Featured Post
How to Choose the Right College Major
The most effective method to Choose the Right College Major A school major is the principle subject that an understudy considers while go...
Sunday, March 29, 2020
Battle of Verdun
Battle of Verdun Introduction Beginning February 21 to December 1916 the Battle of Verdun can be considered one of the largest battles fought during WWI between France and Germany with a total combined death count of 698,000 on both sides (Horne, 1994). Based on the account of Alistair Horne in his book The Price of Glory this paper will elaborate and examine some of the more interesting facets of the war involving pride, nationalism and the de-humanization of combatants brought about by the combination of such factors. Going even further into human aspect of the war elaborated on by Horne, this paper will examine the reasons that drove both combatants to fight over what was basically a useless piece of land and how the end result was nothing more than a war of costly attrition with a pyrrhic victory at the end.Advertising We will write a custom essay sample on Battle of Verdun specifically for you for only $16.05 $11/page Learn More Pride and Verdun When examining the accou nt of Horne regarding the Battle of Verdun it becomes obvious that the entire context of the battle itself was one of pride between two contenders that entered into what can be roughly described as a pissing contest between two countries. For example, if you were to observe the greater context of the First World War it becomes immediately obvious that there was very little to be gained from Germany attacking Verdun while at the same time France had little to lose from merely allowing Germany to take Verdun. The area wasnt situated in what can be described as a strategically viable position in terms of allowing Germany to push further into France nor would holding the area allow the French army to cut off any German supply routes or allow the Germans to access any viable resources from the region since Verdun itself held little, if any, war potential in terms of munitions factories or stockpiled resources. Based on the account of Horne it can be seen that Verdun was a matter of pride between the actors wherein it became a symbol of French resistance against German incursions while at the same time it was a way of showing Germanys resolve in winning the war. Going even further back to understand that factors that lead to irrational exuberance that permeated this desire to go to war over what can be described as a worthless piece of land, one would come across a variety of historical snippets (as indicated by Horne) which show that the land itself was heavily contested between the French and Germans even before the start of WWI. This in itself is quite interesting especially when overlaying the nationalism that was used as a factor to drive the inexorable war machine forward it can be seen that when nationalism meets pride minor disagreements can often erupt into major conflicts resulting in the deaths of hundreds of thousands of people.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Despite the overwhelming loss of life on both sides over something that had nothing to do with actually winning the war it can be seen from the account of Horne that extreme nationalism urged both sides to keep on fighting with German Field Marshall Von Falkenhayn famously saying that they would bleed the French white. What is interesting about this particular account of the war is that when taking it and overlaying it in the greater context of wars within human society it can be seen that a lot of them were a direct result of pride and nationalism taking precedence over common sense and practicality. Even in the modern day era with the current war on terror it can be seen that a large percentage of radical Islamic militants turn towards terrorism due to feelings related to nationalism and the desire to protect their traditional way of life. Nationalism and Inhuman Treatment Continuing the in the same vein of though regarding nationalism, pride and how these fueled the battle of Verdun it is quite interesting to note that it was also during this particular battle that the first recorded instance of poison gas was utilized. This is an important factor to take into consideration since when you combine its usage with the various de-humanizing aspects related to the battle itself it becomes all to obvious that nationalism and pride taken to its zenith enables countries to not think of the ethical and moral considerations of war (as explained by Horne when he elaborated on the various human factors behind and during the battle of Verdun) and as a result dehumanizes the enemy enabling the most atrocious of actions to become acceptable all for the sake of winning. This is particularly enlightening especially when taking into consideration the inherently hypocritical noble and just reasoning elaborated on by state leaders and generals at time regarding the justness of their cause in the face of thousands of deaths. Such a method of justifying atrocities h as actually been endemic in countries such as France and Germany in the past wherein the Crusades (various attempts at retaking the Christian Holy Land from Muslim hands which resulted in millions of deaths on both sides) were fueled by religious fervor.Advertising We will write a custom essay sample on Battle of Verdun specifically for you for only $16.05 $11/page Learn More In the present religion has been replaced by nationalism however it is no less effective in justifying the deaths of thousands all for the sake of a just cause. Pyrrhic victory The last and but not the least most interesting aspect of the account of Horne was that in the end both sides gained nothing from the battle of Verdun and for the French it was nothing more than a pyrrhic victory while for the Germans they actually accomplished what they set out to do and that was to ââ¬Å"bleed the French whiteâ⬠(however in terms of an overall military victory the French actually ââ¬Å" wonâ⬠at Verdun since the Germans were unable to either capture the city of Verdun nor were they able to inflict greater causalities to the French). First and foremost what you have to understand is that despite the sheer amount of deaths on both sides by end of the Battle on December 1916 both sides were quite literally at the same fronts they were in when the battle started in the first place. Thus, from a certain perspective, it can be surmised that the entire battle was useless from start to finish since neither side actually were able to advance, both suffered costly causalities that hampered their war potential and in the end the battle itself was fought for reasons that are both incredibly selfish and can even be described as incredibly stupid given the amount of people died for them. Conclusion Based on the account of Horne and the opinions presented in this paper it can be stated that the entire battle of Verdun was a complete was of human life and shows how nationalis m and pride can lead to actions that can basically be described as insanely stupid. Reference List Horne, A. (1994). The price of glory: Verdun 1916.
Saturday, March 7, 2020
ââ¬ÅThe effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networksââ¬Â The WritePass Journal
ââ¬Å"The effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networksâ⬠1. Introduction: ââ¬Å"The effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networksâ⬠1. Introduction:2. Background:3. Problem Description:4. Current Status and Development:4.1 Literature or Technology Survey and Analysis:References:Related 1. Introduction: Utilization of Bandwidth Efficiently is the most Challenging factor, in todayââ¬â¢s IT Revolution. Providing security for the data transmission over wired and wireless networks is again a very important factor in order to avoid piracy, illegal and unauthorized accesses. Here we are investigating the effect of WPA2 security technique on the IP addressing schemes with the client-server configuration on Windows 7 Windows Server 2008 and Windows XP Windows Server 2008 Operating systems respectively.à When comparing the techniques each other, we need to enable and disable the encryption techniques used respectively, in order to study the proper impact of security techniques on the performance of the 802.11n wireless networks. The most important factor is to provide the better security for the data transmission over wired and wireless communication with less processing time and should use the low bandwidth as much as possible without reducing the performance; and also security is the main factor which decreases the performance of the setup by increasing the processing time [8]. This also leads in decreasing the system throughput. Providing the better security with efficient utilization of bandwidth with reduced processing time during the transmission of data, will become the most effective and supportive step for todayââ¬â¢s growing IT World. IPv6 replaced IPv4 as IPv4 has failed to provide enough IP addresses to all the end user systems. Recently developed operating systems by different organizations support both IPv4 and IPv6 Protocol Stacks and Infrastructures [2]. 802.11n IEEE standard is the recent development by the IEEE group, in the Wireless Fidelity category [9]. This standard provides the improved bandwidth compared to previous wireless standards. 802.11n is able to provide the improved bandwidth as it utilizes multiple antennas and wireless signals technology ââ¬â The MIMO technology, where the other previous version of IEEE standards were not using this technique for the Data Transmission and Reception. 802.11n standard was finalized on nov-2009 [9]. After the successful development of 802.11n, the industries started implementing the wireless devices that provides and supports the data transmission rate more than 100Mbps in the current real world, which is the much more compared to any other wireless standards previously developed. This is one of main advantages of the 802.11n. IPv6 is replaced by IPv4, which is new and have also been upgraded in newly developed operating systems. Windows 7 is the most recent successful development by the Microsoft Windows organization which works on both IPv4 and IPv6 addressing schemes. Most of the companies have decided to move to the new operating systems like Windows 7. Some of the companies and organizations are still using Windows XP which runs on IPv4 addressing scheme [6]. Some of the companies are addicted to Windows vista even though Vista has few bad reviews and disadvantages compared to newly developed operating systems. The working of Vista and Windows 7 are almost same. Windows Server 2008 is the new and advanced version of Microsoft [6]. This has many upgraded features, technologies, better authentication and rights of admission controls and also the added active directory services as compared to the other previous versions of Server Operating Systems from the Microsoft [6]. WPA (Wireless Protected Access) and WPA2 are the security protocols used in securing the data from unauthorized accesses during Data Communication, in Wireless Computer networks[10]. This was developed by ââ¬ËWi-Fi Allianceââ¬â¢. This was developed in order to overcome the disadvantages and solve the queries that were found during research on WEP technique in various organizations and institutes as well. This WPA2 technique provides better encryption than WEP, and consists of more advanced features and techniques [10]. 2. Background: In 2009, Samad Salehi Kolahi, and the co-authors et al [1] conducted aà study on Impact of Security on the IPv4 and IPv6 using 802.11n Wireless LAN on Windows Vista, Windows Server 2008 and Windows XP operating systems[1]. The main contribution of their paper was to compare the performance of IPv4 and IPv6 on a client-server configuration, in wireless 802.11n networks, using the operating systems likeà Windows Vista, Windows Server 2008, Windows XP and Windows Server 2008. WPA2 security encryption technique was used and then they compared the outputs with the open system 802.11n networks [1]. This paper gave me the motivation to compare and verify the performances of both IP addressing schemes and the outputs on different operating systems, when the MTU is increased and to compare the time taken to transmit the data (ex: how much time does setup1 and setup2 takes to transmit the 1Gigabyte of data respectively and compare them with each other). MTU (Maximum Transmission Unit) is a protocol which used in the higher layers. This protocol forwards the data using MTU parameters; these parameters are always associated with the communication interface like network interface card, serial and parallel ports [13]. The MTU size is fixed by the standards or protocols which are used. For a larger MTU, the packets contain data where the protocol headers and delays are remaining fixed. The efficiency of the MTU is calculated when we use bulk data throughput. The Per-Packet-Processing technique used in this protocol may limit the performance of the system. Usually when large packets are being transmitted the transmission link used appears to be slow for some amount of time [13]. This Latency may become a factor in decreasing the overall efficiency of the setup. Sometimes when transmitting the larger packets due to some communication errors which cause the data bit loss in the arrived packets at the destination, irrespective of the error i s present in all of the bits or in a single bit or in some bits of the packet, whole packet has to be retransmitted, this retransmission takes much time which is again a main factor which decreases the throughput of the setup also causes increased MAC delay. The retransmission of IP packet can be done without the fragmentation technique [13]; this fragmentation includes only the IP header except all other low level headers of the OSI layers. The minimum size of reassembled packet for IPv4 is 576 and IPv6 is 1500 bytes. The MTU for a wireless 802.11 networks is 2272 bytes [13]. 3. Problem Description: The above diagram shows the client-server configuration setup, the server is connected to the 802.11n wireless access point using a CAT 5e straight through cable. The client is connected to the access point using 802.11n NIC (Network Interface Card). Here we are investigating the performance of the 802.11n in different phases. In the phase 1, Step1: The Server is installed with Windows Server 2008, and client is installed with windows 7 operating system. IPv4 addressing scheme is used here in this step, no encryption technique is used during the data transmission to verify the throughput of the setup without any security encryption to verify the performance, and also to investigate the performance when MTU is increased beyond the range of 128ââ¬â1408 bytes. Step2: Here in this step the Server is installed with Windows Server 2008, and client is installed with windows 7 operating system. IPv6 addressing scheme is used instead of IPv4 addressing, no encryption technique is used during the data transmission to verify how the security factors affect the throughput performance, and also the performance when MTU is increased. Step3: Here in this step the server remains with the same operating system à and client as well, the IPv4 addressing scheme is used again instead of IPv6 but the à WPA2 encryption technique is enabled. Encrypted data is transmitted in order to verify the weather the security factor affect the throughput performance and also the time taken to transmit the encrypted data and this time is compared with the time taken in the steps 1 and 2 respectively fro different MTU ranges. Step4: The Server operating system remains same with windows server 2008, and client with the Windows 7, but the IP addressing scheme is changed back to the IPv6 then the WPA2 encryption technique is used for the transmitting data, and the outputs are measured and compared with the results of the above steps. The outputs obtained from all the above 4 steps are compared with each other to decide which Operating system configuration and IP addressing schemes going to provide the required high throughput and better performance by plotting the respective graphs to the obtained respective outputs; and also how does the encryption technique impact on the performance of the IPv4 and IPv6 in Wireless 802.11n Networks and the system output as well. In the Phase 2, Step1: Windows Server 2008 is installed in the server, and client is installed with windows XP. First the IPv4 addressing scheme is used, no encryption technique is used all the encryption techniques are disabled during the data transmission to investigate the time taken to transmit data and verify the Throughput as well, and also the performance of the system when MTU is increased. Step2: The Server is installed with Windows Server 2008, and client operating system will be Windows XP. We are using IPv6 addressing scheme instead of IPv4, all the encryption techniques are disabled during the data transmission to verify whether the security factors affect the throughput performance, and also the performance when MTU (Maximum Transmission Unit) à is increased beyond its maximum limit with respect to the operating system used. Step3: Here in this step the Server operating system will be Windows server 2008, but the client operating system is installed with Windows XP, the IPv6 addressing scheme is changed back to IPv4 but here in this step the WPA2 encryption technique is enabled during transmission. Encrypted data is transmitted in order to verify the weather the encryption security factors affect the throughput performance and also the time taken to transmit the encrypted data. Step4: The Server operating system is installed with Windows Server 2008, , and client operating system will be Windows XP, but the IP addressing scheme used here is IPv4, but the WPA2 encryption technique is enabled here and encryption is used for the data transmission, the outputs are measured and compared with the above steps respectively. The outputs obtained in all the steps are compared individually with each other by plotting the respective graphs which helps us in knowing which Operating system Configuration performs better and gives better throughput and the performance as well. Similarly, whether the IP addressing schemes used in the respective steps going to fetch the required high throughput and provide theà better performance; finally how does the encryption technique impact on the performance of the IPv4 and IPv6 in Wireless 802.11n Networks and the system output. Finally the outputs from both phases are compared and plotted a graph TCp Throughput versus packet size (bytes) and this graph helps us to investigate the performance of the IP addressing schemes and the security encryption techniques and their impact on the throughput performances used in the respective setups. The outputs will be verified for different packet sizes like 128, 384, 640, 896, 1152, 1408 bytes of packet sizes in each steps of their respective phases which takes a minimum of 48 different scenarios and setups in order to clearly verify the performance of the IP addressing schemes by plotting the graphs. The client-server setup is installed by windows 7, windows server 2008 and windows XP operating systems to compare whether the operating systems affect the throughput performance of Wireless 802.11n Networks. We also compare the WPA2 encryption security techniques with the Open system to investigate how the encryption technique affects the performance of the setup. The IEEE paper which is published in the year 2009, the paper ââ¬Å"The Impact of security on the performance of IPv4 and IPv6 using 802.11n Wireless LANâ⬠which gave me a motivation to come through this idea, where the author has failed to clarify what happens if the MTU values are increased beyond the 1408 bytes, and the author has failed to give us (reader) a clear idea how does the IPv4 and IPv6 TCP/IP stack works on both Windows 7and Windows XP operating systems from theà Microsoft organizations. We also investigate the time taken in the encapsulation process inside the TCP/IP stack. 4. Current Status and Development: 4.1 Literature or Technology Survey and Analysis: In 2009, S.S.Kolahi, Zhang Qu, Burjiz K.Soorty, and Navneet Chand et al [1] compared the performance of IPv4 and IPv6 addressing scheme on a client-server Wireless 802.11n networks. The author concluded that enabling the encryption technique WPA2 results in approximately 7.07% less throughput for IPv4 and 5.42% less throughput for IPv6. The highest bandwidth obtained here is 120Mbps in 802.11n achieved in XP and IPv4, which is the highest as compared to all the other setups [1]. In 2009, et al [7];à Vasaka Visoottiviseth*, Thanakorn Piroonsith*, Siwaruk Siwamogasatham, the authors made a ââ¬Å" Emperical Study on achievable throughputs of IEEE 802.11n devicesâ⬠, here the performance of 802.11n network is compared with the 802.11g network device,[7] the performance improvements of IEEE 802.11n are measured approximately about 85% of UDP downlink Traffic, 68% of TCP Downlink traffic, 90% of TCP and 50% of UDP Uplink Traffic, the TCP results are quite balanced throughout all the trials where the UDP results are bit more variations[7]. In 2008, et al [3] S.S.Kolahi, the authorââ¬â¢s made a detailed study on the impact of security techniques for 802.11g on Windows Server 2003, Windows Vista and Windows XP [3]. The authorââ¬â¢s contribution was to verify the impact of security on throughput and Round Trip Time (RTT) on the respective operating systems, when the encryption techniques are activated on the Open systems, the TCP throughput reduced by 10% on WEP-64 and 14% for WEP-128 on Windows XP [3]. In 2007, et al [4] Filho investigated the bandwidth security Trade-off in Windows XP Operating System. The outputs showed that there is a drop in the throughput about 4%, 7% and 5% when the encryption techniques WEP-64, WEP-128 and WPA are used in Open Systems [4]. In 2006, B.E Zedin et al [5] published a paper based on the impact of security on the performance of the wireless 802.11n networks.th authors were successful to prove that TCP throughput is reduced about 4% on Windows XP when WEP-64 is enabled and 7.14% when 128 bit key is enable [5]. References: [1] The impact of security on the performance of IPv4 and IPv6 using 802.11n Wireless LAN. Authors: Kolahi, S.S; Zhang Qu; Soorthy, B.K; Chand, N; Publication year 2009. New Technology Mobility and Security 2009, 3rd International conference. Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=538467 [2] Comparison of end system IPv6 Protocol stacks. Authors: Zeadally, S; Waseem, R; Raicu, I;à Publication Year 2004, page(s): 238-242.Communications IEE Proceedings, Vol 151, Issue 3. Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=1309776 [3] The Impact of Wireless LAN Security performance of different windows operating systems. Computers and Communnications, 2008.ISSC 2008. IEEE Symposium Authors: Kolahi, S.S; Narayan, S.; Nguyen, D.D.T.; Sunarto, Y.; Mani,P.; Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4625636 [4] ââ¬Å"Security versus Bandwidth: The support of Mechanisms WEP e WPA in 802.11g Network,â⬠Authors:à E.J.M.A. Filho, P.N.L. Fonseca, M.J.S Leitao, and P.S.F. de Barros, IFIP International Conference on Wireless and Optical Communications Networks, 2007. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4284142 [5] Impact of Security on the performance of Wireless-Local Area Networks, Author: Ezedin, B.; Mohammed, B.; Amal, A; Hanadi, al, S.; Huda, K.; Meera al, M.; Innovations in Informationà Technology, 2006, pp 1-5. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4085411 [6]à Windows Server 2008, Microsoft Corporation, Published June 2008. Link: winsupersite.com/blogs/tabid/3256/entryid/74766/windows-à à à à à à à à à à à à à à à à à server-2003-vs-windows-server-2008.aspx (Click on Windows server 2008 White paper) [7]à An Empirical Study on achievable throughputs of IEEE 802.11n devices. Author: Visootiviseth, V.; Thanakorn; Piroonsith; Siwaruk Siwamogsatham. Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5291578 [13] Structure of the IEEE 802.11 MAC Frames Wireless WLAN Wi-Fi à à à à Configuration and Optimization tips. à à à à à Link:wireless-center.net/Wireless-Internet-Technologies-and- Applications/1925.html Text Book and Timelines: [8] CCNA ââ¬â Fundamentals of Wireless LANs, Cisco Networking Academy program. [9] S.McCann.; Official IEEE 802.11 Working group project timelines ââ¬â 2009. Link: ieee802.org/11/Reports/802.11_Timelines.htm [10] Wikipedia 802.11n, Link: http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access Additional references: [11] ââ¬Å"Measurement and analysis of TCP performance in IEEE 802.11 networks.â⬠Author: W.Ge,; Y. Shu; L.Zhang, L.Hao; O.W. Yang ââ¬â Published year 2006. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4055002 [12] IEEE 802.11n Development: History, Process and Technology. Author: Perahia.E ââ¬â Communication Magazine, IEEE, Vol 46, Issue 7. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4557042
Subscribe to:
Posts (Atom)