Tuesday, December 31, 2019

Military Industrial Complex During The Farewell Speech

II. Conspiracies i. Military-industrial complex In the farewell speech given by U.S. President Dwight D. Eisenhower when he left office, he warned the nation about the power of the military establishment and the arms industry. In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists, and will persist. Some conspiracy theorists have argued that Kennedy planned to end the involvement of the United States in Vietnam, and was therefore targeted by those who had an interest in sustained military conflict, including the Pentagon and defense contractors. Former Texas Senator Ralph Yarborough in 1991 stated: Had Kennedy lived, I think we would have had no Vietnam War, with all of its traumatic and divisive influences in America. I think we would have escaped that. According to author James Douglass, Kennedy was assassinated because he was turning away from the Cold War and seeking a negotiated peace with the Soviet Union. Douglass argued that this was not the kind of leadership the CIA, the Joint Chiefs of Staff, and the military-industrial complex wanted in the White House. Oliver Stone s film, JFK, explored the possibility that Kennedy was killed by a conspiracy involving the military-industrial complex. L. Fletcher Prouty, Chief of Special Operations for the Joint Chiefs of Staff under Kennedy, and theShow MoreRelatedWhy We Fight Directed By Eugene Jarecki Is Not A Sequel Or War Propaganda886 Words   |  4 Pagespropaganda. The film informs the audience and questions America s military industrial complex that has since dictated policy since the victory of World War 2. With the help of narration, soundbites, and credible speakers Jarecki shines light on the pernicious impact of the armed industry on our government, army, and citizens. The film opens with President Dwight Eisenhower’s farewell speech at the end of World War 2. Eisenhower’s speech is significant because he warns Americans about the seeminglyRead MoreDwight D. Eisenhower: A Lifetime of Service Essay1440 Words   |  6 PagesDwight D. Eisenhower: A Lifetime of Service Beware the military-industrial complex, warned Dwight Eisenhower in his farewell address to the nation he had served his entire life. Dwight Eisenhower served his country for many years, and his service has greatly impacted this nations history and future. From his service in the military, to his time as president, he has guided the United States through some of its most difficult years. He will always be remembered for his ability to lead. ThisRead MoreCompare And Contrast Farewell Address1951 Words   |  8 Pageslines. Among the many speeches given by presidents during their tenure in office the final speech was given by a president, their Farewell Address is one of the most influential. This speech sets the path of the nation going forward into the new presidency, can assert their legacy and is their final opportunity to speak their mind as President of the United States without true repercussions from Congress or public opinion. I will be examining two farewell addresses f rom two extremely influential presidentsRead MoreDwight D. Eisenhower s Speech1426 Words   |  6 Pagescareer with a farewell speech outlining the growth of the nation and warnings about the future. Firstly, I will examine the effectiveness of Eisenhower s speech.  Ã‚   I found his speech to be well-written, it held my attention and gave a clear message to protect the future of the nation and its resources. I define a well written speech as one that can keep an audience listening and wanting more. An effective speech must also have a clear message, and not contradict itself. Eisenhower s speech concludedRead MorePosition Paper on Military Industrial Complex1837 Words   |  8 PagesPosition on Military Industrial Complex Catalina M. Young Archbishop Edward A. McCarthy Abstract The â€Å"Military Industrial Complex† is a term coined by former President Dwight D. Eisenhower. This refers to the relationship between the nation’s armed forces and the industries that support them. Though its name came about in the 1960s, this relationship between armed forces and private industry dates back centuries. Recent legislation has been passed to help limit the power that this relationshipRead MoreAmerican Foreign Policy During World War II1565 Words   |  7 PagesAmerican foreign policy shifted drastically from the birth of the new nation to the beginning of the 20th century. George Washington’s Farewell Address in 1796 left an admonition for the nation and isolationist roots from its founding President; however, by the early 1900s, William McKinley and other American Presidents took part in imperialistic foreign policy that represented a complete digression from Washington’s doctrine. After World War I and before the impending Second Worl d War, AmericanRead MorePresident Of The United States1149 Words   |  5 Pagesadministration a businesslike tone. Eisenhower’s first priority was to balance the budget of deficit spending. As a moderate on domestic issues, he accepted most of the New Deals programs as a reality of modern life and even extended some of them. During his first two terms in office, social security was extended to 10 million more citizens, the minimum wage was raised, and additional public housing was built. In 1953, Eisenhower consolidated welfare programs by creating the Department of Health,Read MoreContainment: The American Way1372 Words   |  6 Pagescontainment of Cold War ideology and to prevent nations from turning towards Soviet-based communism. The fear of communism first emerged after the First Red Scare in the 1920s. The fear of extreme ideologies that emerged in European countries during the Great Depression was starting to spread to the United States and President Franklin D. Roosevelt answered it with the Second New Deal. This deal was established to guarantee a modest level of economic safety and security to avoid communist andRead MoreDr. Strangelove And The Cold War1997 Words   |  8 Pagesholds. In Dr. Strangelove, General Jack D. Ripper goes insane and impulsively orders a fighter plane to drop nuclear warheads on Russia. Even worse, no one is able to contact that plane other than General Ripper, causing the U.S. President and his military advisors to evaluate what their next move should be. The film is a parody based on the Cold War between the U.S. and the Soviet Union, but explores some of the consequences that human civilization could have potentially faced if certain orders hadRead MoreDr. Strangelove And The Cold War1954 Words   |  8 Pagesholds. In Dr. Strangelove, General Jack D. Ripper goes insane and impulsively orders a fighter plane to drop nuclear warheads on Russia. Even worse, no one is able to contact that plane other than General Ripper, causing the U.S. President and his military advisors to evaluate what their next move should be. The film is a comedic parody based on the actual Cold War between the U.S. and the Soviet Union, but explores some of the consequences that human civilization could have potentially faced if certain

Monday, December 23, 2019

Community Colleges And Large Universities - 876 Words

Community colleges and large universities have a differentiation. A community college is a two-year school which provides affordable postsecondary education as a pathway to a four-year degree. A large university is an institution of higher education and research which grants academic degrees within a variety of different subjects. Many community colleges have a higher rate of graduation rates than universities. Community Colleges have some similarities but they also differ a number as well. Community Colleges and Large universities differ by : cost,class size, and degree types. Community colleges and large universities differ by cost. Community colleges are known to save tons on tuition. Community Colleges’ , tuition and fees are much lower than those at large universities. Enrolling into a community college, it enables you to achieve the same level of academic success at a fraction of the cost. When purchasing meal plans, dormitory, books, and etc. , you have the opportunity to save thousands of dollars. At four-year public institutions, the average list price for tuition and fees has risen 114 percent, to $9,410 in inflation-adjusted dollars, over the past 20 years.(Farish). If you were to enroll in a large university, then averagely you would be paying the rough estimate cost of $21,000 This price can either be estimated with or without the extra necessities. This includes, transportation as well as the things listed above. Researched on an online article, JonShow MoreRelatedHigh Education System : The United States1411 Words   |  6 Pagesset o f institutions- including public and private community colleges, liberal arts colleges, comprehensive universities, and world-renowned research universities. Every year, college students throughout the nation fall victim to theft, stalking, all forms of sexual assault, homicide, and other crimes. The law enforcement, campus officials, and legal professionals charged with identifying and dealing with violence risk at colleges and universities throughout the United States provide an importantRead MoreCollege Is A Great Feeder School For Brigham Young University848 Words   |  4 PagesUniversity or Community College. Ever since I can remember my parents told me that college was key to being successful in life. If you didn t attend a good college your life was most likely not going to be a very happy one. This message has stayed with me throughout my life , education was of great importance and college was the key factor of where you ended up in life. High school counselors, teachers, parents, and mentors all emphasized that the better the college you attend the more opportunitiesRead MoreEssay about Comparison of Universities and Community Colleges667 Words   |  3 PagesComparison of Universities and Community Colleges When you graduate high school you have your choice of what kind of an education you want to get. You have your choice of going to a 4-year university, or a 2-year college. In order to decide you will compare the two and use the comparisons to come up with your final decision. Questions to ask yourself would be, what are you looking for in college, how do you want to learn, and how much money do you have to work with. Comparing University and CommunityRead MoreCommunity College vs. University Essay559 Words   |  3 PagesAttention: Future college students, After twelve years of school, where will you go next? Many of you have developed the ambition to prolong your education and attend college. Today, there are many more options than there were in the past. One does not have to graduate high school and go straight to a four year university. It is sometimes better for a student to go to a community college and focus on transfer courses or simply get an Associate’s Degree. On the other hand, there are young adultsRead MoreGraduation Speech At Utah Valley University873 Words   |  4 PagesEver since I could remember my parents told me that college was key to being successful in life, if you didn t attend a good college your life was most likely not going to be a very happy one. This message stay throughout my life , education was of great importance and college was the key factor of where you ended up in life. High school counselors, teachers, parents, and mentors all emphasized that the better the college you attend the more o pportunities you ll have. Being a high school seniorRead MoreGroup Policy Paper For Profits Institutions1447 Words   |  6 PagesPolicy Paper—For-Profits Institutions Policy: Complete College Tennessee Act of 2010 Relevant History Higher education attainment is one important parameter of national competitiveness in today’s increasing global world. Compare to 1990, today, the rank of U.S. in the world in four-year degree attainment dropped from the 1st to the 12th. Therefore, President Obama set a new goal for the United States to be first in the world again in college attainment by 2020, in order to remain global competitiveRead MoreCommunity College: A Wiser Decision Essay988 Words   |  4 Pagesfor a better advantage in finding a job and getting a better life. Even though many people think going to a four year university directly from high school is a good idea; they are wrong. Starting out at a two year college is more affordable. Also, it helps people explore careers and prepare people to do better in four years universities later down the road. Going to four a year college directly after high school would cost a fortune amount of money. Before high school’s graduation even comes close,Read MoreLarge Universities Vs. Small Universities . To Put It Quite1335 Words   |  6 PagesLarge Universities vs. Small Universities To put it quite frankly, college searches are daunting for students, parents, and even guidance counselors. With a plethora of universities offering a vast variety of courses and degrees available, searching for one to settle down on can easily become a quagmire for some. One of the biggest decisions to be made in this situation is the size of the university. Although at first glance it may seem like a negligible detail, in fact, it can make or break aRead MoreOn Campus Housing At Community Colleges1424 Words   |  6 Pagesfocus of this paper is to dispel a common view that community colleges do not provide on-campus housing and to provide greater insights into the types of community colleges that provide on-campus housing, the typical student who resides in on-campus housing, a guide to various California community colleges that provide on-campus housing, and the impact that on-campus housing has on student learning outcomes, financial gains for community colleges that provide on -campus housing, and an overview ofRead MoreStudent Loan Debt1074 Words   |  5 Pagesinsufficient amount of guidance that is available concerning student loans. The purpose of this paper is to illustrate how prospective and current college students are ill prepared in their education and understanding of student loans. Three major issues that will be outlined in this paper include the large majority of college students are no longer able to pay for college out of pocket due to the rising costs, the effect that national debt has on students degrees, and finally the lack of early financial education

Sunday, December 15, 2019

Is Divorce Bad for Children Free Essays

Jasmine Grayson October 7, 2010 American Literature Is Divorce Always Bad For Children? To some, divorce may be a terrible thing for a child to have to endure. In some scenarios it is just better if the parents are separated. There is no better way to approach this subject than to talk from personal experience. We will write a custom essay sample on Is Divorce Bad for Children or any similar topic only for you Order Now I’ll explain how it feels to be a child in the middle of a divorce. My mother and father were together for seventeen years and they just recently decided to get a divorce. Under the circumstances I don’t feel bad they there are now separated.Growing up the only thoughts I had of my dad were either him being abusive or of him yelling. Another memory of my dad is the fact he cheated on my mom multiple times not making him seem any better. Due to the fact my father struggled with his health my mother forgave him for it all. To begin, as stated by PBS, when children are in an abusive home they are more susceptible to either being abusive or being abused and feeling that there is no way out. If the parents in an abusive relationship separate then the child(ren) are given a site of love.They are able to see how a family is supposed to react and communicate. They are able to see what real love looks and feels like. If parents in an abusive relation stay together their children will only know violence. They will only know sadness and when it’s time for them to marry they’ll divorce because they’ll think that’s how it’s supposed to go. Consider this, a child has one parent that understands and the other is strict. The child naturally gravitates to the understanding parent because they know the understanding parent is more responsive.When you have a strict parent who doesn’t understand, it usually leads to a child divorcing the parent before the spouse will. When a child divorces its parent the child doesn’t listen or respect their parent. In my case the divorce wasn’t bad at all. Growing up my mother basically did everything for me. Since me and my father never really talked we never had a strong relationship. When my parents decided to get divorce it was paradise for me. Living with my father is like walking on pins and needles barefoot. My dad only yelled and told me and my brother what to do.If you didn’t do something the exact way he wanted it then you had to re-do it all. Dealing with him was like biting into a plastic bottle because you knew he would never break. I was a ticking bomb waiting to explode and one day I did. One night I’d been so fed up I let out all my anger I’d bottled up for the past fifteen years. It felt like I’d exhaled a breath and my chest wasn’t clouded anymore. A few weeks after the argument my mom announced the news of the divorce. Ever since my dad moved out, I’ve been happier than ever.Now I don’t have to worry about coming to home to someone yelling. Had my parents stayed together I don’t think I would’ve started back doing the things I like; singing, dancing, and playing the piano. If parents continue to stay together for the sack of their kids they’ll make themselves unhappy. Some parents will be shocked to realize that their child wanted the divorce longer than they did. While the other parents will face their children who want them to stay together. It all depends on the children and what they’ve been through. How to cite Is Divorce Bad for Children, Papers

Saturday, December 7, 2019

Internetworking with TCP/IP Free Assignment Sample

Questions: Task 1 Explain with the aid of diagrams the TCP/IP Protocol Architecture. Discuss the function of the protocols within each layer. Evaluate the application of TCP/IP to internet based applications. Task 2 Explain the principles of IP addressing based on IPv4 and discuss the key practical issues in implementing IP addressing within public and private networks. With the aid of a network diagram explain how IP addresses are assigned to a network. With the help of a network monitoring tool (Wireshark), analyses the IP traffic.(provide evidence i.e. screenshots) Task 3 A local business TCS Ltd. is considering implementing IPv6 Protocol throughout the organization. Present a report for the Operational Director highlighting and discussing the key issues in migrating from IPv4 to IPv6 addressing. The report should: Discuss the benefits and drawbacks in such migration Explain and evaluate the alternative transition mechanisms Analyze and evaluate the improvement in quality of service (QoS) and security Task 4 TCS Ltd. is also considering the provisioning of voice over IP (VoIP) and mobile IP (MIP) for its employees. It is anticipated this will both reduce operational costs and increase network efficiency. Make a business case for such implementation. The Business Case should; Explain the underlying concepts of VoIP and MIP Analyze and evaluate mobile IP networks, particularly examining routing and security issues Analyze and evaluate the VoIP and MIP in the Enterprise networks. Answers: Task 1 TCP/IP architecture model was initially designed as DARPA model by the US government agency by that name. There were four layers in the DARPA model. Those were, application layer, transport layer, Internet layer and network interface layer. Each of those layer used to correspond to one or more layers in the OSI model with seven layers. In the TCP/IP protocol architecture, there are four layers or sets of protocols, similar to the DARPA model. TCP/IP protocol architecture works as protocol stack. Each layer of TCP/IP protocol stack, has its own set of functionalities and provides a set of services to the next layer. The descriptions of these layers are, (Blank, TCP/IP Foundations, 2006) Network Interface layer Network interface layer or network access layer is the lowest layer in the TCP/IP protocol stack. It places TCP/IP packets on the network and receives the same from the network. TCP/IP protocol stack is independent of different network access methods, medium, frame formats etc. Thus it supports different types of networks, different types of LAN technologies like token ring, Ethernet etc., different types of WAN technologies like frame relay, X.25 etc. This layer is independent from different network technologies. It gives the TCP/IP protocol stack the ability to adapt any new networking technology, for example, ATM or Asynchronous Transfers Mode networks. (Blank, TCP/IP JumpStart, 2006) Internet Layer Internet layer sits on the top of network interface layer in the TCP/IP protocol stack. Internet layer is responsible for packaging, addressing and routing of packets. There are some core protocols in this later. These protocols are important for internetworking. The protocols are IP or Internet Protocol, ARP or Address Resolution Protocol, ICMP or Internet Control Message Protocol, IGMP or Internet group management protocol. Each of these protocols performs different types of responsibilities and collectively all these are the responsibilities of internet layer. (Comer, 2006) Internet protocol is responsible for routing packets. Thus functions like routing, IP addressing, packet fragmentation and reassembly are provided by this layer. Address resolution protocol provides services like IP to MAC address translation etc. The main function is to provide address resolution services to the network layer. Internet control message protocol provides different types of diagnosis and error handling services that may occur from erroneous packet delivery. Internet group management protocol manages groups of IP multi-casting. Transport Layer Transport layer provided host to host service on the top of internet layer. It consumes services from the internet layer and provide service to the application layer that is on the top of it. Mainly it provides services related to transmission of data packets successfully over the internet. There are two protocols in this layer. Those are TCP or Transmission Control Protocol and UDP or User Datagram Protocol. (Alani, 2014) Transmission Control Protocol is responsible for providing a connection- oriented, one to one and reliable communication service. It arranges the sequences of packets, acknowledges the packet transmissions, and provides recovery of packets lost during transmission. On the other hand, user datagram protocol is a connectionless, one to many (may be one to one), unreliable service for communication over the internet. Generally, UDP is used to transfer smaller amount of data or data where security or data loss is not a big issue. TCP provides secure and better service than UDP, but there is some additional overhead of TCP services, when some application does not want to have these overhead and still want to have a data transmission, then it selects UDP instead of TCP. (Blank, TCP/IP JumpStart, 2006) Application Layer Application layer is the topmost layer on the TCP/IP protocol stack. It directly interacts with the applications on a computer or system. It provides abilities to the applications to consume services from other layers of the TCP/IP protocol stack. Application layer has a bunch of protocol and new protocols evolve frequently. (Reynders Wright, 2003) Some of the widely used application layer protocols and the services provided by those protocols are, HTTP or HyperText Transfer Protocol, has the responsibility of exchanging user information through developing web pages for World Wide Web. FTP or File Transfer Protocol is responsible for transferring file between two hosts. SMTP or Simple Mail Transfer Protocol is responsible for transferring mails and attachments. Telnet is responsible for emulation or terminal. It let a user log in to some remote network host. DNS or Domain name service helps in resolving the IP address and host names. RIP or Routing Information Protocol helps in routing and exchanging routing information across an IP network SNMP or Simple Network Management Protocol helps in managing different networking devices and manages the same. It helps in collecting and exchanging management information for devices like bridges, routers, intelligent hubs etc. Some examples of application layer interfaces for TCP/ IP protocol stacks may be NetBIOS, Windows Sockets etc. In Windows operating system environment, Windows Socket helps in having a standard API. NetBIOS helps in managing sessions, name resolutions, datagram related protocol services. The illustration of TCP/ IP protocol stacks along will different sets of protocols for each of the layers, has been given as, There are different types of networks used for different organizations, the networks differ in structures, services, interfaces, technologies. Connecting all these networks to have an interconnected network or Internet required some uniformity and platform independent protocols. OSI model was built to abstract the diverse nature of the network. OSI model provides enough abstractions to hide the complexities of networking and internetworking and gives enough scope to the programmer to build specific programs to each layer. Then programs from different layers of OSI model then work with one another. There were several flaws in OSI model. There were no details about the protocols or how to implement the functions of each layer. On the contrary, TCP/IP model gives details about the protocols from each layer. A programmer can implement those protocols from different layers and the job is done. (Held, 2002) OSI model has total 7 layers. Those layers are categorized into two category of layers as given in the following picture. The layers in the OSI model as, Application layer. Presentation layer, Session layer. Transport layer, Network layer, Data Link layer, Physical layer. First three layers belong to the application layer category and rest of the layers belong to the data flow category. On the other hand, there are four layers on the TCP/IP model. Those are application layer, transport layer, internet layer, and network access interface layer. These four layers covers the seven layers of OSI mode. The layers on the TCP/IP model are again divided into two categories. Application and transport layers are categorized as protocols layers and rest two belongs to networks layers. The comparison between OSI model and TCP/IP model are summarized as,(Alani, 2014) Open System Interconnection (OSI) Model TCP /IP Model This is more focused on architectural aspects of a network model and provides an idealistic view. It is more focused on the implementation aspects and provides some realistic view. OSI model is developed by a horizontal approach. It is developed based on a horizontal approach. The basic assertion behind the OSI model is that operation of distributed applications is laid upon a strict hierarchy of layers and standardisation. The basic assertion of TCP/IP model is that any application is composed of a set of functions over an end to end distributed communication service. There is a pool of application service elements or ASEs a distributed application selects an element from such pool and performs functions that is specific to the end to end service. Abstraction is the fundamental characteristic here. Every application assumes that services from lower layer will be available at any point of time. The session layer controls the sessions, presentation layer controls the representation of data etc. and the application layer communicated with the application on the host system. In OSI model, all these are different layers. Some examples of functions of OSI application layer are, VT, FTAM ,MHS, CMIP, DS etc. In the TCP/IP model, application, session and transport layers of the OSI model have been clubbed into application layer of TCP/IP model. Some example of protocols from application layer of TCP/IP model are, FTP. HTTP, DNS. Telnet etc. (Alani, 2014) The transport layer of OSI is responsible to deliver information from source system to destination system. The transport layer communicates from source to destination, performs flow control, error checking etc. The network layer provides connection oriented and connectionless services. The internet layer on the TCP/IP provides only connectionless service. Data link layer prepares the streaming of data, handles flow control, error control. Whereas data is transmitted through the physical media as a raw bit stream. The later part is handled by physical layer. Here data transmission is handled by network access layer only. Services provided by data link and physical layers in the OSI model are provided by the network access layer in the TCP/IP model. While implementation of the OSI model, the emphasis is on reliability of data transfer. The reliability is handled as an individual cases of end to end delivery. Detection and handling of errors is performed in each layer using checksums. Detection and handling of errors is done by the transport layer only. OSI model is most of the time a theory based description of an ideal network model, whereas TCP/IP model is a model that is being used in practice for long time. Task 2 IPv4 or Internet Protocol version 4 is a widespread and currently used internet addressing scheme. A network connects different types of devices as hosts. An internet is an interconnection of different types of networks across the globe. It is necessary to uniquely address each of the host connected to the internet. For that purpose internet address or IP addresses are used. There are different schemes of IP addressing. IPv4 is a 32 bit IP addressing scheme. With 32 bits, possibly there will be 232 unique IP addresses. IPv4 addressing uses a class-full addressing. Implementation of IP addresses in private and public networks has some challenges. One is, there is scarcity of addresses that can serve need of the networks and devices. Thus, there are two types of addressing used in private and public network. The addressing scheme used within a private network is not visible from the public network. Masquerading, NAT etc. are used to implement it. However, it increases overhead on routers. (Comer, 2006) On the other hand, there are two types of IP addresses, static and dynamic. ISPs use a pool of available IP addresses, when some client logs on to their network and request some IP address, then the ISP allocates one IP address from the address pool. The IP address is valid for that client for that session only. When the client logs off, the address will be de-allocated and will go back to the address pool. This scheme is known as dynamic IP address. Where the IP address is not tied to some device. The same client may get different IP address when it logs in again. And the same IP address may be allocated to other client next time. On the other hand, there are other types of IP addresses that are tied to a particular device. These are called static IP addresses. (Held, 2002) NAT or Network Address Translation is used to bridge the gap between private and public network. A NAT table is kept on the router. There may be at least two attribute for each entry of the NAT table, the IP addresses of a device in the private network and the IP address of the destination of the packet. The router checks the NAT table, replaces the source address as the public address of the network and forwards the packet to the destination. When it receives some packet from the Internet or other network, then it checks the NAT table again and forwards the packet to the destination. For public networks, there is no existence of the private network, they communicate with the public IP address of the network. There are RIR or Regional Internet Registry that are organizations for handling registration and allocation of IP addresses in different parts of the world. There are 5 RIRs currently for different regions of the world. Following picture illustrates the RIRs and operating domains. Each of the RIR has 16 millions of IP addresses to allocate. In IPv4 scheme, the whole address space is divided into 5 categories those are, Class Address Range of first Octet Network and Host octets Class A 1 to 126 N.H.H.H Class B 128 to 191 N.N.H.H Class C 192 to 223 N.N.N.H. Class D NA Reserved for Multi casting Class E NA Reserved for Research and Future use. There are several disadvantages of IPv4 addressing scheme. The blocks dont have equal number of networks or hosts. For example, there is huge numer of hosts possible for a Class A IP address but in reality no class A IP address contains that many hosts. On the other hand very few hosts are possible for a Class C IP address. So, there is a mismatch between the requirement and availability. Here comes the major disadvantage of IPv4 addressing schemes. There are unused IP addresses but those cant be allocated. The available IP addresses are depleting and has failed to cater the requirement of growth of internet. (Reynders Wright, 2003) As a result IPv6 has been developed. Task 3: Report Introduction The aim of this report is to discuss and highlight the key issues in implementation of IPv6 protocol for the organization TCS Ltd. In the rest of the parts of the report the discussion will focus on different aspects of implementing IPv6 in the organization, the benefits and drawback of the implementation, explanation and evaluation of other alternative transition mechanisms, analysis and evaluation of possible improvement in QoS or Quality of Service and security. IPv6 IPv6 or Internet Protocol version 6 is the latest and updated version of the communication protocol IP in the TCP/IP model. It helps in identification and location of a host system in the internet uniquely and routing traffic from source to destination on the Internet. IPv6 has been developed by IETF or Internet Engineering Task Force. One of the major issue with IPv4 is rapid depletion of the available IP addresses and poor distribution of the same. To deal with this problem IPv6 has come into the picture. It is slowly replacing IPv4. IPv6 is a 128 bit addressing protocol and holds almost 2128 unique addresses into its address space. IPv6 is not interoperable with IPv4. Thus one is needed to be replace by other. There are various transition mechanisms from going to IPv6 from IPv4. (Hagen, 2014) A 128 bits IPv6 address is broken down into 8 groups of four hexadecimal digits in each group. Each of the group is separated by a colon. There are compression methods available to shrink or expand representation of an address. Benefits and Drawbacks of Implementation of IPv6 One of the major benefits of IPv6 is the larger address space and classless distribution of addresses. The address allocation methods of IPv6 facilitates route aggregation and limits extensions of routing table. It support multicasting in a simpler and extended way. There are several optimizations for delivery of services. It enhances mobility, configuration and security of the devices. So, other benefits of IPv6 for an organization are, (Johnson, Perkins, Arkko, 2004) It provides better and more effective routing. The routing tables are reduced in sizes. A hierarchical approach in management of routing table can be taken. The ISPs can aggregate their networks into a single prefix. Fragmentation is done by the source in the IPv6 network, the routers are not responsible for it. Thus overall overhead from routing is reduced and routing has become more efficient. Processing of packets in IPv6 networks is better and simpler. Thus more efficient. There is no calculation of packet level checksum and no calculation of checksum at every hop. The link layer protocols and technologies handles this part. Ipv6 supports multicasting. It allows packet flows that are bandwidth intensive, to more than one destination at the same time. Thus the network bandwidth is saved. The hosts that are not bound to process broadcast packets. There is a additional data field in the IPv6 header, called Flow Label. This data field helps in identifying data packets belonging to the same data flow. Configuration of a network for the organization will be automated if it is built on Ipv6. The prefix of all local links to a router will be advertised. A host will be able to generate its own IP address. The MAC address of the host will be appended to the prefix sent by the router. Then it will be converted into some 64 bit EUI or Extended Universal Identifier format. The prefix is another 64 bit, thus the whole address will be 128 bit. There is no need to use NAT or Network Address Translation anymore. At the IP layer, the end to end connectivity will be provides. New services can be added. The peer to peer networks are easily manageable. VoIP, QoS etc. will be more effective. Security is another issue in any type of networks. IPv6 supports IPSec and provides CIA principles of confidentiality, integrity and authentication. ICMP packets for IPv6 are backed up with more security implementations of IPSec and the risks of malware attacks through these packets has been reduced. Apart from the benefits there are few drawbacks of IPv6. Those are, Still IPv6 is not widely accepted and those are not interoperable with IPv4. There is lack of smooth transition schemes to transit from IPv4 to IPv6. Alternative Transition mechanisms Some alternative transition mechanisms to transit to IPv6 from IPv4 are, Host to host Encapsulation In this method, the encapsulation is done at the source and the destination encapsulates it. A private IPv4 network without any information about the IPv6 protocol, is used to transfer the datagrams from the source to the destination. In the following picture, the illustration has been shown, including two hosts with dual IPv4 and IPv6 stacks. These stacks are used for encapsulations. IPv6 datagrams are sent as IPv4 packets. On the destination end, the hosts are updated to IPv6 protocol and will be able to de-capsulate the packets. (John J. Amoss, 2007) This transition mechanism does not require to change the existing IPv4 network, rather it use encapsulation to transit to the IPv6 network. Tunneling from router to router In this mechanism, a tunneling method connecting routers of the organization will be used along with the encapsulation schemes. On the originating host, the edge router will be placed. Another edge router on the destination host will be responsible for the de-capsulation. (Raicu Zeadally, 2003) There will be a tunnel between the edge routers at two ends. Again there will be two protocol stacks of IPv4/ IPv6 at two ends. These stacks will be supported by the hosts at both ends. Again, the source will encapsulate the packets, that will flow through the tunnel and the destination will de-capsulate the packets. Following picture illustrates the idea. The dual stacks at the both ends are needed to be supported by the edge routers. QoS and Security IPv6 provides better QoS and Security compared to the same in IPv4. IPv6 protocol helps in identifying payload that are time sensitive or not. A network can have two types of these packets. It helps in reducing the time in retransmission. IPv6 helps in setting priorities for data transmissions that provide low latency. Applications can select from the priority list as per requirement. A source of significant delay in packet transmission is fragmentation of packets. In IPv6 fragmentation is handled in different way. There is a negotiation between the source and the destination devices about the maximum size of the payload and other parameters are adjusted accordingly. It reduces latency and fragmentation significantly thus helps in better utilization of the network resources. There is QoS implementations on each of the networking device. On the other hand, security of IPv6 protocol is more stringent than the same in the IPv4 protocol. IPSec is an important part of the security mechanisms in IPv6. End to end security is ensured in IPv6. (Li, Jinmei, Shima, 2010) Conclusion In this report IPv6 and different aspects of IPv6 implementation have been discussed. There is a brief description of IPv6 along with discussion on benefits and drawbacks of IPv6, transition mechanisms, QoS and security etc. have been also discussed. Task 4: Report Introduction The aim of this report is to provide information of VoIP and MIP as requested by the TCS Ltd. The organization wants to implement these protocols and technologies for their employees. The organization wants to focus on the reduction of operational cost and modifying efficiency of network. VoIP or Voice over Internet Protocol VoIP or Voice over IP is a technology that helps a group of people to deliver voice and multimedia based communication over IP based networks like Internet. It is also called IP telephony. It supports services like voice communication, SMS, fax etc. over the Internet unlike traditional telephony system, it does not use circuit switching. Rather internet telephony or VoIP uses packet switching networks and packetization of data. An example of VoIP is Skype. (Porter, 2006) There are underlying technologies like session control, signaling control, setting up the call, tearing down the call etc. There are special medial delivery protocols to encode audio, video etc. as digital and streaming data. VoIP can be used by computers, laptops, smart phones etc. SMS service is available over WiFi or 3G connections. (Goode, 2002) Quality of Service or QoS of VoIP has several issues. VoIP is implemented over the Ip networks. IP networks are best effort networks and there may be loss of data, untimely deliver, latency related problem etc. VoIP will use time sensitive communication data. There is no provision of identifying and handling time sensitive data. Network traffic is handled by a first come first serve basis. There is no way to control fixed delays etc. The end points of a VoIP communication path may have to wait for the completion of the transmission of packets from one end to other, then one end will be able to send more data. Security is another consideration of VoIP. There are risks of DoS attacks, stealing of information, eavesdropping etc. There are other technical consideration related to security. For example, VoIP traffic also passes through the firewalls, NATs etc. so, there are chances that communication may get blocked. Encryption is always not supported by VoIP. (Wallingford, 2005) Some of the security measurements and protocols available for the VoIP are, SRTP or Secure Real time Transport Protocol. Also there are implementation of IPSec for the point to point communications. Mobile Internet Protocol MIP or Mobile IP is based on the idea of mobile computing and mobility of devices in a network. It helps a mobile device to keep its IP address same while moving around networks. A mobile node is allowed to have two types of address a care of address and a home address. The care of address changes whenever it moves to some other network, on the other hand the home address is remained same. Thus the computing activities based on the IP addresses are not hampered even there is a change in the network. (Raab, 2007) There are several security and QoS considerations. Most of the times mobile nodes use wireless connectivity options. These links are highly susceptible to vulnerabilities and information security risks. The risks may be active replay attacks, eavesdropping etc. These vulnerabilities cannot be eliminated. But use of encryption etc. can help. Tunneling used in MIP has some serious vulnerability. Thus authentication is always needed here. It also used ARP in case of tunneling. But it is hard to implement authentication for ARP. Thus, there will be some inherent vulnerability. (James, 2008) Conclusion In this report VoIP and MIP has been discussed. There is discussion on what are VoIP, MIP along with security, QoS issues and how enterprise networks are using those. References Ahmed, A., Madani, H., Siddiqui, T. (2010). VoIP Performance Management and Optimization. Cisco Press. Ahson, S. A., Ilyas, M. (2008). VoIP Handbook. CRC Press. Alani, M. M. (2014). Guide to OSI and TCP/IP Models. Springer. Blank, A. G. (2006). TCP/IP Foundations. John Wiley Sons. Blank, A. G. (2006). TCP/IP JumpStart. John Wiley Sons. Comer, D. (2006). Internetworking with TCP/IP: Principles, protocols, and architecture. Prentice Hall. Goode, B. (2002). Voice over internet protocol (VoIP). IEEE. Goralski, W. (2009). The Illustrated Network. Morgan Kaufmann. Graziani, R. (2012). IPv6 Fundamentals. Cisco Press. Hagen, S. (2014). IPv6 Essentials. O'Reilly Media, Inc. Held, G. (2002). The ABCs of TCP/IP. CRC Press. James, S. (2008). Mobile Ip: The Internet Unplugged. Pearson . John J. Amoss, D. M. (2007). Handbook of IPv4 to IPv6 Transition. CRC Press. Johnson, D., Perkins, C., Arkko, J. (2004). Mobility support in IPv6. Karas, J., Peschke, R. (2002). TCP/IP Tutorial and Technical Overview. Prentice Hall PTR. Kozierok, C. M. (2005). The TCP/IP Guide. No Starch Press. Li, Q., Jinmei, T., Shima, K. (2010). IPv6 Core Protocols Implementation. Morgan Kaufmann. Loshin, P. (2004). IPv6. Morgan Kaufmann. Mondal, A. S. (2012). Mobile IP. Springer . Norris, M. (2001). Mobile IP Technology for M-business. Artech House. Perkins, C. E. (2005). Mobile IP. Pearson . Porter, T. (2006). Practical VoIP Security. Syngress. Raab, S. (2007). Mobile Ip Technology And Applications. Pearson . Raicu, I., Zeadally, S. (2003). Evaluating IPv4 to IPv6 Transition Mechanisms. IEEE. Reynders, D., Wright, E. (2003). Practical TCP/IP and Ethernet Networking. Newnes. Thermos, P., Takanen, A. (2007). Securing VoIP Networks. Pearson . Wallingford, T. (2005). Switching to VoIP. O'Reilly Media, Inc.