Thursday, October 31, 2019

Human Sexuality Aspects Essay Example | Topics and Well Written Essays - 500 words

Human Sexuality Aspects - Essay Example Human sexuality deals more with emotional responses as principles, standards, and duties. Movies as a media of communication, has an enormous effect in the manner in which it has shaped the way people relate and engage in sexual activities. Human sexuality directly or indirectly has influences in many areas of life that pertains to human beings. Human sexuality affects the society in numerous ways. For example, it influences persons in the sociocultural aspect. Different people have different cultures and share different views on sexual behaviors and what people perceives to be wrong in different parts of the world. Movies have played a played a major role in influencing the way people perceive sexual activities. For instance, most characters in movies engage in sexual activities before marriage, which is a forbidden practice among many religious groups. Though most persons will try their best to follow religious rules, they will also try their very best to keep secrets of how they engage in sexual activities. People do this in order to avoid critisims or even being punished. Moreover, sexual activities in movies in addition to beliefs of a person and their religious backgrounds as well as personal experiences and behaviors can have even a stronger influence in an individual or a group of people. Such influences from movies include influencing the way children are taught about sexuality by their parents. This is because children tend to emulate in behavior what they watch on movies. Often, young children look for guidance through media on what are both socially acceptable or not. The media tends to help shape the attitudes of children on what they like and what they do not. Movies show attractive cast people in the lead roles (Bancroft 7). Human sexuality also plays a major role in influencing the way people in the society behaves and communicates to each other. More often than not, human behavior is determined by the

Tuesday, October 29, 2019

Feasibility. A Guide for Small Business Research Paper

Feasibility. A Guide for Small Business - Research Paper Example The feasibility study of B2B market gives a brief view on the product, technology used in the operational process. The study also states the market environment which includes competitions in the market, existing industry and the business model. Apart from this, various other strategies have been stated in the feasibility study including the marketing and selling strategies, production and management requirements along with financial projections for one year of the business plan. Products and Services Considering the present market scenario, the toy company has selected a range of innovative products to deal with AGI in B2B market. The selected product is intended towards the little children of Brooklyn. With this concern, the toy company has selected three distinct categories of toys to be introduced in the market, i.e. Toy A (TA) for the age group of 1 year to 3 years, Toy B (TB) is for the age group of 4 years to 6 years and Toy C (TC) for the age group of 7 years to 10 years. Henc e, the toy company will be introducing musical soft toys for the TA product range which will emphasize on the adoption of nursery rhymes and other educational themes rendering due concern towards the mental development of children at this age. The company will further attempt to introduce talking pens for the product line TB and science station educational toys for the product line of TC. ... AGI is fundamentally known for its different types of innovative greetings cards and toys. In this regards, it has been found that AGI serves its consumers with innovative greeting cards; however, the market for innovative toys still remains unexplored by the company (American Greetings, 2012). By analyzing the market it can be stated that the toy company has certain advantages for its product lines in dealing with AGI. AGI is well known for distributing innovative greeting cards and regular toys. However company is noted to have minimum inclusion in the innovative toy segment in comparison to its involvement cards segments. This can offer noteworthy opportunity for the toy company as a supplier of AGI. Technology Introducing new innovative toys in the American market certainly needs modernized technology in its manufacturing unit. While manufacturing toys, the toy company will consider exact technology for selected toys concerning the fact that the requirement varies with different kinds of toys. With this concern, the toy company used basic materials and technologies to manufacture Toy A. The requirements has been planned concentrating on soft baby toys which should be made up of cotton and cloths with attractive color and an electronic device run by battery cell for music. The procedure used for manufacturing Toy A product line is by placing electronic device inside the soft toys so that it is invisible to everyone and stays away from the reach of the children. In similar aspect, different technologies are intended to be used for manufacturing of Toy B product line, with the use of wood or plastic with attractive colors and designs with electronic devices inside it which can speak when the pen is in use and thus can be used by

Sunday, October 27, 2019

Features of Transport Layer Security (TLS)

Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: Features of Transport Layer Security (TLS) Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP:

Friday, October 25, 2019

Of Miracles by David Hume Essays -- Empiricists, Empiricism

"Of Miracles" by David Hume In David Hume?s paper ?Of Miracles,? Hume presents a various number of arguments concerning why people ought not to believe in any miracles. Hume does not think that miracles do not exist it is just that we should not believe in them because they have no rational background. One of his arguments is just by definition miracles are unbelievable. And have no rational means in believing miracles. Another argument is that most miracles tend to come from uncivilized countries and the witnesses typically have conflicts of interest and counterdict each others experiences. Both of these arguments are valid however they tend to be weak. I think that Hume?s strongest argument is that he claims there is no credibility to the testimony behind the miracles. In Hume?s argument he says ?that there is no testimony for any, even those which have not been expressly detected, that is not opposed by an infinite number of witnesses; so that not only the miracle destroys the credit of the testimony, but the testimony destroys itself.? To make this clear Hume uses religious matters. Many religions use miracles as a foundation. ?Every miracle, therefor, pretended to have been wrought in any of these religions as its direct scope is to establish the particular system to which it is attributed; so has it the same force, though bore indirectly, to overthrow every other system.? If the miracles try to destroy a system, a religion, it destroys the credit of the miracles themselves, and the system in which they were established. Since most religions are based on miracles and try to destroy each other with contrary miracles and then we as humans have no reasoning on which miracle to believe in. Therefore what I ... ...may not be any rationality behind the miracles its just something mankind must do. I do not know what Hume?s reaction would be to this kind of an argument but I am sure he would find something wrong about it and lead us to believe that miracles are still something that people ought not believe in. Miracles do happen. They have happened in the past and will remain occurring in the future. The question is not whether or not miracles exist, but whether we should believe in them or not. Hume discusses, in ?Of Miracles,? many reasons why we should not believe in such miracles for various reasons. However I have made a counter argument of Hume?s in saying that we must believe in miracles and if we do not have any faith that they are true then society would fail and not develop. Miracles are something that exist and are something that we have to believe in.

Thursday, October 24, 2019

Case Closed: A short Story

Jackie dropped her blue fountain pen and relaxed her aching wrist. She had been reading and adding to the notes of her client's case for the last two hours. It was taking place the next day and she hadn't even read halfway through yet. Laying back in the comfy black office chair she let out a long yawn and stretched out her legs under the desk. Her neck and back were as stiff as a board and she let out a low moan as she turned her head from side to side. Jackie loved her job as a lawyer. Eating, sleeping and drinking her work she would often receive criticism telling her that there was more to life than just work and that you where supposed to work to live not live to work. She was so bored of hearing it. That's why she lived alone, she was able to get on with extra work and block people out. She knew that they just didn't understand how passionate she was about her job. Well for most aspects of it. She hated doing all the written work and the notes on the cases. After hours of relentless writing, her skinny arm felt as if it was about to drop off. She slowly unhinged her sore arms and stretched up towards the ceiling letting out another deep yawn. She new she would need motivation if she was going to continue with her work. She rose from her warm, moulded seat and dragged herself over to her immaculate, open plan kitchen. Although Jackie's job took up most of her life she had always been a bit of a clean freak. She couldn't bear the sight of untidiness and she always found herself putting things away and cleaning up. Her indolent arms reached up to the wooden shelf and she grabbed a wine glass. Filling the glass up to the brim Jackie took a long gulp and returned back to her study. As she sat back down in her cosy chair she was disturbed by the irritating ring of her telephone. Sighing and reluctantly getting up again, she walked across the room to the phone and clearing her sore throat she picked it up. â€Å"Hello?† No answer. â€Å"Hello?† she repeated herself rolling her exhausted eyes. Still silence. Slamming the phone down she returned back to her desk feeling annoyed that someone had disturbed her. She took another sip of her wine and unwillingly picked up her fountain pen again. Jackie sat in her warm office in deep concentration. She had no longer sat down that she was bothered again. But this time it wasn't her annoying telephone. The noise that filled her ears made her jump out of her skin. It sounded like a lost soul shrieking from the depths of hell. It was her car alarm. Jackie strided through the narrow hallway and wrenched open the front door causing a gust of icy wind to hit her and enter the house. She cautiously walked down the footpath, biting her dry lips, her once warm feet slapping against the smooth glacial pavement. Pushing her tangled curly hair out of her face she bent down and checked underneath her car. Nothing. She glanced across the drive and not wanting to catch a cold for her big day tomorrow she hopped back up the footpath and back into her heated house. Turning the heating up on the wall she returned back to her work filled desk. She picked up her glass and stopped. The glass that she had left on the desk to go and investigate her car alarm going off had been half full. Now it was empty. She stood up, heart racing and stared around the room. She looked back at the glass suspiciously and rubbed her weary eyes. â€Å"I'm going mad† she muttered to herself. Jackie tried to dismiss that somebody had drank from her glass but she couldn't stop thinking about the fact she was sure she hadn't drank it all. She glided over to the front door and pulled across the top lock. She felt slightly easier and safer now. Positioning herself in her chair she went to begin her work. Again she stopped. Her fountain pen that she always kept on top of the mountainous piles of work had gone. Puzzled, Jackie began moving her papers out of the way and searching the whole desk work top for the pen. Giving up and becoming very stressed out because of all her disturbances she furiously got up again and went in search of another pen. She stomped in to the kitchen opened the white sliding draw looking for a biro or something of that sort that she could carry on scrawling her notes with. With no look she slammed the drawer shut and spun back around to have a look in the sitting room. She froze. There was her fountain pen propped up against her porcelain vase on the corner table. The hairs on the back of Jackie's neck stood up. She was positive she hadn't even been in the sitting room all night. She attentively moved across the room towards the pen. When she got there she stopped for a moment and just looked at it, it had been balanced against the vase. She was so bewildered that her heart started to race. She heard a deep breathing sound coming behind her. She couldn't move as her legs had gone numb with terror. Slowly she turned her head but before she could catch sight of her intruder she felt a sharp pain in the back of her head. Jackie fell forward knocking over the vase and hitting her face against the solid wall. She fell to the floor in a state of shock. The stranger dragged Jackie up by her long, blood-soaked hair. Without thinking she grabbed the man's thick, hairy arm and sunk her teeth deep into his flesh. His grip loosened on her hair and she stumbled across the room falling against her desk. Hitting the floor again Jackie began to crawl towards the door in hope to get away from the attacker. She lunged for the handle and tried to turn it. It didn't move. She remembered she had locked it minutes before. Frantically trying to unlock it she could hear him breathing behind her. The lock clicked open but it was too late. She felt another piercing blow to her head, then darkness. Jackie woke up with a start. The pain in her head was unbearable. She was trying to catch her breath but she couldn't, her lungs felt as if they were about to explode. She attempted to sit up, but hit her head on what seemed like a wooden surface that was inches in front of her face. She was terrified; she needed to know where she was. She hated not being in control of situations. She tried to move her arms. They were pressed tightly to her sides. She was in some sort of box. She let out a long, high pitched scream. Little did she know that there was no chance any living person would ever hear her.

Wednesday, October 23, 2019

Centers for Medicare and Medicaid Services (CMS) Essay

Procedure Until recently it was not uncommon for patients admitted to an acute care facility to have an indwelling catheter anchored for unnecessary reasons. Patients that came in thru the emergency department typically were sent to the units with unnecessary indwelling catheters in place and it was not unusual for a surgery patient to have an indwelling catheter anchored before or during a procedure. Once a patient was admitted and was transported to the units nursing would also anchor indwelling catheters for multiple unnecessary reasons. These Catheters could be anchored for many unnecessary days and in some cases until discharge. In 2008 the Centers for Medicare and Medicaid Services (CMS) initiated a policy change to no longer reimburse hospitals for additional cost that were incurred due to catheter associated urinary tract infections or in another term CAUT’Is (Palmer, 2013). The CMS recognized that CAUTI’s are the most common type of hospital acquired infection. The CMS also determined that when evidence based practices are initiated and followed they can be highly preventable, leading to a change in practice. Current Practice Up until 2012 there were no policies pertaining to the anchoring or removal of indwelling catheters in the facility I work for. Nursing would complete their assessment of the patients and per their discretion they would determine if an indwelling catheter by their standards is appropriate. An indwelling catheter could be deemed appropriate according to nursing for multiple reasons including; urinary incontinence, retention, convenience, pressure ulcers, strict output recordings and in some cases per patient request. The nurse was required to obtain an order from the physician in order to anchor a catheter and most cases the physician would comply. After the nurse anchored a catheter it would most likely stay anchored until discharge or until and order was given by the physician to discontinue it.  These procedures lead to the unnecessary length of times catheters were kept in place and the need for change. Rational and Explanation Even though in 2008 Medicare and Medicaid changed their reimbursement policies it wasn’t unit 2012 when the Joint Commission added guidelines for the prevention of CAUTI’s and the facility I work for initiated change. Prior to the Joint Commission’s new guidelines management relied on nursing to make the proper decisions for their patients and supported nursing when they deemed it necessary to anchor a catheter. In 2012 when the guidelines were initiated management chose to follow them when evidence based research supported CAUTI’s were preventable when the appropriate protocols were followed. Hospital management initiated evidence based practices that were supported by CMS and the Joint Commission that would assist nursing on when anchoring a catheter was necessary. The team responsible for these changes included the clinical manager in charge of all medical surgical units, each medical surgical unit manager where these changes were to take place and the medical surgical educator. This team reviewed evidence based research and practices on how to improve CAUTI’s and thru this research came up with a plan to implement nurse driven protocols that would be beneficial to our facility. These protocols instructed nursing, thru protocols on the patient’s EMR to guide nursing when anchoring a catheter would be appropriated and it also gave nursing the ability to remove a catheter when it was deemed unnecessary. After the protocols were initiated management began to notice a decrease in the use of catheters and a decrease in CAUTI’s resulting in cost effectiveness and higher patient satisfaction scores for the hospital. References Bernard, Michael S, Hunter, Kathleen F, Moore, Katherine N. (2012). A Review of Strategies to Decrease the Duration of Indwelling Urethral Catheters and Potentially Reduce the Incidence of Catheter-Associated Urinary Tract Infections. Urologic Nursing, 32 (1): 29-37. Carter, Nina M, Reitmeier, Laura, Goodloe, Lauren R. (2014). An Evidence-Based Approach To the Prevention of Catheter-Associated Urinary Tract Infection. Urologic Nursing, 34 (5): 238-45. Hooton, T., Bradley, S., Cardenas, D., Colgan, R., Geerlings, S., Rice, J., Nicolle, L. (2010). Diagnosis, prevention, and treatment of catheter-associated urinary track infection in adults: 2009 international clinical practice guidelinges from the infectious diseases society of America. Clinical Infectious Diseases, 50(March): 625-663. Knoll, Bettina M.; Wright, Deborah; Ellingson, LeAnn; Kraemer, Linda; Patire, Ronald; Kuskowski, Michael A.; Johnson, James R. (2011). Reduction of Inappropriate Urinary Catheter Use at a Veterans Affairs Hospital Through a Multifaceted Quality Improvement Project. Clinical Infectious Diseases. Vol. 52 Issue 11, 1283-1290. DOI: 10.1093/cid/cir188. Mori, C. (2014). A-Voiding Catastrophe: Implementing a Nurse-Driven Protocol. MedSurg Nursing. 23 (1), 15-28. Clinical Implications An implemented change that would reduce the rates of CAUTI’s in acute health care facilities would be evidence based nurse lead protocols. The protocols would not only benefit the hospitals but they would also contribute to patient satisfaction scores. Approximately 80% of all nosocomial infections are contributed to CAUTI’s and are the most common form of nosocomial infections (Knoll, 2011). Some of the symptoms that contribute to the patients discomfort include hematuria, flank pain, fever and in some cases altered mental status. After a patient develops a CAUTI the patient receives the recommended treatment of antibiotic therapy. Antibiotic therapy could last up to 7 days which could result in an increase of stay (Hooton et al., 2010). Evidence supports that when nurse led or informatics led interventions are implemented CAUTI’s were decreased (Bernard, 2012). The interventions that assist in the prevention of  CAUTI’s are protocol bundles that include insertion policies, removal policies, maintenance policies and competency training (Carter, 2014). If the proper prevention measures are implemented patient satisfaction scores would improve, infection rates would improve leading to a decrease infection rate and shortening patient’s length of stay. Recommended Changes If the prevention protocols that are listed above were implemented changes would occur that would lead to multiple benefits for both the acute care facilities and the patients. Extended hospital days due to CAUTI’s has added to approximately 90,000 days per year and due to Medicaid and Medicare no longer paying the associated cost for CAUTI’s the hospitals out of pocket expenses are estimated at approximately 424 million dollars per year (Mori, 2014). The changes that are discussed and supported in this research paper would have a positive impact on decreasing this data. If the protocols are implemented not only would they benefit the patient’s but they would also benefit the hospitals. Patients would have a decrease risk in acquiring nosocomial infections and hospitals would have the opportunity to use the millions they are losing to benefit the patients. The hospitals could apply the money they are losing for research and/or other areas to improve overall satis faction, increasing hospital census. Stakeholders The stakeholders in implementing this change at the facility I work for would be the unit managers and the nurse educators in the units where these changes would take place. For the unit managers the increased costs that are acquired due to CAUTI’s would have a direct impact on them along with the patient’s overall satisfaction scores. The evidence based research that would be implemented would be presented to the unit managers and the nurse educators. The unit mangers would be the ones to determine if and when the new protocols would take effect. The nurse educators would be the ones educating staff on the new protocols and would be a vital part of evaluating the protocols along with suggesting and implementing changes if necessary. Change would happen in stages with the first stage being the unfreezing stage. This stage occurs when stakeholders receive the information on a change along with supporting evidence to why the change would be beneficial. The second step would be the moving stage. This is the stage when goals  and dates are set to when the change is to take place. The refreezing stage is the last stage. The refreezing stage is when the change is implemented and becomes hospital protocol. The end stage is when the nursing staff would need the most support until the change becomes the hospitals new standard (Cherry & Jacob, 2010). The steps listed will assist getting everyone on board with the change and complying with it. Barriers Anytime when new protocols or procedures are implemented barriers may occur. Not everyone is open to change and many may have a hard time adjusting. Many nurses have been following the same policies and procedures for many years and may be noncompliant due to habit. Another barrier may be the patients, â€Å"frequent fliers† or patients that frequent the hospital regularly have become accustomed to old protocols and may not be receptive to change. The frequent fliers are used to coming in and requesting catheters so they don’t have to get up to the bathroom or if they have incontinency issues. Management and the educators will have to work diligently with nursing to initiate change and nursing may have a difficult time adjusting to the change along with educating patients and enforcing the protocols. Strategies Strategies to overcome the barriers of change would include using Lewin’s Change Theory. This theory suggests that change should be initiated slowly and making the necessary changes with only the staff that would be involved (Cherry & Jacob, 2010). Management and the nursing educator should provide staff with the evidence based research as to why the change is being made so nursing can understand why the change is necessary. By following these strategies nursing may be more compliant with the change and can be better advocates for the patients. Application of Findings CDC guidelines recommend catheters to be inserted for necessary reasons which include urinary retention, strict intake and output, certain surgical procedures, healing for pressure ulcers in incontinent patients and in palliative care patients (Gray, 2010). As research has provided indwelling catheters should be placed only when deemed necessary and removed when they are unnecessary. The facility I work for along with quality control  and the nursing educator put together CAUTI prevention strategies using evidence based research practices. Protocols were initiated in the patient’s electronic medical record (EMR) that would assist nursing in making the right decision whether to cath or not and when it would be appropriate to remove an indwelling catheter. The charge nurses monitor the number of catheters each unit has and researches if they are deemed appropriate to keep anchored. All of these measures have decreased the occurrences of CAUTI’s in the facility I work for. Continued monitoring by quality control is still needed to insure assessments are completed properly and to monitor if the measure the protocols are working. References Bernard, Michael S, Hunter, Kathleen F, Moore, Katherine N. (2012). A Review of Strategies to Decrease the Duration of Indwelling Urethral Catheters and Potentially Reduce the Incidence of Catheter-Associated Urinary Tract Infections. Urologic Nursing, 32 (1): 29-37. Carter, Nina M, Reitmeier, Laura, Goodloe, Lauren R. (2014). An Evidence-Based Approach To the Prevention of Catheter-Associated Urinary Tract Infection. Urologic Nursing, 34 (5): 238-45. Cherry, B., & Jacob, S. (2010). Contemporary Nursing: Issues, Trends, and Management. (5th ed.) St. Louis, MO: Mosby Elsevier. Gray, M. (2010). Reducing catheter associated urinary tract infection in the critical care unit. AACN Advanced Critical Care, 20(3), 247-257. Hooton, T., Bradley, S., Cardenas, D., Colgan, R., Geerlings, S., Rice, J., Nicolle, L. (2010). Diagnosis, prevention, and treatment of catheter-associated urinary track infection in adults: 2009 international clinical practice guidelinges from the infectious diseases society of America. Clinical Infectious Diseases, 50(March): 625-663. Knoll, Bettina M.; Wright, Deborah; Ellingson, LeAnn; Kraemer, Linda; Patire, Ronald; Kuskowski, Michael A.; Johnson, James R. (2011). Reduction of Inappropriate Urinary Catheter Use at a Veterans Affairs Hospital Through a Multifaceted Quality Improvement Project. Clinical Infectious Diseases. Vol. 52 Issue 11, 1283-1290. DOI: 10.1093/cid/cir188. Mori, C. (2014). A-Voiding Catastrophe: Implementing a Nurse-Driven Protocol. MedSurg Nursing. 23 (1), 15-28.

Tuesday, October 22, 2019

Riordan †International Marketing Plan

Riordan – International Marketing Plan Free Online Research Papers Riordan Manufacturing is an industry leader in the manufacturing of plastic injection molding. Currently, Riordan Manufacturing employs 550 people and has annual earnings of nearly $46 million. Their parent company, Riordan Industries, exceeds $1 billion dollars per year in revenue. Currently, Riordan markets their products predominately in the United States but are in the process of developing an International marketing campaign for several countries in Asian market with an emphasis on South Korea. Ethical business practices need to be a part of the marketing strategy implemented. When it comes to South Korea, â€Å"It is a major international economic power; it has the 15th economy in the world and the 4th in Asia, behind Japan,China and India. Its largest trading partner and export market today is China.South Korea has achieved rapid economic growth through exports of manufactured goods, and is one of the Four Asian Tigers. Major industries in South Korea today are automobil es, semiconductor, electronics, shipbuilding, and steel.† There is 3 things need to be considered for the marketing campaign: the company, the industry, and society. The first thing to consider is the employee of Riordan Manufacturing. It is very important that decisions made within the company are done in a manor that is fair and have a positive impact on the employees of the company. For example, compensation packages should coincide with workers skill levels and experience. It could be considered unethical for Riordan to pay higher wages to workers in one section of the company and lower wages to employees that have equal work skills but work in another department. Discrimination is area that always raises questions on ethical business practices. Riordan needs to be aware of the employment laws in South Korea to avoid unethical hiring practices. The South Korea electronics industry as a whole is another area to consider that could be affected by unethical business practices. One way that the industry or particular company could be affected by unethical practices would be through the use of false or misleading advertising. If Riordan developed advertising pieces that depicted the competition in a false or negative way would be a major ethical violation and probably have a negative impact of Riordan Manufacturing. This type of violation could also impact Riordan’s acceptance into other global markets if they create a reputation of being unethical. Major product suppliers and vendors may be unwilling to do business with Riordan if they are perceived as unethical. The last area of concern that may be greatly impacted by unethical business practices is society. This includes consumers and everyone else that either buys or uses Riordan products. An example of questionable ethics could be selling products in South Korea that are made with less quality materials, degrading the quality and trying to sell for the same or greater price in order to reach higher profit margins. Environmental issues also typically play on ethics. Problems could arise if Riordan were purposely or incidentally polluting the environment, therefore it is important the Riordan is aware and follow environmental laws in South Korea and other global markets. Riordan marketers must also be sensitive to the differences that exist between the cultures in the US and South Korea. Advertising campaigns that are successful in the US may not have the same success in South Korea. Different cultures may have different viewpoints on what is considered right and wrong, therefore m arketers will need to conduct extensive research on foreign markets and their cultures before implementing a marketing campaign. The decision to begin marketing to the entire Asian region will have several implications on the current marketing strategy. First, Riordan will need to adjust their marketing efforts to reflect the diverse cultures that exist in different regions of Asia. Asia is comprised of many countries and with many different languages and cultures, which makes marketing more difficult. The Korea Information and Communication Trade Unions was formed to consolidate countries within Asia and create one economic market, which does some to simplify the market, but there are still differences that exist in different countries. A large multi-national market can be very beneficial to Riordan in many ways. â€Å"A company like Riordan, which deals in mass production, can distribute larger quantities of products throughout the entire region while increasing economies of scale.† Riordan Manufacturing has been an industry leader for years because of their creative product design and ability to affectively market their products. If Riordan is to achieve success in the South Korea market, they will need to be aware of ethics as it pertains to society, the industry, and Riordan employees. Marketers need to examine the changes and adapt to the differences that exist between the US and South Korea markets in order to achieve success. References: en.wikipedia.org/wiki/South_Korea –307k Cateora, P. Graham, J. (2007). International Marketing (13th ed.) McGraw Hill, New York, NY. Research Papers on Riordan - International Marketing PlanRiordan Manufacturing Production PlanMoral and Ethical Issues in Hiring New EmployeesDefinition of Export QuotasAnalysis of Ebay Expanding into AsiaTwilight of the UAWMarketing of Lifeboy Soap A Unilever ProductPETSTEL analysis of IndiaBionic Assembly System: A New Concept of SelfOpen Architechture a white paperNever Been Kicked Out of a Place This Nice

Monday, October 21, 2019

Civil liberties, habeas corpus and war on terror

Civil liberties, habeas corpus and war on terror Introduction Habeas corpus is one of the legal principles, which constitute the foundation of law in America. The principle enables an individual to challenge detention. This is a vital principle in law whose application has largely depended on regimes, the governance approach and security challenges that a government encounters.Advertising We will write a custom research paper sample on Civil liberties, habeas corpus and war on terror specifically for you for only $16.05 $11/page Learn More Various regimes have applied the principle in different ways (Halliday, 2011). The variation in the application has been controversial with the onset of war on terror (WON). Legal hurdles have impaired WON as regimes seek to hold enemy combatants without any trial. However, the presence of this clause limits the ability of authorities to detain suspects without initiating hearings (Fiss, 2006). The congress and the president have the capacity to lift the right to habeas corpus. The application of this right is largely dependent on the security challenges that a regime encounters. As such, the suspension of habeas corpus depends on the security challenges that a government is encountering. Definition of habeas corpus With reference to the American constitution, habeas corpus is a vital principle of freedom. The terminology means ‘to avail the body’ in Latin. Consequently, it enables individuals to access freedom from detention without any trial. The American constitution affords its citizenry with the right to plea to this legal clause. In such cases, the American government has to answer to the court. The government has to provide concrete reasons for holding a person. Subsequently, the court determines whether the reasons provided are adequate to allow the wavering of this fundamental right. Habeas corpus in America is much similar to the corresponding law in England. The American law emanated from the English statutes. However, there are numerous adjustments in the respective nations to suit their circumstances. There are certain reasons that lead to lifting of this right. They include rebellion and protection of public safety. Over years, the application of habeas corpus has changed with countless infringements by authorities (Hafetez, 2011). War on terror The WON has culminated in controversy owing to the government’s detention of civilians believed to be enemy combatants. The application of this vital principle has been violated by subsequent regimes as they seek to detain combatants. The challenge that the government encounters is the prosecution of the alleged combatants in civilian court. As such, the terror charges would not stand before judges and most of the combatants would be set free.Advertising Looking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More To prevent this, the government regards enemy combatants as terrorists. This enables the authority to detain such suspects despite the illegality of such detentions. The Bush administration encountered numerous challenges as it was holding suspected criminals without trial. Owing to this challenge, the Bush regime could not effectively execute its strategies during the WOT. Subsequently, it sought to build a holding camp in a place where the American constitution had no jurisdiction. Guantanamo bay was constructed on land leased from the Cuban authority. As such, the American constitution had no jurisdiction. The government held terror suspects on the island without any trial. The right to habeas corpus was not applicable on this detention camp (Fiss, 2006). Cases challenging detention The action to hold detainees in Guantanamo was challenged severally. In Boumediene v. Bush, the court ruled that Boumediene, a Bosnia and Herzegovina national had the right to plead to habeas corpus. Consequently, his detention was illegal. The court decision culminated from 5-4 majority in the ruling. The application of insular cases meant that the American constitution had jurisdiction in Guantanamo since America had complete authority and control over the territory. The decision by the Supreme Court resulted in subsequent cases pertaining to this right. Other suspects sought to plead to this right (Cornell University Law School 2007). However, their efforts were curtailed by legislation. In subsequent cases pertaining to detainees held in the Guantanamo camp, the court ruled that the detention was illegal. Consequently, the government solved the impending crisis by establishing the Combatants status review tribunal. The detainees held in the camp were to face a military commission since the government ruled out trials in civilian courts (Cornell University Law School 2007). Courts’ role in the implementation of habeas corpus In light of the above cases, the court exercised absolute authority on the ability of any detainee to p lead to this habeas corpus. The jurisdiction of the court limited the ability of the defence department to breach this right. However, to some extent the president prevailed since the detainees did not receive the right to prosecution in a civilian court. If the proceeding were in civilian courts, most of the detainees would be set free. This would hinder the WOT since the civilian courts would set free such detainees. The government viewed the prosecution of enemy combatants in civilian courts as counterproductive (Hephaestus Books 2011).Advertising We will write a custom research paper sample on Civil liberties, habeas corpus and war on terror specifically for you for only $16.05 $11/page Learn More Previous incidences of suspension habeas corpus’ The Congress and the president can exercise their authority and limit the right to plea to this right. President Lincoln did so during the civil war when part of America was under enemy forces. The suspen sion of this rights resulted in the establishment of military courts to deal with the rebels that wanted to seize the capital. However, Lincoln faced an aggressive senate once it resumed from recess. The high court in Maryland overturned Lincoln decision pertaining to the right of habeas corpus. However, the president assumed the court’s decision and continued to suspend this right with regard to combatants. Once the senate resumed it passed legislation approving the president’s action. The president’s actions were necessary since American was encountering a rebellion. According to Sir William Blackstone, one of the lords that were pivotal in the creation of this principle the King had to know of any retrains on his subjects. Once the English legal system was fully operation, the legal statues provided that the right could only be waived during a rebellion or an invasion. This is much similar to what the legal statutes in America provide. Similarly, during the S econd World War the president could suspend habeas corpus. However, the court limited the suspension of this right to only crimes that relate to war only. If habeas corpus was suspended, the applicable law only applied to crimes pertaining to invasion, enemy combatants and rebellions. In the above scenario, the courts also limited the suspension of this right. This limits the misuse of the suspension of habeas corpus (Fiss, 2006). Congress and the president The congress being the ultimate legislative body has the capability to determine various aspects of habeas corpus. The congress has enacted laws, which determines the application of habeas corpus. Evidently, alterations to this right mainly result from the security challenges that the nation is encountering. The alterations have sought to approve measures to detain combatants or suspects who threaten the safety of America. The congress first altered the right to habeas corpus was during the Lincoln era, when the president suspend ed this right as the senate was in recess. Despite confrontations in congress, senators ratified the president’s executive order to suspend habeas corpus. The second situation, which required the suspension of habeas corpus, was during World War II (Chemerisnky, 1987). Legal changes owing to WON The Oklahoma and twin towers attacks are other security challenges that have culminated in the suspension of this right. The latter resulted in massive legal changes to deal with terror. However, alterations have encountered challenges if they infringe on the constitutional rights of a person.Advertising Looking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More The 2001 presidential military order sanctioned detention of individuals believed to partake in terrorist activities without any legal proceedings to prove their innocence. Legal scholars were opposed to such an order since it violated habeas corpus. Despite the approval of detention based on terrorist suspicions, the Supreme Court proved the supremacy of the rights entrenched in the constitution through various rulings such as Hamdi v Rumsfield. Cases such Boumediene v. Bush and Hamdi v. Rumsfield had dissenting justices. However, it was vital that the court observed the constitution. This is because habeas corpus is a basic right for any person restrained by American authorities. Consequently, suspending it without providing a detainee with a chance at justices breaches the basic rights entrenched in the constitution. Unlike in previous scenarios where the legal system shied away from upholding the law when the executive contravenes it, the court emerged as an independent organ of governance by terming the detentions unlawful (Perkins, 2004). Personal views on habeas corpus Habeas corpus is a key right in any free society. As such, it is vital to uphold it. Despite the complex security challenges that this nation encounters, it is paramount to ensure that all detainees have access to a legal process where they can prove their innocence. Terrorist charges should not be a basis to detain an individual without any legal procedure to try the suspect. Terror poses a massive challenge to this society. Subsequently, on the determination of the involvement of a suspect in such activities, the suspect should face appropriate legal process. Where the suspect is extremely dangerous specialized trial procedures should apply. These include military commissions and tribunals. The constitution of such tribunals should have civilian legal representatives who should ensure that the basic rights of a defendant are upheld. The president and the congress should also exercise ca ution in suspending habeas corpus since it breaches the basic rights in our constitution (Hephaestus Books, 2011). Conclusion In instances where the government suspends habeas corpus, it seeks to address certain security challenges. The details above exemplify the above assertion fully from the Lincoln regime to the Bush era. However, suspension of such a right has encountered legal challenges from courts, which have either outlawed or limited the suspension of this right. Courts undertake a vital role in ensuring that all detainees can challenge their arrest in a court or an appropriate legal system to suit their circumstance. The congress and the president have emerged as key figures in the implementation of this right with the initial passing bills to influence its application. Conversely, the latter issues executive orders to suspend habeas corpus which congress can ratify to ensure legality. Suspension of habeas corpus has exclusively pertained to individuals that pose a signif icant threat to the security of this nation. Conclusively, the suspension of habeas corpus pertains entirely to the security challenges that this nation is encountering. References Chemerisnky, E. (1987). Thinking about habeas corpus. Law Review, 37:748-789. Cornell University Law School. (2007). Boumediene et al. v. Bush, president of the United States, et al. Retrieved from https://www.law.cornell.edu/supct/html/06-1195.ZS.html Fiss, O. (2006) The War Against Terrorism and the Rule of Law. Oxford Journal ofLegal Studies, 26 (2): 235-256. Hafetez, J. (2011). Habeas Corpus and the â€Å"War on Terror. Retrieved from https://www.acslaw.org/ Halliday, P. (2011). Habeas Corpus: From England to Empire. USA: Congress Publication. Hephaestus Books. (2011). Articles on Global War on Terror Captives Habeas Corpus Petitions, Including. Virginia: Hephaestus Books. Perkins, J. (2004). Habeas Corpus in the war against terrorism: Hamdi v. Rumsfeldand Citizen Enemy Combatants. Hein Online public ation, 19: 437-460.