Saturday, August 31, 2019

Energy Crisi in Pakistan

Tarbela’s 4th extension project to add 1410 MW Posted by  admin  on August 22, 2011  in  PkToday  |  0 Comment ISLAMABAD (APP) – The total generation capacity of the Tarbela Hydropower Station will touch 4,888 megawatt mark with the addition of 1,410 MW as a result of 4th extension project. Official sources told APP on Sunday that the detailed engineering design, tender documents and PC-1 of the Tarbela 4th Extension Project were in active progress and would be completed by next month and would cost $5. 5 million provided by the World Bank.M/S Mott MacDonald (UK) was hired for the detailed engineering design of the project. The sources said that the project would take four years after award of the contract. They said the project would not only generate additional 1410 MW cheap hydel power but also save foreign exchange of $ 900 million spent on import of one million tons of furnace oil annually for equivalent generation of electricity from thermal resources. The World Bank has also shown interest in financing civil works and generating units of the project during the construction, they said.The project will also provide a cushion to undertake rehabilitation and up-gradation of the existing Tarbela Power House during the lean period. It is pertinent to mention that Tarbela`s 4th Extension Project is a part of least-cost energy generation plan, being implemented by WAPDA (Water and Power Development Authority) on priority to harness indigenous hydropower resources of the country with a view to improving the ratio of hydel electricity in the national grid. 50 MW coal power plant being installed in SIEPosted by  admin  on September 23, 2011  in  PkToday  |  1 Comment Punjab Industrial Estates (PIE) has completed initial work to install the first ever 50 megawatt (MW) coal power generation plant in Sundar Industrial Estate (SIE) in Lahore while process of getting license from NEPRA is underway. For this purpose, the Board of Dir ector of PIE has established a power committee under PIE, which will look after this and other power related projects of industrial estates of Punjab. You can read also Thin Film Solar CellChairman of PIE, SM Tanveer in a briefing to Lahore Economic Journalist Association on Thursday said extension work of 132 KVA grid station of PIE was also underway to add additional 34 megawatt in the industrial estate system to ensure uninterrupted availability of power to the industries of the SIE. Meanwhile, PIE has also started Industrial Estate development work in Bahlwal and Rahim Yar Khan with its own resources, he said adding that planning and development of ten other industrial estates in the province was also underway.He said these industrial estates would be established in Kasur Tannery Park, Gujrat, Vehari, Bahawalpur, D G Khan, Wazirabad Cutlery Cluster, Jhang, Okara, Sahiwal and Rawalpindi. He said PIE was working under the vision of Punjab Chief Minister Muhammad Shahbaz Sharif to make the Punjab an industrial hub in the country with all modern facilities. He said a 100-acre Halal Park would also be established in Rahim Yar Khan a nd Multan Industrial Estates to promote the Halal products of Pakistan and get its share from world Halal food market.He said PIEDMC made the public private partnership concept successful and completing its project without support of any government institution. He said the Punjab government had given Rs 1 billion only at the time the PIEDMC was established—and now the company is worth around Rs 15 billion. Talking about the financials of the company, S M Tanveer said that PIE BoD approved 2005 to 2008 accounts while international repute Internal and External Auditors was appointed for self-accountability of the PIEDMC.He said SIE is a state-of-the-art industrial estate in Pakistan where all utilities and concerned departments offices including SNGPL, EOBI and Social Security were established. He said as the result of the present management of the PIE, the Punjab government had abolished capital value tax. He said the master plan of Bahlwal Industrial Estate was completed and litigations in Multan Industrial Estate were finished so that work on Phase-II of this estate could be started.PIEDMC is under process of developing Rahim Yar Khan, Bhalwal, Multan Phase II and Vehari industrial estates and total available land is 1590 acres whereas the sellable land is 1,094 acres—approx 70% of the total land. Whereas the remaining 30% will be used for horticulture and infrastructure development. Chairman of PIE informed it is worth mentioning that through industrialisation of these industrial estates â€Å"we will generate 192,000 jobs. † He further explained the total contribution in the GDP of the country would be approx Rs 17 billion. OUTLINE: 1. Introduction . Pakistan’s Energy Sector 2. 1 Energy Supply 2. 2 Energy Consumption 3. Sources of Energy in Pakistan 3. 1 Non-renewable resources (Fossil fuels) a). Petroleum products b). Natural Gas c). Coal 3. 2 Renewable Resources a). Hydro power o Current Hydropower stations o Potential Hydropow er stations 3. 3 Alternative Energy Sources a). Wind b). Solar c). Agricultural biomass /biodiesel d). Tidal 3. 4 Nuclear 4. Causes of Energy Crisis 4. 1 Growing Energy Demand 4. 2 Lack of proactive and integrated planning for production of energy 4. 3 Imbalanced energy mix 4. Non-utilization of enormous indigenous energy resources   a). Thar Coal b). Hydal power generation 5. Consequences of Energy Crisis 5. 1 Economic Factors 5. 2 Agriculture Sector 5. 3 Industrial Sector 5. 4 Unemployment 5. 5 Social Issues 5. 6 Poverty 6. Conclusion 7. Recommendation/Solutions of Energy Crisis 7. 1 Judicious energy use/saving unecessary energy usage o electricity saving devices o Awareness campaign for energy saving o Reduction in unnecessary transportations o Installation of effective equipment/energy efficient in industries o Decreasing line/transmission losses . 2 Developing new energy resources o Tapping indigenous resources o Using renewable resources (water) by constructing new dams and hydro power plants   o Import of natural gas o Utilizing alternative energy resources Wind power Biodiesel /Biomass Solar Tidal o Enhancing civilian nuclear capacity 1. Introduction : Energy is considered to be life line of any economy and most vital instrument of socioeconomic development of a country. Energy is pivotal in running machinery in factories and industrial units, for lighting our cities and powering our vehicles etc.There has been an enormous increase in the demand of energy as a result of industrial development and population growth, in comparison to enhancement in energy production. Supply of energy is, therefore, far less than the actual demand, resultantly crisis has emerged. An energy crisis can be defined as any great bottleneck (or price rise) in the supply of energy resources to an economy. 2. Pakistan’s Energy Sector: Pakistan’s energy infrastructure is not well developed, rather it is considered to be underdeveloped and poorly managed. Currentl y the country is facing severe energy crisis.Despite of strong economic growth and rising energy demand during past decade, no serious efforts have been made to install new capacity of generation. Moreover, rapid demand growth, transmission losses due to outdated infrastructure, power theft, and seasonal reductions in the availability of hydropower have worsened the situation. Consequently, the demand exceeds supply and hence load-shedding is a common phenomenon through power shutdown. 2. 1 Energy Supply : During 2009-10, Energy supply and per capita availability of energy witnessed a decline of 0. 64 % and 3. 09 % respectively in comparison to previous year.Pakistan needs around 15,000 to 20000 MW electricity per day, however, currently it is able to produce about 11,500 MW per day hence there is a shortfall of about 4000 to 9000 MW per day. This shortage is badly hampering the economic growth of the country. 2. 2 Energy Consumption : Pakistan’s energy consumption is met by mix of gas, oil, electricity, coal and LPG sources with different level of shares. Share of gas consumption stood at 43. 7 %, followed by oil 29. 0 percent, electricity 15. 3 percent, coal 10. 4 percent and LPG 1. 5 percent. 3. Sources of Energy in Pakistan: 3. 1 Non-renewable resources (Fossil fuels):  [Limited – Expensive]Non renewable resources are primarily fossil fuels emanating from remains/decomposition of animals and plants deposited deep into the earth crust and converted into oil and gas. These resources cannot be replenished. There are three main types of fossil fuels: coal, petroleum, natural gas and liquefied petroleum gas (LPG). a). Petroleum products: In 2009-10, consumption of petroleum products was 29% of total share of energy. Majority of crude oil is imported from gulf countries to meet the demand. Power, industry and transport sectors consume higher quantity of petroleum followed by agriculture and house holds.Petroleum is also used in generation of elec tricity, which counts 64 percent of total electricity generation (34 coming from hydro generation). Balance recoverable reserves of crude oil in country have been estimated at 303. 63 million barrels and we are extracting approximately 24 million crude oil annually, meaning if we do not explore new wells, we will exhaust our current crude oil reserves in 12-13 years. b). Natural Gas: Importance of natural gas is increasing rapidly. Average production of natural gas is 4,048. 76 million cubic feet per day as against 3,986. 53 million during corresponding last year, showing an increase of 1. 6 percent. Natural gas is used in general industry to prepare consumer items, to produce cement, for manufacturing fertilizers and to generate electricity. In form of CNG, it is used in transport sector. Share of natural gas in energy consumption is 43. 7 percent. Due to price differential between CNG and Petrol, vehicles are using converted to CNG and approximately 2. 0 million vehicles are using CNG and currently Pakistan is the largest CNG user country in the world. Liquefied petroleum gas (LPG) contributes around 0. 7 percent to total energy supply in country and is being imported to stop deforestation in hilly areas. ). Coal: Pakistan has coal reserves estimated at over 185 billion tonnes, including 175 billion tonnes identified at Thar coalfields. Coal is primarily being used in brick kiln and cement industries and approximately 67 percent coal is imported because indigenous coal is not considered of good quality. Guddu plant is largest plant thermal operated plant with a capacity of 1,650 MW, while two largest Independent Power Plants (IPPs) in Pakistan are Kot Addu (1,600 MW) and Hubb River (1,300 MW). 3. 2 Renewable Resources : (Unlimited – sustainable – clean)Renewable energy resources are those, which are naturally replenished and comes from resources such as water, sunlight, wind, rain, tides, and geothermal heat. a). Hydro power: Hydro power is gen erated by using electricity generators to extract energy from moving water. Pakistan is having rich resource of energy in hydal power, however, only 34 % of total electricity generation is coming from hydro power. Currently we are having 6555 MW against the potential of 41000 to 45000 MW. Current Hydropower stations: Tarbella Dam : 3,478 MW Ghazi Brotha: 1450 MW Mangla 1,000 MW Warsak 240 MW Chashma 184 MW Potential Hydropower stations:Diamer-Bhasha Dam 4500 MW Munda Dam – Swat river in Mohamand Agency 740 MW Kalabagh Dam 2400-3600 MW Bunji Dam 5400 MW Dasu Dam 3800 MW 3. 3 Alternative Sources of Energy  : a). Wind: Wind power harnesses the power of the wind to propel the blades of wind turbines. These turbines cause the rotation of magnets, which creates electricity. Though Pakistan has potentials of wind energy ranging from 10000 MW to 50000 MW, yet power generation through wind is in initial stages in Pakistan and currently 06 MW has been installed in first phase in Jham pir through a Turkish company and 50 MW will be installed shortly.More wind power plants will be built in Jhampir, Gharo, Keti Bandar and Bin Qasim Karachi. b). Solar : Solar power involves using solar cells to convert sunlight into electricity, using sunlight hitting solar thermal panels to convert sunlight to heat water or air. Pakistan has potential of more than 100,000 MW from solar energy. Building of solar power plants is underway in Kashmir, Punjab, Sindh and Balochistan. However, private vendors are importing panels / solar water heaters for consumption in the market. Alternative Energy Development Board (AEDB) is working for 20,000 solar water heaters in Gilgit Baltistan.Mobile companies have been asked by the government to shift supply of energy to their transmission towers from petroleum to solar energy panels. c). Agricultural biomass /biodiesel : Biomass production involves using garbage or other renewable resources such as sugarcane, corn or other vegetation to generat e electricity. When garbage decomposes, methane is produced and captured in pipes and later burned to produce electricity. Vegetation and wood can be burned directly to generate energy, like fossil fuels, or processed to form alcohols.Brazil has one of the largest renewable energy programs from biomass/biodiesel in the world, followed by USA. Alternative Energy Development Board (AEDB) of Pakistan has planned to generate 10 MW of electricity from municipal waste in Karachi followed by similar projects in twenty cities of country. d). Tidal: Tidal power can be extracted from Moon-gravity-powered tides by locating a water turbine in a tidal current. The turbine can turn an electrical generator, or a gas compressor, that can then store energy until needed. Coastal tides are a source of clean, free, renewable, and sustainable energy.Plans are underway in Pakistan to harness tidal energy, however, no implementation has been made so far. 3. 4 Nuclear: Nuclear power stations use nuclear fi ssion reaction to generate energy by the reaction of uranium inside a nuclear reactor. Pakistan has a small nuclear power program, with 425 MW capacity, but there are plans to increase this capacity substantially. Since Pakistan is outside the Nuclear Non-Proliferation Treaty, it is excluded from trade in nuclear plant or materials, which hinders its development of civil nuclear energy.Remaining issues in development of nuclear energy are enricment of uranium from U235 to U238, controlling chain reaction and dumping of solid waste. Pakistan Nuclear Power Reactors Reactor Type MW Construction started Commercial operation Karachi PHWR 125 1966 1972 Chashma 1 PWR 300 1993 2000 Chashma 2 PWR 300 2005 expected 2011 Total 425 MW * Pressurized heavy water reactor (PHWR) – Canadian based reactors   ** Pressurized water reactor (PWR) – Chinese based reactors 4. Causes of Energy Crisis  : Pakistan’s energy crisis traces its roots to following distinct causes : * Growi ng Energy Demand over the years there is greater need of energy because of; †¢ increase in population, †¢ enhancement in lifestyle †¢ industrial and agricultural growth †¢ greater transportation needs * Lack of proactive and integrated planning for production of energy: Pakistan has had wider potentials to tap energy, however, due to lack of any integrated/proactive planning, very less number of power producing plant were installed to meet futuristic demands. Resultantly, over the years, the gap between energy demand and supply drastically grew and now against demand of 20000 MW, we are having around 11500 MW. Imbalanced energy energy mix Energy mix in Pakistan is quite imbalance in comparison to other countries, with greater reliance on non-renewable resources of gas (43. 7 %) and oil (29 % – majority of which is imported). Prices of petroleum products/crude oil fluctuate and in current Afro-Arab political crisis, the oil prices are likely to increase man ifold affecting oil prices in Pakistan. A rational energy mix planning ought to be developed giving greater dependency to renewable (hydel power), indigenous (coal) and alternative energy resources (wind and solar energy).Nuclear energy can   * Non-utilization of enormous indigenous energy resources: o Thar Coal: Pakistan is having one of the largest coal fields in Thar, having reserves of more than 175 billion tones, which exceeds equivalent oil reserves of Saudi Arabia, Iran etc. In addition to power generation, this coal can be used for chemical and fertilizer production. Moreover, employment provided to workforce can be instrumental in increasing GDP and economic prosperity to many families. o Hydal power generation :Pakistan has potential of hydro resources to generate 41000 to 45000 MW, however, only 6555 MW is currently being generated by this important renewable resource. Four large hydro power dams namely Kalabagh 3600 MW, Bhasha 4500 MW, Bunji 5400 MW and Dasu 3800 MW ca n be constructed to generate hydro electricity. Similarly, many small to medium hydro plants can be installed on rivers and canals etc. 5. Consequences of Energy Crisis : i). Economic Factors: Energy is pivotal for running all other resources and crisis of energy directly influences all other sectors of the economy.The economic progress is hampered by decline in agricultural productivity as well as by halting in operations of industries. One important factor of lower GDP and inflation of commodity prices in recent years is attributed to shortfalls in energy supply. ii). Agriculture Sector: Agricultural productivity of Pakistan is decreasing due to provision of energy for running tube wells, agricultural machinery and production of fertilizers and pesticides. Thus higher energy means higher agricultural productivity. iii).Industrial Sector: Nearly all Industrial units are run with the energy and breakage in energy supply is having dire consequences on industrial growth. As a result o f decline in energy supply, industrial units are not only being opened, but also the existing industrial units are gradually closing. iv). Unemployment: By closure of industrial units and less agricultural productivity, new employment opportunities ceased to exist and already employed manpower is shredded by the employers to increase their profit ratios. Thus energy crisis contributes towards unemployment. v).Social Issues: This factor is primarily related to the domestic usage of energy (cooking, heating and water provision). Load shedding cause unrest and frustration amongst the people and results in agitation against the government. vi). Poverty: Declination in economic growth, lower agricultural productivity, unemployment and shackling industrial growth result in increasing poverty. Currently, around forty percent of our population is living beyond poverty line and this ratio is increasing day by day. Ample control of energy crisis will surely yield in curbing the menace of pove rty. 6. Conclusion:Energy Crisis has, more or less, plagued all sectors of Pakistan’s machinery ranging from economy to industry, agriculture to social life, inflation to poverty and it is hampering national progress in a drastic manner. Nonetheless, menace of energy crisis can be overwhelmed by government through making effective policies and its proactive implementation. Simultaneously, it is the responsibility of us, the people of Pakistan, to utilize the available energy astutely and wisely to play our due role for progress of the country. 7. Recomendations/Solutions of Energy Crisis  : Energy crisis can be curtailed by : ). Reducing unnecessary energy use: o Usage of electricity saving devices o Awareness campaign for energy saving o Reduction in unnecessary transportations by developing good public transport systems and strengthening Pakistan railways   o Reduction in industrial uses with installation of effective equipment/ energy efficient and with increasing effi ciency of workforce (cost effective) o Decreasing reliance on rental power projects, because instead of doing any good, they are increasing prices of electricity. o Decreasing line losses by using efficient power transmission cables ii).Developing new energy resources : o Tapping indigenous resources (Thar coal) o Using renewable resources (water) by constructing new dams and hydro power plants   o Import of natural gas by IPI (Iran Pakistan India) and TAPI (Turkmenistan, Afghanistan, Pakistan and India) pipelines   o Import of electricity from Tajikistan -through Pak Afghan Tajikistan transmission- and Iran (approximately 1000 MW from each of them) pipelines o Utilizing alternative energy resources : Wind power Biodiesel /Biomass Solar Tidal o Enhancing civilian nuclear capacity ENERGY CRISIS IN PAKISTAN IntroductionPresent scenario of crisis †¢ Demand supply gap †¢ Counter measures Reasons of energy crisis †¢ Unrealistic plans and improper implementation †¢ Failure of introducing new projects †¢ Underutilization of resources †¢ Circular debt †¢ International oil prices †¢ Provincial prejudices †¢ Water shortage †¢ Transmission losses †¢ Power wastage †¢ Theft of electric power †¢ Accelerating demand †¢ Minimal research/exploration Immediate efforts/goals †¢ RPPs †¢ Stabilizing industrial sector †¢ Limiting commercial supply hours Short term goals †¢ Reviving non functional power plants †¢ Revamping transmission system Thar coal project †¢ IPI gas pipeline project †¢ Alternate/renewable energy sources Long term goals †¢ Conforming foreign policy and energy needs †¢ New dams †¢ Transparency †¢ Efficient techniques and usage †¢ Measures against power theft Energy crisis in transportation sector †¢ Biofuels/synfuels †¢ Standard of public transport system Hurdles †¢ Lack of will and implementation †¢ Corruption and malpractices †¢ Trust deficit conclusion â€Å"It is evident that the fortune o f the world’s human populations, for better or for worse, are inextricably interrelated with the use that is made of energy resources. M. King Hubbert The nexus between economic prosperity and self sufficiency in energy has become essentially vital for Pakistan. Today the energy crisis looming before us is the culmination of a long list of governmental failures, malpractices along with inefficient ways of consumption and a perpetually fragile economy. The futility of apparent counter measures can be attributed to slow or non existent exploration and exploitation of new resources; outdated administrative and technical systems; lack of tactful diplomacy at international level, all requiring immediate attention.Presently, the demand-supply gap in the energy sector has reached one of its highest in the country. This gap subsequently produced huge shortage of power that has adversely affected the economy. The crippling economy was further damaged when many industrial units had to be shut down, rendering thousands jobless. Consequently, this on going chain of crises is accelerating inflation. The government has intended to counter it with Rental Power Plants (RPPs) like the previous IPPs and to ease the burden on common man the authorities claim to be providing continuous subsidies in the power sector.However, the constant trust deficit on the part of masses is not only due to the transparency issue of RPPs, it is majorly due to a constant increase in power failures and shortage, revealing an increase in the crisis instead of signs of recovery. If we take a look at the factors contributing to this enormous problem, the first and foremost one comes out to be the absence of any long term planning along with constant application of such plans. Sadly, the failures of previous governments to increase the supply of energy by new measures against the escalating demand are glari ngly obvious.Small scale projects like the Ghazi barotha only put a temporary halt to the arriving crisis instead of nipping it in the bud. Secondly, the under utilization of available resources- especially hydroelectric one which can produce double the energy it is producing now- is another major setback. The government again fails or neglects to consider the shortages in winter and up-gradation of the hydroelectric and the thermal plants regularly. Thirdly, the ‘circular debt’ is like an invisible impediment subtly fuelling up the crisis.It is an inheritance of former subsidies which the government failed to pay to the power companies, who in turn could not pay the oil and gas companies for supplies. Add to this the fluctuating international oil prices and the failing economy_ the war against terrorism and decreasing Foreign Direct investment-worsened the problem and induced further power and imported oil shortage. Subsequently, the political heads had to turn their e yes back to hydroelectric power generation.But the projects like Kalabagh Dam became victims of narrow mindedness and provincial prejudices which led to failure of consensus of opinion. Had the Kalabagh Dam been built on time, we would not be confronted with this crisis today. Also the acute shortage of water; the curtailed supply in eastern rivers by India; major consumption and wastage of water in irrigation and the decreasing capacity of Mangela and Terbela Dams due to sedimentation render the hydroelectric power generation equally problematic as the thermal power generation.Of the chronic factors, the heavy line losses plus the old and poorly maintained transmission system is a grave administrative and technical failure of public sector power companies. These line losses are comparatively very low elsewhere in the world. Similarly, in the industrial and agricultural sectors which avail more than seventy percent of total power, the outdated techniques and malpractices of consumpt ion waste more than a third of the consumed power. Moreover, the masses do not remain behind in adding to this loss. The theft of electricity, especially in urban areas has become a routine matter.Due to the decades old perception that this is a never ending crisis and no accountability whatsoever, people tend to use unfair means of obtaining electric power. Another reason is the unprecedented increase in demand of energy. It is due to the trend of enjoying luxurious life style in the past decade. This increased demand by the domestic section has greatly disturbed the usually articulated demand and consumption status. Last but not least, snail paced research, minimal exploitation of new energy reserves and exploration of new oil and gas field damages progress in the energy sector.Couple this with the never ending corruption and lack of implementation in government and power companies this crisis has become a consistent and self perpetuating one. Seen in this perspective, Pakistan no t only needs immediate efforts to reduce the demand-supply gap but also some elaborate and well chalked out immediate, short and long term plans and efforts. Thankfully, some sections in the society are aware of the magnanimity of this dire problem. The RPPs are expected to start working soon and the subsidies in the energy sector are still cushioning at least a part of the blow.But the real issue is of determining priorities and extracting maximum results even from this bleak scenario. Keeping this in view, the first policy of the government should be to supply uninterrupted supply of power to the industrial units, small or big, especially in industrial cities like Faisalabad, Gujaranwala. Also the power supply should be continuous for small local businesses throughout the country. Even if it equates to the continuation of the domestic shortage for a while, at least half of the RPPs should be employed for the industrial section.In addition, there are some non-operating power statio ns in the country which only require a little investment and technical improvements to revive them. Such power units should be made effective to pull the economy out of complete doom. Secondly, the markets and shopping centers should be strictly enforced to close their business till 10 pm at night. This save power in different parts of each city can be diverted towards the domestic consumers by means of an effective administrative local system. The media and provincial governments would be of utmost importance in this strategy.The media specially, can acquire public support and educate masses in this regard. Resultantly, they will be able to remove the trust deficit between the government and the people. Coming on to the short term goals, the main focus should be on the revival of those dead power generation units in Sindh and Punjab which can be made functional again and the systematic up-gradation of thermal and hydroelectric plants. Resultantly, these projects will maintain the s mooth flow of energy and will at least prevent any further widening in the demand-supply gap.Similarly, the replacement of transmission lines to reduce losses should fall under the auspices of the provincial governments and ministries with proper allocation of budget from the center. The replacement of expired transmission systems is long overdue. This process must be gradual and systematic to refrain from becoming a drain on the resources and it should be initiated from areas most severely hit by energy shortage. After curbing and curing the internal ills, the attention should be diverted to exploration of new fossil fuel reserves (natural gas).As the thermally generated accounts for the major share of power in Pakistan, it should be dealt with effectively. Contrary to the deficit of oil reserves, the coal reserves in Pakistan are the second largest in the world. But the delay in switching from indigenous energy sources to coal is due to the snail paced progress in the Thar Coal Pr oject that is in collaboration with China. China’ rocketing economy has driven coal industry into a new era of efficient utilization. Pakistan should take heed from China’s example and should gain technical assistance from it.Both countries can collaborate in Gwadar and Thar to explore and exploit new gas and coal reserves. Coming on to the gas pipeline projects, the IRAN-PAKISTAN-INDIA (IPI) pipeline is most realistic plausible one presently. It is at an efficiently advanced stage of implementation but has fallen prey to the disagreement in pricing formulas and trust deficit between India and Pakistan. Both the thar coal and IPI project require tactful diplomatic maneuvering and improving ties with India. An agreement between the two countries on IPI will enhance the prospects of resolving the water issue as well.Another aspect of solving this problem is the utilization of alternate and renewable resources of energy. It has been adopted by many developing and develope d countries of the country to avert this crisis, such as Brazil, India, U. S. , Holland etc. Pakistan however, lags far behind in this regard. Consequently, some NGOs and public communities have took initiative in harnessing the renewable resources of energy such as wind and solar power. Pakistan is ideally situated to make use of both these resources. Isolated cases of developing these modes of energy can be seen in the illages of Thar desert ( solar energy ) and in some areas of Thattha and Karachi ( wind energy ) but it still needs massive government support. Interestingly, the Alternate Energy Development Board (AEDB) of Pakistan has collected data of all areas in the country suitable for making use of these alternate sources of energy but initiative for utilization of these sources are absent. Pakistan can very efficiently make use of its long day light hours and wind power in the coastal region to produce power for upcoming years.Most important in the long term planning and go als must be to streamline the foreign policy of the country according to its economic and energy needs. Improving and increasing ties with future energy rich countries must not be neglected. As mentioned earlier, China can be a great asset in technical training and facilities. Similarly, bilateral relations with Russia, Central Asian, East African states needs to be strengthened. These countries are the new energy hubs of the world, and being mostly land locked (C. A. states) can make use of Gwadar port and in return assist Pakistan as well.Taking Provincial prejudices and politics into view, the matters which are indispensable for the survival of the country and economy should be kept above such strife. Building new dams, at least Kalabagh dam should be taken on without and delay. Transparency and clarity in the policies and implementation methods of government and public sector power companies is of paramount importance. Without checking corruption and applying stringent measures against malpractices, all well executed policies will ultimately become another drain for the economy.Moreover, educating the stakeholders and workers in the industrial and agricultural sectors on adoption of new and efficient practices of water and energy consumption will tend to reduce the wastage of energy. The theft of electricity must be considered and declared a heinous crime and any violations by domestic or industrial users should be liable to legal penalties and complete power cut off for such consumers. Taking a look at the energy crisis in the transportation sector, there is no doubt that fossil fuels are indeed depleting in the world and of reserves natural gas in Pakistan.To curb the hike in prices and supply shortage , research and exploration of new sites must be given impetus under the patronage of AEDB. Meanwhile, bio fuel ( alcohol or synthetic fuel ) can be produced quite easily in Pakistan. Raw materials for this fuel being wheat and other cereals are in ample su pply in Pakistan. Alcohol can be easily prepared by fermentation of molasses and is already a proper local industry in the country it just needs to be diverted in the right course. Finally, the system and standard of public transport must be improved to discourage the trend of personal vehicles which leads to greater demands of fuel.Making policies has never been the plight of our government. It is the lack of implementation which keeps the wheel of crisis moving. Today our government not only needs to take initiatives and hard decisions it also needs to give a boost to the dying economy by providing unimpeded supply of power to industries. Secondly, corruption, misuse of funds, malpractices of energy consumption and wastage must b avoided and eradicated at all costs. Last but not least, the public trust and support is of utmost important. No policy can succeed if it doesn’t enjoy public support.Media can play an effective role in creating awareness and trust that it is actua lly a global crisis which can only be solved with help and conscious effort by every citizen. Conclusively, curbing the energy crisis requires transparent efforts at every level imaginable. The future policies and projects should be so oriented as to make Pakistan self sufficient in the energy sector. Self sufficiency in the energy sector will be the key to a flourishing economy, and a stable economy can serve as a device of curbing several interlinked adversities. The sooner we realize the gravity of this as a whole, the sooner we will emerge out of this crisis.

Friday, August 30, 2019

Economics †Puerto Rico Essay

In this paper will identify, describe and production costs of the Company San Juan Cell Phones compares. In turn, the potential risks are identified in making management decisions. In addition, will analyze and assess what are the best ways to prevent negative consequences for the company. The term cost refers to the amount or representing a product or service according to investment in material, labor; training and time that you need to develop it. As you can see, the term is characteristic and central to economics as it is the point at which any part of trade or economic relationship between two parties. The cost is to be paid by those who want to receive a product or service to have it in his possession or under his control. Today, the cost of a product or service is expressed in most situations in terms of money or capital (which may itself vary currency according to the region or area in which the exchange takes place). However, in antiquity and long, humanity carried on their t rade and economic exchanges through the delivery of other items such as spices. The cost of the products is then provided to the equivalent cost for a given quantity of spice. Economic Costs According to McConnell & Brue (2008), Economic costs include all payments that must be received by resource owners to ensure a continued supply of needed resources to a particular line of production. Economic costs include explicit costs, which flow to resources owned and supplied by others, and implicit costs, which are payments for the use of self-owned and self-employed resources. One implicit cost is a normal profit to the entrepreneur. Economic profit occurs when total revenue exceeds total cost (= explicit costs + implicit costs, including a normal profit).  Differentiate between short-run costs and long run depending on use of whether variable or fixed productive factors. In Short-run costs: have fixed and variable inputs. Therefore, variable and fixed costs will be. Within the short-run costs are: Total Cost is the market value of all inputs used to produce a product. It has 2 components: fixed and variable costs: (1) is determined and unchanging value that is independent o f production volume, are those costs always exist e.g. rent, electricity, etc. (2) A Variable cost is a cost that is incurred depending on the volume of production, human cost (work) and commodities. (3) The marginal cost is the change experienced by the total cost when an additional unit increases production. Grows in contrast to the marginal productivity sense, if it grows, the marginal cost decreases. In Long-run costs: there are only variable costs. In the long run, firms have no fixed costs are all variables that the factors of production are thus the total cost, which is equal to the variable costs. The curves in the long-run costs, they say to each output, with the lowest cost that can be obtained, assuming all inputs vary. The curve means short-run costs will be tangent to the long-run average costs. The total long-run cost is equal to all the variable costs of the company. Some of the reasons why the average total cost curve to be increasing, stable or declining: (1) the means and long-run marginal costs, like a â€Å"u† because it produces income production. (2) When yields are constant output grows proportional / the increase factor, and average costs are constant. (3) When yields are rising, the long-term costs decrease. (4) When yields decrease long-term costs are rising. (5) Normally the company began taking increasing returns but as the situation is complicated diminishing appear. Overall yields are mixed. San Juan Cell Phone Scenario This scenario presented the actual dilemma of company San Juan Cell Phone in Puerto Rico. In this scenario the production manager need to analyze the potential risks, consequences positive or negative and possible solutions; of accepting the order of 100,000 units of cell phone of the company â€Å"Big Box† and accept or reject the external production of the cell by outsourcing, an external company called â€Å"Original Equipment Manufacturer†. In order to make a recommendation on what would be the best alternative for this scenario and to provide a solution that does not affect the company,  analysis and recommendations will be divided into phases. In the first phase will analyze the unit profitability report of San Juan Cell Phones, which is found in Table 1 in the statistical appendix of this document. This table shows that the company San Juan Cell Phones has a price per unit for the Alpha model for $ 20, of which the variable costs per unit are $8, fixed overhead s per unit are $ 9 and a profit per unit of $ 3. The company â€Å"Big Box† will not pay more than $ 15 per cell phone; which implies a loss of $ 5 dollars per unit price for San Juan Cell Phone. If we analyze the loss from the perspective of the total cost of production, San Juan Cell Phones would have a total loss of production of $200,000, even without adding that there was no profit from this production. This loss would lead to other serious problems to company profitability, which will be difficult to replenish in the short term because the equilibrium price in the market is $15. Therefore can notice an excess supply. San Juan Cell Phones must make a comprehensive analysis of their variable and fixed costs and trying to lower them to compete with the market price and maintain profitability. On the other hand, evaluating the offer that provides OEM to San Juan Cell Phones, where the price of production per unit is $14; we can see that San Juan Cell Phones could meet the production requested by Big Box and in turn obtain a profit of $100,000. This in turn allowing you to San Juan Cell Phone keeps the market equilibrium price of $ 15. Where the company can lower the current price per unit and maintain its excess demand in the market and maintain profitability. As part of this analysis shows that the grant to the outsourcing manufacturing, with the penalty would take to keep all their employees working and running the factory capacity. And therefore their bonus, which is based on the overall profitability of the company, is affected. Recommendations of best alternative solution In the second phase of this analysis will make the recommendations to follow to meet the expectations required by Bib Box, without loss of profitability, and to meet the value established by the company. Below the suggested recommendations: (1) Is to secure the order of 100,000 phones required by Bib Box. (2) Establish agreements with OEM outsourcing. In this agreement the Alpha prototype model and the quality of the prototype will be established, also limit the time of delivery and the amount of production is  settled. In turn, the price of $ 14 per unit, which is not negotiable, is settled. (3) Establish a plan for reengineering the organization structure, technology and the human factor in the production line of Alpha models as initial phase of the process. At a later stage the reengineering organization to another production line would be extended. Observe the appendix A: Guide for Strategic Planning and Organizational Reengineering. These recommendations are aimed to the San Juan Cell Phones company, can get the desired order to maintain profitability. In addition to be able to maintain its equilibrium price in the market, you can keep your excess demand, increase their volume of production and profits. In addition meet its corporate values ​​to provide its customers with high quality and exceed the expectations of them. Conclusion In the scenario presented the administrative task being viewed uncertain and challenging, as a number without variables, change and transformation is affecting it. It’s time for San Juan Cell Phones, perform an analysis of their strengths and limitations of your environment and make a formulation of strategic alternatives. This analysis will take the company to be more efficient and effective in meeting the needs of its consumers, taking into consideration an adaptability, a proactive character and flexibility to embrace change, in turn have a better interaction with new technologies and positive changes in the values ​​of corporate society attitude. Reference McConnell, C. R. & Brue, S. L. (2008). Economics: Principles, problems, and policies (17th ed.). Boston, MA: McGraw Hill/Irwin. Pugel, T. A. (2007). International economics (13th ed.). Boston, MA: McGraw Hill/Irwin. University of Phoenix. (2014). Student Resources. Retrieve from https://newclassroom3.phoenix.edu/Classroom/#/contextid/OSIRIS:46311129/context/co/view/activityDetails/activity/d547f818-bc95-4e40-b161-61f94462bdb7/expanded/False Statistical Appendix

Thursday, August 29, 2019

Cognitive Development Theory Essay

As a prospective educator, it is important for me to understand the cognitive development theory and how it applies to individuals. Cognitive development is basically how the thought process begins. It is the way that people learn and how mental processes become elaborate and develop. These processes include remembering things, making decisions, and also solving problems. In order for a teacher to be effective, one must understand how children develop mentally so that each student can be accommodated in the classroom. There are many theories regarding cognitive development, and there are several factors that remain constant throughout all of them. These factors form some of the basic premises on cognitive development, which include the ideas that all people go through specific steps or stages of learning or understanding, and that certain qualifications must be met before learning can occur. It is the actual specifics of these basic premises that cognitive theorists have differing opinions about. (Slavin, 2009) Two theorists that display the basic premises of cognitive development are Jean Piaget and Lev Vygotsky. Both theorists have similarities and differences when it comes to their views on cognitive development. We will first begin with the views of the two on the nature or development of intelligence. Piaget believed that children are naturally born with the ability to both interact with and make sense of their environment. Children as well as adults use patterns of thinking called schemes to deal with different things in the world. The process of assimilation and accommodation is used to maintain balance in our daily lives. Piaget believed that â€Å"learning depends on the process of equilibration. When equilibrium is upset, children have the opportunity to grow and develop. † (Slavin, 2009, pg. 32) Different experiences that we face and factors in our environment contribute to developmental change in us. Vygotsky shared some similar ides with Piaget including the belief that the environment plays a huge role in the development of intelligence. He also believed that â€Å"development depended on a sign system, the culture’s language or writing system, that children grew up with. â€Å"(Slavin, 2009, pg. 2) Both also believed that there is an invariant sequence of steps that is the same for everyone, and that development is influenced by cognitive conflict. While the two share a few similarities on the development of intelligence, there are also differences as well. Piaget feels that development precedes learning. This simply means that something must take pace before learning can begin. Vygotsky, on the other hand, feels that learning comes before development which is the exact opposite of Piaget. It simply means that you must learn something before development can occur. Piaget and Vygotsky also had both similarities and differences on the stages of development. We will first start with the differences beginning with Piaget who believed that there are four stages to cognitive development. They are the sensorimotor, perioperational, concrete operational, and formal operational. He felt that all children passed through these stages and that you could move faster than others, but not skip a stage. (Slavin, 2009, pg. 33) The sensorimotor stage occurs at birth through two years of age. It is the stage where infants explore their environment using the five senses and motor skills. This includes sucking, grasping, and touching. The perioperational stage is from two to seven years old. Language develops at a fast pace in this stage. At this time the child’s thinking is also very self centered, and they lack the understanding of conservation. The concrete operational stage is from ages seven to eleven. At this time, thinking tends to shift from being self-centered to more logical. Problem solving is no longer restricted and the idea of reversibility also occurs. The last and final stage is the formal operational stage. This happens beginning with the age of eleven moving on into adulthood. Systematic experimentation is used to solve problems both symbolic and abstract thinking are now possible in this stage. Vygotsky felt that there was not stages, but different elements to cognitive development. The first element is private speech. â€Å"Private speech is a child’s self talk, which guides their thinking and actions, eventually internalized as silent inner speech† (Slavin, 2009, pg. 43) When children are struggling with a difficult situation you often see children talking to themselves to help cope with the situation. When we become adults we still talk to ourselves, but it is usually silent. The next element of cognitive development is the zone of proximal development or ZPD. â€Å"This is the level of development immediately above the person’s present level. † (Slavin, 2009, pg. 43) To better understand, this can be described as something that the child may not have learned yet, but are capable of being taught with the assistance of an adult. Educators often refer to this as a â€Å"teachable moment†. (Slavin, 2009, pg. 43) Now that we can see the differences between the two theorists, we can now explore the similarities between the two. Both heorists understand the importance of a child learning a culture’s sign system. They both feel that this has a significant impact on development. The two also agree that environmental factors such as sounds, signs, and objects are equally important. Lastly, the two theorists believe that there are some tasks that a child may not understand depending on age, but Vygotsky feels that if it is in the zone of proximal development then the child can be assisted with the help of an adult. Educators have been using both Piaget’s as well as Vygotsky’s theories in the classroom for years. An example of an activity that can be used in the classroom using Piaget’s theory of learning takes place in a kindergarten class. The teacher would ask the students to share what they do when it is raining outside. At this age we are in the perioperational stage where children tend to be egocentric. Some say that they go outside and jump in mud puddles while others may say that they stay inside and play with their toys. The children would share their experiences and they would all be correct because not everyone does the same thing. You can use Vygotsky’s theory of learning in at work in the classroom where third grade students are learning how to classify different types of dirt. You can place the students in groups where they can discuss how you properly classify the dirt. This will allow the students to hear other students thoughts, and see what methods they use to classify. Using this type of cooperative learning allows the students to learn from each other. When comparing both classroom applications we see that both classrooms are working as groups learning from each other. Piaget theory is seen in both classrooms. In the kindergarten classroom, the classroom is seeing that there are different ways to deal with the rain. The students are sharing their personal experiences and showing that there is no wrong answer. There are many ways of doing things . In the third grade classroom, the students are able to classify the dirt using touch and sight to see and feel the differences in each type. Both classrooms are interacting with the environment and learning from it. Vygotsky’s cooperative learning is also being played out in both classrooms. In the kindergarten classroom, the students are learning that there are different activities that can be done outside in the rain. Similarly, in the third grade class the students are using cooperative learning to find different ways of classifying dirt. In both classrooms the students are using the think out loud process. The differences in the two classrooms also stand out. When applying Piaget’s theory in the kindergarten classroom, you see that the students are in the perioperational stage. The students are egocentric and feel that what they say is the only right answer to the question. In the third grade class, the students are in the concrete operational stage. They are able to easily look at and see the differences in the types of dirt that they are working with. When it comes to Vygotsky’s theory in the kindergarten classroom, the students are working within their zone of proximal development. The students may not understand that they can do more than one thing in the rain because they have done the same thing every time. The teacher is using this as a teachable moment to allow the students to teach each other the different things that can be done. In the third grade class, on the other hand, private speech is being used. The students are saying their thoughts out loud to classify the dirt. When the students are using cooperative learning they are learning the different ways in which the other students use to classify the dirt. In conclusion, we can see how and why it is important to understand and know how to apply cognitive development theories in the classroom. Both Piaget and Vygotsky played major roles in how we teach our children in today’s world. We can use information and skills from both theorists to shape our students into great learners.

Wednesday, August 28, 2019

Entrepreneurship Essay Example | Topics and Well Written Essays - 1500 words - 4

Entrepreneurship - Essay Example James Caan and Steve Jobs are some of the well known entrepreneurs of the world. This paper is about interviewing a real business owner (whom I thought to be an entrepreneur) and identifying his/her good and bad business practices. The paper will suggest whether the chosen individual is a true entrepreneur or just a business owner who is not in fact very entrepreneurial. In this paper, Mr. Vasyl Fenin, a medium business owner from Ukraine is interviewed to obtain a clear view of various factors relating to entrepreneurship. Analysis Fenin is operating a medium-sized medical business in different cities of Ukraine. A rediff business article (n.d.) says that the major factors motivating an entrepreneur to start a new venture include desire for autonomy, aspiration for creating something new, achievement of financial independence, and accomplishment of personal goals. It is observed that Fenin had not been motivated by any of these factors before he started his business, for he says, â €Å"I just gave it a try†. Once he realized that this business is a good source of income, he planned to expand his operations. Hence, Fenin’s act does not represent the entrepreneurial characteristics identified by some scholars. According to some, entrepreneurs will have high level of determination and commitment and they will be action oriented as well as result oriented (Kumar et al 2008, p.2). In other words, an entrepreneur should have clear objectives. From the responses documented, it is obvious that Fenin

Tuesday, August 27, 2019

Business organisation and policy cartels and monopolies Essay

Business organisation and policy cartels and monopolies - Essay Example On the other hand, buying cartels aim at purchasing raw materials for its members while the output determining cartels determine the quantity of output for each member unit as the name suggests (Sangla 2009, p.181). Without government intervention, an isolated monopolistic firm would only exist in an ideal world. This is because most monopolistic firms make a lot of profits thus encouraging the formation of rival firms. In the long run, the new firms break the monopoly. Most governments in the 1920s embraced mergers and trade unions in key economical sectors such as chemical and metal industries (McTavish 2005, p.52). However, most of the business organizations preferred cartels to the other forms of trade convergence. After the World War II, the business field developed thorough monopolies and restrictive practices, which had salient effects on business organizations (McTavish 2005, p.52). Currently, it is only America in the whole world, which has not legalized cartel formation. One of the most popular cartels today is the organization of petroleum-exporting countries (OPEC). OPEC was established mainly to control the amount of oil each member produced. Member units that form cartels always enjoy a wide variety of benefits. Each member usually has a guarantee to earn fixed minimum profit which is not the case with other business institutions. In addition, all marketing and other secondary functions of the individual business organizations such as transportation, advertisement and marketing research are normally carried out by the cartels (Sangla 2009, p.181). In addition, the member firms also enjoy price control. Since, in working as a pool, the individual firms acquire monopolistic characteristics, they are in a position to charge the prices of their products at their own will. Conversely, the cartels and monopolistic

Risk Assessment For nonprofit hospital Essay Example | Topics and Well Written Essays - 1750 words

Risk Assessment For nonprofit hospital - Essay Example Evidently, the industry is highly vulnerable to information theft more than ever before. In modern healthcare settings, risk factors are impulsive and hence comprehensive risk assessment programs are essential to meet the challenges. According to the current day concept, risk assessment is not simply a precaution but a preventive healthcare approach that mitigates the impacts of a number of risk factors (The National Patient Safety Agency, 2007). Why Risk Assessment It has been stated that â€Å"each technical advance brings new security holes† (Rogers, 2011, p. 2). According to the writer, storing data over the internet involves incessant threat from hackers and malware. Burger (2010) describes the Kern medical center’s intense struggle with computer virus to regain its data, for the virus had downloaded ‘tons of porn documents’ and crashed all computers causing great dilemma. The incident has been cited by many experts to show that hospital data is always vulnerable to identity theft. For instance, Fell (2010) also points out that hospital computer systems are under the threat of information theft referring to the mayhem caused by virus at Kern Medical Center. According to the officials of UC Davis Police Department, the author says that "Hospitals are a soft target where a cyber attack can cause a lot of damage quite easily† (as cited in Fell, 2010). ... 3-5), the business environment highly involves intense competition and technical complexity which raise considerable amount of vulnerability risk to organizations of every type. Hence it is important to have a reliable risk assessment program for every firm to ensure the security of their data and other areas of organizational functions. And risk assessment in the view of the writers is â€Å"a systematic process for describing and quantifying the risks associated with hazardous substances, processes, action, or events† (Covello & Merkhoher 1993, p.3). Risk Assessment Tools There are certain effective free vulnerability scanning tools that can help non-profit organizations to address this issue. Nessus is one of the most important security vulnerability scanning tools. The website gives very detailed information about the vulnerability scanning tool-Nessus. The site has included several frequently asked questions and their answers along with the basic instructions for its user s. A close analysis of Nessus’ official website gives a clear picture of its total functions (Nessus). The relevance of Nessus has been well described in Rogers (2011). According to the author, tools like Nessus have been helping organizations to assess the vulnerability of their systems. It can also be used to check for misconfiguration vulnerabilities like open mail relay and missing patches (p.291). Evidently, Nessus is widely accepted as the most comprehensive vulnerability scanning program available today, for it helps clients to assess the level of their system’s vulnerability to data theft or virus attack (Nessus: online encyclopedia). The website, SecTools.Org conducts regular surveys to identify and list the community’s favorite software through multiple

Monday, August 26, 2019

Modern Judaism Essay Example | Topics and Well Written Essays - 1500 words

Modern Judaism - Essay Example A second covenant was made some 450 years later when Moses led the Jews from slavery out of Egypt back to Cannon. It was during this exodus upon Mount Sinai that God told Moses the ten commandments, now contained in the Torah or Old Testament, the first five books of the Bible Genesis, Exodus, Leviticus, Numbers, and Deuteronomy . It was here upon Mount Sinai that saw the beginnings of the structured religion, Judaism. The religion of Judaism is ethical; when the Israelites accepted the ten commandments they committed to follow a religious code of law. The Torah contains 613 commandments from God which teaches them how to act and think about life and death. The religion of Judaism believes that God will judge people by their actions alone this leads to a fundamental difference between Christianity and Judaism. Christians believe that all humans are born with original sin and that this sin cannot be absolved by oneself but that the sacrificial death of Jesus was atonement for all humans' sins. Jews on the other hand do not believe in original sin but believe that all have good and bad in them and that they have the choice of moral actions, Jewish principles are that humans themselves decide how to act and it is their actions that will be their salvation in the face of temptation, whereas in Christianity even the thought of temptation is classed as a sin. 1 Judaism is monotheistic; there is only one god, in Christianity the idea of trintarianism exists, God the Father, God the Son an God the Holy Spirit. Whilst all three represent the one God Almighty in Judaism God cannot be divided. Whilst both religions share the books contained in the old testament many Jews see that Jesus replaced Jewish law. The New testament containing the Gospels and scriptures of Jesus' disciples is not believed or is part of the Hebrew Bible. Whilst Jews do not deny the existence of Jesus they do deny that he was the messiah as they argue he did not fulfill what the prophets had said he would. The coming of the messiah or the Moshiach is a belief held by all Jews however the belief is that when he comes there will be peace created on earth, Jesus was not on this earth in times of peace and there has never complete global been peace since his death. Jewish faith proclaims that every generation has a person born who could potentially be the moshiach but only if the time is right will that person become the messiah however if they die before their mission is completed then he has still yet to come. 2 http://www.jewfaq.org/moshiach.htm Moshiach: The Messiah 2. History and Background the Worldview (2 pages) a. Describe the origin or beginning of this religion/cult. b. What are the major believes of this religion/cult and how do they contrast with the beliefs of Christianity c. Be sure to address the beliefs of your chosen worldview concerning Jesus Christ, their concept of salvation, and how salvation is attained. Instructions: RESEARCH PAPER At the end of the fifth week, you are required to turn in an academic research paper. REQUIREMENTS for the PAPER 1. Length - The Paper should be AT LEAST 5 -7 pages of text (to meet the minimum the 5th page MUST be a full page). If your paper does not meet the 5 page minimum

Sunday, August 25, 2019

Understand the functional nature of the Christian Faith rooted in Research Paper

Understand the functional nature of the Christian Faith rooted in human nature,the cosmos, Christian revelation,and Jesus - Research Paper Example Within the structure of the human life, we can distinguish the inner and outer heart and functions. Therefore, faith is considered as the highest function in human existence. This on one hand implies that believing is the only function, and on the other hand it the most important of all functions. When believing is only functional, it implies that faith is not identical with the heart, but it is determined by the heart in its direction toward good or evil. In short, the whole man is religious and his life is a walk before the face of God in obedience or disobedience (Albi). Since the nature of the Christian faith is functional, it is subject to functional law. In this respect, it is identical to all other functions. Furthermore, faith has an analytical function whose nature is to analyze and distinguish. Distinguishing simply entails noting diversity existing independently with respect to its distinguishing activity. Therefore, the analytical is able to note the distinctness of law and function not only in other law spheres but also in the case of analytical itself (Albi). Faith is a fundamental pillar in Christianity since in its absence, spirituality cannot exist, and hope is doomed to crumble. Also, it is the fundamental principle of the religion of Christ. Many people who consider themselves Christians don’t really understand what faith is. However, the Christian faith is grounded and if the foundation is faulty, then it unlikely that structures built upon it will be strong (Boice). According to the Christian faith, the cosmos and all its components were created by God. The ancient Jewish communities believed that the cosmos consisted a flat shaped disc planet that floated on water. According to them, the world was made up of the underworld and the heavens. However, the Jews later adopted the idea that the underworld was a place where

Saturday, August 24, 2019

Ways in which Movies distort our image of the World Essay

Ways in which Movies distort our image of the World - Essay Example Technology has made it possible for movies to portray a particular skill or culture to those who watch them. The fun in watching a movie has made writers to take up the design of perfect movies for some of their books to attract people. This paper is a discussion of ways in which movies distort our view of the world. The director of a movie makes clear that the movie is as interesting as possible, so the people watching it tend to associate themselves with every bit of the movie. Movies tend to distort our perception of the world in many ways. First, movies tend to present false statements to some doubts that existed in the past. They tend to confirm the actual existence of that which we doubted. Although movies may at times distort the actual event, they serve as evidence of existence. For instance in the movie â€Å"Incident at Oglala† where two FBI agents were killed in 1970, some evidence is presented of the existence of a conflict between the government and AIM members. I ndividuals who watch this movie tend to sympathise with Mr. Peltier who is presented by the film producer as convicted without enough evidence (â€Å"Incident at Oglala†). This evidence is not the whole truth. Secondly, movies distort the subject of love. Love portrayed in movies is kind and the relationship between the two people is ideal. Most of the present day soap operas present the theme of love as the main theme. However, the movies present ideal situations that are hard if not impossible to achieve in the real world. Most of these movies are cast in rich and glamorous environments leaving the viewers with the wrong impression of the reality of life. The love between these characters is always passionate and the two find a way to spend time with each other. The couples spend their evenings having candle lit dinners, and in this way a true love is described. At times, a couple will adorn the whole house with roses to surprise the partner either his or her birthday or ab out some other celebration. On watching such movies, it is possible to hold onto such images and think they depict the entire truth about love. This has frustrated many young people in relationships because they want their love life to take the form of movie stars they have watched. The subject of love is fascinating and leaves people with good emotions that they want to hold on to for the rest of their lives. Movies provide the right emotions of the moment and, if taken at its face value, can ruin one’s true love life. Thirdly, different movie characters can distort our position. Movie stars have a good life, dress well, and enjoy what they do. Many viewers would do anything to live the way the movie stars live. It does not come by surprise that movie stars are able to influence fashion trends across the world. Movie cliches spread fast among viewers and become a form of language for many people. According to Famiano and Nickerson, â€Å"Primarily, they are less tangible, m ore perfect, and more predictable. In other words, they are stereotyped† (Famiano and Nickerson). To the fans, movie stars are true and communicate great power that represents success. Therefore, fans will identify themselves with their idols in different ways. They will talk like them, dress like them, and acquire some of their other behavioural traits. To the fans, movies depict great power and expertise carried by the actors. This is not true in many instances. Fourthly, movies distort our ethics and morals. Ethics is a system of guidelines that govern a community’s daily life. Because the law cannot reject all inappropriate or negative behaviours, professionals use it to their advantage. Ethics are self-driven, based on personal values, and the desire to do the right thing. After

Friday, August 23, 2019

Plot the overcoat Essay Example | Topics and Well Written Essays - 500 words

Plot the overcoat - Essay Example (Graffy, 2000) The story entails an exposition that defines the initial premise of the story and Akakiy’s character, a passive civil servant, who is highly skilled in what he does but due to his appearance and aloof nature is often mocked by his superiors and inferiors alike. The focus of the story is then shifted towards Akakiy’s overcoat that has immense significance in the story to the protagonist because the coat was symbolic of social acceptance and a new life for him. However, the overcoat also serves as the main source of conflict and complication in the story, as all the other characters of the story do not understand the significance of the coat to Akakiy. Other characters deem it as an ordinary object, which on the other hand was symbolic of social acceptance for Akakiy as mentioned earlier. Akakiy’s old overcoat is ragged and does not really help to protect Akakiy from the icy cold weather of St. Petersburg.

Thursday, August 22, 2019

Diversity Among Society Essay Example for Free

Diversity Among Society Essay The United States is made up of millions of people that come from different backgrounds, religions and cultures. These differences are what make America the type of place it is today, because without these differences we would be just like every other country in the world. One of the biggest resources that we would have to help find information on Diversity would be the internet and this is mainly because we can find out almost anything that we would need on a certain race or culture. An article from US Life-U. S Department of State had a quote from former U. S.  Secretary of State Colin Powell that states, â€Å"America is a nation of nations, made up of people from every land, of every race and practicing every faith. Our diversity is not a source of weakness; it is a source of strength, it is a source of our success. That quote alone can explain the true meaning behind the diversity in America and why we are the way we are. Through all the information that I acquired during this course, I have come to a better understanding of my racial and ethnical background. I have learned that according to the American Community Survey conducted by the U.  S. Census Bureau there are roughly over 36 million Americans that claimed there American heritage and that great political figures such as John F. Kennedy had an Irish background. I have also learned that it was never easy for Irish settlers years ago, because in the late 1800’s through the early 1900’s Irish immigrants were considered poor trash and were treated as such. It took many years for the Irish to establish a good name in America and over time people would stop hiding their Irish heritage and proudly display out in the open the love of their background. It is very hard to tell what the U. S. will look like in the year 2050, because we are constantly changing and we will continue to do this throughout our time. One thing that I can say is that we will have more humans then we know what to do with, because modern medicine is figuring out new ways to help people live longer and stay healthier. As for the demographics in the U. S. go, I would have to say that all raciest will be about equal in population and the white race will no longer be the dominant race. There will be more diversity in olitics and in the media, because as of right now we have a black president and that is just the beginning of what the future will be like. It’s hard to say if there will ever be any big race wars in America, because in today’s modern world everything seems ok, but no one is ever really sure what lies beneath the surface of individual groups. There could be a great race war that might happen in the future, or everybody will finally start to accept each other and we could live a beautiful existence. The challenge that the United States faces with diversity is that everyone is diverse and the want to be proud and show there true diversity. The main problem with that is that some other cultures don’t agree with them and they might want them to change their ways, or leave. This has always been a big challenge for the United States, because as time goes on we should be comfortable with diversity and accepting it along with ours, but there always will be certain people out there that will never change and they will make sure that they are heard within any means necessary. On the other side there are many great benefits that Untied States could benefit from with being such a diverse place. The fact that there are so many different views and opinions in America of the world around them, they could never truly run out of ideas. So many cultures offer such good things to America and they will continue to keeping adding on to that list. In today’s modern society certain individuals still feel the need for racial security and what that means is that someone might still feel more comfortable around their own kind. For example; a white family starts to pack up out of their home and move away from a changing neighborhood. The family finds a place that is more suitable towards their own security which is an all white suburb. The enroll their kids in an all white school and feel that nothing bad will happen to them. Little do they know is that their son’s new friend from school is a thief and deals drugs throughout the school. As time moves on the family starts to see a change in their child’s behavior, as if he was on some sort of drug, they ignore it, because they are amongst white people are they think that things like that couldn’t happen. Fast forward a little more and the child is grown up and in jail for armed robbery. The parents are clueless and confuse, because they never thought that it would happen in an all white neighborhood. Now the point to that story is that in order to foster a climate for acceptance we need to understand that not every other race is bad or will corrupt their race; in fact if each race got together and helped one another out with this kind of problem they could share their experiences and find a proper solution for the problem. The issue with racial profiling in the media is that the reader does not understand what is going on and assumes that a certain situation is a result of that entire race. A perfect example would be the 9/11 tragedy, because after that the media and the people reading the media pretty much made it seem that the situation was a result of all Muslims, when in fact it was only a handful of people that had hateful opinions towards America. The media may not be all bad and include nothing but racial profiling; in fact the media can also showcase the coming together of different races. The media recognized that we would have a black president and that many different races had voted for him, because they felt that he could do the job right regardless of color or background. If everyone in America could understand the power that we have and this is not because we have missiles or a great army, instead it is because we have so many different cultures that bring many different things to our Nation. We would have the power of America’s spirit on our side and it would be hard to break the spirit and will power of that many different people. I am also one that sadly shown my negativity towards another race at one time and it might of not been violent, because it was only in my head, but it goes to show that almost everyone in some way and another will or have experienced that and the best way to overcome that barrio is to understand, research and understand another cultures meaning to behind what they do and then an alliance with each other could happen and we could one day become brothers and sisters of the world again.

Wednesday, August 21, 2019

African Americans in the U.S. Essay Example for Free

African Americans in the U.S. Essay African Americans (American Blacks or Black Americans), racial group in the United States whose dominant ancestry is from sub-Saharan West Africa. Many African Americans also claim European, Native American, or Asian ancestors. A variety of names have been used for African Americans at various points in history. African Americans have been referred to as Negroes, colored, blacks, and Afro-Americans, as well as lesser-known terms, such as the 19th-century designation Anglo-African. The terms Negro and colored are now rarely used. African American, black, and to a lesser extent Afro-American, are used interchangeably today. Recent black immigrants from Africa and the islands of the Caribbean are sometimes classified as African Americans. However, these groups, especially first- and second-generation immigrants, often have cultural practices, histories, and languages that are distinct from those of African Americans born in the United States. For example, Caribbean natives may speak French, British English, or Spanish as their first language. Emigrants from Africa may speak a European language other than English or any of a number of African languages as their first language. Caribbean and African immigrants often have little knowledge or experience of the distinctive history of race relations in the United States. Thus, Caribbean and African immigrants may or may not choose to identify with the African American community. According to 2000 U. S. census, some 34. 7 million African Americans live in the United States, making up 12. 3 percent of the total population. 2000 census shows that 54. 8 percent African Americans lived in the South. In that year, 17. 6 percent of African Americans lived in the Northeast and 18. 7 percent in the Midwest, while only 8. 9 percent lived in the Western states. Almost 88 percent of African Americans lived in metropolitan areas in 2000. With over 2 million African American residents, New York City had the largest black urban population in the United States in 2000. Washington, D. C. , had the highest proportion of black residents of any U. S. city in 2000, with African Americans making up almost 60 percent of the population. Microsoft  ® Encarta  ® 2009.  © 1993-2008 Microsoft Corporation. All rights reserved. Atlantic Slave Trade, Atlantic Slave Trade, the forced transportation of at least 10 million enslaved Africans from their homelands in Africa to destinations in Europe and the Americas during the 15th through 19th centuries. European and North American slave traders transported most of these slaves to areas in tropical and subtropical America, where the vast majority worked as laborers on large agricultural plantations. See Slavery. Between 1440 and 1880 Europeans and North Americans exchanged merchandise for slaves along 5600 km (3500 miles) of Africa’s western and west central Atlantic coasts. These slaves were then transported to other locations around the Atlantic Ocean. The vast majority went to Brazil, the Caribbean, and Spanish-speaking regions of South America and Central America. Smaller numbers were taken to Atlantic islands, continental Europe, and English-speaking areas of the North American mainland. Approximately 12 million slaves left Africa via the Atlantic trade, and more than 10 million arrived. The Atlantic slave trade involved the largest intercontinental migration of people in world history prior to the 20th century. This transfer of so many people, over such a long time, had enormous consequences for every continent bordering the Atlantic. It profoundly changed the racial, social, economic, and cultural makeup in many of the American nations that imported slaves. It also left a legacy of racism that many of those nations are still struggling to overcome. Microsoft  ® Encarta  ® 2009.  © 1993-2008 Microsoft Corporation. All rights reserved. Civil Rights Movement in the United States, political, legal, and social struggle by black Americans to gain full citizenship rights and to achieve racial equality. The civil rights movement was first and foremost a challenge to segregation, the system of laws and customs separating blacks and whites that whites used to control blacks after slavery was abolished in the 1860s. During the civil rights movement, individuals and civil rights organizations challenged segregation and discrimination with a variety of activities, including protest marches, boycotts, and refusal to abide by segregation laws. Many believe that the movement began with the Montgomery bus boycott in 1955 and ended with the Voting Rights Act of 1965, though there is debate about when it began and whether it has ended yet. The civil rights movement has also been called the Black Freedom Movement, the Negro Revolution, and the Second Reconstruction. Microsoft  ® Encarta  ® 2009.  © 1993-2008 Microsoft Corporation. All rights reserved. AAVE Distinctive patterns of language use among African Americans arose as creative responses to the hardships imposed on the African American community. Slave-owners often intentionally mixed people who spoke many different African languages to discourage communication in any language other than English on their plantations. Moreover, many whites were unwilling to allow blacks to learn proper English. One response to these conditions was the development of pidgins, simplified mixtures of two or more languages that speakers of different languages could use to communicate with each other. Some of these pidgins eventually became fully developed Creole languages spoken by certain groups as a native language. Significant numbers of people still speak some of these Creole languages, notably Gullah on the Sea Islands of South Carolina and Georgia. African American Vernacular English (AAVE), also called black English or Ebonics, is a dialect of English spoken by many African Americans that shares some features with Creole languages. Microsoft  ® Encarta  ® 2009.  © 1993-2008 Microsoft Corporation. All rights reserved.

Tuesday, August 20, 2019

Features of Transport Layer Security (TLS)

Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: Features of Transport Layer Security (TLS) Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: