARPAnet is run by Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet BBN, Inc. under contract from DARPA. Their facility is called the Network Operations Center or NOC. Cornell University temporarily operates NSFnet (called the Network Information Service Center, NISC). It goes on to the -2regionals having similar facilities to monitor and keep watch over the goings on of their portion of the Internet. In addition, they all should have some knowledge of what is happening to the Internet in total.If a problem comes up, it is suggested that a campus network liaison should contact the network operator to which he is directly connected. That is, if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet†¦ ) and have a problem, you should contact your regional network operations center. 3 RFCs The internal workings of the Internet are defined by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel ([email  protected] edu).He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically of course). It may go through multiple revisions. Should it be generally accepted as a good idea, it will be assigned a number and filed with the RFCs. The RFCs can be divided into five groups: required, suggested, directional, informational and obsolete. Required RFC's (e. g. RFC-791, The Internet Protocol) must be implemented on any host connected to the Internet. Suggested RFCs are generally implemented by network hosts. Lack of them does not preclude access to the Internet, but may impact its usability.RFC-793 (Transmission Control Protocol) is a suggested RFC. Directional RFCs were discussed and agreed to, but their application has never come into wide use. This may be due to the lack of wide need for the specific application (RFC-937 The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891 Hello). It is suggested that should the facility be required by a particular site, animplementation be done in accordance with the RFC. This insures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable.Informational RFCs contain factual information about the Internet and its operation (RFC-990, Assigned Numbers). Finally, as the Internet and technology have grown, some RFCs have become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a new one to be issued obsoleting others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and subsequent RFCs Get any book for free on: www. Abika. comThe Hitchhikers Guide to the Internet on the topic. -3(Appendix B contains a list of what are considered to be the major RFCs necessary for understanding the Internet). 4 The Network Information Center The NIC is a facility available to all Internet users which provides information to the community. There are three means of NIC contact: network, telephone, and mail. The network accesses are t he most prevalent. Interactive access is frequently used to do queries of NIC service overviews, look up user and host names, and scan lists of NIC documents. It is available by using %telnet sri-nic. rpa on a BSD system and following the directions provided by a user friendly prompter. From poking around in the databases provided one might decide that a document named NETINFO:NUG. DOC (The Users Guide to the ARPAnet) would be worth having. It could be retrieved via an anonymous FTP. An anonymous FTP would proceed something like the following. (The dialogue may vary slightly depending on the implementation of FTP you are using). %ftp sri-nic. arpa Connected to sri-nic. arpa. 220 SRI_NIC. ARPA FTP Server Process 5Z(47)-6 at Wed 17-Jun-87 12:00 PDT Name (sri-nic. arpa:myname): anonymous 331 ANONYMOUS user ok, send real ident as password.Password: myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 12:01 PDT, job 15. ftp; get netinfo:nug. doc 200 Port 18. 144 at host 128. 174. 5. 50 a ccepted. 150 ASCII retrieve of NUG. DOC. 11 started. 226 Transfer Completed 157675 (8) bytes transferred local: netinfo:nug. doc remote:netinfo:nug. doc 157675 bytes in 4. 5e+02 seconds (0. 34 Kbytes/s) ftp; quit 221 QUIT command received. Goodbye. (Another good initial document to fetch is NETINFO:WHAT-THE-NIC-DOES. TXT)! Questions of the NIC or problems with services can be asked of or reported to using electronic mail. The following addresses can be used: [email  protected]ARPA requests [email  protected] ARPA General user assistance, document User registration and WHOIS updates Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet [email  protected] ARPA Hostname and domain changes and updates [email  protected] ARPA SRI-NIC computer operations [email  protected] ARPA Comments on NIC publications and services -4For people without network access, or if the number of documents is large, many of the NIC documents are available in printed form for a small charge. One frequently ordered document for starting sites is a compendium of major RFCs.Telephone access is used primarily for questions or problems with network access. (See appendix B for mail/telephone contact numbers). 5 The NSFnet Network Service Center The NSFnet Network Service Center (NNSC) is funded by NSF to provide a first level of aid to users of NSFnet should they have questions or encounter problems traversing the network. It is run by BBN Inc. Karen Roubicek ([email  protected] nsf. net) is the NNSC user liaison. The NNSC, which currently has information and documents online and in printed form, plans to distribute news through network mailing lists, bulletins, newsletters, and online reports.The NNSC also maintains a database of contact points and sources of additional information about NSFnet component networks and supercomputer centers. Prospective or current users who do not know whom to call concerning questions about NSFnet use, should contact the NN SC. The NNSC will answer general questions, and, for detailed information relating to specific components of the Internet, will help users find the appropriate contact for further assistance. (Appendix B) Mail Reflectors The way most people keep up to date on network news is through subscription to a number of mail reflectors.Mail reflectors are special electronic mailboxes which, when they receive a message, resend it to a list of other mailboxes. This in effect creates a discussion group on a particular topic. Each subscriber sees all the mail forwarded by the reflector, and if one wants to put his â€Å"two cents† in sends a message with the comments to the reflector†¦. The general format to subscribe to a mail list is to find the address reflector and append the string -REQUEST to the mailbox name (not the host name). For example, if you wanted to take part in the mailing list for NSFnet reflected by [email  protected]NSF. NET, one sends a request to Get any book f or free on: www. Abika. com The Hitchhikers Guide to the Internet [email  protected] NSF. NET. This may be a wonderful scheme, but the problem is that you must know the list exists in the first place. It is suggested that, if you are interested, you read the mail from one list (like NSFNET) and you will probably become familiar with the existence of others. A registration service for mail reflectors is provided by the NIC in the files NETINFO:INTEREST-GROUPS-1. TXT, NETINFO:INTEREST-GROUPS-2. TXT, and NETINFO:INTEREST-GROUPS3.TXT. The NSFNET mail reflector is targeted at those people who have a day to day interest in the news of the NSFnet (the backbone, regional network, and Internet inter-connection site workers). The messages are reflected by a central location and are sent as separate messages to each subscriber. This creates hundreds of messages on the wide area networks where bandwidth is the scarcest. There are two ways in which a campus could spread the news and not cause these messages to inundate the wide area networks. One is to re-reflect the message on the campus.That is, set up a reflector on a local machine which forwards the message to a campus distribution list. The other is to create an alias on a campus machine which places the messages into a notesfile on the topic. Campus users who want the information could access the notesfile and see the messages that have been sent since their last access. One might also elect to have the campus wide area network liaison screen the messages in either case and only forward those which are considered of merit. Either of these schemes allows one message to be sent to the campus, while allowing wide distribution within. Address Allocation Before a local network can be connected to the Internet it must be allocated a unique IP address. These addresses are allocated by ISI. The allocation process consists of getting an application form received from ISI. (Send a message to [email  protected] arpa and ask for the template for a connected address). This template is filled out and mailed back to hostmaster. An address is allocated and e-mailed back to you. This can also be done by postal mail (Appendix B). IP addresses are 32 bits long. It is usually written as four decimal numbers separated by periods (e. . , 192. 17. 5. 100). Each number is the value of an octet of the 32 bits. It was seen from the beginning that some networks might choose to organize themselves as very flat (one net with a lot of nodes) and some might organize hierarchically -6(many interconnected nets with fewer nodes each and a backbone). Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet To provide for these cases, addresses were differentiated into class A, B, and C networks. This classification had to with the interpretation of the octets.Class A networks have the first octet as a network address and the remaining three as a host address on that network. Class C addresses have thre e octets of network address and one of host. Class B is split two and two. Therefore, there is an address space for a few large nets, a reasonable number of medium nets and a large number of small nets. The top two bits in the first octet are coded to tell the address format. All of the class A nets have been allocated. So one has to choose between Class B and Class C when placing an order. (There are also class D (Multicast) and E (Experimental) formats.Multicast addresses will likely come into greater use in the near future, but are not frequently used now). In the past sites requiring multiple network addresses requested multiple discrete addresses (usually Class C). This was done because much of the software available (not ably 4. 2BSD) could not deal with subnetted addresses. Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet switches. Some of these nodes have a limited capability to store and exchange routing i nformation (limited to about 300 networks).Therefore, it is suggested that any campus announce (make known to the Internet) no more than two discrete network numbers. If a campus expects to be constrained by this, it should consider subnetting. Subnetting (RFC-932) allows one to announce one address to the Internet and use a set of addresses on the campus. Basically, one defines a mask which allows the network to differentiate between the network portion and host portion of the address. By using a different mask on the Internet and the campus, the address can be interpreted in multiple ways.For example, if a campus requires two networks internally and has the 32,000 addresses beginning 128. 174. X. X (a Class B address) allocated to it, the campus could allocate 128. 174. 5. X to one part of campus and 128. 174. 10. X to another. By advertising 128. 174 to the Internet with a subnet mask of FF. FF. 00. 00, the Internet would treat these two addresses as one. Within the campus a mask of FF. FF. FF. 00 would be used, allowing the campus to treat the addresses as separate entities. (In reality you don't pass the subnet mask of FF. FF. 00. 0 to the Internet, the octet meaning is implicit in its being a class B address). A word of warning is necessary. Not all systems know how to do subnetting. Some 4. 2BSD systems require additional software. 4. 3BSD systems subnet as released. Other devices -7and operating systems vary in the problems they have dealing with subnets. Frequently these machines can be used as a leaf on a network but not as a gateway within the subnetted portion of the network. As time passes and more systems become 4. 3BSD based, these problems should disappear. 7 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet There has been some confusion in the past over the format of an IP broadcast address. Some machines used an address of all zeros to mean broadcast and some all ones. This was confusing when machines of both type were connected to the same network. The broadcast address of all ones has been adopted to end the grief. Some systems (e. g. 4. 2 BSD) allow one to choose the format of the broadcast address. If a system does allow this choice, care should be taken that the all ones format is chosen. (This is explained in RFC-1009 and RFC-1010). 8Internet Problems There are a number of problems with the Internet. Solutions to the problems range from software changes to long term research projects. Some of the major ones are detailed below: Number of Networks When the Internet was designed it was to have about 50 connected networks. With the explosion of networking, the number is now approaching 300. The software in a group of critical gateways (called the core gateways of the ARPAnet) are not able to pass or store much more than that number. In the short term, core reallocation and recoding has raised the number slightly.By the summer of '88 the current PDP-11 core gateways will be replaced with BB N Butterfly gateways which will solve the problem. Routing Issues Along with sheer mass of the data necessary to route packets to a large number of networks, there are many problems with the updating, stability, and optimality of the routing algorithms. Much research is being done in the area, but the optimal solution to these routing problems is still years away. In most cases the the routing we have today works, but sub-optimally and sometimes unpredictably. -8-Trust Issues Gateways exchange network routing information. Currently, most gateways accept on faith that the information provided about the state of the network is correct. In the past this was not a big problem since most of the gateways belonged to a single administrative entity (DARPA). Now with multiple wide area networks under different administrations, a rogue gateway somewhere in the net could cripple the Internet. There is design work going on to solve both the problem of Get any book for free on: www. Abika. com T he Hitchhikers Guide to the Internet gateway doing unreasonable things and providing enough information to reasonably route data between multiply connected networks (multi-homed networks). Capacity & Congestion Many portions of the ARPAnet are very congested during the busy part of the day. Additional links are planned to alleviate this congestion, but the implementation will take a few months. 9 These problems and the future direction of the Internet are determined by the Internet Architect (Dave Clark of MIT) being advised by the Internet Activities Board (IAB).This board is composed of chairmen of a number of committees with responsibility for various specialized areas of the Internet. The committees composing the IAB and their chairmen are: Committee Chair Autonomous Networks Deborah Estrin End-to-End Services Bob Braden Internet Architecture Dave Mills Internet Engineering Phil Gross EGP2 Mike Petry Name Domain Planning Doug Kingston Gateway Monitoring Craig Partridge Internic Jake Feinler Performance & Congestion ControlRobert Stine NSF Routing Chuck Hedrick Misc. MilSup Issues Mike St.Johns Privacy Steve Kent IRINET Requirements Vint Cerf Robustness & Survivability Jim Mathis Scientific Requirements Barry Leiner Note that under Internet Engineering, there are a set of task forces and chairs to look at short term concerns. The chairs of these task forces are not part of the IAB. -9Routing Routing is the algorithm by which a network directs a packet from its source to its destination. To appreciate the problem, watch a small child trying to find a table in a restaurant. From the adult point of view the structure of the dining room is seen and an optimal route easily chosen.The child, however, is presented with a set of paths between tables where a good path, let alone the optimal one to the goal is not discernible. *** A little more background might be appropriate. IP gateways (more correctly routers) are boxes which have connections to multiple networks and pass traffic between these nets. They decide how the packet is to be sent based on the information in the IP header of the packet and the state of the network. Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Each interface on a router has an unique address appropriate to the network to which it is connected.The information in the IP header which is used is primarily the destination address. Other information (e. g. type of service) is largely ignored at this time. The state of the network is determined by the routers passing information among themselves. The distribution of the database (what each node knows), the form of the updates, and metrics used to measure the value of a connection, are the parameters which determine the characteristics of a routing protocol. Under some algorithms each node in the network has complete knowledge of the state of the network (the adult algorithm).This implies the nodes must have larger amounts of local storage and enough CPU to search the large tables in a short enough time (remember this must be done for each packet). Also, routing updates usually contain only changes to the existing information (or you spend a large amount of the network capacity passing around megabyte routing updates). This type of algorithm has several problems. Since the only way the routing information can be passed around is across the network and the propagation time is non-trivial, the view of the network at each node is a correct historical view of the network at varying times in the past. The adult algorithm, but rather than looking directly at the dining area, looking at a photograph of the dining room. One is likely to pick the optimal route and find a bus-cart has moved in to block the path after the photo was taken). These inconsistencies can cause circular routes (called routing loops) where once a packet enters it is routed in a closed path until its time to live (TTL) field expires and it is discarded. Other algorithms may know about only a subset of the network. To prevent loops in these protocols, they are usually used in a hierarchical network.They know completely about their own area, but to leave that area they go to one particular place (the default gateway). Typically these are used in smaller networks (campus, regional†¦ ). -10Routing protocols in current use: Static (no protocol-table/default routing) Don't laugh. It is probably the most reliable, easiest to implement, and least likely to get one into trouble for a small network or a leaf on the Internet. This is, also, the only method available on some CPU-operating system combinations.If a host is connected to an Ethernet which has only one gateway off of it, one should make that the default gateway for the host and do no other routing. (Of course that gateway may pass the reachablity information somehow on the other side of itself). One word of warning, it is only with extreme caution that one should use static ro utes in the middle of a network 10 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet which is also using dynamic routing. The routers passing dynamic information are sometimes confused by conflicting dynamic and static routes.If your host is on an ethernet with multiple routers to other networks on it and the routers are doing dynamic routing among themselves, it is usually better to take part in the dynamic routing than to use static routes. 11 RIP RIP is a routing protocol based on XNS (Xerox Network System) adapted for IP networks. It is used by many routers (Proteon, cisco, UB†¦ ) and many BSD Unix systems BSD systems typically run a program called â€Å"routed† to exchange information with other systems running RIP. RIP works best for nets of small diameter where the links are of equal speed.The reason for this is that the metric used to determine which path is best is the hop-count. A hop is a traversal across a gateway. So, all machin es on the same Ethernet are zero hops away. If a router connects connects two networks directly, a machine on the other side of the router is one hop away†¦. As the routing information is passed through a gateway, the gateway adds one to the hop counts to keep them consistent across the network. The diameter of a network is defined as the largest hop-count possible within a network. Unfortunately, a hop count of 16 is defined as infinity in RIP meaning the link is down.Therefore, RIP will not allow hosts separated by more than 15 gateways in the RIP space to communicate. The other problem with hop-count metrics is that if links have different speeds, that difference is not -11reflected in the hop-count. So a one hop satellite link (with a . 5 sec delay) at 56kb would be used instead of a two hop T1 connection. Congestion can be viewed as a decrease in the efficacy of a link. So, as a link gets more congested, RIP will still know it is the best hop-count route and congest it eve n more by throwing more packets on the queue for that link.The protocol is not well documented. A group of people are working on producing an RFC to both define the current RIP and to do some extensions to it to allow it to better cope with larger networks. Currently, the best documentation for RIP appears to be the code to BSD â€Å"routed†. Routed The ROUTED program, which does RIP for 4. 2BSD systems, Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet has many options. One of the most frequently used is: â€Å"routed -q† (quiet mode) which means listen to RIP information but never broadcast it.This would be used by a machine on a network with multiple RIP speaking gateways. It allows the host to determine which gateway is best (hopwise) to use to reach a distant network. (Of course you might want to have a default gateway to prevent having to pass all the addresses known to the Internet around with RIP). There are two ways to insert stat ic routes into â€Å"routed†, the â€Å"/etc/gateways† file and the â€Å"route add† command. Static routes are useful if you know how to reach a distant network, but you are not receiving that route using RIP. For the most part the â€Å"route add† command is preferable to use.The reason for this is that the command adds the route to that machine's routing table but does not export it through RIP. The â€Å"/etc/gateways† file takes precedence over any routing information received through a RIP update. It is also broadcast as fact in RIP updates produced by the host without question, so if a mistake is made in the â€Å"/etc/gateways† file, that mistake will soon permeate the RIP space and may bring the network to its knees. One of the problems with â€Å"routed† is that you have very little control over what gets broadcast and what doesn't.Many times in larger networks where various parts of the network are under different administr ative controls, you would like to pass on through RIP only nets which you receive from RIP and you know are reasonable. This prevents people from adding IP addresses to the network which may be illegal and you being responsible for passing them on to the Internet. This -12type of reasonability checks are not available with â€Å"routed† and leave it usable, but inadequate for large networks. 12 Hello (RFC-891) Hello is a routing protocol which was designed and implemented in a experimental software router called a â€Å"Fuzzball† hich runs on a PDP-11. It does not have wide usage, but is the routing protocol currently used on the NSFnet backbone. The data transferred between nodes is similar to RIP (a list of networks and their metrics). The metric, however, is milliseconds of delay. This allows Hello to be used over nets of various link speeds and performs better in congestive situations. One of the most interesting side effects of Hello based networks is their great timekeeping ability. If you consider the problem of measuring delay on a link for the metric, you find that it is not an easy thing toGet any book for free on: www. Abika. com The Hitchhikers Guide to the Internet do. You cannot measure round trip time since the return link may be more congested, of a different speed, or even not there. It is not really feasible for each node on the network to have a builtin WWV (nationwide radio time standard) receiver. So, you must design an algorithm to pass around time between nodes over the network links where the delay in transmission can only be approximated. Hello routers do this and in a nationwide network maintain synchronized time within milliseconds. 13Exterior Gateway Protocol (EGP RFC-904) EGP is not strictly a routing protocol, it is a reachability protocol. It tells only if nets can be reached through a particular gateway, not how good the connection is. It is the standard by which gateways to local nets inform the ARPAnet of the net s they can reach. There is a metric passed around by EGP but its usage is not standardized formally. Its typical value is value is 1 to 8 which are arbitrary goodness of link values understood by the internal DDN gateways. The smaller the value the better and a value of 8 being unreachable.A quirk of the protocol prevents distinguishing between 1 and 2, 3 and 4†¦ , so the usablity of this as a metric is as three values and unreachable. Within NSFnet the values used are 1, 3, and unreachable. Many routers talk EGP so they can be used for ARPAnet gateways. -13Gated So we have regional and campus networks talking RIP among themselves, the NSFnet backbone talking Hello, and the DDN speaking EGP. How do they interoperate? In the beginning there was static routing, assembled into the Fuzzball software configured for each site.The problem with doing static routing in the middle of the network is that it is broadcast to the Internet whether it is usable or not. Therefore, if a net beco mes unreachable and you try to get there, dynamic routing will immediately issue a net unreachable to you. Under static routing the routers would think the net could be reached and would continue trying until the application gave up (in 2 or more minutes). Mark Fedor of Cornell ([email  protected] tn. cornell. edu) attempted to solve these problems with a replacement for â€Å"routed† called â€Å"gated†. â€Å"Gated† talks RIP to RIP speaking hosts, EGP to EGP speakers, and Hello to Hello'ers.These speakers frequently all live on one Ethernet, but luckily (or unluckily) cannot understand each others ruminations. In addition, under configuration file control it can filter the conversion. For example, one can produce a Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet configuration saying announce RIP nets via Hello only if they are specified in a list and are reachable by way of a RIP broadcast as well. This means that if a rogue network appears in your local site's RIP space, it won't be passed through to the Hello side of the world.There are also configuration options to do static routing and name trusted gateways. This may sound like the greatest thing since sliced bread, but there is a catch called metric conversion. You have RIP measuring in hops, Hello measuring in milliseconds, and EGP using arbitrary small numbers. The big questions is how many hops to a millisecond, how many milliseconds in the EGP number 3†¦. Also, remember that infinity (unreachability) is 16 to RIP, 30000 or so to Hello, and 8 to the DDN with EGP. Getting all these metrics to work well together is no small feat.If done incorrectly and you translate an RIP of 16 into an EGP of 6, everyone in the ARPAnet will still think your gateway can reach the unreachable and will send every packet in the world your way. For these reasons, Mark requests that you consult closely with him when configuring and using â€Å"gated†. -14â € ³Names† All routing across the network is done by means of the IP address associated with a packet. Since humans find it difficult to remember addresses like 128. 174. 5. 50, a symbolic name register was set up at the NIC where people would say â€Å"I would like my host to be named ‘uiucuxc'†.Machines connected to the Internet across the nation would connect to the NIC in the middle of the night, check modification dates on the hosts file, and if modified move it to their local machine. With the advent of workstations and micros, changes to the host file would have to be made nightly. It would also be very labor intensive and consume a lot of network bandwidth. RFC-882 and a number of others describe domain name service, a distributed data base system for mapping names into addresses. We must look a little more closely into what's in a name. First, note that an address specifies a particular connection on a specific network.If the machine moves, the address c hanges. Second, a machine can have one or more names and one or more network addresses (connections) to different networks. Names point to a something which does useful work (i. e. the machine) and IP addresses point to an interface on that provider. A name is a purely symbolic representation of a list of addresses on the network. If a machine moves to a different network, the addresses will change but the name could remain the same. Domain names are tree structured names with the root of the tree at the right. For example: 14 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet 15 uxc. cso. uiuc. edu is a machine called ‘uxc' (purely arbitrary), within the subdomains method of allocation of the U of I) and ‘uiuc' (the University of Illinois at Urbana), registered with ‘edu' (the set of educational institutions). A simplified model of how a name is resolved is that on the user's machine there is a resolver. The resolver knows how to contac t across the network a root name server. Root servers are the base of the tree structured data retrieval system. They know who is responsible for handling first level domains (e. g. ‘edu').What root servers to use is an installation parameter. From the root server the resolver finds out who provides ‘edu' service. It contacts the ‘edu' name server which supplies it with a list of addresses of servers for the subdomains (like ‘uiuc'). This action is repeated with the subdomain servers until the final subdomain returns a list of addresses of interfaces on the host in question. The user's machine then has its choice of which of these addresses to use for communication. -15A group may apply for its own domain name (like ‘uiuc' above). This is done in a manner similar to the IP address allocation.The only requirements are that the requestor have two machines reachable from the Internet, which will act as name servers for that domain. Those servers could also act as servers for subdomains or other servers could be designated as such. Note that the servers need not be located in any particular place, as long as they are reachable for name resolution. (U of I could ask Michigan State to act on its behalf and that would be fine). The biggest problem is that someone must do maintenance on the database. If the machine is not convenient, that might not be done in a timely fashion.The other thing to note is that once the domain is allocated to an administrative entity, that entity can freely allocate subdomains using what ever manner it sees fit. The Berkeley Internet Name Domain (BIND) Server implements the Internet name server for UNIX systems. The name server is a distributed data base system that allows clients to name resources and to share that information with other network hosts. BIND is integrated with 4. 3BSD and is used to lookup and store host names, addresses, mail agents, host information, and more. It replaces the â€Å"/etc/ho sts† file for host name lookup.BIND is still an evolving program. To keep up with reports on operational problems, future design decisions, etc, join the BIND mailing list by sending a request to â€Å"[email  protected] Berkeley. EDU†. BIND can also be obtained via anonymous FTP from ucbarpa. berkley. edu. There are several advantages in using BIND. One of the most important is that it frees a host from relying on â€Å"/etc/hosts† Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet being up to date and complete. Within the . uiuc. edu domain, only a few hosts are included in the host table distributed by SRI.The remainder are listed locally within the BIND tables on uxc. cso. uiuc. edu (the server machine for most of the . uiuc. edu domain). All are equally reachable from any other Internet host running BIND. BIND can also provide mail forwarding information for interior hosts not directly reachable from the Internet. These hosts c an either be on non-advertised networks, or not connected to a network at all, as in the case of UUCP-reachable hosts. More information on BIND is available in the â€Å"Name Server Operations Guide for BIND† in â€Å"UNIX System Manager's Manual†, 4. 3BSD release.There are a few special domains on the network, like SRINIC. ARPA. The ‘arpa' domain is historical, referring to hosts registered in the old hosts database at the NIC. There are others of the form NNSC. NSF. NET. These special domains are used sparingly and require ample justification. They refer to servers under the administrative control of -16the network rather than any single organization. This allows for the actual server to be moved around the net while the user interface to that machine remains constant. That is, should BBN relinquish control of the NNSC, the new provider would be pointed to by that name.In actuality, the domain system is a much more general and complex system than has been descr ibed. Resolvers and some servers cache information to allow steps in the resolution to be skipped. Information provided by the servers can be arbitrary, not merely IP addresses. This allows the system to be used both by non-IP networks and for mail, where it may be necessary to give information on intermediate mail bridges. 16 What's wrong with Berkeley Unix University of California at Berkeley has been funded by DARPA to modify the Unix system in a number of ways.Included in these modifications is support for the Internet protocols. In earlier versions (e. g. BSD 4. 2) there was good support for the basic Internet protocols (TCP, IP, SMTP, ARP) which allowed it to perform nicely on IP ethernets and smaller Internets. There were deficiencies, however, when it was connected to complicated networks. Most of these problems have been resolved under the newest release (BSD 4. 3). Since it is the springboard from which many vendors have launched Unix implementations (either by porting the existing code or by using it as a model), many implementations (e. g.Ultrix) are still based on BSD 4. 2. Therefore, many implementations still exist with the BSD 4. 2 problems. As time goes on, when BSD 4. 3 trickles through Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet vendors as new release, many of the problems will be resolved. Following is a list of some problem scenarios and their handling under each of these releases. ICMP redirects Under the Internet model, all a system needs to know to get anywhere in the Internet is its own address, the address of where it wants to go, and how to reach a gateway which knows about the Internet.It doesn't have to be the best gateway. If the system is on a network with multiple gateways, and a host sends a packet for delivery to a gateway which feels another directly connected gateway is more appropriate, the gateway sends the sender a message. This message is an ICMP redirect, which politely says â€Å"I' ll deliver this message for you, but you really ought to use that gateway over there to reach this host†. BSD 4. 2 ignores these messages. This creates more stress on the gateways and the local network, since for every packet -17sent, the gateway sends a packet to the originator.BSD 4. 3 uses the redirect to update its routing tables, will use the route until it times out, then revert to the use of the route it thinks is should use. The whole process then repeats, but it is far better than one per packet. Trailers An application (like FTP) sends a string of octets to TCP which breaks it into chunks, and adds a TCP header. TCP then sends blocks of data to IP which adds its own headers and ships the packets over the network. All this prepending of the data with headers causes memory moves in both the sending and the receiving machines.Someone got the bright idea that if packets were long and they stuck the headers on the end (they became trailers), the receiving machine could pu t the packet on the beginning of a page boundary and if the trailer was OK merely delete it and transfer control of the page with no memory moves involved. The problem is that trailers were never standardized and most gateways don't know to look for the routing information at the end of the block. When trailers are used, the machine typically works fine on the local network (no gateways involved) and for short blocks through gateways (on which trailers aren't used).So TELNET and FTP's of very short files work just fine and FTP's of long files seem to hang. On BSD 4. 2 trailers are a boot option and one should make sure they are off when using the Internet. BSD 4. 3 negotiates trailers, so it uses them on its local net and doesn't use them when going across the network. 17 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Retransmissions TCP fires off blocks to its partner at the far end of the connection. If it doesn't receive an acknowledgement in a re asonable amount of time it retransmits the blocks.The determination of what is reasonable is done by TCP's retransmission algorithm. There is no correct algorithm but some are better than others, where better is measured by the number of retransmissions done unnecessarily. BSD 4. 2 had a retransmission algorithm which retransmitted quickly and often. This is exactly what you would want if you had a bunch of machines on an ethernet (a low delay network of large bandwidth). If you have a network of relatively longer delay and scarce bandwidth (e. g. 56kb lines), it tends to retransmit too aggressively.Therefore, it makes the networks and gateways pass more traffic than is really necessary for a given conversation. Retransmission algorithms do adapt to the delay of the network -18after a few packets, but 4. 2's adapts slowly in delay situations. BSD 4. 3 does a lot better and tries to do the best for both worlds. It fires off a few retransmissions really quickly assuming it is on a low delay network, and then backs off very quickly. It also allows the delay to be about 4 minutes before it gives up and declares the connection broken. -19Appendix A References to Remedial Information 18Quaterman and Hoskins, â€Å"Notable Computer Networks†, Communications of the ACM, Vol 29, #10, pp. 932-971 (October, 1986). Tannenbaum, Andrew S. , Computer Networks, Prentice Hall, 1981. Hedrick, Chuck, Introduction to the Internet Protocols, Anonymous FTP from topaz. rutgers. edu, directory pub/tcp-ip-docs, file tcp-ip-intro. doc. -20Appendix B List of Major RFCs RFC-768 RFC-791 RFC-792 RFC-793 RFC-821 User Datagram Protocol (UDP) Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) Simple Mail Transfer Protocol (SMTP) Get any book for free on: www. Abika. com The Hitchhikers Guide to the InternetRFC-822 RFC-854 RFC-917 * RFC-919 * RFC-922 * Subnets RFC-940 * RFC-947 * RFC-950 * RFC-959 RFC-966 * Protocol RFC-988 * RFC-997 * RF C-1010 * RFC-1011 * Standard for the Format of ARPA Internet Text Messages Telnet Protocol Internet Subnets Broadcasting Internet Datagrams Broadcasting Internet Datagrams in the Presence of Toward an Internet Standard Scheme for Subnetting Multi-network Broadcasting within the Internet Internet Standard Subnetting Procedure File Transfer Protocol (FTP) Host Groups: A Multicast Extension to the Internet Host Extensions for IP Multicasting Internet Numbers Assigned Numbers Official ARPA-Internet Protocols 9 RFC's marked with the asterisk (*) are not included in the 1985 DDN Protocol Handbook. Note: This list is a portion of a list of RFC's by topic retrieved from the NIC under NETINFO:RFC-SETS. TXT (anonymous FTP of course). The following list is not necessary for connection to the Internet, but is useful in understanding the domain system, mail system, and gateways: RFC-882 RFC-883 RFC-973 RFC-974 RFC-1009 Domain Names – Concepts and Facilities Domain Names – Implement ation Domain System Changes andObservations Mail Routing and the Domain System Requirements for Internet Gateways -21Appendix C Contact Points for Network Information Network Information Center (NIC) DDN Network Information Center SRI International, Room EJ291 333 Ravenswood Avenue Menlo Park, CA 94025 (800) 235-3155 or (415) 859-3695 [email  protected] ARPA NSF Network Service Center (NNSC) NNSC BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 (617) 497-3400 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet[email  protected] NSF. NET -22Glossary core gateway The innermost gateways of the ARPAnet. These gateways have a total picture of the reachability to all networks known to the ARPAnet with EGP. They then redistribute reachability information to all those gateways speaking EGP. It is from them your EGP agent (there is one acting for you somewhere if you can reach the ARPAnet) finds out it can reach all the nets on the ARPAnet. Which is th en passed to you via Hello, gated, RIP†¦. ount to infinity The symptom of a routing problem where routing information is passed in a circular manner through multiple gateways. Each gateway increments the metric appropriately and passes it on. As the metric is passed around the loop, it increments to ever increasing values til it reaches the maximum for the routing protocol being used, which typically denotes a link outage. hold down When a router discovers a path in the network has gone down announcing that that path is down for a minimum amount of time (usually at least two minutes).This allows for the propagation of the routing information across the network and prevents the formation of routing loops. split horizon When a router (or group of routers working in consort) accept routing information from multiple external networks, but do not pass on information learned from one external network to any others. This is an attempt to prevent bogus routes to a network from being pr opagated because of gossip or counting to infinity. -23- 20 Get any book for free on: www. Abika. com