Featured Post
How to Choose the Right College Major
The most effective method to Choose the Right College Major A school major is the principle subject that an understudy considers while go...
Sunday, May 24, 2020
Cognitive Behavioral Therapy (CBT) and Management of...
Introduction In this paper, I will discuss how cognitive behavioral therapy (CBT) can be utilized in the management of eating disorders. More specifically I will identify Anorexia Nervosa and provide statistics that relate to the disease. Etiologies will be discussed as well as symptoms. Various techniques of Cognitive Behavioral Therapy will be described as well as the rationale as it relates to the clinical issue. Therapy has been used for many generations as a mean to resolve dilemmas in a personsââ¬â¢ life. Unfortunately, due to cultural aspects, therapy is generally centered on an individual. We typically presume that any problem that one may exhibit can be solved through personal realizations. However, society and therapists alike areâ⬠¦show more contentâ⬠¦In todayââ¬â¢s time, food has various meanings and degrees of importance. Some people use food as an act of nurture, some use food for a means of happiness. Preoccupation with food may lead to eating disorders. Eating disorders often causes one to display symptoms of depression, including mood swings, hopelessness, loneliness and anxiety. There are several categories of eating disorders and the etiology differs among individuals. Weight and physical appearance has a direct relation to the food we ingest. Young women often seek an ideal look and weight. This perceived image is often a product of media influences such as televisions, and magazines, as well as generalized peer pressure. Women are more apt to suffer from eating disorders. Young women are specifically affected. Historian John Brumberg concluded that about 95% of people who suffer from eating disorders are women between the ages of 12 to 25. The Food and Drug Administration reported only 5 to 10% of the population that is afflicted with an eating disorder is males (Diagnostic and Statistical Manual of Mental Disorders). Anorexia Nervosa Anorexia Nervosa (AN) is defined an eating disorder that is consists of abnormally low body weight. A person suffering from this disease typically has a body mass index (BMI) that is less than 85% of what is considered normal. Anorexics have a fear of being overweight and oftenShow MoreRelatedCauses Of Anorexia Nervosa1344 Words à |à 6 PagesGiven that anorexia nervosa is associated with high rates of mortality, relapse, suicide, and a diminished quality of life, long-term prognosis does look very tragic, with recovery rates ranging from 25-70% (Guarda, 2008). The extant of anorexia nervosa long-term outcome studies have reported, ââ¬Å"only one-third of individuals (37%) recover within 4 years after disease onset; this figure rises to almost half (47%) by year 10 and to 73% after 10 years post onsetâ⬠(Zerwas et al., 2013). These statisticsRead MoreCognitive Behavioral Therapy And Mental Health Disorders Essay1545 Words à |à 7 Pagesdepression. Rather th an relying on medications, clinical therapies are more effective to cure a variety of mental disorders. Although there are numerous psychological and physiological treatments to cure depression, ââ¬ËCognitive Behavioral Therapyââ¬â¢ [CBT] will effectively treat depression as well as other mental health problems. Commonly used by most mental health experts, cognitive behavioral therapy is ââ¬Å"a short-term, problem-focused form of behavioral treatment that helps people see the relationship betweenRead MoreRita Has A Rough Childhood Growing Up Essay1342 Words à |à 6 Pagesforming new serious friendships. à à à After high school, Rita continued her education by attending a local community college to major in business. During her sophomore year Rita worked part time in a department store and one year later was offered a management position in the store. She figured it made sense to drop out of college and be a manager because business was her career choice. Rita was in a serious relationship with a man she had met in college and eventually got engaged. However they neverRead MoreAnorexia Nervos A Group Of Eating Disorders1696 Words à |à 7 Pages Anorexia nervosa is psychiatric condition that is part of a group of eating disorders. It is associated with abnormally low body weight, extreme fear of gaining weight and a distorted perception of body image. Those with the disorder place a high value on controlling their weight to produce certain image. However, those suffering from the disorder more than likely use extreme efforts that tends to significantly interfere with their he alth and even normal activities or occupations in their livesRead MoreTaking a Look at Eating Disorders1708 Words à |à 7 Pagesmental as well as physical health. Anorexia nervosa and bulimia nervosa are the most common types. Others are binge eating disorder and eating disorder not otherwise specified. Classification: â⬠¢ Anorexia nervosa (AN), â⬠¢ Bulimia nervosa (BN), â⬠¢ Eating disorders not otherwise specified â⬠¢ Binge eating disorder (BED) or compulsive overeating, â⬠¢ Pica The two most common types, Anorexia nervosa and Bulimia nervosa are described below: Anorexia Nervosa: Anorexia nervosa (AN) is a psychiatric disorderRead MoreNutrition Counseling Practices And Psychological Counseling1294 Words à |à 6 Pagesdevelopment theories influence the way that nutrition counseling is conducted. Behavior modification, cognitive-behavioral therapy (CBT), rational-emotive therapy (RET), social learning theory, standard behavioral therapy, transtheoretical model, person-centered therapy, Gestalt therapy, family therapy, self-management approach, the health belief model, and developing skills training are examples of behavioral theories utilized in nutrition counseling. The idea that human development theories form the basisRead MoreDifference Of Initial Treatment Options For Anorexia Nervosa1786 Words à |à 8 PagesComparison of initial treatment options for anorexia nervosa Word Count: 1,619 Anna Davidson Abstract: Anorexia Nervosa is a DSM-5 psychological disorder characterized by energy restriction, weight loss and psychological comorbidities. The treatment of anorexia nervosa involves mainly medical and psychological interventions, and new treatments are being researched every day. Re-feeding is known to be the cornerstone, initial treatment. However, the specifics of treatment areRead More Cognitive-Behavioral Therapy And Exposure With Response Prevention In The Treatment Of Bulimia Nervosa3130 Words à |à 13 PagesCognitive-Behavioral Therapy And Exposure With Response Prevention In The Treatment Of Bulimia Nervosa Bulimia nervosa is an eating disorder with psychological, physiological, developmental, and cultural components. The disorder is commonly characterized by binge eating followed by inappropriate compensatory behaviors, such as self-induced vomiting, excessive exercise, fasting, and the misuse of diuretics, laxatives or enemas. Patients properly diagnosed with bulimia nervosaRead MorePositive Body Image Group Essay1234 Words à |à 5 Pagesinternalization of an individuals weight, shape, and/or appearance, usually involving any combination of attitudinal, behavioral, and perceptual components (Bhatnagar, Wisniewski, Solomon, Heinberg, 2013). The attitudinal component consists of beliefs about appearance and body satisfaction, and the behavioral component consists of the frequency of behaviors related to management of weight or avoidance. Furthermore, the perceptual component consists of the levels of accuracy estimating body shapeRead MoreCultural Factors Of Eating Diso rders1696 Words à |à 7 Pagesself-perception and self-image. Cost and time have to be put into consideration as well as the complexity of the disorder, insurance coverage, and treatment locations, whether it is outpatient or inpatient facilities, therapy, or counseling which may consist of cognitive behavioral therapy or family therapy. ââ¬Å"Counseling or psychotherapy alone, as well as in combination with pharmacotherapy, requires highly trained mental health and/or medical professionals working in outpatient or inpatient facilities, and these
Wednesday, May 13, 2020
Analysis Of Of Mice And Men And Macbeth - 1891 Words
For the purpose of this assignment, I will be exploring the ways women are presented in the texts ââ¬ËOf Mice and Menââ¬â¢ and ââ¬ËMacbethââ¬â¢. My focus will be centred on the two main female characters in both texts - ââ¬ËCurleyââ¬â¢s wifeââ¬â¢ in ââ¬ËOf Mice and Menââ¬â¢ and ââ¬ËLady Macbethââ¬â¢ in ââ¬ËMacbethââ¬â¢ - and discussing how the authors have portrayed them. As well as this, I will also be briefly looking at other female characters that feature in the texts that are equally as interesting. ââ¬Å"She had full rouged lips and wide spaced eyeââ¬â¢s, heavily made up.â⬠- This is one of the ways John Steinbeck (who is the author of the novella ââ¬ËOf Mice and Menââ¬â¢) describes the character of ââ¬ËCurleyââ¬â¢s Wifeââ¬â¢. She is a complex and controversial character, who although is not referenced much throughout the book, still plays a significant role within the story. Our first impression of Curleyââ¬â¢s wife is that she is very manipulative. The reader first hears about her in chapter two of the book, in a conversation between George, Lennie and Candy, thus giving the reader an insight into her character before she has even made her first appearance. During the discussion, Candy mentions that ââ¬Å"She has got the eyeâ⬠and describes her as being very flirtatious with the other workers on the ranch despite being married to Curley. He also refers to her as being a ââ¬Å"Tartâ⬠, which gives the reader the impression that she is immoral and is not the stereotypical woman you would expect to see during the 1930ââ¬â¢s. By introducing her character throughShow MoreRelatedAnalysis Of Of Mice And Men And Macbeth 1808 Words à |à 8 PagesCoursework: How are women presented in ââ¬ËOf mice and men and ââ¬ËMacbeth ? Throughout time, society has always been prejudice towards women and their characteristics. With regards to Adam and Eve, the Biblical story in which God created two humans (Adam and Eve) and positioned them in a beautiful garden called the ââ¬ËGarden of Eden , since then people have associated the story to being sexist and prejudice towards women. When Eve disobeyed God about eating fruit from the tree of knowledge and forcedRead MoreRichard Graff s Hidden Intellectualism, By Gerald Graff1142 Words à |à 5 Pagesexcited to read Macbeth by WIlliam Shakespeare and write about it like thereââ¬â¢s no tomorrow,â⬠itââ¬â¢s just uncommon. There are ââ¬Å"more than 2.1 million students on 114 campuses,â⬠in community colleges in California alone according to the California Community College Chancellor s Office, and we are all different, but expected to learn the same way. How does that make any sense? What one students might find interesting, the other might detest. Fo r example, I enjoyed reading Of Mice and Men by John SteinbeckRead MoreHow To Write Literary Analysis4174 Words à |à 17 PagesHow To Write Literary Analysis The Literary Essay: A Step-by-Step Guide When you read for pleasure, your only goal is enjoyment. You might find yourself reading to get caught up in an exciting story, to learn about an interesting time or place, or just to pass time. Maybe youââ¬â¢re looking for inspiration, guidance, or a reflection of your own life. There are as many different, valid ways of reading a book as there are books in the world. When you read a work of literature in an English classRead MoreNon Profit Analysis Essay7109 Words à |à 29 PagesNon-Profit Analysis Project Liberty University Penny LeBaron Busi 602 Carlson Hurst Part 1: Christian World View According to Del Tackettââ¬â¢s article on the Focus on the Family website, a person with a Biblical world view ââ¬Å"believes his primary reason for existence is to love and serve Godâ⬠(Tackett, 2012). Barna Research Group asks the following questions to determine if a person has a Biblical worldview: ââ¬Å"Do absolute moral truths exist? Is absolute truth defined by the Bible? Did Jesus
Wednesday, May 6, 2020
Climate Change and Its Consequences Free Essays
Climate change and its consequences have recently grown in importance on political agendasworldwide. CO2 emissions is one of the gases that has a dramatic impact on the environmentresulting in rising coastal flooding, reduction in water supplies and increase malnutrition(IEA, 2010). In order to protect the environment for future generations, a global reduction inCO2 emissions is required along with reduced consumption of non-renewable energyresources. We will write a custom essay sample on Climate Change and Its Consequences or any similar topic only for you Order Now One major CO2 contributor is the transport sector, which is responsible for arounda quarter of EU greenhouse gas emissions, making it the second biggest greenhouse gasemittingsector after energy. While emissions from other sectors are shrinking, those fromtransport have increased by 36% since 1990. As a consequence, the European Union has setmandatory emission reduction targets for passenger cars of 95g/km by 2020, which is areduction of 40% compared to 2007. Automobile manufacturers that fail to comply facedrastic fines. In order to reach these targets and prevent penalty payments for excessemissions, innovative propulsion systems have gained increasing attention. Vehicles withelectric propulsion are considered as a promising alternative on the pathway towards lowemissionvehicles that could enable the transport sector to reduce emissions significantly.During the last few years, electric vehicles (EV) got more and more attention in national andEuropean policies and public awareness increased significantly. While much effort has beenput in the research and development of e-mobility, less attention has been paid to consumersââ¬â¢acceptance (Yeh, 2007). The majority of consumers still consider EVs as disadvantageouscompared to traditional cars. However, without consumer acceptance there will be notechnological shift and long-term success of sustainable transport systems (Wiedmann et al.,2011). Therefore, it is crucial to gain in-depth insights in consumersââ¬â¢ perception towards EVsthat affect preferences for and the adoption of alternative fuelled vehicles. How to cite Climate Change and Its Consequences, Papers
Monday, May 4, 2020
Comparative advantage, free essay sample
What are the advantages Blades could gain from importing from and/or exporting to a foreign country such as Thailand? Ans: The advantages Blades could gain from importing from and/or exporting to Thailand could be Decrease their cost of goods sold, and increase Bladesââ¬â¢ net income since rubber and plastic are cheaper when imported from a foreign country such as Thailand. Due to its superior production process Thai firms could not duplicate the high-quality production process , so establishing a subsidiary in Thailand would preserve blade sales before Thai competitors. Allow Blades to explore the option of exporting to Thailand by building relationships with some local suppliers. As far as exporting is concerned, Blades could become the first firm to seller roller Blades in Thailand. Diversify their investment by opening option to export to other countries beyond Thailand to ensure company sustainability. 2. What are some of the disadvantages Blades could face as a result of foreign trade in the short run? In the long run? Ans: The disadvantages Blades could face as a result of foreign trade in the short run are: Exchange rate risk. We will write a custom essay sample on Comparative advantage, or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Blades would be exposed to currency fluctuation in the Thai baht if importation cost increase without Thai suppliers adjusting their price. International economic condition; if Thailandââ¬â¢s economy undergoes recession, Blades would suffer from sales decrease in Thailand. In the long run, Blades should be aware of the political risk involved in operating in Thailand, such as any regulatory changes or tax increase may impact on Bladeââ¬â¢s subsidiary. 3. Which theories of international business described in this chapter apply to Blades, Inc. in the short run? In the long run? Ans: There are three theories of international business in this chapter will apply to Blades, Inc.: the theory of comparative advantage, the imperfect markets theory, and the product cycle theory. In the short run, Blades would like to import from Thailand because it will reduce its cost. On the other hand, Blades would like to export to Thailand because roller blades currently are in demand in Thailand. Both of these factors suggest that the imperfect markets theory applies to Blades in the short run. In the long run, the goal is to be became the first roller blades manufacturers in Thailand. The superiority of its production process suggests that the theory of comparative advantage would apply to Blades in the long run. Also, the product cycle theory will apply to Blades, since its U.S. sales are declining and Blades feels that it must eventually establish a subsidiary in Thailand in order to preserve its competitive advantage over Thai competitors. 4. What long-range plans other than the establishment of a subsidiary in Thailand are an option for Blades and may be more suitable for the company? Ans: Since Blades has never operated in other country, and CFO Ben Holt is unfamiliar with international business, establish a subsidiary in Thailand would not be the best interest for Blades, Inc. to gain a foothold in Thailand at this time. A joint venture with Thai roller blades manufacture may be more suitable for the company in a short run. Since this option will allow Blade to gain access to Thaiââ¬â¢s distribution channels, familiarity of the Thai culture, consumer behavior and political rule and regulation in Thailand before establishing a permanent subsidiary market.
Sunday, March 29, 2020
Battle of Verdun
Battle of Verdun Introduction Beginning February 21 to December 1916 the Battle of Verdun can be considered one of the largest battles fought during WWI between France and Germany with a total combined death count of 698,000 on both sides (Horne, 1994). Based on the account of Alistair Horne in his book The Price of Glory this paper will elaborate and examine some of the more interesting facets of the war involving pride, nationalism and the de-humanization of combatants brought about by the combination of such factors. Going even further into human aspect of the war elaborated on by Horne, this paper will examine the reasons that drove both combatants to fight over what was basically a useless piece of land and how the end result was nothing more than a war of costly attrition with a pyrrhic victory at the end.Advertising We will write a custom essay sample on Battle of Verdun specifically for you for only $16.05 $11/page Learn More Pride and Verdun When examining the accou nt of Horne regarding the Battle of Verdun it becomes obvious that the entire context of the battle itself was one of pride between two contenders that entered into what can be roughly described as a pissing contest between two countries. For example, if you were to observe the greater context of the First World War it becomes immediately obvious that there was very little to be gained from Germany attacking Verdun while at the same time France had little to lose from merely allowing Germany to take Verdun. The area wasnt situated in what can be described as a strategically viable position in terms of allowing Germany to push further into France nor would holding the area allow the French army to cut off any German supply routes or allow the Germans to access any viable resources from the region since Verdun itself held little, if any, war potential in terms of munitions factories or stockpiled resources. Based on the account of Horne it can be seen that Verdun was a matter of pride between the actors wherein it became a symbol of French resistance against German incursions while at the same time it was a way of showing Germanys resolve in winning the war. Going even further back to understand that factors that lead to irrational exuberance that permeated this desire to go to war over what can be described as a worthless piece of land, one would come across a variety of historical snippets (as indicated by Horne) which show that the land itself was heavily contested between the French and Germans even before the start of WWI. This in itself is quite interesting especially when overlaying the nationalism that was used as a factor to drive the inexorable war machine forward it can be seen that when nationalism meets pride minor disagreements can often erupt into major conflicts resulting in the deaths of hundreds of thousands of people.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Despite the overwhelming loss of life on both sides over something that had nothing to do with actually winning the war it can be seen from the account of Horne that extreme nationalism urged both sides to keep on fighting with German Field Marshall Von Falkenhayn famously saying that they would bleed the French white. What is interesting about this particular account of the war is that when taking it and overlaying it in the greater context of wars within human society it can be seen that a lot of them were a direct result of pride and nationalism taking precedence over common sense and practicality. Even in the modern day era with the current war on terror it can be seen that a large percentage of radical Islamic militants turn towards terrorism due to feelings related to nationalism and the desire to protect their traditional way of life. Nationalism and Inhuman Treatment Continuing the in the same vein of though regarding nationalism, pride and how these fueled the battle of Verdun it is quite interesting to note that it was also during this particular battle that the first recorded instance of poison gas was utilized. This is an important factor to take into consideration since when you combine its usage with the various de-humanizing aspects related to the battle itself it becomes all to obvious that nationalism and pride taken to its zenith enables countries to not think of the ethical and moral considerations of war (as explained by Horne when he elaborated on the various human factors behind and during the battle of Verdun) and as a result dehumanizes the enemy enabling the most atrocious of actions to become acceptable all for the sake of winning. This is particularly enlightening especially when taking into consideration the inherently hypocritical noble and just reasoning elaborated on by state leaders and generals at time regarding the justness of their cause in the face of thousands of deaths. Such a method of justifying atrocities h as actually been endemic in countries such as France and Germany in the past wherein the Crusades (various attempts at retaking the Christian Holy Land from Muslim hands which resulted in millions of deaths on both sides) were fueled by religious fervor.Advertising We will write a custom essay sample on Battle of Verdun specifically for you for only $16.05 $11/page Learn More In the present religion has been replaced by nationalism however it is no less effective in justifying the deaths of thousands all for the sake of a just cause. Pyrrhic victory The last and but not the least most interesting aspect of the account of Horne was that in the end both sides gained nothing from the battle of Verdun and for the French it was nothing more than a pyrrhic victory while for the Germans they actually accomplished what they set out to do and that was to ââ¬Å"bleed the French whiteâ⬠(however in terms of an overall military victory the French actually ââ¬Å" wonâ⬠at Verdun since the Germans were unable to either capture the city of Verdun nor were they able to inflict greater causalities to the French). First and foremost what you have to understand is that despite the sheer amount of deaths on both sides by end of the Battle on December 1916 both sides were quite literally at the same fronts they were in when the battle started in the first place. Thus, from a certain perspective, it can be surmised that the entire battle was useless from start to finish since neither side actually were able to advance, both suffered costly causalities that hampered their war potential and in the end the battle itself was fought for reasons that are both incredibly selfish and can even be described as incredibly stupid given the amount of people died for them. Conclusion Based on the account of Horne and the opinions presented in this paper it can be stated that the entire battle of Verdun was a complete was of human life and shows how nationalis m and pride can lead to actions that can basically be described as insanely stupid. Reference List Horne, A. (1994). The price of glory: Verdun 1916.
Saturday, March 7, 2020
ââ¬ÅThe effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networksââ¬Â The WritePass Journal
ââ¬Å"The effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networksâ⬠1. Introduction: ââ¬Å"The effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networksâ⬠1. Introduction:2. Background:3. Problem Description:4. Current Status and Development:4.1 Literature or Technology Survey and Analysis:References:Related 1. Introduction: Utilization of Bandwidth Efficiently is the most Challenging factor, in todayââ¬â¢s IT Revolution. Providing security for the data transmission over wired and wireless networks is again a very important factor in order to avoid piracy, illegal and unauthorized accesses. Here we are investigating the effect of WPA2 security technique on the IP addressing schemes with the client-server configuration on Windows 7 Windows Server 2008 and Windows XP Windows Server 2008 Operating systems respectively.à When comparing the techniques each other, we need to enable and disable the encryption techniques used respectively, in order to study the proper impact of security techniques on the performance of the 802.11n wireless networks. The most important factor is to provide the better security for the data transmission over wired and wireless communication with less processing time and should use the low bandwidth as much as possible without reducing the performance; and also security is the main factor which decreases the performance of the setup by increasing the processing time [8]. This also leads in decreasing the system throughput. Providing the better security with efficient utilization of bandwidth with reduced processing time during the transmission of data, will become the most effective and supportive step for todayââ¬â¢s growing IT World. IPv6 replaced IPv4 as IPv4 has failed to provide enough IP addresses to all the end user systems. Recently developed operating systems by different organizations support both IPv4 and IPv6 Protocol Stacks and Infrastructures [2]. 802.11n IEEE standard is the recent development by the IEEE group, in the Wireless Fidelity category [9]. This standard provides the improved bandwidth compared to previous wireless standards. 802.11n is able to provide the improved bandwidth as it utilizes multiple antennas and wireless signals technology ââ¬â The MIMO technology, where the other previous version of IEEE standards were not using this technique for the Data Transmission and Reception. 802.11n standard was finalized on nov-2009 [9]. After the successful development of 802.11n, the industries started implementing the wireless devices that provides and supports the data transmission rate more than 100Mbps in the current real world, which is the much more compared to any other wireless standards previously developed. This is one of main advantages of the 802.11n. IPv6 is replaced by IPv4, which is new and have also been upgraded in newly developed operating systems. Windows 7 is the most recent successful development by the Microsoft Windows organization which works on both IPv4 and IPv6 addressing schemes. Most of the companies have decided to move to the new operating systems like Windows 7. Some of the companies and organizations are still using Windows XP which runs on IPv4 addressing scheme [6]. Some of the companies are addicted to Windows vista even though Vista has few bad reviews and disadvantages compared to newly developed operating systems. The working of Vista and Windows 7 are almost same. Windows Server 2008 is the new and advanced version of Microsoft [6]. This has many upgraded features, technologies, better authentication and rights of admission controls and also the added active directory services as compared to the other previous versions of Server Operating Systems from the Microsoft [6]. WPA (Wireless Protected Access) and WPA2 are the security protocols used in securing the data from unauthorized accesses during Data Communication, in Wireless Computer networks[10]. This was developed by ââ¬ËWi-Fi Allianceââ¬â¢. This was developed in order to overcome the disadvantages and solve the queries that were found during research on WEP technique in various organizations and institutes as well. This WPA2 technique provides better encryption than WEP, and consists of more advanced features and techniques [10]. 2. Background: In 2009, Samad Salehi Kolahi, and the co-authors et al [1] conducted aà study on Impact of Security on the IPv4 and IPv6 using 802.11n Wireless LAN on Windows Vista, Windows Server 2008 and Windows XP operating systems[1]. The main contribution of their paper was to compare the performance of IPv4 and IPv6 on a client-server configuration, in wireless 802.11n networks, using the operating systems likeà Windows Vista, Windows Server 2008, Windows XP and Windows Server 2008. WPA2 security encryption technique was used and then they compared the outputs with the open system 802.11n networks [1]. This paper gave me the motivation to compare and verify the performances of both IP addressing schemes and the outputs on different operating systems, when the MTU is increased and to compare the time taken to transmit the data (ex: how much time does setup1 and setup2 takes to transmit the 1Gigabyte of data respectively and compare them with each other). MTU (Maximum Transmission Unit) is a protocol which used in the higher layers. This protocol forwards the data using MTU parameters; these parameters are always associated with the communication interface like network interface card, serial and parallel ports [13]. The MTU size is fixed by the standards or protocols which are used. For a larger MTU, the packets contain data where the protocol headers and delays are remaining fixed. The efficiency of the MTU is calculated when we use bulk data throughput. The Per-Packet-Processing technique used in this protocol may limit the performance of the system. Usually when large packets are being transmitted the transmission link used appears to be slow for some amount of time [13]. This Latency may become a factor in decreasing the overall efficiency of the setup. Sometimes when transmitting the larger packets due to some communication errors which cause the data bit loss in the arrived packets at the destination, irrespective of the error i s present in all of the bits or in a single bit or in some bits of the packet, whole packet has to be retransmitted, this retransmission takes much time which is again a main factor which decreases the throughput of the setup also causes increased MAC delay. The retransmission of IP packet can be done without the fragmentation technique [13]; this fragmentation includes only the IP header except all other low level headers of the OSI layers. The minimum size of reassembled packet for IPv4 is 576 and IPv6 is 1500 bytes. The MTU for a wireless 802.11 networks is 2272 bytes [13]. 3. Problem Description: The above diagram shows the client-server configuration setup, the server is connected to the 802.11n wireless access point using a CAT 5e straight through cable. The client is connected to the access point using 802.11n NIC (Network Interface Card). Here we are investigating the performance of the 802.11n in different phases. In the phase 1, Step1: The Server is installed with Windows Server 2008, and client is installed with windows 7 operating system. IPv4 addressing scheme is used here in this step, no encryption technique is used during the data transmission to verify the throughput of the setup without any security encryption to verify the performance, and also to investigate the performance when MTU is increased beyond the range of 128ââ¬â1408 bytes. Step2: Here in this step the Server is installed with Windows Server 2008, and client is installed with windows 7 operating system. IPv6 addressing scheme is used instead of IPv4 addressing, no encryption technique is used during the data transmission to verify how the security factors affect the throughput performance, and also the performance when MTU is increased. Step3: Here in this step the server remains with the same operating system à and client as well, the IPv4 addressing scheme is used again instead of IPv6 but the à WPA2 encryption technique is enabled. Encrypted data is transmitted in order to verify the weather the security factor affect the throughput performance and also the time taken to transmit the encrypted data and this time is compared with the time taken in the steps 1 and 2 respectively fro different MTU ranges. Step4: The Server operating system remains same with windows server 2008, and client with the Windows 7, but the IP addressing scheme is changed back to the IPv6 then the WPA2 encryption technique is used for the transmitting data, and the outputs are measured and compared with the results of the above steps. The outputs obtained from all the above 4 steps are compared with each other to decide which Operating system configuration and IP addressing schemes going to provide the required high throughput and better performance by plotting the respective graphs to the obtained respective outputs; and also how does the encryption technique impact on the performance of the IPv4 and IPv6 in Wireless 802.11n Networks and the system output as well. In the Phase 2, Step1: Windows Server 2008 is installed in the server, and client is installed with windows XP. First the IPv4 addressing scheme is used, no encryption technique is used all the encryption techniques are disabled during the data transmission to investigate the time taken to transmit data and verify the Throughput as well, and also the performance of the system when MTU is increased. Step2: The Server is installed with Windows Server 2008, and client operating system will be Windows XP. We are using IPv6 addressing scheme instead of IPv4, all the encryption techniques are disabled during the data transmission to verify whether the security factors affect the throughput performance, and also the performance when MTU (Maximum Transmission Unit) à is increased beyond its maximum limit with respect to the operating system used. Step3: Here in this step the Server operating system will be Windows server 2008, but the client operating system is installed with Windows XP, the IPv6 addressing scheme is changed back to IPv4 but here in this step the WPA2 encryption technique is enabled during transmission. Encrypted data is transmitted in order to verify the weather the encryption security factors affect the throughput performance and also the time taken to transmit the encrypted data. Step4: The Server operating system is installed with Windows Server 2008, , and client operating system will be Windows XP, but the IP addressing scheme used here is IPv4, but the WPA2 encryption technique is enabled here and encryption is used for the data transmission, the outputs are measured and compared with the above steps respectively. The outputs obtained in all the steps are compared individually with each other by plotting the respective graphs which helps us in knowing which Operating system Configuration performs better and gives better throughput and the performance as well. Similarly, whether the IP addressing schemes used in the respective steps going to fetch the required high throughput and provide theà better performance; finally how does the encryption technique impact on the performance of the IPv4 and IPv6 in Wireless 802.11n Networks and the system output. Finally the outputs from both phases are compared and plotted a graph TCp Throughput versus packet size (bytes) and this graph helps us to investigate the performance of the IP addressing schemes and the security encryption techniques and their impact on the throughput performances used in the respective setups. The outputs will be verified for different packet sizes like 128, 384, 640, 896, 1152, 1408 bytes of packet sizes in each steps of their respective phases which takes a minimum of 48 different scenarios and setups in order to clearly verify the performance of the IP addressing schemes by plotting the graphs. The client-server setup is installed by windows 7, windows server 2008 and windows XP operating systems to compare whether the operating systems affect the throughput performance of Wireless 802.11n Networks. We also compare the WPA2 encryption security techniques with the Open system to investigate how the encryption technique affects the performance of the setup. The IEEE paper which is published in the year 2009, the paper ââ¬Å"The Impact of security on the performance of IPv4 and IPv6 using 802.11n Wireless LANâ⬠which gave me a motivation to come through this idea, where the author has failed to clarify what happens if the MTU values are increased beyond the 1408 bytes, and the author has failed to give us (reader) a clear idea how does the IPv4 and IPv6 TCP/IP stack works on both Windows 7and Windows XP operating systems from theà Microsoft organizations. We also investigate the time taken in the encapsulation process inside the TCP/IP stack. 4. Current Status and Development: 4.1 Literature or Technology Survey and Analysis: In 2009, S.S.Kolahi, Zhang Qu, Burjiz K.Soorty, and Navneet Chand et al [1] compared the performance of IPv4 and IPv6 addressing scheme on a client-server Wireless 802.11n networks. The author concluded that enabling the encryption technique WPA2 results in approximately 7.07% less throughput for IPv4 and 5.42% less throughput for IPv6. The highest bandwidth obtained here is 120Mbps in 802.11n achieved in XP and IPv4, which is the highest as compared to all the other setups [1]. In 2009, et al [7];à Vasaka Visoottiviseth*, Thanakorn Piroonsith*, Siwaruk Siwamogasatham, the authors made a ââ¬Å" Emperical Study on achievable throughputs of IEEE 802.11n devicesâ⬠, here the performance of 802.11n network is compared with the 802.11g network device,[7] the performance improvements of IEEE 802.11n are measured approximately about 85% of UDP downlink Traffic, 68% of TCP Downlink traffic, 90% of TCP and 50% of UDP Uplink Traffic, the TCP results are quite balanced throughout all the trials where the UDP results are bit more variations[7]. In 2008, et al [3] S.S.Kolahi, the authorââ¬â¢s made a detailed study on the impact of security techniques for 802.11g on Windows Server 2003, Windows Vista and Windows XP [3]. The authorââ¬â¢s contribution was to verify the impact of security on throughput and Round Trip Time (RTT) on the respective operating systems, when the encryption techniques are activated on the Open systems, the TCP throughput reduced by 10% on WEP-64 and 14% for WEP-128 on Windows XP [3]. In 2007, et al [4] Filho investigated the bandwidth security Trade-off in Windows XP Operating System. The outputs showed that there is a drop in the throughput about 4%, 7% and 5% when the encryption techniques WEP-64, WEP-128 and WPA are used in Open Systems [4]. In 2006, B.E Zedin et al [5] published a paper based on the impact of security on the performance of the wireless 802.11n networks.th authors were successful to prove that TCP throughput is reduced about 4% on Windows XP when WEP-64 is enabled and 7.14% when 128 bit key is enable [5]. References: [1] The impact of security on the performance of IPv4 and IPv6 using 802.11n Wireless LAN. Authors: Kolahi, S.S; Zhang Qu; Soorthy, B.K; Chand, N; Publication year 2009. New Technology Mobility and Security 2009, 3rd International conference. Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=538467 [2] Comparison of end system IPv6 Protocol stacks. Authors: Zeadally, S; Waseem, R; Raicu, I;à Publication Year 2004, page(s): 238-242.Communications IEE Proceedings, Vol 151, Issue 3. Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=1309776 [3] The Impact of Wireless LAN Security performance of different windows operating systems. Computers and Communnications, 2008.ISSC 2008. IEEE Symposium Authors: Kolahi, S.S; Narayan, S.; Nguyen, D.D.T.; Sunarto, Y.; Mani,P.; Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4625636 [4] ââ¬Å"Security versus Bandwidth: The support of Mechanisms WEP e WPA in 802.11g Network,â⬠Authors:à E.J.M.A. Filho, P.N.L. Fonseca, M.J.S Leitao, and P.S.F. de Barros, IFIP International Conference on Wireless and Optical Communications Networks, 2007. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4284142 [5] Impact of Security on the performance of Wireless-Local Area Networks, Author: Ezedin, B.; Mohammed, B.; Amal, A; Hanadi, al, S.; Huda, K.; Meera al, M.; Innovations in Informationà Technology, 2006, pp 1-5. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4085411 [6]à Windows Server 2008, Microsoft Corporation, Published June 2008. Link: winsupersite.com/blogs/tabid/3256/entryid/74766/windows-à à à à à à à à à à à à à à à à à server-2003-vs-windows-server-2008.aspx (Click on Windows server 2008 White paper) [7]à An Empirical Study on achievable throughputs of IEEE 802.11n devices. Author: Visootiviseth, V.; Thanakorn; Piroonsith; Siwaruk Siwamogsatham. Link:à http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5291578 [13] Structure of the IEEE 802.11 MAC Frames Wireless WLAN Wi-Fi à à à à Configuration and Optimization tips. à à à à à Link:wireless-center.net/Wireless-Internet-Technologies-and- Applications/1925.html Text Book and Timelines: [8] CCNA ââ¬â Fundamentals of Wireless LANs, Cisco Networking Academy program. [9] S.McCann.; Official IEEE 802.11 Working group project timelines ââ¬â 2009. Link: ieee802.org/11/Reports/802.11_Timelines.htm [10] Wikipedia 802.11n, Link: http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access Additional references: [11] ââ¬Å"Measurement and analysis of TCP performance in IEEE 802.11 networks.â⬠Author: W.Ge,; Y. Shu; L.Zhang, L.Hao; O.W. Yang ââ¬â Published year 2006. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4055002 [12] IEEE 802.11n Development: History, Process and Technology. Author: Perahia.E ââ¬â Communication Magazine, IEEE, Vol 46, Issue 7. Link: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=4557042
Wednesday, February 19, 2020
Presidents Day Essay Example | Topics and Well Written Essays - 750 words
Presidents Day - Essay Example However from January 1, 1971 onwards instead of February 22, Presidents day started to celebrate on every third Monday of February. Since then Presidents day never happened in Washingtonââ¬â¢s actual birth day (February 22) as third Monday of February occurs in between February 15 and 21. In this year or 2011, Presidents day was on February 21. Thus, at present presidents day lost its significance as the actual birth day of Americaââ¬â¢s first president since it is celebrated based on the day rather than the date. Today, people celebrate Presidents day to mark their respect towards the entire Presidents of America, but most significantly George Washington and Abraham Lincoln. ââ¬Å"The official US holiday is meant to honor only George Washington, but many people consider President's Day a day to honor both George Washington (born on Feb. 22, 1732) and Abraham Lincoln (born on Feb. 12, 1809)â⬠(Activities, Worksheets and Crafts for Presidents Day).The story behind fixing t he presidents day as the third Monday on February is interesting. According to the Gregorian or "New Style" calendar that is most commonly used today, George Washington was born on February 22, 1732. But according to the Julian or "Old Style" calendar that was used in England until 1752, his birth date was February 11th. Back in the 1790s, Americans were split - some celebrated his birthday on February 11th and some on February 22nd.When Abraham Lincoln became president and helped reshape our country, it was believed he, too, should have a special day of recognition. Tricky thing was that Lincolnââ¬â¢s birthday fell on February 12th. Prior to 1968, having two presidential birthdays so close together didn't seem to bother anyone. February 22nd was observed as a federal public holiday to honor the birthday of George Washington and February 12th was observed as a public holiday to honor Abraham Lincolnââ¬â¢s birthday (Himiac). The confusion over the significance of Presidents day is still prevailing in America. Some people celebrate it for honoring first president George Washington whereas some others use it to honor Abraham Lincoln. In order to avoid confusion or controversy some people celebrate the entire week for Presidents day celebration. Some of the America schools and colleges conducting regular classes currently even on Presidents day. At the same time, many other schools in America often been closed for the entire week. In other words, Presidents day is celebrated or observed differently by the academic community. Even though Congress had made federal legislation for celebrating Presidents day, still individual states are keeping their preferences while observing Presidents day. States like California, Idaho, Tennessee and Texas started to use the term "President's Day rather than Presidentsââ¬â¢ Day. The confusion about the Presidents day helped the business community to exploit it. Business people interpreted presidents day differently with t he help of different advertising campaigns and currently peopleââ¬â¢s perception about president day has been changed a lot. Instead of honoring the Presidents, current people use this occasion for shopping and enjoying. Presidents day is currently celebrated more by the business community. They use this occasion to boost their sales just like other significant occasions like Memorial Day, Christmas Day, Veterans Day, Columbus Day etc. Earlier most of the American shops were remain closed
Subscribe to:
Posts (Atom)