Saturday, August 31, 2019

Is USA a True Democracy? Essay

United States of America is undoubtedly being praised for standing firmly for democracy in the field of political system. Likewise, in political history, America is regarded as the only country having a strong democratic form of government. Throughout history, America has always played an important role in spreading democracy around the world. Several communist countries have also been converted to democracy through the efforts of America. The obvious reason for adopting democracy within a system of governance is to uphold majority rights rather than of the few. In addition, the power is concentrated in the hands of the people and not on the few groups of people. Aside from these, the features of democracy guarantee freedom and human rights which are not guaranteed in other forms of government. In the real scenery of a democratic country, the freedom exercised by every citizen is overflowing. In the American setting, several rights were established as new social developments are being experienced. Through case laws, the civil liberties afforded to citizens have been broadened and several classes of people finally enjoyed their rights. Through time, democracy has been strengthened over the land. However, recently, through issues on national security, terrorism, and other predicaments faced by the country, the spirit of democracy started to diminish. Furthermore, with the strengthening power of the government against its citizens, the essence of democracy has begun to vanish. Hence, despite adherence to the democratic form of government, in real essence, the country is not acting like it is a democratic country. Democracy Democracy, in its political definition refers to â€Å"a political system based on the participation of the people. It foresees, among others, the separation of powers among the judiciary, the legislative and the executive authorities, as well as free and regular elections† (Spring 91). In its cultural definition: Democracy is a way of living together and an expression of respect for other people; it must be rooted in a genuine democratic culture, a culture of debate and dialogue. A critical attitude should therefore be developed in children and young people towards the institutions that govern a State or regulate life in a given society. (Spring 91) In its political sense, the main feature of democracy is the direct participation of the people in governing the citizens and the country through election. Aside from this, it reiterates the principle of checks and balances or the existence of independent three fundamental branches of the government namely, the executive, legislative, and judiciary. From its political definition, the political system is only established; however, it is lacking of the rights or benefits guaranteed to the citizens. Hence, political architects have inculcated human rights protection by adding a cultural definition of democracy. Meanwhile, democracy has primarily rooted from the ancient Greeks. The word democracy was coined from the Greek word â€Å"demokratia† (Cartledge n. p. ). The â€Å"demos† means â€Å"people† while â€Å"kratos† means â€Å"strength† or â€Å"rule† (Cartledge n. p. ).. Hence, the word demokratia literally means â€Å"people power† (Cartledge n. p. ). The literal definition of the democracy is in consonant with the definition of government propounded by Abraham Lincoln in his popular statement, â€Å"government of the people, by the people, and for the people† (â€Å"The Gettysburg Address†). Development in the Concept of Democracy Through time, the concept of democracy has developed. Aside from being a political concept, democracy has also become a moral concept. As a political concept, democracy provides standard of societal management; while as a moral concept, democracy provides moral principles that should govern the conduct of the citizens as well as the government and its agencies (Kelly, 103). The moral concept of democracy does not stem out from any religious belief or governmental pronouncement; instead, it rooted from the concept of democracy alone (Kelly, 104). Among the guarantees of democracy in its moral concept includes â€Å"respect for freedom† of every individual in the society (Kelly, 104). It also demands equal treatment of every citizen and encourages them to openly participate in the government either by engaging in governmental affairs, evaluating government actions or taking part in forming public policies. This clearly correlates in the modern understanding that freedom is strictly linked in the democracy. Hence, a democratic country that has no respect on freedom is not democratic at all. Factors that Diminishes Democracy in the Country After the tragic 9/11 terrorist attack, the threat on democracy began to emerge. The threat to national security has become the license of the government in enacting and adopting laws and policies that have adverse effects on the democracy being enjoyed by the citizens. Through the 9/11 attack, the government has acquired power in order to implement rules and regulations beyond its legal duties. On the part of the government, its acts are justified by the need of the county and the citizens to be safe from further attacks and to fully eliminate any shadows of terrorism. However, as an effect, civil liberties are compromised. The exercise of freedom has gradually been regulated and limited. Furthermore, several fundamental freedoms exercised in a democratic country have been curtailed. These drastic changes in the lives of the American citizens have been perceived to be incompatible with the democratic principle adhered to by the country. It was reiterated that the laws and governmental systems being implemented today are a clear proof that United States is no longer a democratic country. It is noteworthy that the government quickly responded to the 9/11 terrorist attack through the enactment of the â€Å"Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001† or the USA Patriot Act (Scheppler 5). Through the Patriot Act, many remarkable non-democratic government actions and regulations have been imposed. This in turn, is an obvious disrespect to the cultural and moral concept of democracy that has been prevalent in the country throughout the years. Primarily, the USA Patriot Act aims to provide the law enforcement and intelligence community with tools and legal grounds to eliminate terrorism (O’Neal). Through the USA Patriot Act, the federal government has been empowered to intrude into the privacy of a citizen suspected to be a terrorist or corroborating with terrorists. The intrusion to privacy that the Act allows takes in many forms. Title II of the USA Patriot Act laid down the enhancement of the surveillance capabilities of the federal law enforcers. By virtue of the Act, communications, wire, oral and electronic, can be intercepted by the authorities (â€Å"USA Patriot Act of 2001†). In intercepting communication, the authorities are empowered to trespass into the communication tools of the target or suspect beyond legal boundaries. For example, the authorities can wiretap the phones of a target individual. Through the advancement in technology, roving wiretapping has been allowed by the Act. Traditionally, authorities are required to obtain first a court order to tap the phone (O’Neal). However, in roving wiretapping, the authorities can now tap a person or organization by monitoring the calls made and received by the target (O’Neal). In here, it can be observed that the extent of wiretapping that has originally been approved by law has expanded because all calls can be allowed to be monitored. In addition, the â€Å"pen register† and â€Å"trap-and-trace device† have allowed the authorities to collect telephone numbers dialed to and from the communication device used by the suspected terrorist (O’Neal). Remarkably, e-mail communications are also covered by the pen/trap provision of the Act because e-mail has been considered today as the most effective and fastest tool being used by the terrorists. Through these devices, the authorities can look into the Website and IP addresses visited and used by the target. Furthermore, the libraries and other public and private establishments visited by the target can also be intruded by the authorities in order to gather information about the activities done by the former. Through these extended power of the federal government in surveillances in communication, the privacy of the target is put at stake. The Act also enhanced the Foreign Intelligence Surveillance Act which was focused on foreign investigations (Bidgoli 225). Through the expanded meaning of terrorism, an alien has been denounced of his constitutional rights as he is considered as an agent of foreign power (Bidgoli 225). Hence, an alien is subjected to the provisions of the USA Patriot Acts. This system also means that information obtained through surveillance can be shared between agencies for further investigation of the target. The surveillance capability of the authorities under the USA Patriot Act also extends to information gathering. Notably, through the Act, the authorities can make searches and seizure against the dwelling place and objects of the target. The authorities can secretly make searches through the house or office of the target through a search warrant which is secretly obtained from the court. The Fourth Amendment has laid down the requirements of a valid search warrant. Through the precedents, it can be observed that the requirement for probable cause is strict. But the USA Patriot Act has limited such requirement by considering only a significant reason in obtaining a warrant. It is also noteworthy that the proper serving of a warrant is disregarded by the Act. According to the valid warrant procedure, the person against whom the warrant has been issued should be notified and be present during the search. This is to ensure that the things and areas specified in the warrant are correctly searched and seized. However, in the procedure adopted by the Act, such essential procedure has been denied and clearly violated. Another focus of the Act is the enhancement of the money laundering law. The Act has laid down effective measures in preventing, deterring and prosecuting money laundering. It is believed that the financial needs of terrorists have been backed by money laundering activities. Few of the measures include monitoring of suspicious bank transactions, seizing illicit funds in foreign banks, and issuing regulations to be adopted by banks in recording account owners and receivers. In addition, the Act also required financial institutions to use networks to facilitate communication between them and the authorities with regard to illicit and suspicious transactions or accounts (â€Å"USA Patriot Act†). These activities have been made possible through the Act requiring the national and international financial institution to cooperate and comply with the policies. However, such activity has been criticized because of violation of the confidentiality of the bank records of account owners. In addition, immigrants are also covered by the Act because stricter policies have been implemented in airports and in immigration offices. Immigrants are also treated differently as they are scrutinized stringently. Aside from that, the Asians and Arabs are usually subjected to discrimination because they are primarily linked to terrorism because of their racial affiliations. In accordance with the expanded power of the federal authorities, many fear that such power may be used in focusing in monitoring, harassment, and intimidation of political dissidents and thousands of harmless immigrants rather than concentrating on curtailing terrorism (Etzioni 9). Many civil societies are also alarmed by the government’s curtailment on the citizen’s civil liberties. Meanwhile, American Civil Liberties Union (ACLU) described the government as having an â€Å"insatiable appetite† due to its secrecy, lack of transparency, disregard of equality under the law, and â€Å"disdain and outright removal of checks and balances† (Etzioni 9). All of these changes in the government system after the 9/11 terrorist attack have only led in the diminishing spirit of democracy in the country. The political concept of democracy has also been endangered in the country through the USA Patriot Act. As has been said, one fundamental feature of democracy is the checks and balances. Meanwhile, the principle of checks and balances is understood as the separation of the three branches of the government namely; the executive, legislative, and judiciary. Each of the three branches is bestowed with unique duties and responsibilities. Having unique duties and separate jurisdiction, the three department works independently from each other. However, each serves as a watchdog for any act of encroachment or violation of the principle committed by any of the branches. In the present setting, the principle of checks and balances is clearly violated by the executive branch, particularly during the administration of George W. Bush. Remarkably, right after the 9/11, America initiated the global war against terrorism which has led to war against Iraq and Afghanistan. It can be remembered that several human rights violations have been recorded due to the wars. Civilians have suffered the pain more than the real enemies. Although America has been a firm supporter of human rights, the Bush administration refused to be bound by human rights standards (Weiss, Crahan, and Goering 113). During the height of war against terrorism, President Bush had been acting beyond legal constraints as he used the countries foreign policies and executive power to adopt policies that are perceived to require the approval of Congress. Apart from that, the government wanted to create an international order that places no limits to its actions despite the Constitutional checks and balances premise (Weiss, Crahan, and Goering 113). It has been clear that human rights have been compromised in place of fighting terrorism. The government was seemed so paranoid about the security that it almost forgot that is operated within a democratic country. Clearly, the activities and changes in the country have considerably limited the meaning of freedom. In addition, security has been used as a license in imposing policies that clearly violate the principle of checks and balances. Having violated both the cultural, moral and political concepts of democracy, it is clear that democracy has been diminishing in the country. Conclusion Generally, democracy is understood as a system of government where citizens have freedom and human rights. In its strictest concept, it is a political system where people have direct participation in the government and checks and balances is observed. The meaning of democracy was further strengthened by inculcating the freedom and rights of the citizens. As mentioned, democracy means power of the people. Hence, it would be useless of people have power but lack the freedom to enjoy and use such power in a way that the majority will benefit from it. It is also undeniable that since the early days, America has played an important role in spreading democracy and in fighting for human rights. America also initiated the adoption of various laws protecting human rights. However, because of the threat against its national security, its views about democracy have drastically changed. The imposition of the USA Patriot Act has remarkably limited the freedom enjoyed by the citizens. At the same time, the Act has significantly intervened with the fundamental rights of the citizens. The intrusion into the private dwellings of the citizens has eliminated the legal boundaries that separate the rights of the citizens and of the state. With the remarkable changes in the society and the massive violation of civil liberties, it is clear that democracy has also been gradually diminished in the country. Works cited Bidgoli, Hossein. The Internet Encyclopedia. New York: John Wiley and Sons, 2004. Cartledge, Paul. â€Å"The Democratic Experiment.† 01 January 2001. BBC. 16 April 2009 . Etzioni, Amitai. How Patriotic Is the Patriot Act? Freedom versus Security in the Age of Terrorism. New York: Routledge, 2004.

Friday, August 30, 2019

Case Study Analysis of Lajolla Software, Inc.

Case Study Analysis of LaJolla Software, Inc. Bus 600: Management Communications with Technology Tools Instructor: Sara Garski January 31, 2011 With the rapidly growing state of todays start-ups, fostering good overseas partnerships are essential in any business seeking to expand their company internationally. With such expansions, come becoming inter-culturally involved with those partnerships so that both party’s implicated can expand exponentially, building off one another. In the Case Study of LaJolla Software, Inc. ; overseas expansion was laid out in their companies plans for months. Their intent? To deliver a new product launch that could potentially prove to be very profitable. But to achieve such aspirations they needed a business partner that knew the market in which they wished to serve. When the opportunity presented itself to make such a merger they knew it would take more than their companies most brilliant programers to take on the challenge. And after constant visits to Japan, correspondence via fax, and many meetings with the interested shareholders and business partners of Ichi Ban Heavy Industries, the alliance was formed. Now all that was needed for the deal to be complete was for LaJolla to meet with Ichi Ban’s organizational management team where they were to learn more about their new partnership on the foreign territories of the United States. The problem, nevertheless, was communication; getting the Japanese to understand American culture and more importantly how LaJolla Software, Inc. unctioned in it. And being that their first partnership was with the Japanese they needed Ichi Ban to understand their purpose so that the two could unite as one solid entity of ingenuity for all of Asia to see. More specifically, here you have one company attempting to expand their products overseas. But in order for them to do so they need to first partner up with a company that is more knowledgeable of the territory in w hich they plan to expand. And after successfully attaining the partnership the problem that then arises is a cultural break down. In order for the partnership to work they must overcome the communication barrier, and they’re relying on one Marketing Manager to make it all possible. The key issue with this company and their partnership is learning enough about their newly gained partners so that they can in turn impart knowledge of American culture in a way they can understand and interpret it. And so, for them to successfully maintain their business, as well as their new partnership, they’re going to have to figure out innovative ways to teach their counterparts American culture. According to a Finance Discussion Forum (where questions are asked and answers are given by people either familiar with the topic or just sharing their opinion) five steps to successfully fostering a good overseas partnership are posted and listed below: learning the language learning the culture respecting the people and the country in which you plan to do business having eagerness to learn about the respective country and enjoying and making the most of the partnership Although this posting is really just an opinion it does raise good points about establishing good business connections when branching out to partners over seas. In this list, some of the suggestions may be a little hard to committee to accomplishing so it is imperative to outline key points to accomplish in overseas relations. For LaJolla, some of those key points could be to focus on learning and having the eagerness to learn about Japanese culture all while making the most of their partnership with Ichi Ban. For the marketing manager that is left with the single task of coming up with activities to engage their visitors he should first familiarize himself with Japanese culture, and asian culture in general. He should learn the signs of respect according to their culture as well as how they conduct business. Once he understands they’re key principles he’ll be able to get them to understand American culture. By being proactive and taking the initiative to learn their culture they’ll see that as a sign of respect and hey’ll want to learn more about the culture in which their company will be merging. In his quest to learn more about his foreign business counterparts he should also research Japanese business styles. And in an article entitled Japanese Business Styles it states, â€Å"Japanese communications are epitomized by subtlety and nuance†¦ (their) body language is very minimal, making it difficult for the untrained observer to read. The(y) also seem to be very still in meetings, sitting in a formal upright posture†¦ nd it is rare for any reaction or emotion to be visible. † So taking this into account, knowing this tidbit of information could drastically help gauge what activities the marketing manager should plan for the visitors. After some investigation has been done, the planning of activities for the visiting Japanese organizational management team should begin. Starting with a dinner; taking them to a Japanese inspired restaurant absorbed in their culture would be a good way to break the ice and start discussions about the business venture. This should then be followed up by a tour of some of the most important places near or boarding LaJolla, California. Such site-seeing could commence with visiting other similar software businesses (if permitted) and concluding their touristic trip with a tour of LaJolla Software, Inc. Now it may seem a little odd to see everything else first and the company they plan to work with directly last but doing it this way can help the visitors get a well rounded understanding of American business practice. So when they do finally meet LaJolla Software, Inc. they’ll have an appreciation for what they do, what they have already accomplished, and what they wish to accomplish with the help of their new partners. Another thing that LaJolla could do as a whole, is have a staff meeting where the marketing manager would go about making the rest of the staff culturally aware of the new business partners as well. This is yet another thing the Japanese will take notice to and seeing the eagerness of the Americans could make for an easier transition. In a PDF, entitled How to do it: Manage Overseas Business Relationships, it discusses the importance for the staff to â€Å"think carefully about what (their) foreigners might mean when they are using English† (pg. 5) With these key recommendations, these two very different businesses may actually be able to accomplish the goal they set out to do. Important facts to remember, however, is that the entire process will not be an over night success. In order for a bond to be forged and a good partnership fostered each party will have to work diligently in helping one another understand each other. Works Citied Anonymous. Japanese Communication Styles. worldbusinessculture. com http://www. worldbusinessculture. com/Japanese-Business-Communication-Style. html Business Link. Manage Overseas Business Relationships. HOW TO DO IT: International Trade. Last updated: 01. 08. 10. http://www. businessandpatents. org/content/files/IT8 (1). pdf CoastalCutie. What are the essentials to working with overseas business partners? Finance Discussion Forum http://www. financialcrisis2009. org/forum1/Business-Finance/ What-are-the-essentials-to-working-with-overseas-business-partners-7. htm

Thursday, August 29, 2019

Transmission Control Protocol and Cisco Public Information

Learning Objectives Be able to explain the purpose of a protocol analyzer (Wireshark). Be able to perform basic PDU capture using Wireshark. Be able to perform basic PDU analysis on straightforward network data traffic. Experiment with Wireshark features and options such as PDU capture and display filtering. Background Wireshark is a software protocol analyzer, or â€Å"packet sniffer† application, used for network troubleshooting, analysis, software and protocol development, and education. Before June 2006, Wireshark was known as Ethereal.A packet sniffer (also known as a network analyzer or protocol analyzer) is comput er software that can intercept and log data traffic passing over a data network. As data streams travel back and forth over the network, the sniffer â€Å"captures† each protocol dat a unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications. Wireshark is programmed to recognize the structure of differen t network protocols. This enables it to display the encapsulati on and individual fields of a PDU and interpret their meaning.It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting. For information and to download the program go to -http://www. Wireshark. org Scenario To capture PDUs the computer on which W ireshark is installed must have a working connection to the network and Wireshark must be running before any data can be captured. W hen Wireshark is launched, the screen below is displayed. To start data capture it is first necessary to go to the Capture menu and select the Options choice.The Options dialog provides a range of settings and filters which determines which and how much data traffic is captured. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 12 First, it is necessary to ensure that Wire shark is set to monitor the correct interface. From the Interface drop down list, select the network adapter in use. Typically, for a computer this will be the connected Ethernet Adapter. Then other Options can be set. Among those available in Capture Options, the two highlighted below are worth examination.Setting Wireshark to capture packets in promiscuous mode If this feature is NOT checked, only PDUs destined for this computer will be captured. If this feature is checked, all PDUs d estined for this computer AND all those detected by the computer NIC on the same network segment (i. e. , those that â€Å"pass by† the NI C but are not destined for the computer) are captured. Note: The capturing of these other PDUs depends on the intermediary device connecting the end device computers on this network. As you use different intermediary devices (hubs, switches, routers) thro ughout these courses, you will experience the different Wireshark results.Setting Wireshark for network name resolution This option allows you to control whether or not Wireshark translates network addresses found in PDUs into names. Although th is is a useful feature, the name resolution process may add extra PDUs to your captured data perhaps distorting the analysis. There are also a number of other capture filtering and process settings available. Clicking on the Start button starts the data capture process and a message box displays the progress of this process. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved.This document is Cisco Public Information. Page 3 of 12 As data PDUs are captured, the types and number are indicated in the message box The examples above show the capture of a ping process and then accessing a web page . When the Stop button is clicked, the capture process is terminated and the main screen is displayed . This main display window of Wireshark has three panes. All contents are Copyright  © 1992–2007 Cisco Sys tems, Inc. All rights reserved. This document i s Cisco Public Information. Page 4 of 12 The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet captured.By clicking on packets in this pane, you control what is displayed in the other two panes. The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in the Packet List Pane in more de tail. The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (in hexadecimal form representing the actual binary) from the packet selected in the Packet List Pane, and highlights the field selected in the Packet Details Pane . Each line in the Packet List corresponds to one PDU or packet of the captured d ata.If you select a line in this pane, more details will be displayed in the â€Å"Packet Details† and â€Å"Packet Bytes† panes. The example above shows the PDUs captured when the ping utilit y was used and http://www. Wireshark. org was ac cessed. Packet number 1 is selected in this pane. The Packet Details pane shows the current packet (selected in the â€Å"Packet List† pane) in a more detailed form. This pane show s the protocols and protocol fields of the selected packet. The protocols and fields of the packet are disp layed using a tree, which can be expanded and collapsed.The Packet Bytes pane shows the data of the current packet (selec ted in the â€Å"Packet List† pane) in what is known as â€Å"hexdump† style. In this lab, this pane will not be examined in detail. However, when a more in -depth analysis is required this displayed information is useful for examining the binary values and content o f PDUs. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 12 The information captured for the data PDUs can be saved in a file. This file can then be opened in Wireshark f or analysis some time in the fut ure ithout the need to re-capture the same data traffic again. The information displayed when a capture file is opened is the same as the original capture. When closing a data capture screen or exiting Wireshark you are pr ompted to save the captured PDUs. Clicking on Continue without Saving closes the file or exits Wireshark without saving the displayed captured data. Task 1: Ping PDU Capture Step 1: After ensuring that the standard lab topology and configuration is correct, launch Wireshark on a computer in a lab pod. Set the Capture Options as described above in the overview and start the capture process.From the command line of the computer, ping the IP address of another network connected and powered on end device on in the lab topology. In this case, ping the Eagle Server at using the command ping 192. 168. 254. 254. After receiving the successful replies to the ping in the command line window, stop the packet capture. Step 2: Examine the Packet List pane. The Packet List pane on Wireshark should now look something like this: Look at the packets listed above; we are interested in packet numbers 6, 7, 8, 9, 11, 12, 14 and 15. Locate the equivalent packets on the packet list on your computer.All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Pa ge 6 of 12 If you performed Step 1A above match the messages displayed in the command line window when th e ping was issued with the six packets captured by Wireshark . From the Wireshark Packet List answer the following: What protocol is used by ping? ________ICMP______________________ What is the full protocol name? ___Internet Control Message Protocol____ What are the names of the two ping messages? _____Echo Request____ _____Echo Reply____________________________________Are the listed source and destination IP addresses what you expected? Yes / N o Why? ___________________________________ Answers may vary-Yes, the source address is my computer and the destination is the Eagle server Step 3: Select (highlight) the first echo request packet on the list with the mouse. The Packet Detail pane will now display something similar to: Click on each of the four â€Å"+† to expand the information. The packet Detail Pane will now be similar to: All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.Page 7 of 12 As you can see, the details for each section and protocol can be expanded further. Spend some time scrolling through this information. At this stage of the course, you may not fully understand the information displayed but make a note of the information you do recognize. Locate the two different types of ‘Source† and â€Å"Destination†. Why are there two types? The Ethernet II shows the MAC addresses and the Internet Protocol shows the IP addresses What protocols are in the Ethernet frame? ___ eth:ip:icmp:data _ __________________________________As you select a line in the Packets Detail pane all or part of the information in the Packet Bytes pane als o becomes highlighted. For example, if the second line (+ Ethernet II) is highlighted in the Details pane the Bytes pane no w highlights the corresponding values. This shows the particular binary values that represent that information in the PDU. At this stage of the course, it is not necessary to understand this information in detail. Step 4: Go to the File menu and select Close. Click on Continue without Saving when this message box appears. Task 2: FTP PDU Capture Step 1: Start packet capture.Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start option on the Capture menu of Wireshark. At the command line on your computer running Wireshark, enter ftp 192. 168. 254. 254 When the connection is established, enter anonymous as the user without a password. Userid: anonymous All contents are Co pyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 12 Password: You may alternatively use login with userid cisco and with password cisco. When successfully logged in enter get /pub/eagle_labs/eagle1/chapter1/gaim-1. . 0. exe and press the enter key . This will start downloading the file from the ftp server. The output wil l look similar to: C:Documents and Settingsccna1>ftp eagle-server. example. com Connected to eagle-server. example. com. 220 Welcome to the eagle-server FTP service. User (eagle-server. example. com:(none)): anonymous 331 Please specify the password. Password: 230 Login successful. ftp> get /pub/eagle_labs/eagle1/chapter1/gaim-1. 5. 0. exe 200 PORT command successful. Consider using PASV. 150 Opening BINARY mode data connection for pub/eagle_labs/eagle1/chapter1/gaim-1. 5. 0. xe (6967072 bytes). 226 File send OK. ftp: 6967072 bytes received in 0. 59Seconds 11729. 08Kbytes/sec. When the file d ownload is complete enter quit ftp> quit 221 Goodbye. C:Documents and Settingsccna1> When the file has successfully downloaded, stop the PDU capture in Wireshark. Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed. Locate and note those PDUs associated with the file download. These will be the PDUs from the Layer 4 protocol TCP and the Layer 7 protocol FTP. Identify the three groups of PDUs associated with the file transfer.If you performed the step above, match the packets with the messages and prompts in the FTP command line window. The first group is associated with the â€Å"connection† phase and logging into the server . List examples of messages exchanged in this phase. Answers will vary- 1292 > ftp [SYN], FTP > 1292 [SYN, ACK], Response: 220 Welcome to the eagle -server FTP service, 1292 > ftp [ACK], Request: User anonymous, Response: 331 Please specify the password, Request: Pass Locate and list examples of messages exchange d in the second phase that is the actual download request and the data transfer.Answers will vary- FTP Data: 1448 bytes, 1294 > ftp-data [ACK], All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 12 The third group of PDUs relate to logging out and â€Å"breaking the connection†. List examples of messages exchanged during this process. Answers will vary- Request:QUIT, Response: 221 Goodbye, 1292 > ftp [FIN, ACK], ftp >1292 [FIN, ACK] Locate recurring TCP exchanges throughout the FTP process. What feature of TCP does this indicate? __Send and receipt of data____________________________________________ Step 3: Examine Packet Details. Select (highlight) a packet on the list associated with the first phase of the FTP process. View the packet details in the Details pane. What are the protocols encapsulated in the frame? ____ Eth:ip:tcp:ftp-data ______________________________________ Highligh t the packets containing the user name and password. Examine the highlighted portion in the Packet Byte pane. What does this say about the security of this FTP login process ? _____ Security isn’t very high because the name and password are visible. ___________ Highlight a packet associated with the second phase. From any pane, locate the packet containing the f ile name. The filename is: ___gaim-1. 5. 0. exe__________ Highlight a packet containing the actual file content -note the plain text visible in the Byte pane. Highlight and examine, in the Details and Byte panes, some packets exchanged in the third phase o f the file download. What features distinguish the content of these packets ? ____ A [FIN, ACK] is issued to close the connection. __________________ When finished, close the Wireshark file and continue without savingTask 3: HTTP PDU Capture Step 1: Start packet capture. Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start option on the Capture menu of Wireshark. Note: Capture Options do not have to be set if continuing from previous steps of thi s lab. Launch a web browser on the computer that is running Wireshark. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 12 Enter the URL of the Eagle Server of example. com or enter the IP address-192. 168. 54. 254. When the webpage has fully downloaded, stop the Wireshark packet capture. Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed. Locate and identify the TCP and HTTP packets associated with the webpage download. Note the similarity between this message exchange and the FTP exchange. Step 3: In the Packet List pane, highlight an HTTP packet that has the notation â€Å"(text/html)† in the Info column. In the Packet Detail pane click on the â€Å"+† next to â€Å"Line-based text data: htmlâ €  When this information expands what is displayed? ____HTML code for the web page__________________________ Examine the highlighted portion of the Byte Panel. This shows the HTML data carried by the packet. When finished close the Wireshark file and continue without saving Task 4: Reflection Consider the encapsulation information pertaining to captured network data Wireshark can provide. Relate this to th e OSI and TCP/IP layer models. It is important that you can recognize and link both the protocols represented and the protocol layer a nd encapsulation types of the models with the information provided by Wireshark.Task 5: Challenge Discuss how you could use a protocol analyzer such as Wireshark to: (1) Troubleshoot the failure of a webpage to download successfully to a browser on a computer. and (2) Identify data traffic on a network that is requested by users. Answers could vary-Wireshark could show when request for a web page failed due to incorrect URL. User traffic could b e monitored to identify errors in source or destination. All contents are Copyright  © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 12

Online game Parents should control their children's online time Research Paper

Online game Parents should control their children's online time - Research Paper Example The games are currently more entertaining due to advanced features added in them. This contributes to addiction which makes the game industry to grow very fast. Apart from addiction, online games have negative economic impacts because parents and teenagers spend their savings playing the games. It is difficult for some gamers, especially children to differentiate reality and cyber world. Study outcomes show that online games violence does not help in reducing real world problems as some people claim. People are spending most of their time playing online games. Currently, studies show that a large percentage of children in the US play online games (Prot, McDonald, Anderson 2). They also show that young people play online games for about 2 hours a day. 25 percent of the young males spend about 4 hours playing online games (Prot, McDonald & Anderson 2). Children are the most affected because they make 79.9 percent of all the gamers globally (Fullerton, Taylor, Grande 1). As people spend their time playing online games, they start focusing more on the game and forget the real world. Most people play games in order to escape reality. Games are currently more advanced and interesting. Consequently, people use them as way of relaxing. Others also use them to pursue their passions. For instance, those who like football and have never had a chance to play it in real world gain satisfaction by playing virtual games. In addition, people can play games that require opponents in real world such as chess. They do not need their friends in the virtual world. This has reduced people’s level of interaction in the society. People do not have much interaction with their families because the online games have become their first priority. The situation destroys relationships between family members. The virtual game world affects people’s real lives because gamers bring problems from the gaming world to real life. In the virtual game world, people do