Monday, September 30, 2019

Jane Eyre Character Essay

â€Å"The humblest individual exerts some influence, either for good or evil, upon others† said Henry Ward Beecher. Everyone has some type of influence on another, whether it is big or small, good or bad. For example, outside influences, such as other characters, can affect a characters actions and thoughts in either a positive or negative way. In the novel Jane Eyre written by Charlotte Bronte, many characters influenced Jane, but Mr. Rochester and St. John Rivers had the most influence on her personality. Although the two men were very different from one another, they both had an impact on Jane’s transformation into a strong and independent women thought their actions, love, and influence. Mr. Rochester differs greatly with St. John though their outlook on religious and moral beliefs. â€Å"I advise you to live sinless; and I wish you to die tranquil.† (p.398) Mr. Rochester is portrayed as a sinner because he did not inform Jane that he was still married to Bertha Mason. His desire to keep Jane at Thornfield as his mistress displayed his lack of morality. While Mr. Rochester is passionate and desperate, St. John is cold and determined. St. John’s somber personality is made clear when he said, â€Å"I want a wife: the sole helpmeet I can influence efficiently in life and retain absolutely till death. (p.506) St. John, unlike Mr. Rochester, followed religious principles and moral values. These two men are both the most influential males in her life, but they are both so different from one another. Although Mr. Rochester and St. John had very different beliefs, they both brought out changes in Jane’s character. If Jane were to accept Rochester’s first proposal, she would had sacrificed her dignity for love. â€Å"I care for myself. The more solitary, the more friendless, the more unsustained I am, the more I will respect myself.† (p.398) Jane does not accept his proposal in marriage in order to preserve her self-esteem. This struggle with Rochester farther developed her morality and self-worth. In refusing his marriage proposal because he has a wife, she became morally superior to him. Jane was able to keep her moral value through sacrificing her feelings for what was right. St. John longed to marry Jane and invited her to accompany him on his missionary trip to India. He says, â€Å"God and nature intended you for a missionary’s wife. It is not personal, but mental endowments they have given you: you are formed for labor, not for love.† (p.502) St. John thought Jane would make a great missionary’s wife because of her morals. Jane replies saying, â€Å" Oh! I will give my heart to God, you do not want it.† (p.507) As the quote shows, if Jane was to accept St. John’s proposal, she knew she would be settling on someone that did not truly love her, nor did she truly love in return. Though this experience Jane realizes love can on be found in a relationship with mutual feelings. Therefore Jane denies St. Johns love for her and his marriage proposal. Through Jane’s obstacles throughout the novel, she overcame her weaknesses. The influences from both Mr. Rochester and St. John shaped her character, strengthened her moral principles, and taught her to make the right choices. With each situation Jane made the right decisions. The two men, although completely diverse from one another, they both played a vital role in Jane’s growth as a character.

Sunday, September 29, 2019

Homelessness: What We Can Do About It

â€Å"Being homeless is often defined as sleeping on the streets. Although this is the most visible and severe form of homelessness, there are many other types of acute housing need. These include living in temporary accommodation, poor or overcrowded conditions, or being in mortgage arrears and under threat of re-possession. † (Hope, 27) It is a symptom of many complex problems: mental illness, emotional instability, illiteracy, chronic substance abuse, unemployment, and, most basic of all, the breakdown of city planning. Anyone can become homeless and the reasons that force people into homelessness are many and varied. The leading cause, however, of homelessness in the United States is the inability of poor people to afford housing. â€Å"Housing costs have risen significantly over the last decade, while the incomes of poor and middle-class Americans have stagnated. † (Erickson, 169) The millions of Americans who are unemployed or work in low-paying jobs are among the most vulnerable to becoming homeless. Therefore, homelessness, housing, and income are inextricably linked. Low-income people are frequently unable to pay for housing, food, child-care, health care, and education. Difficult choices must be made when limited resources cover only some of these necessities. Often it is housing, which takes a high proportion of income that must be dropped. Two major sources of income are from employment and public assistance. A decrease in either one of them would certainly put poor people at risk of homelessness. Additionally, minimum wage earnings no longer lift families above the poverty line. More than 3 million poor Americans spend more than half of their total income on housing, yet the Department of Housing and Urban Development estimates families should spend no more than 30%. † (Gilbert, 84) Although many homeless adults are employed, they work in day-labor jobs that do not meet basic needs, while technological acceleration excludes others from a competitive job market. Many factors have contributed to declining work opportunities for large segments of the workforce, including the loss of well-paying manufacturing jobs. The decline in relatively secure and well-paying jobs in manufacturing, which have been replaced by less secure and poorly-paid jobs in the service sector, has greatly limited the opportunities for poorly-educated and low-skilled segments of the population. This transformation has led to an unprecedented incidence of chronic unemployment and underemployment. (Hardin, 379) â€Å"Underemployment is an especially useful measure of the decline in secure jobs since, unlike the unemployment rate, measures of underemployment reflect not only individuals who are unemployed, but also involuntary part-timers and those who have given up seeking work. (Hardin, 263) In addition to increasing underemployment, an estimated 29. 4% of the workforce are employed in nonstandard work arrangements, for example, independent contracting, working for a temporary help agency, day labor, and regular part-time employment. These kinds of work arrangements typically offer lower wages, fewer benefits, and less job security. â€Å"As recently as 1967, a year-round worker earning the minimum wage was paid enough to raise a family of three above the poverty line† (Sklar, 103). From 1981-1990, however, â€Å"the minimum wage was frozen at $3. 5 an hour, while the cost of living increased 48% over the same period. Congress raised the minimum wage to $5. 15 per hour in 1996. This increase made up only slightly more than half of the ground lost to inflation in the 1980s† (Hardin, 191). Thus, full-time year-round minimum-wage earnings currently not equal to the estimated poverty line for a family of three. Unsurprisingly, the decline in the value of the minimum wage has been accompanied by an increase in the number of people earning poverty-level wages and the declining wages have put housing out of reach for many workers, in every state. Slashed public assistance has also left many people homeless or at risk of homelessness. Replacement of the Aid to Families with Dependent Children (AFDC) entitlement program, a program that was already inadequate in meeting the needs of families, with the non-entitlement block grant program would significantly increase the risk of homelessness for many Americans. Furthermore, earned income and asset limitations discourage individuals and families from breaking the cycle of homelessness and extreme poverty. Several states have terminated or reduced public assistance and food stamps for individuals, while Social Security Income (SSI) is inadequate, and sometimes impossible to obtain, for disabled individuals. As a result, the number of poor Americans is growing and the poor are getting poorer. Across America, there has been a substantial decline in the number of housing units that low-income people and those in need of shelter assistance can afford. Those losses have resulted primarily from downtown urban renewal, gentrification, abandonment, and suburban land use controls. The elimination and reduction of federal low income housing programs has also dramatically reduced the supply of affordable shelter. Moreover, construction of low income and assisted housing has essentially stopped. Due to the increased demand and diminished supply of housing or shelter, the problem of homelessness is further deteriorated. The amount of housing available in the private sector rental stock is diminishing rapidly. As more and more landlords abandon apartment buildings and houses rather than repair them, the housing supply for the poor has declined at an accelerating pace in some cities in the nation. The growth of service-sector employment in central business districts has attracted white-collar professionals, many of whom prefer to live in accessible central city neighborhoods, where they compete with poor, indigenous residents for private market housing (Noyelle, 210). The result is frequently gentrification of inner city housing which traditionally has been the major source of low- income housing. At the same time, downtown service sector expansion has created jobs for many low-waged workers, which increases the demand for low cost shelter readily accessible to the downtown. It makes the homeless in downtown even harder to rent a place to live. Downtown development also diminishes the supply of low-income housing for poor people. As the City raises more new office towers, the vacancy for housing is getting less. In Seattle, for instance, office space in downtown grew from 13 million square feet in 1981 to about 24 million square feet in 1990. On the other hand, the downtown low-income housing stock declined from about 11,000 units in 1980 to less than 6,000 units in 1987. With the passage of new housing levies, cities will try to regain some low income units, but today s low-income units vanish faster than they can be built and there is still a shortage in housing supply in downtown areas. Besides, the qualities of temporary shelters for homeless people are terrible that they think staying on streets is a better choice. Not only have the lost bed-spaces not been made up, but the new hostels are not as readily accessible to the homeless coming directly off the street. They tend to cater to special-needs groups and access tends to be through referral. Planners can play an important role in the search for solutions to homelessness. And homelessness is an extensive, complex process. Different kinds of intervention are needed to deal with the problem. But the most widely accepted approach is a three-tier system, beginning with emergency shelters and moving through transitional accommodations to long-term housing. Rehabilitation of old buildings by minimal funding are common projects to provide shelters for the homeless people. However, some observers suggests that making the renovation of buildings for low-income housing profitable, for developers or investors, can be the solution to the homeless problem. Our examination makes it clear that piecemeal intervention can alleviate emergency shelter crises, but such action will not resolve the long-term problem of finding permanent shelter for the homeless and returning them to the mainstream of society wherever possible, which we regard as the ultimate goal of intervention. Equally obvious is that while long-term intervention strategies are vital, they do not address the problems of survival for those presently without shelter and support. We conclude that both long-term and short-term measures are necessary, but that all the solutions should be based on integrated, comprehensive understanding of the homelessness problem. Only such a comprehensive approach will allow planners to develop workable strategies with any chance for success.

Saturday, September 28, 2019

The Ronald Reagan Administration

In the year 1980, an unstable economy at home, a hostage crisis overseas, and the end of prior administrations that were not trusted at all troubled The Untied States. Ronald Reagan was elected as the oldest president at sixty-nine years old on November 4th, 1980. Reagan was born in Tampico, Illinois and before he was elected he served two terms as California governor first year starting in 1966. He served to presidential terms from 1981-1989. Reagan's track record proved to be very strong and included welfare cuts, decreasing the number of state employees, and halting radical student protesters.Like other GOP members, Reagan came into office promising to limit the power of government and to strengthen American military power overseas. â€Å"In this present crisis,† Reagan said in his inaugural address in 1981, â€Å"government is not the solution to our problem; government is the problem. † He was saying that government was holding the economy back of its full potentia l. Ronald Reagan wasted no time in institutionalizing the new conservative creed. In 1981, after surviving an assassination attempt, Reagan pushed his plan of lower taxes which was that proved most beneficial to the rich and steep budget cuts through a tentative Congress.Additionally to that year he cut spending on social security, debilitated and weakened organized labor groups, and lived up to his campaign promises and commitments by reducing government regulations and laws that had prevented mergers while managing the banking industry. Also, in 1981 he appointed conservatives who would carry out his vision of smaller government to agencies like the EPA, his cabinet, and the courts. A big keystone was Anti-Communism of Ronald Reagan administration’s foreign policy.The Reagan Doctrine had a unstable relationship with the Soviet Union and Central America, more so than with other nations. President Reagan drove for a space-based missile system to help keep America on the offen sive and, to protect ourselves from other countries trying to attack the Untied States. He also pushed for a â€Å"Caribbean Basin Initiative† in expectations of stimulation of economic growth in the United States. Many critics saw Reagan's military tactics as illegitimate and dishonest.They disagreed with the quantity of funding relegated to military efforts in Central America. . These funds were used to intervene in Grenada and El Salvador, and aided pay an undercover war against the revolutionary government of Nicaragua. As expected from a timid Liberal Congress, funding for the Nicaraguan war was blocked. Nonetheless, the National Security Council raised the money to finance the intervention. Reagan saw the Soviets at the heart of every international dispute, from revolution in Central America to international terrorism in the Middle East.To frustrate the Soviets, Reagan called for the largest and most expensive peacetime military buildup in American history. Ronald Reaga n made the Untied States of America military powers way stronger than ever, he was always trying to improve the military’s technology and weapons. He made America one of the strongest military powers when in office. With his telegenic features and extensive experience in front of a camera from his career in Hollywood, Reagan was ideally suited for politics in a growing media age.Though intellectually unaspiring and often disengaged in his leadership style, he brilliantly articulated themes of patriotism, individualism, and limited government that resonated with millions of Americans. The President worked tirelessly in effort to propel his campaign for a second term. Ronald Reagan's victory in the 1984 presidential election underscored his political popularity which he carried 49 states and 525 electoral votes. Through his speeches he repeated his anti-Communist bombast that Soviets and Communism, as a whole, would fail.He despised the Soviets and told the country they would f ail in anything against America. Ronald Reagan's second term witnessed a radical change in U. S. and Soviet relations. He was concerned about a possible backfire against his policies; Reagan called for a â€Å"constructive working relationship† with the Kremlin. At the same time, a new leader was emerged in Mikhail Gorbachev, came into power determined to change Soviet society by introducing a series of political and economic reforms.In determination to avoid an expensive arms  race and allow economic growth to take place, Gorbachev declared a suspension, or delay, on deployment of medium range missiles in Europe and asked the United States to do the same. The result of these growths was a series of four Reagan-Gorbachev summits, which concluded in the first U. S. and Soviet treaty to reduce the number of nuclear weapons. Treaties were then worked out and caused demolition of some missiles and allowed onsite checkups and inspections to occur. This was big for both countryâ €™s’ as the missiles were demolished from attacking each other.This was one of the many huge accomplishments while Reagan was in office. The Soviet Union no longer standing the type of threat it once did, Reagan and his anti-communist attitude and mentality still did not let up. Reagan with a goal of greater participation in the third world, the military's attention and care was soon afterward shared with the Middle East and its terrorism. Previous administrations had not been completely honest with the public as to what exactly their foreign policies involved. For this reason, great attention was turned toward President Ronald Reagan's handling of foreign policy in 1986.That year, there was assumption of the United States trading weapons with Iran in exchange for the return of American hostages being held in Tehran. In 1986, despite a Congressional ban, Reagan approved and authorized the sale of arms to Iran. This complex arrangement's aim was to furtively fund Nicaragua n rebels' efforts to defeat the cruel Sandinista government, successfully stopping the spread of Communism. All this was done in an effort to send a strong message to the Soviets that further Marxist activity would not be tolerated.Reagan was not a fan of communism he was an anti-communist. He did not accept it, and always had his eyes on communist. Despite these wins over communism, Reagan's authority was diminished and weakened in his second term by this scandal. Congressional hearings and investigation by special prosecutors led to the indictment of some of the President's top advisers. By the conclusion of his presidency, conservatives spoke greatly of the â€Å"Reagan Revolution,† which reduced the size of the government, reduced and lowered taxes, and technically â€Å"won† the Cold War.However, some claimed that Reagan's domestic policies forced excessive adversity on the poor and created a piercing increase and surge in homelessness around the whole country, wh ile his extreme military spending produced an extraordinary budget deficit. People say he increased military power over economic attentions. Possibly the critical irony of Reagan's presidency was that he improved public faith, confidence, and trust in the office of the presidency at the same time that his enormous scarcities crippled Washington's capability to reply to demands for greater government services.Nonetheless in actuality, his anti-Communist movement led to a grander involvement in the third world, particularly in Central America, and made his point very clear that he would stop at nothing to achieve worldwide democracy. Ronald Reagan's passionate opposing Communist rhetoric could be viewed as very debatable in its time, but events have shown he was prophetic in regards to the complexity of Soviet interior flaws. In an address to the British Parliament on June 8, 1982, Reagan declared that the Soviet Union was in the middle of a â€Å"great revolutionary crisis† an d expressed hope that Communism would wind up â€Å"on the ash heap of history.†He noted the depth of Soviet economic stagnation. Which he said, â€Å"The dimensions of this failure are astounding,† and, â€Å"A country which employs one-fifth of its population in agriculture is unable to feed its own people. Over centralized, with little or no incentives, year after year the Soviet system pours its best resources into the making of instruments of destruction†. The Soviet authorities criticized this Westminster speech, one of the most important of Reagan’s presidency.Still, what Reagan had defined was no secret to numerous Communist Party officials. One of them was Gorbachev, who evoked in his memoir that he was acquainted with the â€Å"disastrous picture† of Soviet agriculture millions of acres wasted, villages abandoned, and soils ruined by pollution. It was not until after President Reagan's two terms in office that his efforts against Communis m were understood as necessary. Less than a year after Reagan left office, the Berlin Wall was knocked and the Cold War was officially over in 1991.The Soviet collapse and failure was the result of a conclusion of many events, including the Chernobyl disaster, rebellion in the Baltic republics, and the rising expectations of consumers in a socialist system that could not manufacture anything of use. Reagan was right about the Soviet collapsing. Reagan was indeed sensible in his pomposity and his Anti-Communist views. These actions on his behalf led to greater worldwide investment in democracy. Ronald Reagan was a great natural born leader. He was a great speaker and his speeches were so motive.He was one of most influential political leaders in modern American history. Reagan’s presidency was a social, ideological, and political impact for the Untied States of America. He was one of the main leaders against anti- Communism. Ronald Reagan made the country stronger in political and military wise. Reagan thought you should be able to dream big and to accomplish your dream. Ronald Reagan thought you should have the determination, courage, strength, and hope to live that big dream and make it become real. Reagan thought outside the box and wanted Americans to live with big hope with their freedom.

Friday, September 27, 2019

Critique Article writing Example | Topics and Well Written Essays - 750 words

Critique writing - Article Example ciates the significance of addressing the research question by deriving the importance of measuring and enhancing patient satisfaction in evaluating adequacy of treatment. Indeed, the study reckons that understanding the patients perception will help the nurses to meet analgesic goals (Bozimowski, 2012). The study notes the motivators of the research question by highlighting the significance of adequate patient teaching in enhancing patient satisfaction and perception. The research study notes the research gaps in previous studies that addressed the same topic by stating the failure of utilizing simplified tool to assess patients satisfaction. The study defines the most effective methods of addressing the research question in a clear, accurate, and simplified manner. The research study depicted a significant level of coherence and congruence by relating the most relevant qualitative factors and variables to address the research problem. Indeed, the study seeks to establish the congruence between nurses perceptions of their patients satisfaction with pain management and patients self-report (Bozimowski, 2012). It also establishes the correspondence between patients level of satisfaction, type of therapy used, and adequacy of teaching related to their pain management plan (Bozimowski, 2012). The data collection method and the research population were equally relevant to the study. However, the mixing of the evaluative study of the variables and the pilot study was seemingly confusing since one would struggle to establish the actual results. Indeed, the use of a simple survey to measure satisfaction demeaned the value of the research problem. The analysis of the collected data was reliable and the results correlated with the study by addressing the research question. In criticizing the nursing article, â€Å"Pain neurophysiology education for the management of individuals with chronic low back pain: A systematic review and meta-analysis† by Clarke et al. (2011), I

Thursday, September 26, 2019

((((9))))) Essay Example | Topics and Well Written Essays - 250 words

((((9))))) - Essay Example Interacting with the playdough empowers children to express themselves in creative and unique ways. This fact stood out since it is an important concept that strongly supports DAP classroom. Play gives children a sense of competency and gives them the inordinate opportunity to independently develop socially and emotional. This has changed my previous perception that the playdough is an irrelevant component of the kindergarten program and I started perceiving play as an important child’s â€Å"work†. As a teacher, observation of children’s interactions with the playdough should be observed to ensure that early learning standards are appropriately met. Similarly, I have to persuade parents about the value of resourceful play experiences in a classroom. A substantial concept that I perceive to be new is the importance of imaginative games. This information will make my classroom more interactive and make students more creative by allowing them to engage in activities such as dressing up and constructing cubby houses using blankets or boxes. Moreover, it will help children connect and enhance pathways in their brains making them more adaptive to the changing global education environment. However, time and financial resources will prove to be barriers since there is the stipulated curriculum to be followed and purchasing toys and other play materials is substantially costly. However, these constraints must be overcome by utilization of readily available time and

Strategic International Business Management Essay

Strategic International Business Management - Essay Example However, before going internationally, the company needs to address its weaknesses, including frequent product recalls, negative international publicity, and bad accounting practices. The potential target market for Tesco chosen for this paper was the Chilean market. Chile is a highly attractive market for Tesco due to its competitive position in the South American region in terms of economic ranking, openness to Foreign Direct Investment (FDI), basic business requirements and other parameters. Retailing industry in Chile is growing and is forecasted to show positive growth in future. Also, there is a growth of demand for imported, exotic and sophisticated products among the urban population of Chile, which is a good business opportunity for Tesco. Hypermarkets and Supermarkets in Chile is one of the most popular establishments for grocery shopping as this segment has the highest % share. The number of supermarkets and hypermarkets is continuously growing in Chile and indicate that t here are growth opportunities for Tesco. Among three market entry strategies suggested, it was recommended to pursue acquisition strategy in order to enter the Chilean retail market. With the development of international logistics, information technology, global integration, and liberalization of markets more and more companies seek the opportunities for international expansion. One of such companies is the UK-based retailing chain, Tesco Plc. The company already operates in the European and some Asian markets. However, the firm seeks for other markets for international expansion. The aim of this paper is to suggest a potential international market for Tesco’s expansion, to analyze the external environment of the proposed country and to provide recommendations regarding the selection of a market entry strategy for Tesco. Tesco is a network of retail stores selling grocery, general merchandise, electrical products, apparel and other non-food items (MarketLine Advantage, 2015).

Wednesday, September 25, 2019

Englsih - Rhetorical Appeals analysis (logos, ethos, pathos) Essay

Englsih - Rhetorical Appeals analysis (logos, ethos, pathos) - Essay Example The commercial appeals to viewers by implying that when we drive, we are responsible not only for our lives but the lives of others as well. Consequently, when we drive too fast, the consequences can be very tragic. As the commercial showed that the reckless driver was sentenced by the court, accountability is the lesson projected here. Ironically, the last scene showing the cemetery shows that we cannot bring back the dead and suffer the consequences. All throughout, emotions was effectively used to convey the message to the public. The commercial chosen was about transport safety that showed the difference in driving at higher speed when you hit a person. The theme of the commercial was â€Å"The faster you go the bigger the mess†. This commercial was one of the most discussed commercial in Poland. It showed two simultaneous situations ( split frame )with the same characters. The first one showed two joggers of which one was almost hit by a speeding car at 50m/h. The jogger was unhurt but run away scared after the car stopped. The other frame showed the same woman being hit by the car and thrown a few meters resulting to her death. In the end, the left frame showed 50m/h while the right frame showed 67m/h. The commercial has used logos argument since it directly argues to the audience that a difference of 17m/h can result to fatality. It rationally persuades viewers to drive in a certain limit. The commercial was balanced in using pathos and logos although the emphasis was more on the effect of the incr eased speed rate. The commercial that uses an Ethos argument well is the South African advertisement of BMW titled †Innovation†, although it was originally titled †Kinetic Sculptures†. The main endorser is world-class sculptor Theo Jensen who creates moving sculptures. Indeed, he is an authority when it comes to

Tuesday, September 24, 2019

Four Freedoms for All Essay Example | Topics and Well Written Essays - 1500 words

Four Freedoms for All - Essay Example The first freedom, that of speech is the hallmark of a democratic society where people are free to express their opinions on a variety of subjects. Speech differentiates man from any other form of life and allows humans to communicate, and through this communication to explore and create in fields as diverse as music or art, science or medicine. This freedom of speech and expression is not just a basic right, but also a means to impart ideas that contribute to man’s ever increasing knowledge as well as his growth, happiness, and well-being. The curtailment of this freedom can subdue man for a while but in the end, when he sees others enjoying it, revolt is inevitable. In today’s world of speedy communication, this phenomenon is being increasingly seen in the overthrow of dictatorships around the world. In democratic societies, it is the tool used to keep a watch on the activities of those in power, because unbridled power can lead to corruption. This freedom in the hand s of the media is a powerful tool to place facts before the people so they are in a position to make informed choices while choosing their leaders. However, every right comes with a responsibility and freedom of speech does not mean maligning others or their way of life and customs or traditions. A responsible way to use freedom of speech is to respect the rights and freedoms of others. The second freedom is man’s freedom to worship the god or gods of his choice and in a way, he feels fit for his own peace of mind. Today religious intolerance is what is leading to many of the world’s problems. ... It is important to note that a man’s religion or religious beliefs are his personal choice hence it is important for each one of us to have the freedom to choose whom we worship and how we do it. Ultimately all religions preach the same things and they really are the same except for the names that they go by, which again are given to them by man. Religion and religious beliefs have always been the source of conflict since the time man began to worship nature and the elements. Every religion has gone through phases when people were killed and tortured in the name of religion. Most religious leaders are under the impression that the greater the numbers of their followers, the better their religion or the stronger their faith, little realizing that no religious body teaches its followers to kill or steal or lie. Despite this underlying truth that is self evident, religious persecutions have dogged mankind from time immemorial and persist even to this day. International bodies can pass resolutions and nation states can pass laws, but ultimately unless man is willing to admit that religion is a personal choice and cannot be forced on another through fear, real freedom of worship cannot be attained. The third freedom, that of freedom from want is the vast imbalance between the haves and the have nots. There are some countries in our world where poverty is rampant. The people do not have the basic necessities of two square meals a day or a roof over their heads. Here malnourished mothers give birth to underweight babies who do not have a chance to grow into healthy children or adults. Infant mortality rates are high, and those babies who do survive, fall prey to diseases that are spread due to the unhygienic conditions in

Monday, September 23, 2019

Training Trends and Issues Essay Example | Topics and Well Written Essays - 750 words

Training Trends and Issues - Essay Example The organizations have become more demanding due to globalization factor, hence an individual’s worth in his organization has increased manifold. Due to the complex business nature, the organizations are marked by a scuttle and commotion to attract the best talent of the industry. There is huge dearth of skilled, experienced and competent workforce that help in the enhancement of organization overall efficiency and accomplishment of pre-defined goals and objectives (Rolph J. CIPD, 2004). In such an intense situation, business heads are looking out for innovative and effectual ways through which existing employees can be trained for future challenges. After analyzing and deeply evaluating the current trends in training and development, three specific styles have been identified. First and foremost is the impact of globalization on training delivery tools and techniques. It has become mandatory for firms to intensely compare the cost that is incurred on training in terms of inve stment made in different countries, regions, centers, units etc. The primary objective is to attain maximum output with minimum input along with optimum utilization of resources. In order to realize the above objective, reconstruction of integrated potential of the organization is preferred by most of the firms these days. A large training cluster is formed within the organization or can be outsourced as well to an agency that provides timely delivery of resources exceptionally manages the project and provides effective administration services (Polson, 2001). For rendering the above mentioned services, the company charges a fixed cost. The practitioners must ensure that organization must be proactive rather than reactive in identifying to the emerging skills that are needed to combat the current market threat. They need to highly focused and clear regarding their needs and requirements, and should be in a position to put pressure on outsourced companies to deliver the best and top m ost quality service. Second most upcoming trend is e-learning that aims to extract the best possible training from any part of the world at lowest price possible. On-line training is the solution to all problems faced in training employees and those companies, who have yet not adopted the trend or find no such need for it, would soon be ravaged (Polson, 2001). This is the most effective method as the learner can move as per his individual pace, it is cost effective as mass scattered audience can be targeted, and quality and cost are the two main attributes of the emerging trend overpowering the limitation of distance or location. The practitioners in this case need to understand that here the learners need constant motivation as different age groups have different grasping power, distinct goals and pace. A 21 year old energetic, vibrant and inquisitive learner can’t be taken on the same platform as a 50 year old experienced employee who wants to be at ease in his own created comfort zone. Technology alone can’t resolve all learning challenges hence must be taken as an additional source of training, the fundamental designing must be sound, meticulous planning and effective instructional skills are required. ‘Talent Hunt’ is another recent trend observed in the current business scenario where there is acute shortage of well trained, capable and highly skilled employees. It is contradictory statement when we say that the unemployment rate in most of

Sunday, September 22, 2019

U.S. and China’s Future Essay Example for Free

U.S. and China’s Future Essay America is a powerful country with a developed market economy and great economic potential. American foreign policy has a great influence on the whole world. The main goals of America on the international market are to create a democratic world for American people and all other people. The era of globalization presumes the developed network of contacts with other countries and America is very successful in this aspect. China is another influential country. Big population and quick economical growth have made this country an important figure on the world political stage. Relationship between China and the United States have experienced major transformation during last fifty years. America’s foreign policy is greatly influenced by its economical and political interests. A serious test for America was The Great Depression. The Great Depression became the biggest economic fall during the history of the United States, which stared after the Stock Market Crash in 1929. Trade and personal income experienced a period of great decline during this time. Depression quickly became widespread to the most countries of the world. Economic instability finally led to the development of anti-democratic regimes in many countries, such as Germany, Italy and the USSR. The government of the United States managed to overcome the Great Depression without turning to dictatorship. Starting from the 1933 Roosevelt insisted on the necessity of a restructuring of the economy in order to avoid another depression. New Deal programs, aiming to stimulate demand and create work places, have been created. In contrast to many counties, which could not find a way to solve economical problems, the United States of America escaped this danger. This fact can explain the further successful American development on the world market. World War II has had a great impact on the position of most countries on the world’s map. After the experience of the World War I the United States of America took preventive measures when the World War II broke out. Hostility of Japan and threat of Nazi regimes to democracy made the United States of America take an active part in this war. Trying to keep neutral position the USA did not start war actions until the attack to Pearl Harbor. America being an active participant insisted on the Unified Allied Military Command for all the aliens, except the USSR because the Soviet Union did not want to declare war on Japan at first. In 1944 together British and American army attacked the Germans on the occupied territory of France. At that time the Soviets were attacking Germans in Poland and Romania (Friedman, 63). The United States of America took part in the WWII helped to stop Nazism and helped to save democracy in the world. It is necessary to note that the most powerful countries then were the United States and the USSR and so they were taking the most important strategic decisions. After the war the United Nations were created and America became one the five permanent members of the Security Council. The Cold War was another period in American foreign policy. This war was aimed to limit the USSR’s power all over the world and to find the balance. The US had established the NATO (North Atlantic Treaty Organization) and got into close contact with China during that time. America was spreading its influence in every corner of the world, while the Soviet Union, being weakened after the war, was losing its power and might. By the end of the Cold War America invaded Panama and made a number of campaigns in Central America. â€Å"In 1986 the US was convicted of multiple violations of international law and breaches of treaties against Nicaragua by the International Court of Justice in The Hague† (Bunton, 64). Relations between the U. S. and Asian countries were not stable after the World War II, because of the so-called â€Å"American dominance† in the world. America was suspicious of Communist government of China making an assumption that China could invade all East Asia and so threaten America. China, in its turn, was afraid that America was going to weaken Chinese government. On the other hand, both countries saw the necessity in cooperation to escape the possible threats from both countries. Formally, America had not recognized China (Peoples’ republic of China) for almost 30 years and only after the war this conflict was resolved. After the Korean War, in which the United States and the PRC were enemies the relations between these two countries became frozen. â€Å"The Soviet Union was more of a factor than the Peoples Republic of China in instigating the 1950 North Korean invasion of South Korea. In response, the United Nations Security Council undertook to assist by military means the Republic of Korea† (Vogel, 167). All in all, this war has not had an official end but it has had a great impact on the relations between China and America. After it the relations became distanced, two countries had stopped any cooperation. America was even doing its best to prevent China from entering the United Nations. It imposed an embargo on trade with China and encouraged other countries to stop their cooperation with China. In the middle of the last century the situation has changed. The United States wanted to spread its influence in Southeast Asia in order to have an access to Laos, Vietnam and Cambodia and the only way to do it was the improvement of relations with China. America also required the Chinese market of over one billion consumers. In the year 1969, America removed an embargo on trade with China and took a number of measures to develop a bilateral contact. The negotiations lasted till the year 1972. In this year President Nixon visited Shanghai, Beijing and Hangzhou and, as a result, two countries signed to the Shanghai Communique. According to this agreement China and America stated that they shared their views on foreign policy. Its main aim was to normalize the relations between tow countries (Harding, 143). All in all, America did not get all the profit it supposed to get from this agreement, as the American products could enter the Chinese market only in a few decades and their economic cooperation was very slow. To analyze the further perspectives of Sino-American relations, it is necessary to get some information about China’s economy. China presents a significant part of the world’s economy because of its geographical position, demographic factor and unique methods of economic development. The population of China makes 20. 7% of the world total, the territory of China is 3. 70 million square miles, GPD annual growth is 7. 05% on average. China being under transition and developing in a unique way can give good lessons for other young developing countries. To analyze the position of this country in the rate of modern economy today it is necessary to get acquainted with the history of China’s development. The first period on the way of its development is so-called â€Å"Five-Year Plan; 1953-1957† when the emphasis was made on the development of heavy industry following the Soviet Union example. The second step was â€Å"Great Leap Forward; 1958-1960†. This period is characterized by raising of agricultural and industrial production following an own program, not the Soviet one. In 1966-1976 Cultural Revolution took place and, as a result Mao’s theory of self-reliant economy and political struggle and its pursuit appeared. In 1978 started the process of economic reformation that continues till now. This process is aimed to reform the planned economy into the market-oriented one (Buxton 219). China’s reforms are often called â€Å"economic miracle†, as such progress and success is just unbelievable but the results are visible. Only in year 1978 60% of one billion population lived below poverty and China was concerned as one of the poorest countries in the world. Beginning from the year 1978 China started its transition from a command economy to a market one and from the rural society to the urban one. China has chosen one of the fastest rates for economic and agriculture development and succeeded in it. The rapid economic growth is the result of combination of part reforms and constant experimentation. There were made reforms practically in all areas but agriculture was the most reformed area. Agriculture played a very important role in eradication of poverty. â€Å"By international standards, Chinas social indicators as reflected in close to universal access to primary education, low infant mortality and high life expectancy have been outliers, in view of Chinas low initial per capita income† (Hsieh, 37). The first actions that were taken about agriculture were the privatization of farming, intensification of industry and liberalization of markets for many goods. The process of transition to urbanization took the US, for example, 47 years while China managed to double its income twice just in 10 years (1978-1996). If to compare economic geographical factors of the USA and China from the first point of view they seem absolutely different but it is only first impression. In fact, both these countries occupy large territory, which is rich in numerous mineral resources. Nature is represented by lowlands, highlands, mountains and valleys and this fact contributes to excellent conditions of economic development. Geographical factor is one of the factors which can explain such rapid and such successful development of the both countries. It is quite another matter that countries have chosen absolutely different ways of the economic development. According to the statistics of 1987 China was on the fifth place of long-run of Economic Growth while America was on the forth after Japan, Brazil, Canada and Germany (Mankiw, 237). Nowadays the situation has not changed very much and both countries sit tight on their positions and develop successfully. China was not in an enviable position after World War II. Due to American efforts it was isolated not only from America but also from a number of European countries. Sino-Soviet Split was the last straw and there were even military tensions on the Soviet borders. It was necessary to improve relations with America because China’s security was in danger. The rapprochement with the United States was of great importance for China. Now China was in security during the Cold War and could extend its foreign policy. China was by American side in the Soviet war in Afghanistan and Cuban movements. China and the United States had little political interaction until the middle of the last century. They did not even have direct diplomatic contacts. Only after the 1960s the USA and China began active economical partnership. At the present moment they are major trading partners. These relationships survived confrontation during Taiwan crisis and Tiananmen massacre of 1989. Economic relations are not the only point, which unites these two great nations. It is hard to underestimate the impact of China, as the most populous country of the world, especially after rapid economic development (Mann, 146). At the same time the United States of America is one of the most powerful counties of the world. Relationship between these two counties guarantees not only economical privileges for both of them, but also becomes important for maintaining peace in the world. The United States wanted to use China as a counterweight to the USSR during the period of the Cold War. It was difficult to develop relations between such closed political, social and economical unit as China, but President Nixon put much effort to develop this relationship. Henry Kissinger, State Secretary of the USA also put much effort in building relationship with China. His mission to Beijing was aimed to build the basis for future fruitful relationships between two countries. Relationships between the U. S. and China have become so useful for both countries that they continue them after the end of the Cold War. Economy is a strong basis for Sino-American relationships but conflicts between two values systems can become a serious problem in the future. All hopes of American government that Chinese authoritarian political system will gradually be transformed, like it has happened in other authoritarian countries, have gradually faded away. America, which serves a democratic ideal for the rest of the world, has to tolerate bad violations of human rights in China. In the 1960s, when relationships between these two countries were only developing the American government had very strong determination that China would turn to Western value system and switch to democratic principles. â€Å"Stolidly eyeing the authoritarian reality behind all the fine words and sumptuous banquets that Beijing bestows on influential visitors, it is necessary to remember how sorry has been Chinas record on human rights in recent decades and how cravenly Washington has sought to sweep that record under the carpet† (Mann, 112). China shows strong determination in its ruling regime and value system. Since situation is not likely to be resolved in the nearest future, it depends mostly on the United States: how long it will tolerate such state of events. Directed by economic profit, the United States during the long period closed eyes on the political aspect of the problem. If such a tendency continues, the U. S. will experience a threat to lose a status of the carrier of democratic ideals all over the world. Close relations with the one of the most authoritarian counties of the world will finally compromise the United States. Governmental regime which exists in modern China is a mixture of communism and Nazism. Such a regime has nothing to do with western democratic ideals. In addition, China used such tricks as military and industrial espionage against the USA. The concept of human rights practiced in these two countries are completely different and even incompatible. Nowadays it becomes more and more evident that Sino-American relationships are based on completely different goals. During the long period of time the U. S. was expecting liberalization of the Chinese government and modernization of its policies. As to China, it gladly accepted any kind of help in modernization but did not let interferer within inner policy of the country and rejected any attempts to liberalization. Since it becomes more and more evident that China is not going to change its governmental regime and economic structure, the United States has to choose if it is ready to prolong its relationship with this country or not. One of possible solutions would be a picky attitude, proclaimed by Harding. He proposes to develop realistic and nuanced policy toward China, and I agree with him. (Harding, 214). It is quite evident the U. S. will not be able to break its relationships with one of its major trade partners. On the other hand, it also evident that China becomes a dominant power in Sino-American relationships and if the situation is not changed recently, it will gain more and more power and knowing about the authoritative nature of Chinese governmental power, it is hard to predict all possible bad consequences of such interaction. First of all it is necessary to get rid of romantic vision of China as a country with the â€Å"developing† democracy. Rational attitude to China, as to an independent counterpart in a complex balance of power » can help the United States to renew health balance in these relationships (Harding, 217). In this way in 10 years Sino-American relationship will depend on the role the U. S. chooses inside of these relationships. It is quite evident that such kind of relationship is satisfactory for China and not satisfactory for the United States. If the U. S. does not agree to stand its role in these relationships any more, it will have to build a thoughtful strategy aiming to make China accept not only economical interaction, but also political ideas. If this happens, relations, despite they will be transformed, will stay in the form of close partnership in many fields. If this does not happen we can expect cold and estrangement in the relationships between these two countries. It is obvious that such close economical ties, which exist between China and the United States can not be broken in one day but they will be gradually reducing and this short down will be initiated by America. By that time China will have to make a difficult choice. It is evident that it needs American support and funding for the economical growth and development. On the other hand China is very reluctant to seek any compromises when it comes to internal political changes. In the case this country does not decide to make any changes towards liberalization, we will most probably face the decline of Sino-American relationships. This crisis will be hard to overcome, so America has finally to get rid of its idealistic hope that China will turn to liberalization and democracy. It will count only on concrete facts and numbers and if China does not provide sufficient proves, crises will not be overcome. So, next ten years promise to be very important for Sino-American relationships. After these ten years we can expect two results. Either China turns to liberalization and enters world of Western ideals of democracy as a peer, or it returns to its estrangement from the world culture, policy and economy. The impact of these two scenarios on the Sino-American relationships is evident. In the first case (if China turns to liberalization and democracy) these relationships will become even closer and bring profit to both countries. In the second case these relationships will gradually decline and even lead to serious conflicts. Works Cited: Bunton, T. S. , and Kathleen J. Michels.â€Å"2005 REPORT TO CONGRESS OF THE U. S. -CHINA ECONOMIC AND SECURITY REVIEW COMMISSION. † 2005. China Economic and Security Review Commission. 27 April 2007 http://www. uscc. gov/annual_report/05_annual_report. php. Buxton, Leonard H. China: The Land and the People. New York: Gallery Books, W. H. Smith, Pub. , 1988. Cohen, Warren. America`s Response to China. Columbia University Press, 2000. Eckholm, Erik. Clinton Urged to Meet Top China Dissident. New York Times 20 June 1998. Friedman, Milton and Anna Jacobson Schwartz. A Monetary History of the United States, 1867-1960. New York: Gallery Books, 1963. Harding, Harry. â€Å"A Fragile Relationship: The United States and China Since 1972. † Brookings Institution Press, 1992. Hsieh Chiao-min and Jean Kan Hsieh. China: A Provincial Atlas. New York: Macmillan Publishing, U. S. A. , 1995. Mankiw, N. Gregory, et. al. , Principles of Marcroeconomics. First Canadian Edition, Dryden, Harcourt Brace Company, Canada, 2003. Mann, James. About Face: A History of America`s Curious Relationship with China, from Nixon to Clinton. Vintage, 2000. Vogel, F. Ezra. Living With China: U. S. /China Relations in the Twenty-First Century. W. W. Norton Company, 1997..

Saturday, September 21, 2019

Maxima And Minima Of Functions Mathematics Essay

Maxima And Minima Of Functions Mathematics Essay Maxima and Minima are important topics of maths Calculus. It is the approach for finding maximum or minimum value of any function or any event. It is practically very helpful as it helps in solving the complex problems of science and commerce. It can be with one variable of with more than one variable. These can be done with the help of simple geometry and math functions. Finding the maxima and minima, both absolute and relative, of various functions represents an important class of problems solvable by use of differential calculus. The theory behind finding maximum and minimum values of a function is based on the fact that the derivative of a function is equal to the slope of the tangent. Analytical definition A real-valued function f defined on a real line is said to have a local (or relative) maximum point at the point xà ¢Ã‹â€ -, if there exists some ÃŽÂ µ > 0 such that f(xà ¢Ã‹â€ -) à ¢Ã¢â‚¬ °Ã‚ ¥ f(x) when |x à ¢Ã‹â€ Ã¢â‚¬â„¢ xà ¢Ã‹â€ -| Restricted domains: There may be maxima and minima for a function whose domain does not include all real numbers. A real-valued function, whose domain is any set, can have a global maximum and minimum. There may also be local maxima and local minima points, but only at points of the domain set where the concept of neighbourhood is defined. A neighbourhood plays the role of the set of x such that |x à ¢Ã‹â€ Ã¢â‚¬â„¢ xà ¢Ã‹â€ -| A continuous (real-valued) function on a compact set always takes maximum and minimum values on that set. An important example is a function whose domain is a closed (and bounded) interval of real numbers (see the graph above). The neighbourhood requirement precludes a local maximum or minimum at an endpoint of an interval. However, an endpoint may still be a global maximum or minimum. Thus it is not always true, for finite domains, that a global maximum (minimum) must also be a local maximum (minimum). Finding Functional Maxima And Minima Finding global maxima and minima is the goal of optimization. If a function is continuous on a closed interval, then by the extreme value theorem global maxima and minima exist. Furthermore, a global maximum (or minimum) either must be a local maximum (or minimum) in the interior of the domain, or must lie on the boundary of the domain. So a method of finding a global maximum (or minimum) is to look at all the local maxima (or minima) in the interior, and also look at the maxima (or minima) of the points on the boundary; and take the biggest (or smallest) one. Local extrema can be found by Fermats theorem, which states that they must occur at critical points. One can distinguish whether a critical point is a local maximum or local minimum by using the first derivative test or second derivative test. For any function that is defined piecewise, one finds maxima (or minima) by finding the maximum (or minimum) of each piece separately; and then seeing which one is biggest (or smallest). Examples The function x2 has a unique global minimum at x = 0. The function x3 has no global minima or maxima. Although the first derivative (32) is 0 at x = 0, this is an inflection point. The function x-x has a unique global maximum over the positive real numbers at x = 1/e. The function x3/3 à ¢Ã‹â€ Ã¢â‚¬â„¢ x has first derivative x2 à ¢Ã‹â€ Ã¢â‚¬â„¢ 1 and second derivative 2x. Setting the first derivative to 0 and solving for x gives stationary points at à ¢Ã‹â€ Ã¢â‚¬â„¢1 and +1. From the sign of the second derivative we can see that à ¢Ã‹â€ Ã¢â‚¬â„¢1 is a local maximum and +1 is a local minimum. Note that this function has no global maximum or minimum. The function |x| has a global minimum at x = 0 that cannot be found by taking derivatives, because the derivative does not exist at x = 0. The function cos(x) has infinitely many global maxima at 0,  ±2à Ã¢â€š ¬,  ±4à Ã¢â€š ¬, à ¢Ã¢â€š ¬Ã‚ ¦, and infinitely many global minima at  ±Ãƒ Ã¢â€š ¬,  ±3à Ã¢â€š ¬, à ¢Ã¢â€š ¬Ã‚ ¦. The function 2 cos(x) à ¢Ã‹â€ Ã¢â‚¬â„¢ x has infinitely many local maxima and minima, but no global maximum or minimum. The function cos(3à Ã¢â€š ¬x)/x with 0.1  Ãƒ ¢Ã¢â‚¬ °Ã‚ ¤Ã‚  x  Ãƒ ¢Ã¢â‚¬ °Ã‚ ¤Ã‚  1.1 has a global maximum at x  = 0.1 (a boundary), a global minimum near x  = 0.3, a local maximum near x  = 0.6, and a local minimum near x  = 1.0. (See figure at top of page.) The function x3 + 32 à ¢Ã‹â€ Ã¢â‚¬â„¢ 2x + 1 defined over the closed interval (segment) [à ¢Ã‹â€ Ã¢â‚¬â„¢4,2] has two extrema: one local maximum at x = à ¢Ã‹â€ Ã¢â‚¬â„¢1à ¢Ã‹â€ Ã¢â‚¬â„¢Ãƒ ¢Ã‹â€ Ã… ¡15à ¢Ã‚ Ã¢â‚¬Å¾3, one local minimum at x = à ¢Ã‹â€ Ã¢â‚¬â„¢1+à ¢Ã‹â€ Ã… ¡15à ¢Ã‚ Ã¢â‚¬Å¾3, a global maximum at x = 2 and a global minimum at x = à ¢Ã‹â€ Ã¢â‚¬â„¢4. Functions of more than one variable  ­For functions of more than one variable, similar conditions apply. For example, in the (enlargeable) figure at the right, the necessary conditions for a local maximum are similar to those of a function with only one variable. The first partial derivatives as to z (the variable to be maximized) are zero at the maximum (the glowing dot on top in the figure). The second partial derivatives are negative. These are only necessary, not sufficient, conditions for a local maximum because of the possibility of a saddle point. For use of these conditions to solve for a maximum, the function z must also be differentiable throughout. The second partial derivative test can help classify the point as a relative maximum or relative minimum. In contrast, there are substantial differences between functions of one variable and functions of more than one variable in the identification of global extrema. For example, if a differentiable function f defined on the real line has a single critical point, which is a local minimum, then it is also a global minimum (use the intermediate value theorem and Rolles Theorem to prove this by reduction ad absurdum). In two and more dimensions, this argument fails, as the function shows. Its only critical point is at (0,0), which is a local minimum with Æ’(0,0)  =  0. However, it cannot be a global one, because Æ’(4,1)  =  Ãƒ ¢Ã‹â€ Ã¢â‚¬â„¢11. The global maximum is the point at the top In relation to sets Maxima and minima are more generally defined for sets. In general, if an ordered set S has a greatest element m, m is a maximal element. Furthermore, if S is a subset of an ordered set T and m is the greatest element of S with respect to order induced by T, m is a least upper bound of S in T. The similar result holds for least element, minimal element and greatest lower bound. In the case of a general partial order, the least element (smaller than all other) should not be confused with a minimal element (nothing is smaller). Likewise, a greatest element of a partially ordered set (poset) is an upper bound of the set which is contained within the set, whereas a maximal element m of a poset A is an element of A such that if m à ¢Ã¢â‚¬ °Ã‚ ¤ b (for any b in A) then m = b. Any least element or greatest element of a poset is unique, but a poset can have several minimal or maximal elements. If a poset has more than one maximal element, then these elements will not be mutually comparable. In a totally ordered set, or chain, all elements are mutually comparable, so such a set can have at most one minimal element and at most one maximal element. Then, due to mutual comparability, the minimal element will also be the least element and the maximal element will also be the greatest element. Thus in a totally ordered set we can simply use the terms minimum and maximum. If a chain is finite then it will always have a maximum and a minimum. If a chain is infinite then it need not have a maximum or a minimum. For example, the set of natural numbers has no maximum, though it has a minimum. If an infinite chain S is bounded, then the closure Cl(S) of the set occasionally has a minimum and a maximum, in such case they are called the greatest lower bound and the least upper bound of the set S, respectively. The diagram below shows part of a function y = f(x). The Point A is a local maximum and the Point B is a local minimum. At each of these points the tangent to the curve is parallel to the x-axis so the derivative of the function is zero. Both of these points are therefore stationary points of the function. The term local is used since these points are the maximum and minimum in this particular region. There may be others outside this region. function f(x) is said to have a local maximum at x = a, if $ is a neighbourhood I of a, such that f(a) f(x) for all x I. The number f(a) is called the local maximum of f(x). The point a is called the point of maxima. Note that when a is the point of local maxima, f(x) is increasing for all values of x a in the given interval. At x = a, the function ceases to increase. A function f(x) is said to have a local minimum at x = a, if $ is a neighbourhood I of a, such that f(a) f(x) for all x I Here, f(a) is called the local minimum of f(x). The point a is called the point of minima. Note that, when a is a point of local minimum f (x) is decreasing for all x a in the given interval. At x = a, the function ceases to decrease. If f(a) is either a maximum value or a minimum value of f in an interval I, then f is said to have an extreme value in I and the point a is called the extreme point. Monotonic Function maxima and minima A function is said to be monotonic if it is either increasing or decreasing but not both in a given interval. Consider the function The given function is increasing function on R. Therefore it is a monotonic function in [0,1]. It has its minimum value at x = 0 which is equal to f (0) =1, has a maximum value at x = 1, which is equal to f (1) = 4. Here we state a more general result that, Every monotonic function assumes its maximum or minimum values at the end points of its domain of definition. Note that every continuous function on a closed interval has a maximum and a minimum value. Theorem on First Derivative Test (First Derivative Test) Let f (x) be a real valued differentiable function. Let a be a point on an interval I such that f (a) = 0. (a) a is a local maxima of the function f (x) if i) f (a) = 0 ii) f(x) changes sign from positive to negative as x increases through a. That is, f (x) > 0 for x f (x) a (b) a is a point of local minima of the function f (x) if i) f (a) = 0 ii) f(x) changes sign from negative to positive as x increases through a. That is, f (x) f (x) > 0 for x > a Working Rule for Finding Extremum Values Using First Derivative Test Let f (x) be the real valued differentiable function. Step 1: Find f (x) Step 2: Solve f (x) = 0 to get the critical values for f (x). Let these values be a, b, c. These are the points of maxima or minima. Arrange these values in ascending order. Step 3: Check the sign of f'(x) in the immediate neighbourhood of each critical value. Step 4: Let us take the critical value x= a. Find the sign of f (x) for values of x slightly less than a and for values slightly greater than a. (i) If the sign of f (x) changes from positive to negative as x increases through a, then f (a) is a local maximum value. (ii) If the sign of f (x) changes from negative to positive as x increases through a, then f (a) is local minimum value. (iii) If the sign of f (x) does not change as x increases through a, then f (a) is neither a local maximum value not a minimum value. In this case x = a is called a point of inflection. Maxima and Minima Example Find the local maxima or local minima, if any, for the following function using first derivative test f (x) = x3 62 + 9x + 15 Solution to Maxima and Minima Example f (x) = x3 62 + 9x + 15 f (x) = 32 -12x + 9 = 3(x2- 4x + 3) = 3 (x 1) (x 3) Thus x = 1 and x = 3 are the only points which could be the points of local maxima or local minima. Let us examine for x=1 When x f (x) = 3 (x 1) (x 3) = (+ ve) (- ve) (- ve) = + ve When x >1 (slightly greater than 1) f (x) = 3 (x -1) (x 3) = (+ ve) (+ ve) (- ve) = ve The sign of f (x) changes from +ve to -ve as x increases through 1. x = 1 is a point of local maxima and f (1) = 13 6 (1)2 + 9 (1) +15 = 1- 6 + 9 + 15 =19 is local maximum value. Similarly, it can be examined that f (x) changes its sign from negative to positive as x increases through the point x = 3. x = 3 is a point of minima and the minimum value is f (3) = (3)3- 6 (3)2+ 9(3) + 15 = 15 Theorem on Second Derivative Test Let f be a differentiable function on an interval I and let a I. Let f (a) be continuous at a. Then i) a is a point of local maxima if f (a) = 0 and f (a) ii) a is a point of local minima if f (a) = 0 and f (a) > 0 iii) The test fails if f (a) = 0 and f (a) = 0. In this case we have to go back to the first derivative test to find whether a is a point of maxima, minima or a point of inflexion. Working Rule to Determine the Local Extremum Using Second Derivative Test Step 1 For a differentiable function f (x), find f (x). Equate it to zero. Solve the equation f (x) = 0 to get the Critical values of f (x). Step 2 For a particular Critical value x = a, find f (a) (i) If f (a) (ii) If f (a) > 0 then f (x) has a local minima at x = a and f (a) is the minimum value. (iii) If f (a) = 0 or , the test fails and the first derivative test has to be applied to study the nature of f(a). Example on Local Maxima and Minima Find the local maxima and local minima of the function f (x) = 23 212 +36x 20. Find also the local maximum and local minimum values. Solution: f (x) = 62 42x + 36 f (x) = 0 x = 1 and x = 6 are the critical values f (x) =12x 42 If x =1, f (1) =12 42 = 30 x =1 is a point of local maxima of f (x). Maximum value = 2(1)3 21(1)2 + 36(1) 20 = -3 If x = 6, f (6) = 72 42 = 30 > 0 x = 6 is a point of local minima of f (x) Minimum value = 2(6)3 21 (6)2 + 36 (6)- 20 = -128 Absolute Maximum and Absolute Minimum Value of a Function Let f (x) be a real valued function with its domain D. (i) f(x) is said to have absolute maximum value at x = a if f(a)  ³ f(x) for all x ÃŽ D. (ii) f(x) is said to have absolute minimum value at x = a if f(a)  £ f(x) for all x ÃŽ D. The following points are to be noted carefully with the help of the diagram. Let y = f (x) be the function defined on (a, b) in the graph. (i) f (x) has local maximum values at x = a1, a3, a5, a7 (ii) f (x) has local minimum values at x = a2, a4, a6, a8 (iii) Note that, between two local maximum values, there is a local minimum value and vice versa. (iv) The absolute maximum value of the function is f(a7)and absolute minimum value is f(a). (v) A local minimum value may be greater than a local maximum value. Clearly local minimum at a6 is greater than the local maximum at a1. Theorem on Absolute Maximum and Minimum Value Let f be a continuous function on an interval I = [a, b]. Then, f has the absolute maximum value and f attains it at least once in I. Also, f has the absolute minimum value and attains it at least once in I. Theorem on Interior point in Maxima and Minima Let f be a differentiable function on I and let x0 be any interior point of I. Then (a) If f attains its absolute maximum value at x0, then f (x0)= 0 (b) If f attains its absolute minimum value at x0, then f (x0) = 0. In view of the above theorems, we state the following rule for finding the absolute maximum or absolute minimum values of a function in a given interval. Step 1: Find all the points where f takes the value zero. Step 2: Take the end points of the interval. Step 3: At all the points calculate the values of f. Step 4: Take the maximum and minimum values of f out of the values calculated in step 3. These will be the absolute maximum or absolute minimum values. Real life Problem Solving With Maxima And Minima For a belt drive the power transmitted is a function of the speed of the belt, the law being P(v) = Tv av3 where T is the tension in the belt and a some constant. Find the maximum power if T = 600, a = 2 and v 12. Is the answer different if the maximum speed is 8? Solution First find the critical points. P = 600v 2v3 And so = 600 6v2 This is zero when v =  ±10. Commonsense tells us that v 0, and so we can forget about the critical point at -10. So we have just the one relevant critical point to worry about, the one at x = 10. The two endpoints are v = 0 and v = 12. We dont hold out a lot of hope for v = 0, since this would indicate that the machine was switched off, but we calculate it anyway. Next calculate P for each of these values and see which is the largest. P(0) = 0  ,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  P(10) = 6000 2000 = 4000  ,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  P(12) = 7200 3456 = 3744 So the maximum occurs at the critical point and is 4000. When the range is reduced so that the maximum value of v is down to 8, neither of the critical points is in range. That being the case, we just have the endpoints to worry about. The maximum this time is P(8) = 4800 1024 = 3776. A box of maximum volume is to be made from a sheet of card measuring 16 inches by 10. It is an open box and the method of construction is to cut a square from each corner and then fold. Solution Let x be the side of the square which is cut from each corner. Then AB = 16 2x, CD = 10 2x and the volume, V, is given by V = (16 2x)(10 2x)x = 4x(8 x)(5 x) And so = 4(x3-132+40x) =4(32-26x+40) The critical points occur when 32 26x + 40 = 0 i.e.  when x =   = The commonsense restrictions are 5 x 0.So the only critical point in range is x = 2. Now calculate V for the critical point and the two endpoints. V(0) = 0  ,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  V(2) = 144  ,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  V(5) = 0 So the maximum value is 144, occurring when x = 2. Uses of Maxima and Minima in War. Concepts of maxima and minima can be used in war to predict most probably result of any event. It can be very helpful to all soldiers as it help to save time. Maximum damage with minimum armor can be predicted via these functions. It can be helpful in preventive actions for military. It is use dto calculate ammunition numbers, food requests, fuel consumption, parts ordering, and other logical operations. It is also helpful in finding daily expenditure on war.

Friday, September 20, 2019

Construct A Script By Using Scapy Computer Science Essay

Construct A Script By Using Scapy Computer Science Essay Wireless network generally can be defined as a network which is set up by using radio signal frequency to communicate among computers and other network devices. Wireless networks known as WiFi network or WLAN. As a network grows and expands wireless networks are extremely popular and easy to setup feature and no cabling involved. There are two main components to access the wireless network which are wireless router or access point and wireless clients. Wireless network normally used in 802.11a, 802.11b, 802.11g, and 802.11n standards protocol. Wireless network needs highly security to carry all kinds of confidential data which means at least enabling Wired Equivalent Privacy (WEP) on the access point. Without proper implementation of security measures, any wireless network adapter coming within the range can access the internet without permission. So, it will results in congestion and some of the authorized client cannot access the internet. So, this research will do wireless network auditing by sniffing some of the information within the access point and detect possible intrusions in Faculty of Computer and Mathematical Sciences. 1.1 Background Wireless network is a network which is setup by using radio signal frequency to communicate among multiple stations at one time. In addition, wireless network referred as WiFi network or WLAN. Although we have enable WEP encryption on the access point, there are still some weaknesses which can be easily crack by the users with the right equipment to crack. The attacker can sniff easily with several tools to crack the password to break in as unauthorized person. In order to verify the correct access point settings and detect intrusions in terms of security in wireless network, we construct the complete script to audit wireless networks. 1.2 Problem Statement Nowadays wireless network become a trend in communication. Each wireless system or access point was setup with certain policies. It is hard to verify whether each wireless access point setup correctly or not. Plus, nowadays we need to use many tools to verify the wireless access point status. Furthermore, most of network admin does not check back each wireless access point after its configuration. Moreover, we need some tools to identify the intrusions that come where they are try to access the Internet. Besides that, some of attackers send spoofing frame to try access the wireless network. So, we cannot identify the attackers MAC address. 1.3 Research Objectives The main objective of this project is: To construct a script by using Scapy To sniff and to find possible intrusion on wireless network related with wireless security. 1.4 Scope of the Research This project focuses in Faculty of Computer and Mathematical Sciences that has multiple access points which will enables to sniff all the information on wireless networks. We focuses on Data Link layer 2 to sniff the broadcast frame and identify possible intrusion. The main platform to run the tools:- Ubuntu10.10 We are use two main tools to construct the script which are:- Python2.6 Scapy 1.5 Significance of the Research This project is important to gain knowledge to construct the complete script by using Python2.6 and Scapy script. We can learn the easiest way by using this script with the shorter line compared to other script. This project also helps to learn 802.11 frame structure including beacon frame that has transmitted by the access point. 1.6 Organization of Thesis This project divided into 5 main chapters: Chapter 1: In this chapter, we discussed on the introduction generally of this topic. It includes problem statement, objectives, scope and significance of the research. Chapter 2: This chapter reviewed literature that relate to the topic with previous researches. We include the similar of related studies to our research. Chapter 3: In third chapter, we identify materials and methods that are described in methodology phases in order to get the desired information for the accomplishment of this research. Chapter 4: In fourth chapter, we discusses on the findings of the research. Chapter 5: Finally, the last chapter is focuses on the recommendations and suggestions where it will summarize the conclusion of the research. 1.7 Conclusion This introduction of this chapter had clearly explained the problem statement, objectives, scope, and significances of the research. This chapter gives a clear view of the overall content of the research. CHAPTER 2 LITERATURE REVIEW 2.0 Introduction This chapter examines the previous work done by prior researcher in the field of auditing wireless network, security of wireless network and any other related works. Section 2.1 discuss on main platform to install the tools. Section 2.2 discuss on the tools to be use to construct and run the script. Section 2.3 discuss on standard protocol fro wireless Lan(WLAN), IEE 802.11. Then, sections 2.4 discuss on frame for 802.11, 2.5 Wireless LAN components, 2.6 Wireless Network Sniffing, 2.7 reviews for the related works and lastly 2.8 Summarizations of Literature Reviews. 2.1 Platform 2.1.1 Ubuntu10.10 Ubuntu is a free operating system, developed by small team developers who are established Linux Debian projects. This free operating system was developed to facilitate the use of desktop linux, Ubuntu. It developed based on the Debian GNU/Linux distribution and distributed as free and open source software. Most Ubuntu packages are based on package from Debian. Both distributions are using Debians deb package format and package management tools, Apt and Synaptic. However, sometimes .deb packages need to be rebuild from source to be used in Ubuntu. Ubuntu have variant edition such as GNOME desktop, KDE edition, Kubuntu and server edition. In this project, we use Ubuntu 10.10 as our platform to run all the tools in it. 2.2 Tools 2.2.1 Python Python is the one of the programming language that can interpret in developing the applications such as web applications and integrate the system more effectively. Python can run on Windows, Linux/Unix, Mac OS X. All the Python programs can be packaged into stand-alone executable code for many using various tools. In this project, we use the latest version, Python2.6 tool to construct and run the complete script after install all the Python package in Ubuntu10.10. We use Python as a programming language because it is most powerful language and shorter to write the code than other languages. Compared to other programming languages, Python are readable syntax, intuitive object orientation, very high level dynamic data types, full modularity, supporting hierarchical packages and many more. 2.2.2 Scapy According to Philippe Biondi (2009), Scapy is a powerful interactive packet manipulation program from Python program that be able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery. For this project, we focused on 802.11 standard protocols. Scapy enable to sniff wireless network and generate the packet and can send it to the wireless network. 2.3 Wireless Protocol 2.3.1 IEEE 802.11 IEEE 802.11 is a standard protocol for wireless LAN (WLAN), which is uses RF technology to transmit and receive data over the air. Based on this standard protocol, it communicates between wireless client and a base stations or access point. There are several types of standard protocols which are 802.11a, 802.11b, 802.11g, and 802.11n. Here are briefly about types of standard protocols: 2.3.1.1 IEEE 802.11b IEEE 802.11b standard supports maximum bandwidth 11Mbps in 2.4 Ghz. The advantage of this protocol is lowest. Disadvantage using this protocol is lowest maximum speed because it may interfere if no determined the frequency band. 2.3.1.2 IEEE 802.11a 802.11a supports bandwidth up to 54 Mbps in 5 GHz. The advantage of this protocol is fast maximum speed. Disadvantage using this protocol is the cost is higher than IEE 802.11b 2.3.1.3 IEE 802.11g IEE 802.11g standard supports maximum bandwidth 54Mbps in the 2.4 GHz band in maximum range. The advantage is signal range is better with fastest maximum speed. Disadvantage using this protocol is higher cost than IEEE 802.11b. 2.3.1.4 IEEE 802.11n IEEE 802.11n is developed on previous IEEE 802.11 standards by adding MIMO. IEEE 802.11n offers high throughput wireless transmission at 100Mbps 200 Mbps. It is better performance compared with IEE 802.11g. 2.4 802.11 Frame 2.4.1 Frame header Each  frame  contains  a  standard  header  as  shown  in  Figure  2.1 Figure 2.1 Frame Header from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The  frame header  contains  all  the  information  needed  to  get  the  frame to  where  it  is  going  and  allow  the  receiver  to  understand  what message  the  frame  is  carrying. Frame Control FC contains control information used for defining the type of 802.11 MAC frame and providing information necessary. FC field as shown in Figure 2.2 Figure 2.2 Frame Control Field from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The details of frame control field as follows: Protocol Version Protocol Version provides the current version of the 802.11 protocol used. Type and Subtypes It is determines the function of the frame. There are three main different of type fields which are control, data and management and breaks into multiple subtypes. Three values of type field: 00 Management 01 Control 10 Data 11 Reserved/Unused Breaks into subtype field: 00/0000 Management/Association Request 00/1000 Management/Authentication 00/1100 Management/Deauthentication 01/1011 Control/Request To Send (RTS) 10/0000 Data/Data To DS and from DS Specify  the  addressing  type  of  the frame, either the frame is going to or exiting from the DS. More Fragments   Shows more fragments of the frame, either data or management type. Retry Retransmitted either data or management frame types. Power Management   shows whether the sending station is in active mode or power-save mode. More Data   shows to a station in power-save mode that the AP has more frames to send. It is also used for APs to show that additional broadcast/multicast frames are to follow. WEP   shows whether or not encryption and authentication are used in the frame. Order   Shows that all received data frames must be processed in order. Duration/ID Shows the remaining duration needed to receive the next frame transmission. Sequence Control (SEQ) SEQ used  for  fragmentation  and packet  reassembly. Frame body The frame body contains the data or information included in either management type or data type frames. Frame Check Sequence (FCS) The transmitting STA uses a cyclic redundancy check (CRC) over all the fields of the MAC header and the frame body field to generate the FCS value. 2.4.2 Beacon Frame Beacon frames are identified by the type field being set to 0 (Management Frame) and subtype of 8. Beacon frame are used by access point to advertise its presence and relay information, such as timestamp, SSID, and other parameters based on access point to radio NICs that are within range. Radio NICs continually scan all 802.11 radio channels and listen to beacons as the basis for choosing which access point is best to associate with. According to Robin Wood (2007), people  mostly believe that turning  off  beacons  will  hide  their  network  from  attacks  as  their SSID will no longer be broadcast. Unfortunately, SSID is transmitted in clear text in all management frames and when the network is hidden while there is no data being transmitted, attacker can collect a management frame they can find in network SSID. 2.5 Wireless LAN component 2.5.1 Access point Wireless access point (WAP) is a basically hardware equipment that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. In a wireless network, an access point sends and receives signals to any number of other, local wireless devices. These are usually adapters and routers. The WAP is commonly use in offices, homes and educational institutions. WAP devices use in IEEE 802.11 standards. 2.6 Wireless Network Sniffing Wireless Sniffer is captures the data on wireless network without being detected. Wireless network sniffing works in 802.11, Ethernet as the physical and data link layers which is able of reporting raw packets (RFMON support), which include any prism2 based card (Linksys, D-Link, Rangelan, etc), Cisco Aironet cards, and Orinoco based cards. Moreover, sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections. Sniffing wireless network usually used by the attackers to capture the data and get the appropriate information from the beacon frame. There are several techniques used to sniff the wireless network. Some of them are as follows:- Passive Scanning Passive scanning is the first steps used to sniff the wireless networks. It is turn to mode RF into monitor mode that allows every frame appearing on a channel to be copied as the radio of the station tunes to various channels. A station in monitor mode can capture packets without associating with an AP or ad-hoc network. When the transmission of the data in the form of radio waves starts the attackers can scan the whole data passively and carry on the sniffing process. The so-called promiscuous mode allows the capture of all wireless packets of an associated network. In this mode, packets cannot be read until authentication and association are completed. With the help of this data sniffer can easily decodes the secret information of the wireless networks. SSID Detection After scan the data transmitted, it can detect the list of service set identifier (SSID) in the particular wireless network. The SSID shown in the Beacon frames is set to null in the hope of making the WLAN invisible unless a client already knows the correct SSID.  When the Beacon displays a null SSID, there are two possibilities.   Eventually, an Associate Request may appear from a legitimate station that already has a correct SSID.   To such a request, there will be an Associate Response frame from the AP.   Both frames will contain the SSID in the clear, and the attacker sniffs these.   If the station wishes to join any available AP, it sends Probe Requests on all channels, and listens for Probe Responses that contain the SSIDs of the APs.   The station considers all Probe Responses, just as it would have with the non-empty SSID Beacon frames, to select an AP. Normal association then begins.   The attacker usually waits to sniff these Probe Responses and extract the SSIDs. Otherwise, if the beacon transmission is disabled, the attacker has two choices.   The attacker can keep sniffing waiting for a voluntary Associate Request to appear from a legal station that already has a correct SSID and sniff that SSID.   Collection of MAC addresses After detecting the SSID, sniffer now take steps to sniff the wireless network by collecting the required MAC addresses with the help of passive scanning and also with the help of different types of software. The collected of MAC address used for constructing spoofed frame by using specific tool. In wireless sniffing, there are some reasons why attacker collects all the MAC address. Some of the reasons are the attacker used sniffing to hide his or her identity and their access points. The other reason, access points used in collecting the MAC would not be registered. 2.7 Review of Previous Related Works 2.7.1 Author: David Maynor Title of Paper: Beginners Guide to Wireless Auditing (2006) This paper is a study of how to find the vulnerabilities in wireless devices drivers with specific techniques. The researcher discuss on how to build auditing environment, how to construct tools and finally how to interpret the results. On this paper, although this was done on Dell Latitude D610, the internal wireless card of the machine was not used. The researcher was used wireless card, Netgear WPN511 to set up auditing environment that is supported with madwifi drivers. The combination with LORCON (Loss Of Radio CONnectivity) ability to craft the packet from scratch. Moreover, after setting up the good environment with patch madwifi and LORCON, the researcher construct the script with Scapy to generate a simple frame and inject it. The researcher use Wireshark to see the packets injected. 2.7.2 Author: Shreeraj Shah Title of Paper: Secure Your Wireless Networks with Scapy Packet Manipulation (2007) According to Shreej Shah, Scapy is scriptable and easy to use compared with Kismet and Airodump-ng. This paper focused on intrusion detection by using proven techniques. There are two techniques can be employed which are passive sniffing and active packet injection. The researcher discussed only passive sniffing methodology. In this project, there are several steps are used in passive sniffing methodology as follows:- Set up a station for radio frequency (RF) monitor mode Sniff packets and discover network access points Discover hidden access points and SSID (service set identifier) Harvest MAC and IP addresses Perform ongoing intrusion detection with sniffing. 2.7.3 Author: Robin Wood, Robin and freedomsoftware.co.uk Title: Programming Wireless Security (2007) This paper discussed some programming techniques to build wireless security tools. The researchers construct the script by using Python and Ruby script. There are several techniques that are used by using both scripts including deauthentication attack, sniffing wireless traffic and automating a Four-Way- Handshake capture. All the techniques will be brought together to create an applications to automate capturing an EAPOL handshake which can used to crack the Pre-Shared Key. This paper required several tools including Lorcon, Pylorcon, ruby lorcon and Scruby. Moreover, it also discussed about several issues on Scruby which means Ruby scripts will not work properly as exactly required. 2.8 Summarizations of some Literature Reviews No Author Year Project Title Project Similarities and Differences 1. Peter Seebach 2005 Getting practical about wireless security, Part 1: Building a wireless sniffer with Perl In this paper, lightweight wireless sniffer was build that runs on open source software. This paper show to use open source software by getting information about on wireless network and identified the common security problem. 2. TJ OConnor 2010 Detecting and Responding to Data Link Layer Attacks In this paper, Scapy is used to examine network traffic for data link layer attacks with identifying signatures and anomalies on both wired and wireless networks. 3. Petter Clutterbuck, Terry Rowlands, Owen Seamons 2007 Auditing the Data Confidentiality of Wireless Local Area Networks This paper describes how the software auditing artefact uses on sampled data packets to product a very detailed evaluation of the level of data confidentiality in effect across the WLAN. 4. Mingzhe Li, Mark Claypool, and Robert Kinicki 2005 How to Build and Use an IEEE 802.11 Wireless Network Sniffer In this paper, wireless sniffer is built on computers with Linux operating systems and prism GT-based wireless interface cards. The operating systems tested are SUSE (Novell) Linux release 9.0/9.1/9.2/10.0 and Linux Fedora Core 3 where the kernel version can be either 2.4.x or 2.6.x. The wireless network interface cards, Netgear WG 511 version 1 PCMCIA card and Allnet ALL0271 54Mbit Wireless PCI adapter are used Table 2.1: Summarization of related Literature Review 2.9 Conclusion All the information gathered from this literature review is very useful in order to identify potential information that can make this research more relevant. By understanding the scenario of past implementation, it will give a better view on how to achieve these research objectives and also inspire new ideas to be implemented or added into this research. CHAPTER 3 METHODOLOGY 3.0 Introduction This chapter presents about the methodology being used as a guideline to ensure the project will operate successfully. Methodology consists of hardware, software and method that being used in this research. We need to choose proper hardware and software to meet the research requirement. Methodology is very important part to audit the wireless network with sequence of phases. We need to follow all this phases in order to accomplish the final project with achieving the objective. We divide the methodology of our project to several phases, where every phase will include the important activities and its significant to be done. 3.1 Methodology Phase In this project, there are four phases of method that followed properly. First phase is planning, second phase is development, third phase is testing, fourth phase is result and evaluation and the last phase is documentation. All the flow of the methodology phase will be implementing systematically and efficiently as its role is vital to ensure the process of finishing this project in time. These phases are illustrated in methodology overview in Figure 3.1(i) and Figure 3.1(ii). PLANNING DEVELOPMENT TESTING RESULT AND EVALUATION DOCUMENTATION Figure 3.1 Project Phase (i) Documentation Development Testing Result and Evaluation Planning Problem Assessment Preliminary study of Literature Install OS Install Python package Install Scapy package Construct script Run Scapy script Sniff a list of access point. Sniff Intrusion Detection Writing a report Project Scope Project Objective Project Planning Determine hardware and software used Scapy script completed Result finding Final report completed. Figure 3.1 Project Phase (ii) 3.2 Research Methodology 3.2.1 Planning For planning phase, the activity is to define the objective of project by identifying problem assessment and by preliminary study of literature review. The deliverable of this phase can identify research objective and scope and also project planning. It consists of: 3.2.1.1 Preliminary study of literature review The purpose is to understanding the similar or related project to be done. We need to review and get the idea on how it can be implemented and find the objective, scope and others benefit can get for the project requirement. This preliminary study can review by journals, online resource (internet), articles or book. USER ACCESS POINT USER SNIFF3.2.2 Development Diagram 3.1: Structure of research project 3.2.2 [a] Install operating system We install Ubuntu 10.10 with interactive Graphical User Interface (GUI) on the laptop. It is easier to update the latest package. All the latest package including Python will updated on Ubuntu10.10 [emailprotected]:~# sudo apt-get update 3.2.2 [b] Install tools We install Scapy in Python program where the Scapy is interactive manipulation program that can construct with the shorter script compared to the other script. We install Python program as a main programming language and resides the entire package in it. a. Install Python 2.6 package [emailprotected]:~# sudo apt-get install python [emailprotected]:~# cd /tmp [emailprotected]: /tmp# fetch http://www.secdev.org/projects/scapy/files/scapy-latest.tar.gz [emailprotected]: /tmp# tar xvzf scapy-latest.tar.gz [emailprotected]: /tmp# cd scapy-2.1.0 [emailprotected]: /tmp/scapy-2.1.0 # python setup.py install b. Install python-scapy package [emailprotected]:~# sudo apt-get install python-libpcap c. Install libpcap and libdnet and their Python wrappers. [emailprotected]:~# sudo apt-get install python-libdnet d. Install additional software for special features. [emailprotected]:~# sudo apt-get install tcpdump graphviz imagemagick python-gnuplot python-crypto python-pyx 3.2.2 [c] Construct the script We construct the script with Python program for sniffing and detect possible vulnerabilities. The script will run on Ubuntu 10.10 in root terminal. 3.2.3 Testing Testing phase, the action is to test by sniffing wireless network in an area by running the completed script. Before we run the script, we need to setting up the station for radio frequency (FR) in monitor mode. We illustrates the steps in Figure 3.2 Construct the script Setting up the station for Radio Frequency (RF) to monitor mode Script run Enter the command Get the data from acces point including:- Name of access point SSID channel Radio Type Security Type Signal Collect the data: Intrusion Detection including:- Discovering Rogue Access Point Discovering Dummy Access Point Figures 3.2 Steps for testing 3.2.4 Result and Evaluation In this phase, we come out with the result by running the script. We collect all the information about SSID, MAC address, channel, radio type, security type, signal from broadcast frame that send by multiple access point. Next, we can detect possible intrusion by running other script using a same scripting language. 3.2.5 Documentation In this final phase, all the results and findings will be included in one report. From the documentation, the researcher can determine whether the project achieve the objectives or not. 3.3 Hardware and Software Required To execute this project successfully, some requirement need to be accomplish. Some of the requirement will be involving hardware and software. Hardwares that will be required are: 3.3.1 Hardware This project will used laptop. Processor at least 1 Gigahertz of CPU speed. 3GB of RAM 250 Gigabyte of hard disk space Intel WiFi Link 5100 wireless network interface card Motherboard that support the processor Monitor Network cable 3.3.2 Software This project will be running on LINUX platform: Ubuntu 10.10 3.3.3 Tools Python2.6 Scapy 3.4 Conclusion As a conclusion, this chapter is very important to gather all related and relevant information required. All the information will be used in order to achieve the objectives of this research. CHAPTER 4 RESULTS AND DISCUSSIONS 4.0 Introduction This chapter discusses on the results gathered from this research, which is obtained by implementing the methods in Chapter 3. The result based on running completed script on Ubuntu10.10. It will display all the available information of access point actively in an area after sniffing it. Moreover we can detect all the possible intrusion with display the list of rogue access point and dummy access point. 4.1 Sniff the wireless network First of all we set up Radio Frequency (RF) into monitor mode which is in wlan0 interface. Next, we run the completed script that is already saved in root on Ubuntu 10.10 with the name of file, sniffap.py. Then, we open the root terminal by enter ./sniffap.py wlan0. The result has shown in Figure 4.1 Figure 4.1 Sniff Wireless Networks sniffap.py name of saved file wlan0 monitor mode interface CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.0 Introduction This final chapter discuss about the conclusion of this research. It also discusses the suggestions and recommendations that will help those who want to upgrade or refers to this project in the future. 5.1 Conclusion As you can see, having an effective wireless access policy is critical to the security of any organization that operates a wireless networks. Without appropriate policy, the attacker easily gain access the wireless networks. 5.2 Recommendation This project is hopefully can only use the fully script to get the data from the access point without purchase the tools. Moreover, the admin take the action to get access point more securely and get a better signal for client to access the Internet.