Monday, September 30, 2019

A Sequence for Academic Writing Essay

The purpose of this website of The National Abortion and Reproductive Rights Action League (NARAL) Pro-choice America, is to to show their advocacy for the right of a woman to choose and her right to privacy with regards to reproductive health. The exclusivity of the issues tackled in this site suggest that their concern is concentrated on specific subject matters affecting the conditions of women in the society such as abortion, use of birth control, teen-pregnancy, reproductive health issues of women of color and legislation about the advancement of the right of a woman to choose. Also, the site offers different means on how women with these kind of problems can understand and take action. 2. What is the subject matter of this site? The subject matter of this site is about the right of every woman to choose and her right to privacy regarding women’s reproductive health. 3. What is the purpose of the site? The purpose of this site is to empower women about their sexuality. They aim is to promote the freedom of women to decide for themselves without being scrutinized or discriminated by the society. Also, the website provides many information about the pro-choice legislation and policies for women, research, campaigns and other advocate organizations to educate visitors about the mentioned subject matter. 4. Is this site for, against, or neutral as far as the subject matter is concerned? This site is evidently pro-choice and for the privacy of women. One of the site’s objective is the prevention of unintended pregnancies by provding women more access to birth control and sex education to lessen the occurence of abortion. But they believe that abortion should be made legal and safe to give options to women whether they want to puruse their pregnancy or not regardless of their reasons. 5. Does the site offer anything unique? Does it tell you more than you could find out in an encyclopedia? This site offers a variety of information ranging from research done by NARAL Pro-choice America to government legislations and policies. The media center of the site is composed of choice-related topics from other publications or websites such as The Buffalo News, Fox News and Colorado Springs Gazette. Other sources are background materials, quotes, and story ideas or experiences of women. 6. Did you learn anything? Was the site worth visiting? In this site, I have learned the dilemmas experienced by women particularly when it comes to their reproductive health and choices. In these kind of situations, women are torn between choosing the right thing or what is for their best interest. Moreover, this site really gives a comprehensive outlook about the fight to advance the rights of woment to choose and privacy. Visitors of this website will really have an elightening experience when they read the content. 7. If you were compiling a bibliography of sources about the subject matter of this site, would you include or exclude it from your final list? Yes, I would use this website as one my sources if I am writing a research about the subject mater because it has a single point of view which is supported by many arguments which are valid and practical. Writing Exercise 2 Analyze the Web site National Right to Life. 1. As stated on page 295 of A Sequence for Academic Writing, â€Å"Web pages generally fall into one of six types, each with a different purpose: (1) entertainment, (2) business/marketing, (3) reference/information, (4) news, (5) advocacy of a particular point of view or program, (6) personal page. † What type is this site? Why do you think this? This is an advocay website that upholds the importance and presenrvation of life. They are against any act that would endanger any human life such as abortion. 2. What is the subject matter of this site? The subject of this website is focused on protecting and giving importance to all human life. In line with this, the information contained on the website clearly suggest that the organizers, National Right to Life Committee, are opposed to abortion and issues related to medical ethics such as euthanasia and infanticide. However, the site does not tackle and does not provide any opinions or views on contraception, sex education, capital punishment, and national defense. 3. What is the purpose of the site? The purpose of this site is to encourage visitors of the website to patronize their advocacy which is to disseminate information and at the same time convince people about the negative effects of abortion, infanticide, and euthanasia to an individual and to the society 4. Is this site for, against, or neutral as far as the subject matter is concerned? This site is against the promotion, advocacy and conduct of abortion, infanticide, and euthanasia but the site also advocates the propagation of the notion that human life is valuable so any act that tries to eliminate it should be punishable by law. 5. Does the site offer anything unique? Does it tell you more than you could find out in an encyclopedia? The site of the National Right to Life Committee used different data to support their objective. Its extensive database is focused on these three aspects: abortion, infanticide, and euthanasia. The site includes other realted links from other websites as well, media press releases and current legislation updates about the subject matter. 6. Did you learn anything? Was the site worth visiting? I have learned that even though the US has a liberated culture, many citizens still possess conservative views specfically about the protection of human life whether that individual is an infant or an adult. 7. If you were compiling a bibliography of sources about the subject matter of this site, would you include or exclude it from your final list? Yes, I would definitely use this website as a bibliography source if I were to tackle the subject matter. The website contains many informative data from their own database and outside sources as wells such as information from orgazations with similar objectives, the US government and media publications. Having all these information would make my research very substatntial and extensive. Revision Activity 1 Go to: Handwriting Analysis Read the article analyzing the sample of handwriting provided. Answer the following questions regarding the analysis. 1. What is the author’s initial impression of Walter Railey’s handwriting? The analyst’s initial impression on Walter Railey’s handwriting is that Railey has self-control but his emotions are repressed. These characteristics were presumed by the analyst as an indication of having a compulsive personality. 2. What are three of the particular elements of Railey’s handwriting the author analyzes? The author analyzed the writing strokes, spaces between the letters and hand pressure which became the three major foundations in analyzing the personality of Railey. 3. What element of Railey’s handwriting does the author thinks reveals his weak self image? According to the analyst, the â€Å"diminished and sometimes near threaded middle zone, small compared to upper and lower zones, together with an insignificant and defensive ppI, represent his weak self-image† (Arnold â€Å"Walker Railey†). 4. Explain what analytical tool the author is using in order to analyze Railey’s handwriting. Is the author credible in applying this analytical tool? The author searched for patterns in Raile’s handwriting. Then, the changes in these patterns are noted and analyzed in accordance with the personality of the subject. Moreover, based on the findings, the author was able to make a detailed analysis of the handwriting indicating his/her expertise about it. Also, the patterns of the handwriting helped the author to determine the elements that would expose the individuality of Railey. 5. Once the analysis is complete the author offers a summary of his findings. Are his summary findings concurrent with his initial impressions? The summary part is the synthesis of all the findings regarding the handwriting of Railey. With regards with the concurrence of the initial impression with the summary is that both were able to provide similar information. However, in the initial impression the descriptiom is brief but in the summary it is a little bit more detailed. 6. At the end of the page you will find a link to a short biography of Walter Railey. Follow the link and read the biography. How accurate is the author’s analysis of Walter Railey’s character, based on his handwriting analysis? After reading the biography of Walker and comparing it with the results of handwriting analysis, the former made some very accurate portrayal of the real Walter Raileys. In the analysis, Railey was rendered as selfish, emotionally repressed, and having dual personality which were all apparent in his historical background. Railey was selfish because he only cared about himself and he ignored his family and friends. Also, his emotional repression was shown when he tried to kill his wife and commit suicide. More so, his dual personality was demonstrated when he was charaterized as a charismatic religous leader and also as a controlling and indifferent individual. Revision Activity 1 Go to: Handwriting Analysis Read the article analyzing the sample of handwriting provided. Answer the following questions regarding the analysis. 1. What does the analysis say that the dark strokes represent about Bill Clinton? According to the analyst, the dark strokes of Clinton’s handwriting indicate â€Å"a great deal of energy and an ability to work hard and for long periods of time† (Canoles â€Å"Bill Clinton†). 2. What does the analysis say about the â€Å"little tents† under Clinton’s words? The little tents suggest â€Å"how firm, and even stubborn, Clinton can become once his mind is made up† (Canoles â€Å"Bill Clinton†). 3. How accurate do you find the analysis comments from what you know about Bill Clinton? Based on his administration when he was president and my impression about Bill Clinton, I could say that the handwriting analysis was close to my ideas. Since Clinton was elected as president for two consecutive terms, it suggested that he was well-liked by his consitutents and that he did a great job in doing his taks as head of the state which is very similar with the report of the author’s analysis that Clinton is â€Å"fair and objective when working on initiatives or with people† (Canoles â€Å"Bill Clinton†). 4. Go to: Clinton Biography Read a short biography on Bill Clinton. What comments from the analysis seem accurate according to the short biography? According to the first short biogrphy that I read, Clinton achieved numerous accomplishemnts dugin his term as President of the United States. Some of these were the increase of employment for Americans, reductionsof tax for businesses and many others. In the handwriting analysis, Clinton was depicted as â€Å"direct, efficient, can prioritize easily,† detail-oriented and a â€Å"pragmatic idealist† which are characteristics needed in order to make positive accomplishments. (Canoles â€Å"Bill Clinton†). These qualifyers corresponded with the characteristics of Clinton shown on the biography. 5. Go to: Handwriting Analysis Read a second short analysis of Bill Clinton. How do the two analyses compare/contrast? According to the second short biogrphy that I read, Clinton was described as an intelligent and a charismatic political leader loved by the people. However, he was involved in a sex controversy that influenced many people to question his credibility. But after being found not guilty from the charges against him, he gradually redeemed himself by initiating productive changes in the US and in the international scene. When the handwriting analysis was compared to the biography, the fomer made accurate descriptions of Clinton solely based on his handwriting that matched the information from the latter. But there were some information that were not confirmed by the biography such as the early emotional hurt experienced by Clinton that caused him to have a protective cautin. Nothing was said in his biography about any incident that might have a negative impact on him. So this piece of data still remain questionable. Nevertheless, the majority of information in the handwriting analysis were similar to the actual personal and historical background of Bill Clinton. Write Journal ( Two paragraphs only): Find an advertisement in U. S. a magazine and a) describe the ad, then b) analyze it by discussing all of the following: the colors in the ad, the message (or words) of the ad, and who or what is the focal point of the ad. How do all of these aspects work together to try to get you to buy the product? In the rainbow ad by Skittles, the texts incorporated stated, â€Å"If you filled all the world’s maracas with skittle, no one would ever know. † This literally means that the maracas would not be heard because people are going to eat the Skittles which will supposedly make the sound for the maracas. These texts were colored using all the rainbow colors which are also the colors of the Skittle candies. It was like the ad was bursting with colors which insinuated that if a someone eats a Skittle, the flavors would also burst inside the mouth. More so, in a caption below the ad which says, â€Å"Hear the rainbow, taste the rainbow,† suggests that the appealing look of the Skittles is also transcended to the taste which is composed of different flavors similar with the colors of the window. When all these elements are combined, the ad makes a powerful visual that is both enticing and informative. Works Cited Arnold, Rosemay. â€Å"Walker Railey. † 2006. Handwriting. org. 14 July 2008 . Canoles, June. â€Å"Bill Clinton. † 2006. Handwriting. org. 14 July 2008 .

Sunday, September 29, 2019

Breadfruit Analysis / Reactions

Breadfruit is a short poem written by English poet Philip Larkin. The poem is composed of only two stanzas, each composing of eight lines. The poem is about the failure of men to mature when they dream of unrealistic things, as referred in line14 of the second stanza—the demise of a fantasy of living a life that resembles that of a life in a tropical paradise amidst the reality of life. The title â€Å"Breadfruit† is misleading because the poem is not exactly about the fruit itself. In fact the speaker does not even know what Breadfruits are.â€Å"†¦Whatever they are. † (line 2 and 17). The fruit bears no significance except as an ornament for the native girls. The first line, â€Å"Boys dream of native girls who bring breadfruit. † (line 1) shows readers images of a tropical island paradise where native girls are stereotypically innocent and offer foreigners, in the poem’s case, the boys, a tropical fruit which is breadfruit. As mentioned, the use of breadfruit is insignificant; it may have been just a random tropical fruit that Larkin chose.He could have used coconuts, bananas, or any fruit that is typically found in tropical areas. The third line and fourth lines â€Å"As bribes to teach them how to execute/ Sixteen sexual positions on the sand;† (3-4). This sexual aspiration is of course from the point of view of the day dreaming boys. Although tropical island girls may have been stereotyped (thanks mostly to the movies) as innocent, willing to explore anything types, I don’t think island girls would give an offering as it were, just to satisfy their sexual desires. Specifics again do not matter in this poem.Just as the Breadfruit, at least in my opinion does not bear significance, the number of sexual positions does not really have any symbolic meaning. It could have been just an aesthetic technique of Larkin to relate the number sixteen to the age of the island girls that were willing to offer breadfru it for sex. And again, it is just the product of the boys’ fantasies so the number may be relatively higher to emphasize the unrealistic fantasy. The rest of the lines in the first stanza, lines 5-8, are about the result of the island girls sleeping with the boys.â€Å"This makes them join (the boys) the tennis club,/Jive at the Mecca, use deodorants, and/ On Saturdays squire ex-schoolgirls to the pub/ By private car. † (5-8). The lines suggests that once the island girls have slept with the boys, they would be civilized and let go of their island ways. In a sense, it shows the corruption that sex can possibly do. If the first stanza is all about the dream, then the second stanza is about the realization that these dreams are exactly what they are—dreams. The daydreaming ends, the boys change into men and now they are in churches, probably with their wives, and in offices.â€Å"Such uncorrected visions end in church/ Or registrar:† (9-10). The speaker men tions that these dreams are visions that are â€Å"uncorrected† meaning the speaker too realizes that it is wrong to dream of such things. The rest of the lines, except for the last two which is somewhat a repetition of the first two lines, are all about realities of life in contrast to the fantasies of the first stanza. The lines give examples of negative realities; â€Å"A mortgaged semi†¦, a widowed mum having to scheme with money; illness; age.† These examples show that life has more serious things to attend to other than wandering off in a daydream in an island with innocent, promiscuous girls. The theme of the poem does not have to be thought of that much because the speaker mentions it perfectly at the last lines of the poem. â€Å"Maturity falls, when old men sit and dream/ Of naked native girls who bring breadfruit/ Whatever they are. † (14-16). It is immature for grown men to daydream if they have responsibilities to attend to. Reference Larkin, P . (1961). Breadfruit. Retrieved May 15, 2009. from http://www. philiplarkin. com/pom/pomcurrent. html

Saturday, September 28, 2019

Journal abstract Assignment Example | Topics and Well Written Essays - 250 words

Journal abstract - Assignment Example Data in this research was collected through interviews with the preschool mentors. The preschool mentors interviewed revealed that there are two fundamental perspectives that depict how special children can be provided the necessary educational support with. According to their first perspective, the interviewees said that nothing unique is done for the special children requiring support by the preschool mentors, in comparison to the opinion that special children require and acquire increased assistance from concerned staff in the daily preschool activities. The second of the two perspectives requires the preschool mentors to personally identify the particular education based support with respect to two basic themes, namely the direct and the indirect educational support. This research is of great significance to the preschool education and academic nurturing of children. The findings of this research are equally applicable on theory and practice. Through their study, the researchers have made a big contribution to the present body of understanding and knowledge apropos the special educational support which the needy children require in their preschool age. References: Sandberg, A., Norling, M., and Lillvist, A. (2009). Teachers' view of educational support to children in need of special support. International Journal of Early Childhood Special Education. 1(2): 102-116.

Friday, September 27, 2019

Strategic Decision Making Underwater Hotel Essay

Strategic Decision Making Underwater Hotel - Essay Example However, other elements, particularly the individual actions that supported the goals and objectives of the model, are deficient. Components like cost structure or key activities are also ill-placed, especially when the model should provide a logical and structured framework where the hotel’s characteristics and potential can be clearly converted into economic outputs. (Chesbrough, 2011: 94) This must have been what Neely (2007: 200) had in mind when explaining how a model improperly grounded in the performing unit as a phenomenon will most likely overlook the variables that influence how the system functions. Because of these cited weaknesses, the business model will fail in the areas of theoretical and operational coherence. To address this, an improved framework should be adopted. An appropriate framework is outlined below. Fig. 1: Suggested Framework (Osterwalder, 2009: 44) The model shown above has been perfected by Osterwalder and could actually be modified into several other versions to accommodate the differences in both components and objectives. What the model offers is not only an effective framework description, but also the capacity to be flexible and envision alternatives. Hence, this particular model can optimize processes for underwater hotel ventures and its objectives, especially in the long term. II. Integration of the Business Model In terms of integration, the business model is quite efficient. The framework outlines clear practices and activities as well as future objectives and visions. This strengthens the business model, especially considering the fact that the venture is entering into the market for the first time. However, as has been previously cited, the model—in effectively integrating components—must provide nodes to depict their relationships and connections. Jaakola, Kiyoki and Tokuda (2008: 154) identified this as the node structure, an element in business models that explain processes such as value creatio n and business transactions. III. Feasibility of the Business Model Elements unique to a business model add to the complexity of how framework should be examined in the context of its feasibility. The most important criteria, however, is economic viability. This should made a crucial precondition, because without it there is no reason for existence, as the project being undertaken cannot be supported by the market. The project, as defined by the business model, should be profitable. What this means is that rewards must either equal or surpass the expectations of diversified investors on a risk-adjusted basis from investments made and resources consumed (Johnson, 2007: 42). Currently, the business model lacks value-added development and thus misses out on the profits available. Another important aspect in a business model is the way it creates value or shared value among business partners. According to Vermeulen and Cotula (2010: 35), there are four criteria that should be used to de termine how a business model shares value: 1. Ownership of business equity shares 2. Ability to take part in decision–making process 3. Commercial risk and other types of risk such as political and reputational risks 4. Sharing of economic costs and benefits and other financial arrangements All of these variables are related to each other. One may be linked or is responsible for the existence of another. Nonetheless, these elements collectively bring about value and, hence, must be present in a business

Thursday, September 26, 2019

Finance final examination questions Essay Example | Topics and Well Written Essays - 1250 words

Finance final examination questions - Essay Example This change causes a shift in a company's cost structure which will result in an increase in Fixed Cost and a reduction in Variable Cost. For example, in period 1 Company A employs unskilled labor which cost $10.00 per hour. However because of a cost cutting exercise by the company, the organisation decides to purchase a new machine in period 2, which will enable Variable Labor cost to be reduced by 75%. The new machine will cost $50,000 and will have a useful life of 10 Years. The following occurred: Period 1 - 1,000 Hrs $ Variable Cost - Labor Cost ($10.00 X 1,000 Hrs) 10,000.00 Fixed Cost 0.00 Total Cost 10,000.00 Period 1 - 1,500 Hrs $ Variable Cost - Labor Cost ($10.00 X 1,500 Hrs) X 25%) 3,750.00 Fixed Cost - Depreciation ($50,000/10 years 5,000.00 Total Cost 8,750.00 Conclusion An increase in a company's Fixed Cost in relation to its Variable cost (as in the above example) will ultimately lead to a fall in Total Cost. This can effectively be determined using CPV

Wednesday, September 25, 2019

Evidence-Based Practice among Hospital Nurses Term Paper

Evidence-Based Practice among Hospital Nurses - Term Paper Example In this light, the healthcare leader was categorical that the final decision arrived at must be premised on available data and the rightful conviction that the decision made will elicit the most optimal patient outcome. The healthcare leader was also very categorical that the foregoing differentiates EBP from research-based practice (RBP). This is the case since, unlike EBP; RBP is a scientific method which involves the collection and analyzing traditional practices that are sustained within standards of care.   The import of this is that in RBP, the care being advanced towards the patient has to have been identified as the most effective. This identification is normally carried out by comparing available research with and the established methods. The results available are thus to change the delivery of care, upon the changes having been deemed medically appropriate. Also, the changes that are being made must have been proven to have the capacity for improved outcome. During the in teraction with the healthcare leader, it became very palpable that he felt strongly about the topic. The strong conviction that the health care leader harbors are pegged on the belief that evidence-based research study will pave way for more efficient and productive services delivery in a medical institution and the healthcare sector in general. This is mainly because, according to him, an evidence-based research study is likely to herald certain values. Particularly, employing the use of evidence-based research studies in healthcare puts focus on health care and scientific literature. All this consideration of medical and scientific literature is underpinned by the need to improve: treatment modalities such as appropriate medical technology; safety and quality (including prevention of accidents, errors, and infections); and exercises (as a way of encouraging rehabilitation and exertion).

Tuesday, September 24, 2019

20th Century ART Essay Example | Topics and Well Written Essays - 500 words

20th Century ART - Essay Example Picasso had several friends most of them journalists and artists. Max Jacob was a poet and a friend of Picasso; he helped Picasso learn literature and language. They shared a room, which is similar to my personal experience. As a student because of the inability to afford an apartment, I shared my room with a friend. The shared room was disorganized because of the working on shifts. Picasso worked at night while Max Jacob operates during the day (Hopkins). The artist was not outgoing because of his personal experience during his childhood. However, it is evident that his relationship with women was complex because he had several lovers. The dressing used by the artist was casual and he loved hats as part of his accessory to his dressing style. The film employs the use of films paradox to develop the different angles on the life of Picasso, which include the successful life as an artist, and the social life as a playboy. His passion for women was similar to his passion for painting. This behavior is covered significantly in the play by addressing his sex life, in the light of his artistic success. The failure of his marriage also depicts the passion for women and unfaithfulness. However, the film does not capture the role of the artists in social movements and agitation. Apart from the success of Picasso in the use of art, he employed the use of art in the depicting of his displeasure of the Vietnam War. International peace organizations among other organizations have managed to use art in portraying of the message to the society leading to the massive societal changes witnessed over time. Picasso’s works of art involved weaving themes of conflict, doom, transcendence, redemption reflected on the canvas. When expose d to the society, it gives the impression or reflects on the situation existing in the society. During one of his painting sessions in the studio, Picasso compared women with wild cats because of their passion to

Monday, September 23, 2019

Reporting on a Religious Service Essay Example | Topics and Well Written Essays - 1250 words

Reporting on a Religious Service - Essay Example The outside pictures were a distinct depiction of a religious place that was encompassed in its architecture. The temple was fenced all round by metallic rails that demarcated the place from its neighborhoods. The temple had a dome that was indicative of the Shikar-bandhi type of the Jain temples. The temple was beautifully carved with pillars all over the entrance, and the inside of the temple was enclosed. The colors that were used on the outside included white with blue-print of the Jain signs and symbols. From the front, there was only one entrance to access the building with a dome on top of the entrance. The inside was also decorated with a combination of architecture, paintings, and colors that were similar to those that were outside. On my entry into the building, I took off my shoes because every other believer was taking off their shoes, and it was a sign of etiquette. The inside had two staircases. The downstairs was composed of many rooms that were meant for education and other programs in the temple. The upstairs was the main temple of the believers. The upstairs was an empty hall that had no furniture. However, the floor was covered with a mat. Inside this temple, there were idols that were decorated differently. The middle idol was the most decorated while the three on each of the sides were less decorated. The believers were seated on these mats with their legs folded and their hands laying on their laps. Most people in this service were middle class and the high class. Their ethnic group was mainly Indian, and their gender was composed of both males and females. Their age s were varied from approximately 3years to 70 years old. I went upstairs to the service because that was the location of the temple. On this Sunday, the people had attended the service for prayer. On the way they pray, before we entered the temple, the people should put something yellow on their forehead and wipe their heads a little of

Sunday, September 22, 2019

Assess the practical usefulness and the relevance of game theory in Essay - 2

Assess the practical usefulness and the relevance of game theory in light of the demanding assumptions behind the concept of the - Essay Example This theory is also known as the interactive decision theory, as such being in a more descriptive manner of the theory as regards to its discipline of administration (Tieben 2012). Economists are the main users of game theory in the establishment of results and determination of outcomes from specific business ideas. In addition, the game theory is also paramount in other sectors such as in political science, in biology, in logic, as well as, in psychology (Nicholson & Snyder 2012 pg. 345) The original idea and concept covered by game theory in the early days of its inception was the addressing of zero-sum games. In these games, the gains of an individual or a person were exactly the equal net losses of the other participants in the simulation theory. Nonetheless; with the development of the modern society and civilization, the game theory concepts developed further to incorporate and apply a wide range of behavioral (Peters 2008 pg. 109). In fact, game theory developed into an umbrel la term to refer to or explain the logical side of the science decision. This includes the collection of both humans as well as the non-humans involved in the system, such as the computers (McCain 2010 pg. 189) The modern game theory resulted from the idea that regarded the existence of mixed strategy equilibrium, especially in the two-person zero-sum games, as proved by John Newman. The original proof used by Newman in the development of the game theory was the brouwer’s fixed-point theorem that incorporated continuous mapping into compact convex sets that were standardized through the game theory method as well as the usage of mathematical economics (Hirschey 2008 pg. 208). As such, game theory became an important aspect in the determination of measurable tendencies, as well as, constraints that affect the plausibility of decision making, in addition to determining the right amount of efforts to put into a simulation game in order to guarantee flexible results for the compa ny. This also leads to effective production and management of the company especially considering the right amounts of resources necessary to input into the game, and as such gain the maximum output (McCain 2010 pg. 227). The game theory works closely with the Nash equilibrium. This is especially in the sense that the Nash equilibrium comes around as the concept of game theory that allows derivation of optimal outcomes in the game. This considers the case whereby a game involves the lack of incentives in the players of a game, such as an incentive to deviate from the original chosen strategy after considering the choice made by the opponents. As such, an individual playing the game theory can receive little or no incremental benefits from the changing actions. This also assumes the fact that other players remain at a constant position with their strategies. As such, a game may have a multiple numbers of Nash equilibrium or none at all (Hirschey 2008 pg. 245). The Nash equilibrium is a concept that originated from an inventor known as John Nash, who incorporated this theory into a number of disciplines, ranging in a wide range of perspectives, such as the behavioral ecology to economics. The use of the Nash equilibrium is very simple as it entails application of simple procedures by undertaking all the players’

Saturday, September 21, 2019

Programme Schedule Essay Example for Free

Programme Schedule Essay It should be noted that although I have used Sky One as an example of a typical evenings viewing on Sky, this ignores the other channels available through the satellite broadcaster. But in doing so I am illustrating the channels provision in terms of target audience, rejection of a public service ethos (to educate, inform and entertain), and its ability to house hour after hour of populist programming on one channel (complimenting Sky One is a mass of channels providing a wide range of programming (see Sky World and Family Pack, appendix 2)). What is obvious from this comparison is that the public service broadcasters are providing a schedule which caters for the widest possible audience, within the structure of two channels (BBC1/BBC2/RTE1/N2). There is the argument that, instead of attempting to provide an output representative of the whole of its audience, which on the face of it seems impossible, it should specialise into more defined areas. Some complain that money being spent on paying comedians for programmes such as `Have I Got News For You` (Friday 21:00, BBC), could be better spent on this specialisation, however those arguments often come down to ones particular taste, rather than any informed argument. What is it that public service broadcasters provide, which are deemed in the `public interest`, that those without such a remit fail to provide? It can surely not, as outlined previously be choice. Diversity, a term often associated with public service broadcasters, is no longer solely applicable to the latter as diverseness is arguably a product of greater choice. It could be argued however that the choice and diversity available from terrestrial public service broadcasters is of a higher quality and is therefore of greater value to an interested audience. The pluralistic nature of public service broadcasting requires that they take into account the sociocultural segmentation of society, but this is often difficult because of the limited terrestrial channel space available. However, what it does do is provide a common domain, arguably important in the context of social interaction. The ability of the audience to discuss for example, the previous nights episode of Eastenders (BBC1) in the playground or at work should not be underestimated. It could be argued that a wider range of viewing could bring a greater level of social ideas and concepts, yet this ignores the `information rich/information poor` argument, and the resulting divide which has yet to be addressed. The digression by both RTE and the BBC into digital media does not, in the current climate, resolve the problem of catering for such a large audience on a limited broadcasting frequency, simply because digital television is not widespread enough at this time. The conundrum for both organisations therefore, is that in order that they become both more diverse and competitive, their energies must go into the creation and promotion of their digital services so as to have a foothold in the future of digital broadcasting. And here lies the rub, At the moment there does not exist a platform solely intended for the broadcast of the BBCs digital programmes. It is available through NTL, Sky and ITV Digital, and therefore, the BBC is indirectly promoting the formats that have reduced their audience share and contributed to calls for its privatisation. The argument hinges on how the PSBs intend to supply their digital services in the future. They may provide a set-top box through which their channels can be received, or fund their place on the current EPG (Electronic Programme Guide), available through SkyDigital. RTE will begin broadcasting on the SkyDigital platform from April 2002, which has emphasised its intention to fulfil its public service remit by extending its audience reach to as many parts of Ireland as possible. However both NTL and Chorus, (cable companies operating in Ireland) have complained that RTE paid a reported i 6 million for its inclusion on the SkyGuide EPG (Electronic Programme Guide), whereas RTE is hosted for free, and importantly, compulsorily by the two cable operators. If Chorus Digital were to pull the plug on RTE, the low subscription rate would not cause significant damage to the public service broadcaster. However, NTL, who have a much higher subscription, and therefore attract more advertising, offers a greater problem. If NTL removed RTE from its output, advertising revenues would fall dramatically, indeed, it has already fallen in 2001 by i 12 million; 15. 5 million less than projected for 2002 and RTE would inevitably become bankrupt. But in doing so, NTL would almost certainly have its licence revoked, which it would appear, provides the greatest chance of survival for RTE. As I have discussed earlier, the introduction of satellite broadcasting into the UK and Ireland has had a detrimental impact upon the public service broadcasters viewing figures. The information below illustrates the year-on-year increase and uptake of cable and satellite subscription, paralleled with a year-on-year decrease in the BBCs viewing figures. RTE has been grouped in the same category as cable and satellite, however RTE would represent only a fraction of the increase. (NB. Shares before 1996 have been rounded to nearest whole number)

Friday, September 20, 2019

Security Issues in Peer-to-peer Networking

Security Issues in Peer-to-peer Networking ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of networks. Out of them the more popularized and upcoming trend of networks are peer-to-peer networks. This report of my final dissertation for the partial fulfilment of my M.Sc, computer networking, would not have been possible without the support of my supervisor, Mr. Harry Benetatos. He helped me a lot by guiding me and pin-pointing the key mistakes which I have done during my research. My course leader Mr. Nicholas Ioannides also helped me a lot to complete this dissertation. His advises and suggestions gave me a lot of encouragement and support which made me do this research and finish it in time. I am very thankful to my university, LONDON METROPOLITAN UNIVERSITY which provided me the free access to the IEEE library which helped me to find the key papers which are very useful for my research. I also thank my parents for their support given to me in all walks of my life. DEDICATION: I dedicate this report to my parents and my well wisher Sakshi for their constant support and encouragement throughout my education and life. CHAPTER 1 PROJECT INTRODUCTION 1.1 INTRODUCTION TO THE PROJECT: This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks. I have chosen to do research on worm intrusions in peer-to-peer networks. In this document I have mentioned how the worm propagates in the network from one peer to another peer, how the worm can be detected and how the detected worm can be attacked and save the network from getting infected. 1.2 AIM: Security issue in Peer-to-peer networks: Securing the peer-to-peer network from worms.   1.3 OBJECTIVES: Ø To understand how the peers communicate with each other in the peer-to-peer network Ø To analyse the propagation of worms in the network. Ø To detect the worms near the nodes of the network Ø To defence the worms in the network. 1.4 RESEARCH QUESTION: This document briefly discusses about how the worms propagates in the network and how can it be detected and attacked in order to save the peer-to-peer network 1.5 APPROACH: My approach for this dissertation is as follows: Ø Understanding peer-to-peer networks Ø Defining the problem Ø Data collection and analysis Ø Study and understanding the existing solutions for the problem Ø Comparing different solutions Ø conclusion 1.6 METHODOLOGY: This section of my document contains what important steps to be followed in order to achieve the mentioned objectives. It also helps to schedule how to develop and complete different parts of the dissertation. In this dissertation firstly I will study and understand about the peer-to-peer networks and how the peers in the networks communicate and share information with the remaining peer in the network. Then I do research on how the worm propagates in the network, how can the worm be detected and how the detected worm can be attacked and restore the network.   In the pictorial form the different stages of my dissertation are 1.7 PREVIEW ABOUT THE COMING CHAPTERS IN THE REPORT: The rest of the report is organised as follows: in the chapter 2, there is brief discussion about the peer-to-peer networks, different types of peer-to-peer networks, advantages and disadvantages of the peer-to-peer networks. There is also some information about the worms, its nature and different types of worms. In chapter 3, there is a discussion about the methods given by the different person to detect the worm in the network by the method of matching the characteristic string of the worm. In section 4, there is a solution for this issue. That is mathematical method of detecting the worm in the network and defending it. Chapter 5 consists of a critical appraisal and suggestions for the further work. Finally, I concluded in chapter 6. CHAPTER 2 OVERVIEW OF THE GENERIC AREA AND IDENTIFICATION OF PROBLEM: 2.1 NETWORK: Network is a group of electronic devices which are connected to each other in order to communicate which each other.   The devices can be computers, laptops, printers etc. networks can be wired or wireless. Wired networks are networks in which the devices are connected with the help of wires. Wireless networks are the networks in which the devices are connected without the wires. There are many different types of networks and peer-to-peer is one of the important and special types of networks. 2.2 PEER-TO-PEER NETWORKS: Peer-to-peer networks are emerged in 1990 because of the development of the peer-to-peer file sharing like Napster [1].   Peer-to-peer networks abbreviated as p2p networks are the networks in which all the nodes or peers in the network acts as servers as well as clients on demand. This is unlike typical client server model, in which the clients requests the services and server supplies the resources. But in case of peer-to-peer networks every node in the networks requests services like a client and every node will supply the resources like server on demand. Peer-to-peer network doesn’t need any centralized server coordination.   Peer-to-peer network is scalable. Addition of new nodes to the network or removal of already existing nodes on the network doesn’t affect the network. That means addition or removal of nodes can be done dynamically. All the nodes connected in a peer-to-peer network run on the same network protocol and software. Resources available on a node in the network are available to the remaining nodes of the network and they can access this information easily. Peer-to-peer networks provide robustness and scalability. All the wired and wireless networks can be configured as peer-to-peer networks. Home networks and small enterprise networks are preferable to configure in a peer-to-peer networks. Most the networks are not pure peer-to-peer networks because of they use some network interface devices. In the beginning, the information is stored at all the nodes by making a copy of it. But this increases the flow of traffic in the network. But now, a centralised system is maintained by the network and the requests are directed to the nodes which contains the relevant information. This will save the time and the traffic flow in the network. 2.3 WIRELESS NETWORKS: Devices connected to each other without any wires can also be configured like peer-to-peer networks. In a case of small of number of devices it is preferable to configure the network in wireless peer-to-peer networks because it will be easy to share the data in both the directions. It is even cheaper to connect the networks in wireless peer-to-peer because we do not need to spend on the wires. Peer-to-peer networks are divided into three types. They are: Instant messaging networks Collaborative networks Affinity community networks[2] Instant messaging networks: In this type of peer-to-peer networks, the users can chat with each other in real time by installing some software such as MSN messenger, AOL instant messenger etc. Collaborative networks: This type of peer-to-peer networks are also called as distributed computing.   This is widely used in the field of science and biotechnology where the intense computer processing is needed. Affinity community peer-to-peer networks: It is a type of p2p network, where the group of devices are connected only for the purpose of sharing the data among them. Peer to peer networks are basically classified into two types. They are: Ø Structured peer-to-peer networks Ø Unstructured peer-to-peer networks 2.4 STRUCTURED PEER-TO-PEER NETWORKS: In the structured peer-to-peer nodes connected in the network are fixed. They use distributed hashing table (DHT) for indexing [4]. In DHT data is stored in the form of hash table like (key, value). Any node willing to retrieve the data can easily do that using the keys. The mapping of values to the keys are maintained by all the nodes present in the network such that there will be very less disruption in case of change in the set of participants DHT-based networks are very efficient in retrieving the resources. 2.5 UNSTRUCTURED PEER-TO-PEER NETWORKS: In unstructured p2p network nodes are established arbitrarily. There are three types of unstructured p2p networks. They are Pure peer-to-peer Hybrid peer-to-peer Centralized peer-to-peer In Pure p2p networks all the nodes in the network are equal. There won’t be any preferred node with special infrastructure function. In hybrid p2p networks there will be a special node called â€Å"supernodes† [3] . This supernode can be any node in the network depending on the momentary need of the network. Centralized p2p network is a type of hybrid network in which there will be one central system which manages the network. The network cannot be able to work without this centralized system Basically, all the nodes in the peer-to-peer networks contain the information of the neighbour in its routing table. The rate of propagation of worms in the peer-to-peer networks is larger than compared to the other networks. This is because the information of the neighbour peers can easily achieved from the routing table of the infected node. Different types of files are shared between the nodes in the peer-to-peer networks. These files can be the audio files, video files, music files, text documents, books; articles etc. there are a lot of peer-to-peer software available these days in the market for sharing the files. Some of them are bittorrent, limeware, shareaza, kazaa, Imesh, bearshare Lite, eMule, KCeasy, Ares Galaxy, Soulseek, WinMX, Piolet, Gnutella, Overnet, Azureus (vuze), FrostWire, uTorrent, Morpheus, Ants, Acquisition[5]. There are lot more file sharing softwares in the market but these are the top 20 file sharing softwares for peer-to-peer networks. Basically, all the nodes connected together in the network should configure with the same network protocol and the same software should be installed in all the nodes in order to communicate with each other. Else the nodes in the network cannot communicate if they are configured with the different software or protocol. 2.6 ADVANTAGES OF PEER-TO-PEER NETWORKS [6]: It is more useful for the small business network comprising of very small number of computer systems or devices. Computers in this network can be configured easily. Full time network administrator is not required for the p2p networks. Easy maintenance of the network. Only a single operating system and less number of cables needed to get connected Can be installed easily Users can control the shared resources Distributed nature of the network increases the robustness of the network. 2.7 DISADVANTAGES OF THE PEER-TO-PEER NETWORKS [12]: No centralised administration Back-up should be performed on the each computer individually. Peer-to-peer networks are not secure Every computer in the network behaves as server and client which can slow down the performance of the system Legal controversy with the copyrights. 2.8 WORM: Worm is a computer malware program or it can be called as a mischievous code which can multiple itself   into several replicas or it duplicate itself into several copies. Worm in simple can be called as â€Å"autonomous intrusion agent† [19] .It doesn’t actually alters the function of the system but it pass through i.e., worm is unlike virus.   It intrudes the network without the mediation of the user. This is first detected by Robert T Morris in 1988[18]. Today we have some billions of systems connected to internet. Bu during 1988 there were only 60,000 systems connected to the internet. During that period 10% of the internet systems i.e., 6000 of the systems are infected and almost clogged because of the worms [8]. Worms when enters the system it hides in the operating system where it cannot be noticeable [18] . It drastically slows down the system the effect the other programs in the system. In worst cases it could even effect the entire network and slow down the internet across whole world. As it is said earlier that it replicates itself into multiple copies and attach itself to the emails and corrupt them and sometimes deleting the file without the user interaction. If it enters our email, it can able to send itself to all the contacts in our email book and then to all the contacts of the emails of our email book and likewise it propagates, grow and spread at the higher rate. Worms will even create the â€Å"backdoor† into the computer [11]. This will make the attackers to send spam easily. Some famous worms discovered in 2003 and 2004 are â€Å"Mydoom†, â€Å" Sobig† and â€Å"Sasser†[7].   â€Å"Sasser† worm has recently affected the computers which are using Windows 2000 or Windows XP operating system. It restarts the system automatically and crashes it. It is spread to all the nodes in the network. There are some worms which are unlike the normal worms. These worms are very useful to the user some times. Hence, these are called the â€Å"helpful worms† [9]. Sometimes they help users without the interaction with the user. But most of the known worms are harmful and will always tries to infect the nodes in the network and affect the performance of the network. When the peer-to-peer networks are attacked by the worms, it slows down the efficiency of the network. So there is a need to save the networks from entering into the network and spreading itself all over the network. The worms should be detected and defended. If we delay in defending these worms, they replicate itself and makes many copies of itself and spread all through the network. This is very dangerous to the network as it affects the performance and efficiency of the network [10]. CHAPTER 3 RELEVANT WORK DONE BY OTHERS IN ORDER TO SOLVE THE PROBLEM: Many people proposed solutions to this problem. First Zhou L gave solution to p2p worm and he observed that propagation of worm in p2p network is very speed when compared to other networks[13] . Jayanthkumar performed some simulations on worm propagation from infected node to other node[10]. Wei yu researched on the behaviour of worms in p2p networks[14]. In my research I found one more interesting method of detecting the worms in the peer-to-peer network. This is indeed a special method of detecting the worms in network because the authors Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu in their paper titled â€Å"A Signature-behaviour-based P2P worm detection approach† they proposed a mechanism of detecting the known worms in the peer-to-peer networks based on characteristic string matching. Worm make use of vulnerabilities in the network and +Spreads[15]. They also proposed the detection mechanism for the unknown worms based on their behaviour. They technique mainly consists of the te chnology of characteristic string matching, identifying the application and the unknown worm detection technology. They have given the algorithm for the matching the characteristics string of the worm called suffix-tree algorithm- suffix array algorithm. This is efficient and simple with very less time complexity. As peer-to-peer network follows fragment transfer technique there is chance of assigning the characteristics string of the worm to the other blocks of data. And again during the reorganisation process this characteristic string can identify the worm. These authors even validated their results by simulation. They proved that their method is also one of the efficient methods of p2p worm detection. As mentioned above this method detects the known worm and also the unknown worms based on characteristic string matching and their behaviour respectively. In this method they initially capture the network packets using the library function called â€Å"LibPcap†. â€Å"LibPcap† is the library function that captures the network packets in UNIX and Linux platforms. This function contains many functions that will be useful for capturing the network packets. After capturing the data packets with help of these functions the non-P2P packets are filtered out. So now the P2P packets are filtered. In these P2P packets the known worms are detected by using the characteristic string matching. This is implemented by the couple of algorithms. They are the â€Å"suffix array algorithm† and the â€Å"dichotomy algorithm†. These algorithms are very accurate and are capable of detecting the worms in very less time. As I mentioned above peer-to-peer networks follow fragment transfer mechanism. Hence the characteristic string of the worm can be assigned to the other blocks of data. So, in this situation it is difficult to detect the worm if the characteristic string of the worm is based on the single packet. But if the characteristic string is present in the block then there is a chance of detecting the worm because it will assign it to the two packets. At this time the worm characteristic string present in the two different data packets need to restructure. After restructuring, the worm can be detected by using the matching mechanism. In this way the known worm in the network is detected by using the characteristic string matching. The unknown worms in the p2p network can be detected with the help of the act characteristics of the worm at the initial stage of its propagation. This can be called as the behaviour based detection of the unknown p2p worms. Like this all the known and unknown worms in the network are detected. 3.1 P2P KNOWN WORM DETECTION: There are four steps in detecting the p2p known worms. They are: Deal flow Technology of identifying the application Characteristic string matching Reorganising the characteristic string 3.1.1 DEAL FLOW: In this step of deal flow the flow of data is divided into four steps[16]. Step 1: Extracting the p2p data stream from the original data stream. Step 2: check the extracted p2p data stream for worms using characteristic string matching with the worms already existing in the library function. Step 3: data is flow is reorganised. It now contains worm characteristic string as well. Go to step 2. Step 4: check the data flow for unknown worms using unknown worm detection techniques. After performing the four steps update the library function. All the four steps is represented   pictorially as in the next page. Figure 4: flow chart representing four steps to detect worms   yes    normal  Ã‚  Normal no  Ã‚  Ã‚  Ã‚   Abnormal abnormal 3.1.2 TECHNOLOGY OF IDENTIFYING THE APPLICATION: As said earlier, this paper uses the method of capturing the data packets and sca it for the worms which are known with the help of a function library called â€Å"LibPcap†[17] . For this there should be already some assigned rules in the network interface devices. So assigning these rules to those devices is done in stepwise procedure as: Identify the available network interface devices Open the network interface device Compile the rules that we are willing to attach to the devices Setup the rules of filtering to the device Now operate the equipment Start the process of capturing the packets There are some rules for identifying the p2p application. They are: Characteristic information of the known p2p is used Sometimes, if source-destination IP pairs don’t use the known P2P and they may use TCP and UDP at same time, then they are p2p. At a particular time source pairs {srcIP, srcport}[27] and the destination pairs {dstIP, dstport}[27] are checked Here we can identify whether it’s a p2p or not. If the number of connection port is equal to the number of connection IP, then we can say that it is a p2p. There are the situations where these rules have been used unruly. So the there were some amendments made to these rules. The amendments are rule (2) can identify even the mazes which are present and rule (3) is modified in such a way that in the detect cycle {srcIP, srcport}[27] pairs at the source and the {dstIP,   dstport }[27] pairs at the destination are checked. From this they derived that if the number of connection port is equal to the number of connection IP, the protocols which are used are same. If they are different then the protocols are different. 3.1.3 CHARACTERISTIC STRING MATCHING: This is the most important section of the paper. Here authors have given some definitions to the terms which we are going to use, the algorithms which we are going to use to detect the worm. Couple of algorithms are mentioned. They are suffix-array algorithm and the dichotomy algorithm. So the entire process of detecting the worm depends on the efficiency and the accuracy of these algorithms. First of all before using and understanding suffix-array algorithm we will try to understand some keywords and rules. Suffix: suffix is the part of a string or a substring which starts at a particular location to the end of the string. If a suffix in the string S starts at the location ‘i’ to the end of the string S, then the suffix can be represented as Suffix(i)=S[i,Len(S) ][27] . Let us understand how the strings can be compared. The comparison in this paper followed â€Å"dictionary comparison† If u and v are the two different strings. Comparing the strings u and v is same like comparing u[i] and v[i], where ‘i’ starts with the value 1. Ø Here string u is equal to string v i.e., u=v when u[i]=v[i] Ø String u is greater then string v i.e., u>v when u[i]>v[i] Ø String u is less than string v i.e., u But the results were still not obtained for i>len(u) or i>len(v) Also if len(u)>len(v) then u >v, if len(u) Suffix-array: suffix-array is denoted by SA. It is a one-dimensional array. It is an array of SA[1], S[2], SA[3],†¦. And so on. Here s[i] Rank-array: rank-array is nothing but SA-1. If SA[i]=j, then Rank[j]=i. we can say that the rank[i] saves the rank of Suffix(i) in an ascending order for all the suffixes. In this paper the author has taken the example of string â€Å"science† and explained everything clearly. The string â€Å"science† can generate seven suffixes. They are: Suffix(1): science Suffix(2): cience Suffix(3): ience Suffix(4): ence Suffix(5): nce Suffix(6): ce Suffix(7): e When we sort out everything in a dictionary order it will be in the order as follow Suffix(6)= ce Suffix(2)= cience Suffix(7)= e Suffix(4)= ence Suffix(3)= ience Suffix(5)= nce Suffix(1)= science Suffix-array algorithm follows multiplier ideas. Firstly get SA1 and Rank1 by comparing every character in the string. Comparing string is similar to comparing the every character sequentially. So by comparing every character, SA1 and Rank1 can derive SA2 and Rank2. And this SA2 and Rank2 will derive SA4 and Rank4. And this will again derive SA8 and Rank8. So finally suffix-array and rank-array are derived from this process. The main process of the suffix-array algorithm is Ø Calculating SA1 and Rank1. Firstly all the suffixes are arranged in the first letter order and then suffix-array (SA1) is generated by using quick sorry algorithm and then Rank1 is also generated. Ø Comparing 2k-prefix Suffix(i) and Suffix(j) using SAk and Rankk. 2k-Suffix(i) = 2k-Suffixes(j), this is equivalent to Rankk[SAk[i]] = Rankk[SAk[j]] and Rankk[SAk[i+k]] = Rankk[SAk[j+k]] 2k-Suffix(i) Suffix-array algorithm is a sorting algorithm which sorts out the characteristic string. So, this uses binary search algorithm. The algorithm follows Step 1: in the first step values are assigned like left=1, right=n and max_match=0 Step 2: the middle value i.e., mid= (left +right)/2. Step 3: comparing the characters corresponding to Suffix (SA[mid]) and P. the longest public prefix r can be helpful in implantation and comparison. If r > max_match, then max_match=r. Step 4: if Suffix(SA[mid])   If Suffix(SA[mid])>P, then right=mid-1   If Suffix(SA[mid])=P, then go to step 6 Step 5: if left Step 6: if max_match= m, then print â€Å"match is successful†. 3.1.4 REORGANISING THE CHARACTERISTIC STRING: In this step the characteristic string is reorganised. If the character string is divided into two different data blocks, then the data block with the partial characteristic string is stored. Basically, all the information about the data block like index, beginning offset, length of the block and so on are contained at the head of the each block. Here a structure piece is defined which consists of index of the block, beginning offset of the block offset, length of the character array head and the length of the character array end[18]. Initially each and every data packet is compared with the characteristic string for matching. If it is matched then the warning or an alert is sent to all the users about the worm. Here if the tail of the characteristic string of the worm matches with the head of the data block, then it will be stored in the character array end. And if the head of the characteristic string of the worm matches with the tail of the data block then it is stored in the corr esponding character array head. Suppose if the neighbouring data block contains a partial characteristic string of the worm then the neighbour string in the array head as well as in the end will be reorganised. Now this reorganised string will again perform the characteristic string matching and if any worm is detected then again the warning is sent to all users saying that the worm have found. If it is not matched then it won’t perform any operation. If in a case that the characteristic string is present in the block but is divided into two different data packets, then a special term called â€Å"character array† is introduced. First the matching mechanism is performed in both the data packet. If the matching characteristic string is found then the warning is sent to the users that there is a worm present. But if only part of the characteristic string is found then it will be enough if it meets some of the requirements like the head of the data packet should match wit h the tail of the characteristic string or the tail of the data packet should match with the head of the characteristic string. But if these conditions are not satisfied then no operation is performed. Now, if the tail of the data packet contains the partial characteristic string then the data packet is stored in the array. If the length of the characteristic string is m, then the Array[m] is set as ’’. And if the head of the data packet contains a part of the characteristic string then that data packet is stored in the n consecutive units of array. Finally, this array will be the characteristic string matching and if the worm is detected then the warning is sent to all the users. If it is not matched then nothing is done. 3.2 DETECTING UNKNOWN P2P WORM: In the above section we have seen how the known worm is detected. But that algorithm or mechanism are meant to detect the unknown p2p worms. So here in this section we will understand how the unknown worms can be detected and restrain the network. As we know in p2p networks a node can able to send the information to multiple hosts at a same time. Anyhow same protocol is used by all the nodes in the network[27]. These characteristics of the network helps worm to propagate easily. As we discussed above, only the known worms can be detected by using the characteristic string matching method. Here we will see how the unknown worms can be detected. The unknown worms are detected based on the behaviour of the node. Some of the detection rules are: same content files are transferred to multiple hosts in a very short time. Same protocol is used and the destination port is same. If these rules are satisfies by the source port then it allows the p2p worm to propagate. Now, it is necessary to e xtract the characteristics of worm near the worm propagation nodes. When these characteristics are extracted, they are added to the feature library. This data similarity comparison and extracting the characteristics are done using the LCSeq algorithm. But the LCSeq algorithm based on generalized suffix tree (GST) is the more efficient. The overall idea is that all the suffixes are represented as a tree. And this tree will have some characteristics like: Ø Every node in a tree is a string and root is the empty string Ø Every suffix can be represented as a path from the root. Ø Every substring can be considered as a prefix of a suffix. Ø To achieve the searching public sub sequence, every node should be set the information of its subordinate source string. 3.3 EXPERIMENT: We know that the worm body tries to infect the other nodes in the network by sending the worm to the specific ports of p2p node. So here the author tried to prove the efficiency of his method by performing an experiment. In this experiment he prepared a multiple group worm body and sent it repeatedly at regular intervals of time. Then he captured these packets and extracted their characteristics and compared it with the one that already exist in the feature library. P2p worm is detected separately using different algorithms like BF algorithm, KMP algorithm and suffix-array algorithm and compared their results doing three experiments. In the experiment 1, worm characteristics are in the same packet.. in the experiment Security Issues in Peer-to-peer Networking Security Issues in Peer-to-peer Networking ACKNOWLEDGEMENTS: The interest in the field of networking, driven me to take the computer networking as my course in M.Sc. there are many different types of networks. Out of them the more popularized and upcoming trend of networks are peer-to-peer networks. This report of my final dissertation for the partial fulfilment of my M.Sc, computer networking, would not have been possible without the support of my supervisor, Mr. Harry Benetatos. He helped me a lot by guiding me and pin-pointing the key mistakes which I have done during my research. My course leader Mr. Nicholas Ioannides also helped me a lot to complete this dissertation. His advises and suggestions gave me a lot of encouragement and support which made me do this research and finish it in time. I am very thankful to my university, LONDON METROPOLITAN UNIVERSITY which provided me the free access to the IEEE library which helped me to find the key papers which are very useful for my research. I also thank my parents for their support given to me in all walks of my life. DEDICATION: I dedicate this report to my parents and my well wisher Sakshi for their constant support and encouragement throughout my education and life. CHAPTER 1 PROJECT INTRODUCTION 1.1 INTRODUCTION TO THE PROJECT: This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks. I have chosen to do research on worm intrusions in peer-to-peer networks. In this document I have mentioned how the worm propagates in the network from one peer to another peer, how the worm can be detected and how the detected worm can be attacked and save the network from getting infected. 1.2 AIM: Security issue in Peer-to-peer networks: Securing the peer-to-peer network from worms.   1.3 OBJECTIVES: Ø To understand how the peers communicate with each other in the peer-to-peer network Ø To analyse the propagation of worms in the network. Ø To detect the worms near the nodes of the network Ø To defence the worms in the network. 1.4 RESEARCH QUESTION: This document briefly discusses about how the worms propagates in the network and how can it be detected and attacked in order to save the peer-to-peer network 1.5 APPROACH: My approach for this dissertation is as follows: Ø Understanding peer-to-peer networks Ø Defining the problem Ø Data collection and analysis Ø Study and understanding the existing solutions for the problem Ø Comparing different solutions Ø conclusion 1.6 METHODOLOGY: This section of my document contains what important steps to be followed in order to achieve the mentioned objectives. It also helps to schedule how to develop and complete different parts of the dissertation. In this dissertation firstly I will study and understand about the peer-to-peer networks and how the peers in the networks communicate and share information with the remaining peer in the network. Then I do research on how the worm propagates in the network, how can the worm be detected and how the detected worm can be attacked and restore the network.   In the pictorial form the different stages of my dissertation are 1.7 PREVIEW ABOUT THE COMING CHAPTERS IN THE REPORT: The rest of the report is organised as follows: in the chapter 2, there is brief discussion about the peer-to-peer networks, different types of peer-to-peer networks, advantages and disadvantages of the peer-to-peer networks. There is also some information about the worms, its nature and different types of worms. In chapter 3, there is a discussion about the methods given by the different person to detect the worm in the network by the method of matching the characteristic string of the worm. In section 4, there is a solution for this issue. That is mathematical method of detecting the worm in the network and defending it. Chapter 5 consists of a critical appraisal and suggestions for the further work. Finally, I concluded in chapter 6. CHAPTER 2 OVERVIEW OF THE GENERIC AREA AND IDENTIFICATION OF PROBLEM: 2.1 NETWORK: Network is a group of electronic devices which are connected to each other in order to communicate which each other.   The devices can be computers, laptops, printers etc. networks can be wired or wireless. Wired networks are networks in which the devices are connected with the help of wires. Wireless networks are the networks in which the devices are connected without the wires. There are many different types of networks and peer-to-peer is one of the important and special types of networks. 2.2 PEER-TO-PEER NETWORKS: Peer-to-peer networks are emerged in 1990 because of the development of the peer-to-peer file sharing like Napster [1].   Peer-to-peer networks abbreviated as p2p networks are the networks in which all the nodes or peers in the network acts as servers as well as clients on demand. This is unlike typical client server model, in which the clients requests the services and server supplies the resources. But in case of peer-to-peer networks every node in the networks requests services like a client and every node will supply the resources like server on demand. Peer-to-peer network doesn’t need any centralized server coordination.   Peer-to-peer network is scalable. Addition of new nodes to the network or removal of already existing nodes on the network doesn’t affect the network. That means addition or removal of nodes can be done dynamically. All the nodes connected in a peer-to-peer network run on the same network protocol and software. Resources available on a node in the network are available to the remaining nodes of the network and they can access this information easily. Peer-to-peer networks provide robustness and scalability. All the wired and wireless networks can be configured as peer-to-peer networks. Home networks and small enterprise networks are preferable to configure in a peer-to-peer networks. Most the networks are not pure peer-to-peer networks because of they use some network interface devices. In the beginning, the information is stored at all the nodes by making a copy of it. But this increases the flow of traffic in the network. But now, a centralised system is maintained by the network and the requests are directed to the nodes which contains the relevant information. This will save the time and the traffic flow in the network. 2.3 WIRELESS NETWORKS: Devices connected to each other without any wires can also be configured like peer-to-peer networks. In a case of small of number of devices it is preferable to configure the network in wireless peer-to-peer networks because it will be easy to share the data in both the directions. It is even cheaper to connect the networks in wireless peer-to-peer because we do not need to spend on the wires. Peer-to-peer networks are divided into three types. They are: Instant messaging networks Collaborative networks Affinity community networks[2] Instant messaging networks: In this type of peer-to-peer networks, the users can chat with each other in real time by installing some software such as MSN messenger, AOL instant messenger etc. Collaborative networks: This type of peer-to-peer networks are also called as distributed computing.   This is widely used in the field of science and biotechnology where the intense computer processing is needed. Affinity community peer-to-peer networks: It is a type of p2p network, where the group of devices are connected only for the purpose of sharing the data among them. Peer to peer networks are basically classified into two types. They are: Ø Structured peer-to-peer networks Ø Unstructured peer-to-peer networks 2.4 STRUCTURED PEER-TO-PEER NETWORKS: In the structured peer-to-peer nodes connected in the network are fixed. They use distributed hashing table (DHT) for indexing [4]. In DHT data is stored in the form of hash table like (key, value). Any node willing to retrieve the data can easily do that using the keys. The mapping of values to the keys are maintained by all the nodes present in the network such that there will be very less disruption in case of change in the set of participants DHT-based networks are very efficient in retrieving the resources. 2.5 UNSTRUCTURED PEER-TO-PEER NETWORKS: In unstructured p2p network nodes are established arbitrarily. There are three types of unstructured p2p networks. They are Pure peer-to-peer Hybrid peer-to-peer Centralized peer-to-peer In Pure p2p networks all the nodes in the network are equal. There won’t be any preferred node with special infrastructure function. In hybrid p2p networks there will be a special node called â€Å"supernodes† [3] . This supernode can be any node in the network depending on the momentary need of the network. Centralized p2p network is a type of hybrid network in which there will be one central system which manages the network. The network cannot be able to work without this centralized system Basically, all the nodes in the peer-to-peer networks contain the information of the neighbour in its routing table. The rate of propagation of worms in the peer-to-peer networks is larger than compared to the other networks. This is because the information of the neighbour peers can easily achieved from the routing table of the infected node. Different types of files are shared between the nodes in the peer-to-peer networks. These files can be the audio files, video files, music files, text documents, books; articles etc. there are a lot of peer-to-peer software available these days in the market for sharing the files. Some of them are bittorrent, limeware, shareaza, kazaa, Imesh, bearshare Lite, eMule, KCeasy, Ares Galaxy, Soulseek, WinMX, Piolet, Gnutella, Overnet, Azureus (vuze), FrostWire, uTorrent, Morpheus, Ants, Acquisition[5]. There are lot more file sharing softwares in the market but these are the top 20 file sharing softwares for peer-to-peer networks. Basically, all the nodes connected together in the network should configure with the same network protocol and the same software should be installed in all the nodes in order to communicate with each other. Else the nodes in the network cannot communicate if they are configured with the different software or protocol. 2.6 ADVANTAGES OF PEER-TO-PEER NETWORKS [6]: It is more useful for the small business network comprising of very small number of computer systems or devices. Computers in this network can be configured easily. Full time network administrator is not required for the p2p networks. Easy maintenance of the network. Only a single operating system and less number of cables needed to get connected Can be installed easily Users can control the shared resources Distributed nature of the network increases the robustness of the network. 2.7 DISADVANTAGES OF THE PEER-TO-PEER NETWORKS [12]: No centralised administration Back-up should be performed on the each computer individually. Peer-to-peer networks are not secure Every computer in the network behaves as server and client which can slow down the performance of the system Legal controversy with the copyrights. 2.8 WORM: Worm is a computer malware program or it can be called as a mischievous code which can multiple itself   into several replicas or it duplicate itself into several copies. Worm in simple can be called as â€Å"autonomous intrusion agent† [19] .It doesn’t actually alters the function of the system but it pass through i.e., worm is unlike virus.   It intrudes the network without the mediation of the user. This is first detected by Robert T Morris in 1988[18]. Today we have some billions of systems connected to internet. Bu during 1988 there were only 60,000 systems connected to the internet. During that period 10% of the internet systems i.e., 6000 of the systems are infected and almost clogged because of the worms [8]. Worms when enters the system it hides in the operating system where it cannot be noticeable [18] . It drastically slows down the system the effect the other programs in the system. In worst cases it could even effect the entire network and slow down the internet across whole world. As it is said earlier that it replicates itself into multiple copies and attach itself to the emails and corrupt them and sometimes deleting the file without the user interaction. If it enters our email, it can able to send itself to all the contacts in our email book and then to all the contacts of the emails of our email book and likewise it propagates, grow and spread at the higher rate. Worms will even create the â€Å"backdoor† into the computer [11]. This will make the attackers to send spam easily. Some famous worms discovered in 2003 and 2004 are â€Å"Mydoom†, â€Å" Sobig† and â€Å"Sasser†[7].   â€Å"Sasser† worm has recently affected the computers which are using Windows 2000 or Windows XP operating system. It restarts the system automatically and crashes it. It is spread to all the nodes in the network. There are some worms which are unlike the normal worms. These worms are very useful to the user some times. Hence, these are called the â€Å"helpful worms† [9]. Sometimes they help users without the interaction with the user. But most of the known worms are harmful and will always tries to infect the nodes in the network and affect the performance of the network. When the peer-to-peer networks are attacked by the worms, it slows down the efficiency of the network. So there is a need to save the networks from entering into the network and spreading itself all over the network. The worms should be detected and defended. If we delay in defending these worms, they replicate itself and makes many copies of itself and spread all through the network. This is very dangerous to the network as it affects the performance and efficiency of the network [10]. CHAPTER 3 RELEVANT WORK DONE BY OTHERS IN ORDER TO SOLVE THE PROBLEM: Many people proposed solutions to this problem. First Zhou L gave solution to p2p worm and he observed that propagation of worm in p2p network is very speed when compared to other networks[13] . Jayanthkumar performed some simulations on worm propagation from infected node to other node[10]. Wei yu researched on the behaviour of worms in p2p networks[14]. In my research I found one more interesting method of detecting the worms in the peer-to-peer network. This is indeed a special method of detecting the worms in network because the authors Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu in their paper titled â€Å"A Signature-behaviour-based P2P worm detection approach† they proposed a mechanism of detecting the known worms in the peer-to-peer networks based on characteristic string matching. Worm make use of vulnerabilities in the network and +Spreads[15]. They also proposed the detection mechanism for the unknown worms based on their behaviour. They technique mainly consists of the te chnology of characteristic string matching, identifying the application and the unknown worm detection technology. They have given the algorithm for the matching the characteristics string of the worm called suffix-tree algorithm- suffix array algorithm. This is efficient and simple with very less time complexity. As peer-to-peer network follows fragment transfer technique there is chance of assigning the characteristics string of the worm to the other blocks of data. And again during the reorganisation process this characteristic string can identify the worm. These authors even validated their results by simulation. They proved that their method is also one of the efficient methods of p2p worm detection. As mentioned above this method detects the known worm and also the unknown worms based on characteristic string matching and their behaviour respectively. In this method they initially capture the network packets using the library function called â€Å"LibPcap†. â€Å"LibPcap† is the library function that captures the network packets in UNIX and Linux platforms. This function contains many functions that will be useful for capturing the network packets. After capturing the data packets with help of these functions the non-P2P packets are filtered out. So now the P2P packets are filtered. In these P2P packets the known worms are detected by using the characteristic string matching. This is implemented by the couple of algorithms. They are the â€Å"suffix array algorithm† and the â€Å"dichotomy algorithm†. These algorithms are very accurate and are capable of detecting the worms in very less time. As I mentioned above peer-to-peer networks follow fragment transfer mechanism. Hence the characteristic string of the worm can be assigned to the other blocks of data. So, in this situation it is difficult to detect the worm if the characteristic string of the worm is based on the single packet. But if the characteristic string is present in the block then there is a chance of detecting the worm because it will assign it to the two packets. At this time the worm characteristic string present in the two different data packets need to restructure. After restructuring, the worm can be detected by using the matching mechanism. In this way the known worm in the network is detected by using the characteristic string matching. The unknown worms in the p2p network can be detected with the help of the act characteristics of the worm at the initial stage of its propagation. This can be called as the behaviour based detection of the unknown p2p worms. Like this all the known and unknown worms in the network are detected. 3.1 P2P KNOWN WORM DETECTION: There are four steps in detecting the p2p known worms. They are: Deal flow Technology of identifying the application Characteristic string matching Reorganising the characteristic string 3.1.1 DEAL FLOW: In this step of deal flow the flow of data is divided into four steps[16]. Step 1: Extracting the p2p data stream from the original data stream. Step 2: check the extracted p2p data stream for worms using characteristic string matching with the worms already existing in the library function. Step 3: data is flow is reorganised. It now contains worm characteristic string as well. Go to step 2. Step 4: check the data flow for unknown worms using unknown worm detection techniques. After performing the four steps update the library function. All the four steps is represented   pictorially as in the next page. Figure 4: flow chart representing four steps to detect worms   yes    normal  Ã‚  Normal no  Ã‚  Ã‚  Ã‚   Abnormal abnormal 3.1.2 TECHNOLOGY OF IDENTIFYING THE APPLICATION: As said earlier, this paper uses the method of capturing the data packets and sca it for the worms which are known with the help of a function library called â€Å"LibPcap†[17] . For this there should be already some assigned rules in the network interface devices. So assigning these rules to those devices is done in stepwise procedure as: Identify the available network interface devices Open the network interface device Compile the rules that we are willing to attach to the devices Setup the rules of filtering to the device Now operate the equipment Start the process of capturing the packets There are some rules for identifying the p2p application. They are: Characteristic information of the known p2p is used Sometimes, if source-destination IP pairs don’t use the known P2P and they may use TCP and UDP at same time, then they are p2p. At a particular time source pairs {srcIP, srcport}[27] and the destination pairs {dstIP, dstport}[27] are checked Here we can identify whether it’s a p2p or not. If the number of connection port is equal to the number of connection IP, then we can say that it is a p2p. There are the situations where these rules have been used unruly. So the there were some amendments made to these rules. The amendments are rule (2) can identify even the mazes which are present and rule (3) is modified in such a way that in the detect cycle {srcIP, srcport}[27] pairs at the source and the {dstIP,   dstport }[27] pairs at the destination are checked. From this they derived that if the number of connection port is equal to the number of connection IP, the protocols which are used are same. If they are different then the protocols are different. 3.1.3 CHARACTERISTIC STRING MATCHING: This is the most important section of the paper. Here authors have given some definitions to the terms which we are going to use, the algorithms which we are going to use to detect the worm. Couple of algorithms are mentioned. They are suffix-array algorithm and the dichotomy algorithm. So the entire process of detecting the worm depends on the efficiency and the accuracy of these algorithms. First of all before using and understanding suffix-array algorithm we will try to understand some keywords and rules. Suffix: suffix is the part of a string or a substring which starts at a particular location to the end of the string. If a suffix in the string S starts at the location ‘i’ to the end of the string S, then the suffix can be represented as Suffix(i)=S[i,Len(S) ][27] . Let us understand how the strings can be compared. The comparison in this paper followed â€Å"dictionary comparison† If u and v are the two different strings. Comparing the strings u and v is same like comparing u[i] and v[i], where ‘i’ starts with the value 1. Ø Here string u is equal to string v i.e., u=v when u[i]=v[i] Ø String u is greater then string v i.e., u>v when u[i]>v[i] Ø String u is less than string v i.e., u But the results were still not obtained for i>len(u) or i>len(v) Also if len(u)>len(v) then u >v, if len(u) Suffix-array: suffix-array is denoted by SA. It is a one-dimensional array. It is an array of SA[1], S[2], SA[3],†¦. And so on. Here s[i] Rank-array: rank-array is nothing but SA-1. If SA[i]=j, then Rank[j]=i. we can say that the rank[i] saves the rank of Suffix(i) in an ascending order for all the suffixes. In this paper the author has taken the example of string â€Å"science† and explained everything clearly. The string â€Å"science† can generate seven suffixes. They are: Suffix(1): science Suffix(2): cience Suffix(3): ience Suffix(4): ence Suffix(5): nce Suffix(6): ce Suffix(7): e When we sort out everything in a dictionary order it will be in the order as follow Suffix(6)= ce Suffix(2)= cience Suffix(7)= e Suffix(4)= ence Suffix(3)= ience Suffix(5)= nce Suffix(1)= science Suffix-array algorithm follows multiplier ideas. Firstly get SA1 and Rank1 by comparing every character in the string. Comparing string is similar to comparing the every character sequentially. So by comparing every character, SA1 and Rank1 can derive SA2 and Rank2. And this SA2 and Rank2 will derive SA4 and Rank4. And this will again derive SA8 and Rank8. So finally suffix-array and rank-array are derived from this process. The main process of the suffix-array algorithm is Ø Calculating SA1 and Rank1. Firstly all the suffixes are arranged in the first letter order and then suffix-array (SA1) is generated by using quick sorry algorithm and then Rank1 is also generated. Ø Comparing 2k-prefix Suffix(i) and Suffix(j) using SAk and Rankk. 2k-Suffix(i) = 2k-Suffixes(j), this is equivalent to Rankk[SAk[i]] = Rankk[SAk[j]] and Rankk[SAk[i+k]] = Rankk[SAk[j+k]] 2k-Suffix(i) Suffix-array algorithm is a sorting algorithm which sorts out the characteristic string. So, this uses binary search algorithm. The algorithm follows Step 1: in the first step values are assigned like left=1, right=n and max_match=0 Step 2: the middle value i.e., mid= (left +right)/2. Step 3: comparing the characters corresponding to Suffix (SA[mid]) and P. the longest public prefix r can be helpful in implantation and comparison. If r > max_match, then max_match=r. Step 4: if Suffix(SA[mid])   If Suffix(SA[mid])>P, then right=mid-1   If Suffix(SA[mid])=P, then go to step 6 Step 5: if left Step 6: if max_match= m, then print â€Å"match is successful†. 3.1.4 REORGANISING THE CHARACTERISTIC STRING: In this step the characteristic string is reorganised. If the character string is divided into two different data blocks, then the data block with the partial characteristic string is stored. Basically, all the information about the data block like index, beginning offset, length of the block and so on are contained at the head of the each block. Here a structure piece is defined which consists of index of the block, beginning offset of the block offset, length of the character array head and the length of the character array end[18]. Initially each and every data packet is compared with the characteristic string for matching. If it is matched then the warning or an alert is sent to all the users about the worm. Here if the tail of the characteristic string of the worm matches with the head of the data block, then it will be stored in the character array end. And if the head of the characteristic string of the worm matches with the tail of the data block then it is stored in the corr esponding character array head. Suppose if the neighbouring data block contains a partial characteristic string of the worm then the neighbour string in the array head as well as in the end will be reorganised. Now this reorganised string will again perform the characteristic string matching and if any worm is detected then again the warning is sent to all users saying that the worm have found. If it is not matched then it won’t perform any operation. If in a case that the characteristic string is present in the block but is divided into two different data packets, then a special term called â€Å"character array† is introduced. First the matching mechanism is performed in both the data packet. If the matching characteristic string is found then the warning is sent to the users that there is a worm present. But if only part of the characteristic string is found then it will be enough if it meets some of the requirements like the head of the data packet should match wit h the tail of the characteristic string or the tail of the data packet should match with the head of the characteristic string. But if these conditions are not satisfied then no operation is performed. Now, if the tail of the data packet contains the partial characteristic string then the data packet is stored in the array. If the length of the characteristic string is m, then the Array[m] is set as ’’. And if the head of the data packet contains a part of the characteristic string then that data packet is stored in the n consecutive units of array. Finally, this array will be the characteristic string matching and if the worm is detected then the warning is sent to all the users. If it is not matched then nothing is done. 3.2 DETECTING UNKNOWN P2P WORM: In the above section we have seen how the known worm is detected. But that algorithm or mechanism are meant to detect the unknown p2p worms. So here in this section we will understand how the unknown worms can be detected and restrain the network. As we know in p2p networks a node can able to send the information to multiple hosts at a same time. Anyhow same protocol is used by all the nodes in the network[27]. These characteristics of the network helps worm to propagate easily. As we discussed above, only the known worms can be detected by using the characteristic string matching method. Here we will see how the unknown worms can be detected. The unknown worms are detected based on the behaviour of the node. Some of the detection rules are: same content files are transferred to multiple hosts in a very short time. Same protocol is used and the destination port is same. If these rules are satisfies by the source port then it allows the p2p worm to propagate. Now, it is necessary to e xtract the characteristics of worm near the worm propagation nodes. When these characteristics are extracted, they are added to the feature library. This data similarity comparison and extracting the characteristics are done using the LCSeq algorithm. But the LCSeq algorithm based on generalized suffix tree (GST) is the more efficient. The overall idea is that all the suffixes are represented as a tree. And this tree will have some characteristics like: Ø Every node in a tree is a string and root is the empty string Ø Every suffix can be represented as a path from the root. Ø Every substring can be considered as a prefix of a suffix. Ø To achieve the searching public sub sequence, every node should be set the information of its subordinate source string. 3.3 EXPERIMENT: We know that the worm body tries to infect the other nodes in the network by sending the worm to the specific ports of p2p node. So here the author tried to prove the efficiency of his method by performing an experiment. In this experiment he prepared a multiple group worm body and sent it repeatedly at regular intervals of time. Then he captured these packets and extracted their characteristics and compared it with the one that already exist in the feature library. P2p worm is detected separately using different algorithms like BF algorithm, KMP algorithm and suffix-array algorithm and compared their results doing three experiments. In the experiment 1, worm characteristics are in the same packet.. in the experiment

Thursday, September 19, 2019

The Importance of Confidence Essay example -- Personal Narrative Essay

The Importance of Confidence Most of life's situations are learning experiences. People can learn what activities are right or wrong for them by experiences these emotions in different situations. These learning experiences can take place at home, school, the workplace, or anywhere else. The three major experiences that have given me confidence in my ability to learn have all taken place at Penn State University. One experience that, in the end, gave me confidence was my first semester of lessons with the Penn State School of Music clarinet professor. The Professor was not a personable man. He was very quick to criticize every mistake I was making and was very blunt with his comments. I felt like a failure. I was very sensitive, and began to cry many times. Being that sensitive didn't help at all. When I finally did so something well, he made me feel great. I learned that no matter how badly I am playing, I must stay confident, for crying doesn't help anything. I know now that his criticisms were made so I could work on my weakness in my playing and get better. He was not ...

Wednesday, September 18, 2019

Small Business Management: Childs Pay :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  This article was about owners of small businesses and how they compensate their children who are also involved in the family business. This article contained significant points. Three significant points that this article made were about over compensating, market rate, and what is expected of the children to run the family business.   Ã‚  Ã‚  Ã‚  Ã‚  Over compensating may and may not be a good thing. It may be good in helping an entrepreneur improve their business because the child might think that since they are getting paid more, that more is expected of them. If they follow that rule the child will help out and benefit the business by going ahead and doing extra beneficial things or just going the extra mile. The downside however is that the child will do the complete opposite and not benefit the business at all.   Ã‚  Ã‚  Ã‚  Ã‚  Market rare is also good in helping an entrepreneur improve their business because it can help prevent the loss or â€Å"wasting† of money. I think a child might benefit from market rate in a sense that they do not expect things to be just handed to them and that is a good quality to have. It can make them appreciate the value of a dollar and maybe even appreciate their job a little more. You can always give them incentives and extra gifts to add a little more to their pay as well and to make market rate not so bad for them.   Ã‚  Ã‚  Ã‚  Ã‚  Lastly, what is expected of the child will help an entrepreneur improve their business because it will make their business run more smoothly and successfully. Having your child go to college, meet special qualifications or just do other things to learn more about the business will benefit the business, I think in a great deal.