Saturday, August 31, 2019

Wireless network routing on linux

1. IntroductionIn this portion of the topic, we are traveling to look at the introductory facets of sphere name waiters and its construction and its functionality facets. In which we are traveling to larn about several distinguishable routing mechanisms that helps us to implement dynamic routing with its organisation. In this we are besides traveling to larn about how to get down the routing between the terminuss and routing between groups and so on. In this portion we will show about the chief thought on smaller way routing and multicasting in routing so on.1.1 AIM AND OBJECTIVEThe chief facet that lie beneath the debut of webs operation inside the house by Unix Router is studied, at the same time with the adversities that occur during development and constellation of router for the house and when all the workers uses the Unix OS. The chief facet that lie beneath the debut of webs operation inside the house by Linux Virtual LANS is studied, at the same time with the adversities that occur during development and constellation of router for the house and when all the workers uses the Mac OS. This technique besides concerns about the presentation mechanisms for doing certain a grow able and resilient web group development using the Unix Router. [ 1 ] Coming to the routing in Linux from local system to remote nodes within the web there are two distinguishable types of attacks and they are based on use of routing statically or dynamically. Each type of the attack that the router follows has some benefits and drawbacks besides in it, but when a web increases its capacity so dynamic routing is the most low-cost manner of keeping the web in Linux. Taking this facet into consideration we have to happen out the use of dynamic routing protocols in the topographic point of the use of inactive waies in all terminuss of a web2. Introduction ON SUBJECTIn this portion of the topic, we are traveling to look at the introductory facets of sphere name waiters and its construction and its functionality facets. In which we are traveling to larn about several distinguishable routing mechanisms that helps us to implement dynamic routing with its organisation. In this we are besides traveling to larn about how to get down the routing between the termi nuss and routing between groups and so on. In this portion we will show about the chief thought on smaller way routing and multicasting in routing so on.2.1 DOMAIN NAME SERVERThe Domain name waiter construction on the cyberspace really works like this: There are machines that work on petition of IP Numberss of these itself. These machines are known as waiters on sphere Name Server, and a petition is known as a Domain Name Server Lookup. Every Domain Name Server merely has inside informations about a specific entity of the universe broad web, and they often contact each other. [ 2 ]2.2 DIFFERENT ROUTING TECHNIQUESThere are several different attacks that exist and which help us to implement dynamic routing inside the IT organisation.Zebra is a codification for Linux machines which can keep several of the protocols demonstrated in this thesis. It is TCP/IP routing package that works with, OSPFVS RIPv1 and RIPv2.Gated is one more functionality plan for Linux, but it works merely in its binary province. This attack has a higher period of heritage than zebra and could be much faster. High terminal version of this attack works, but merely with proper licences in the market. Educational establishments works with this attack in different ma nner.Routed is a basic attack that is best available attack based on its cost restraints on Linux platforms. It is restricted merely to utilize a RIP protocol, which non a best option to travel on in a large webs, particularly when the web grows invariably. This is significantly advantageous for little webs. Merely thing we have take into consideration is the suited version of routing which works with RIP.2 and therefore we can work with class-less webs.The use of dynamic routing protocols is non that of import, but it is optional. A inactive Linux way can be another suited option to fall in the web to different node.2.3 ROUTING AMONG NODESWhen we join nodes combined with a distinguishable assortment of IP references will be used to those of set ‘s client web in Linux. The connection can be established between merely two-terminals as a point-to-point connections between the terminuss, but in instances where many terminuss can pass on with each other the terminuss can be config ured to be inside a basic country web, hence giving permission to them to pass on information in much better manner and forestall the hops. [ 2 ] The IP references used for the inter-terminal connection will be from the set 192.168.1xx.y, get downing with 172.168.64.0 and traveling on with 172.168.64.4, 172.168.64.8, depending on the measure of connections used. This could be the instance in point-to-point connections. In this instance 255.255.255.252 will be the net mask and will include two good IP addresses one for every terminal of the terminus. For bigger webs a bigger web will be marked for utilizing the suited net mask in Unix Router. To the several figure of webs which will, which may be predicted to be within a routing set the routing between the terminuss can be a hard undertaking. To decide this restraint it will be more frequently be necessary to use a interior gateway protocol, like RIP-Routing information Protocol or OSPF-open shortest way foremost, the protocol will be a much hard attack but confronting a adversity job. If the set ‘s web comprises of a less figure of terminuss inactive routing can be adjustable option, although it is non a coveted one. The use of dynamic routing in Linux prevents manual changes and makes certain that the connection to the new terminuss on the web commences automatically in a normal manner. For these peculiar facets its benefits are demonstrated whenever possible. Due to these facets antecedently the client IP addresses, and the use of the IP references choose for fall ining the terminuss within a Wi-Fi set must non be against with the references used by other Wi-Fi sets. Chiefly based on this aspect each set should hold to register the IP which has to be used for inter-terminal connections if they are distinguishable to the IP references used by their clients. If this is non made, it may non back up the routing between client terminuss on both webs joined to the Linux router, but it will do rectifying routing troubles ne'er possible which taking opportunities to larn about flow from one web to the other, and this is non at wholly opted to utilize. It is easier to unite protocols on the same web this is non a best suitable attack as the routing traffic will maximise and besides there will more hard adversities in the machines which should reassign the routing related informations from one protocol to another protocol within the web. Therefore every router sets must seek to judge on the routing and take a opportunity and must be certain that all routing inside the web between terminuss utilizes this similar protocol in Linux. As it could non be a desirable option to swear each one inside the web it may be compulsory for the terminuss admin to maintain some preventative confirmation techniques to do certain that incorrect informations related to routing is non inserted into the web.2.4 ROUTING WITH OTHER GROUPSEach clip a connection occurs by a web set to an outside machine is stated, in other territories, states or countries it is high precedence to do certain that there are no job between the different IP references used by the sets, and that no other high precedence restraints are traveling to be taken topographic point. [ 6 ] A web set an utilize the similar ways of interior gateway protocols to reassign routing related informations with other set as it happens within the nodes, but is more frequently desirable to use an exterior gateway protocol. Routing with another web sets must more frequently be made utilizing the boundary line gateway protocol and this is a peculiar 1 for which it is necessary to heighten more acquisition. The benefit of this technique is that every machine or set of machines in the web is termed as an chief machine which operates automatically and there is necessity to hold the inside informations of group ‘s internal paths, merely the places of entree to the set, the webs it comprises and the connection it has to other groups. [ 7 ] The assortment of IP references used for the inter-set interlinking is described antecedently and the references used must be made public to forestall IP reference jobs inside the web by the router. Taking into consideration of this, T may non be possible to wholly swear all the related informations gained by another set ‘s in the web and at the same clip to forestall erroneous informations being inserted into the web it may be of import for the web admin to maintain necessary confirmation techniques to do certain that false routing related informations will non oppositely affect the set ‘s web right methodological analysis. In a web set in the Linux we are said that a machine which operates automatically is necessary to give a figure utilizing some peculiar codification which specifically makes it out. In several state of affairss the set will non hold its single AS figure. It is said that when a set requires a new AS figure that it meets the Wi-Fi sets and it must be given with a figure inside the private AS group referred by RFC 1940. This set of Numberss is from 6441.2-65564. It will be good if a record of the given AS Numberss used by the Wi-Fi sets is placed in a public location web site such that it can be viewed and taken as mention by the distinguishable web sets. The existent AS figure is non that necessary, it is fundamentally an AS figure which is used for designation. In the similar mode that it is of high precedence that the IP references used by united work sets are non made extra transcripts, it is besides necessary to look into that a new set does n't utilize a As figure given to other work set, due to which the routers may be falsely communicated up to a certain extent.2.5 OPEN SHORTEST PATH FIRSTOpen shortest way foremost is a non important link- province routing protocol. Open shortest way foremost can be used as an unfastened beginning and is said to be robust attack because it works on a broad scope of platforms independently which may be supplying this sort of support to the web and as it is a link-state protocol it can be distinguished from RIP or IGRP which are distance-vector protocols. Open shortest way foremost will non ever reassign a record of all its paths to its environing 1s, but merely transfers the alterations it finds out in the web construction, hence forestalling the non needed use of webs bandwidth. This is extremely more good than distance-vector algorithms which rely on the given timers to reassign sometimes local routing related informations to the staying web. Using the unfastened shortest way foremost the junction clip when a web alters may be every bit little as five or six seconds, which in the instance of RIP is hundred and ninety seconds. The naming of the routers which make an unfastened shortest way first web are given a peculiar name base on some facets like topographic point and necessity of them inside the web. About which it is demonstrated below briefly:Internal Router:Internal Router is a router in which all the webs are joined inside the same country in a direct manner. In the Internal Router merely one transcript of routing algorithm will be continued.Area Border Router:Area boundary line Router is a router in which it joins country to an country. It makes ideas between the two countries and maintains the webs which are utilized between them.Back Bone Routers:Back Bone Routers are routers which are the related to country O and are the necessary 1s for the broadcast medium through webs between several distinguishable countries.AUTONOMOUS SYSTEM BOUNDARY Routers:Autonomous system boundary routers are routers which are joined to the other AS or to the worldwide web. These are specifically routers which broadcas t routing related informations with other IGP and EGP routers which need non utilize the unfastened shortest way foremost. There are several distinguishable ways in which we can fall in the countries or terminuss at eh routing phase in web. A VPN manner has besides been introduced which can be extremely advantageous, specifically while fall ining distinguishable webs among territories or while the two terminuss are fare separated and it is mandatory to set up a nexus over the universe broad web. In this attack we can propose the country O is been placed as the chief terminus and more likely to a big bandwidth cyberspace connexion and to which other webs may be joined. In the instance where the terminuss many non be joined in direct contact to country O utilizing a direct contact or by VPN a practical connection to fall in it to country O will be necessary.2.6 OPEN SHORTEST PATH FIRST COMPARED TO OTHER PROTOCOLSThere will be peculiar instances in which peculiar machines will non assist out unfastened shortest way foremost and in this state of affairs another protocol such as RIP can be used, till it is RIP version 2, or lake herrings EIGRP two of which helps instance less webs. On a whole, the ABR will necessitate to assist open shortest way foremost to do certain that it need non give out the entire web related informations. It is required at the clip the entire web are joined to use protocols which can exemplify brief versions of the webs within an independent system as this will minimise up to a certain extent the use of the sum of routing related informations which is necessary to be exchanged between several distinguishable routers.2.7 BORDER GATEWAY PROTOCOLThe of import facets of the boundary line Gateway Protocol is same to that of an IGP router like unfastened shortest way foremost which surveies the minimal paths to entree the remaining of the terminuss and webs inside a machine which operates automatically. This differentiation is because of the Border Gateway Protocol works with webs of several distinguishable machines, exemplifying its ain web and happening out the ways by which the staying independent machines can be attained. BGP besides has several filtrating techniques which gives entree to us to take a determination to give a presentment to each of its bordering webs or non to inform related to the several distinguishable webs to which they are joined Because of the above facet, the benefits of BGP is considered as significantly advantageous to bury joint distinguishable Wi-Fi webs, as another option of utilizing an IGP type unfastened shortest way foremost.2.8 SUPPORT FOR MULTICAST ROUTINGSupport for multicast references must be involved in the terminuss routers, as this will give entree for systems which utilize the bandwidth of the web to a maximal extent. It keeps it conformity with multicast references that it is used to a maximal extent by several runing systems, but package sweetenings are compulsory for support multicast routing. For building a inactive routing tabular array, even we have an optional routing tabular array which maps to link hosts merely on the physical webs which are connected straight. The paths by the outside gateways must be included to the routing tabular array. One types of method to back up this edifice a inactive routing tabular array with path questions. In the routing tabular array, we can utilize manually route question to infix or cancel entries. To explicate the more clearly, if we wanted the path 207.25.98.0 to be added to a Solaris machines routing tabular array with path questions, so types: â€Å" # path add 207.25.98.0 172.16.12.11 add net 207.25.98.0: gateway almond† . As it is considered as a first bid after the path in this illustration is the cardinal guard ‘s add-on. The keyword on a interpolation or omission, commanding path to infix a new path or to cancel a present one. On the other manus, other value must be derived as finish references, which has to be assumed as reference that is attained through the path. At the same clip, Network name from the webs file as an Ip reference the mark reference could be assigned, a host name from the host files or the keyword fundamentally. Several Linux paths are inserted at the beginning degrees, IP addresses which are numeral are used more than the machine names. This is made for back uping that the routing scheme is independent on the degree of the name waiter package. At any clip we must use the entire numeral reference ( all 4 bytes ) . The path enhances the reference if it is made up of smaller than four bytes, and the enhanced reference need non be the one which we desired. If the basic keyword is used for the mark reference, path establishes a basic path. The basic path to a finish and it is fundamentally the one router we need in the web, if the web of ours has merely a individual gateway, and so use a basic path to convey all the traffic that is related to the distant webs through that gateway. The path question twine is the gateway reference for the web. It utilizes the IP reference of the outside gateway by which information is transmitted to the mark reference inside the web. The reference should hold gateway reference which is joined through a direct nexus in the web. The following hop must be available to the local host through a direct nexus. Therefore, it should be on a web which is joined straight. The metric bid is non used when routers are removed, but assorted machines need it when a path is inserted. Although its demand is necessary, path utilizes the metric merely to judge if this is a path which is attained by an interface through a direct nexus or a path that is achieved by a outside gateway. If the metric is O, the path is implemented as a path by a local interface, and the G flag. However, the gateway reference has to be considered with the aid of G flag set If the metric is more than zero, the reference should be assigned address of outside gateway.2.9 ADDING STATIC ROUTESTo infix inactive router in Linux atmosphere the subnet value 172.16.12.0. There are fundamentally two gateways on this subnet that can be handled, and they are almond and pecan. Almond type of gateway is utilized to several of the webs on the cyberspace used in Linux. Whereas the pecan gives entree to the different subnets on nuts-net therefore, We can use Prunus dulcis as our basic gateway due to i ts use of several 1000s of the paths. The lesser figure of paths that can be accessed with a easiness clearly by the pecan. The figure of paths that are accessed by a gateway waiter is non the measure of traffic it maintains, but Judgess which gateway to take as a basic one.To put in the default path on peanut, we enter:# path -n add default 172.16.12.1 1, add net default: gateway 172.16.12.1The mark is usually set as default ; Prunus dulcis ‘s reference is nil but the gateway reference ( 172.16.12.1 ) . The -n keyword is non a necessary option in Linux. It is merely to give the informations related to the path to demo numeral references in its informations messages. When we insert router questions to a startup file, use the -n keyword to avoid way from dissipate clip frame from commanding name waiter package that might non be put to deathing. After implementing the default way, measure the routing tabular array to guarantee that path has been inserted:% netstat -rnRouting Tables:FinishGatewayFlagsHoloceneUseInterface127.0.0.1127.0.0.1UH1132LionDefault172.16.12.1UG00Lion172.16.12.0172.16.12.2Uracil2649041LionBeginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm Attempt ping one time to look into the peanut is now ready to interchange informations with distant hosts. If we are fortunate, the distant host will reply and which will wish this: It is likely that the distant host is crashed or dropped. If it is, the Ping does non react. If it is like this we should non lose our hopes ; we need to seek another waiter.% ping 207.25.98.2 Ping 207.25.98.2: 56 informations bytes 64 bytes from the ruby.ora.com ( 207.25.98.2 ) : icmp_seq=0. time=110. MS 64 bytes from ruby.ora.com ( 207.25.98.2 ) : icmp_seq=1. time=100. Ms— — 207.25.98.2 Ping Statisticss — — 2 packages transmitted, 2 packages received, 0 % package loss round-trip ( MS ) min/avg/max = 100/105/110Beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm This consequence is desirable which states that we are pass oning with the remote host which is a good mark ; this implies we got a important path to hosts on the cyberspace. On the other manus, now besides we have non implemented paths to the left over nuts-net. If we ping a host on different subnet, something exiting occurs:— – % ping 172.16.1.2 — – Ping 172.16.1.2: 56 informations bytes ICMP Host redirect from gateway almond.nuts.com ( 172.16.12.1 ) to pecan.nuts.com ( 172.16.12.3 ) for filbert.nuts.com ( 172.16.1.2 ) 64 bytes from filbert.nuts.com ( 172.16.1.2 ) : icmp_seq=1. time=30. Ms — — 172.16.1.2 Ping Statisticss — — 1 packages transmitted, 1 packages received, 0 % package loss round-trip ( MS ) min/avg/max = 30/30/30 beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htmPeanut trusts that all marks are come-at-able through its default way. Hence, even information meant for some other subnets is transmitted to almond. If insignificant transmits information to almond that must travel through the pecan, almond transmits an ICMP Redirect to peanut desiring it to utilize pecan Ping illustrations the ICMP Redirect in action. Netstat shows the consequence the redirect has on the routing tabular array:% netstat -nrRouting TablesFinishGatewayFlagsRefcntUseInterface127.0.0.1127.0.0.1UH11604lo0172.16.1.2172.16.1.3UGHD0514le0Default172.16.1.1UG3373964Lion172.16.1.0172.16.12.1Uracil686547686547le0 Beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm The path with the D flag set was installed by the ICMP Redirect. Some of the web directors take the benefit of ICMP Redirects while intriguing and developing a web. All hosts are implemented with a default way, even those on webs with more than one gateway. The gateways swap routing informations through routing protocols and readdress hosts to the finest gateway for a specific path. This sort of routing, which is necessary on ICMP Redirects, has been a important attack due to personal systems ( Personal computers ) . Assorted Personal computers does non put to death a routing protocol ; some does non hold a path question and are restricted to a lone default way. Obviously, ICMP Redirects are delighting to keep up these users. Along with this, this sort of routing is simple to implement and best appropriate for execution by a constellation waiter, as the similar default way is used on each host. Based on these facets, some web directors support confidence on repeating ICMP Redirects. [ 6 ] Additional web decision makers want to forestall ICMP Redirects and to continue direct bid of above the topics of the routing tabular array. To remain off from redirects, specific paths can be setup for each subnet, utilizing independent path statements:# path -n add 172.16.1.0 172.16.12.3 1, add net 172.16.1.0: gateway 172.16.12.3 # path -n add 172.16.6.0 172.16.12.3 1 add net 172.16.6.0: gateway 172.16.12.3 # path -n add 172.16.3.0 172.16.12.3 1 add net 172.16.3.0: gateway 172.16.12.3 # path -n add 172.16.9.0 172.16.12.3 1 add net 172.16.9.0: gateway 172.16.12.3 Netstat shows what the completed routing table expressions like. % netstat -rnhypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm Routing tabular arraiesFinishGatewayFlagsRefcntUseInterface127.0.0.1127.0.0.1UH1132Loe172.16.12.0172.16.12.2Uracil2649041Lion172.16.1.3172.16.12.3UGHD1514LionDefault172.16.12.1UG00Lion172.16.1.0172.16.12.3UG14904Lion172.16.6.0172.16.12.3UG00Lion172.16.3.0172.16.12.3UG00Lion00LionBeginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm The routing tabular array we have created utilizes the default way i.e. by Prunus dulcis to achieve outside webs, and specific waies by pecan to achieve other subnets inside nuts-net. Re-executing the Ping options facilitates regular most achieving end products. On the other manus, if any subnets are excess to the web, the waies to these new subnets should be manually inserted to the routing tabular array. On a whole, if the machine is restarted, all routing tabular arraies which are inactive will lose its entries. Hence, to use inactive routing, we should guarantee that the waies are re-introduced every clip our machine restarts.Installing inactive paths at startupIf we make a determination to use inactive routing, we need to make two changes to our startup files: Insert the wanted path statements to a startup file. Delete any statements from startup file that execute a routing protocol. Linux offers an inspiring illustration, due to its demand of inactive paths to build the optimum routing tabular array. The Linux debut of ifconfig will non change the routing tabular array when a new interface is implemented. The way for a new interface is inserted form outside with a path question. These interface paths are stocked up in the startup book. The chief path statements in rc.inet1 utilize book variables. We altered these to references for the intent of ambiguity./sbin/route add -net 127.0.0.0 /sbin/route add -net 172.16.5.0 netmask 255.255.255.0beginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm The first statement installs the path for the loopback interface. Taking into consideration of this brief sentence structure of this codification: it find out a mark but no gateway. This is due to Linux has a specific sentence structure merely for including a path to an interface. We must hold stated the bid as: /sbin/route add -net 127.0.0.0 dev lo0 If dev is non mentioned on the codification line, the way codification finds out the right interface from the mark reference. The 2nd statement from /etc/rc.d/rc.inet1 book implements the way for the Ethernet interface. This statement comprises of a subnet mask. If nil provided, it would default to 255.255.0.0, which is the criterion for category B reference 172.16.0.0. Implementing waies for straight presenting interfaces is specific to Linux. On a Solaris system, edit /etc/init.d/inetinit to add the path statements:path -n add default 172.16.12.1 1 & gt ; /dev/consolepath -n add 172.16.1.0 172.16.12.3 1 & gt ; /dev/consolepath -n add 172.16.3.0 172.16.12.3 1 & gt ; /dev/consoleBeginning: hypertext transfer protocol: //docstore.mik.ua/orelly/networking/tcpip/ch07_03.htm3 INFORMATION SECURITIESNetwork security and informations security are largely used as the security mechanisms which are maintained one or the other. On a whole web security is usually taken in to consideration for security mechanisms at the terminals of a house, seting out the unauthenticated entries, for illustration Data Loss Prevention-DLP. In the instance of the two manner attack of hallmark, the things which we utilize are the things which are in usage, coming to the three manner attack of hallmark the things which we have used are besides used. A important survey of basic techniques and inside informations in web security is demonstrated in the signifier of a non sum topology of web security onslaughts. [ 14 ]3.1 SECURITY MANAGEMENTSecurity direction for webs is varied for all types of scenarios. Manageability enhances package and hardware to forestall boisterous charges from speaking entree of the web and spamming. A switch works as a several-port span and to larn the topographic point of each systems Mac reference by maintaining an oculus on the current traffic. For each clip period it switches, it will merely travel in front traffic to the port that contain the finish Mac reference. Developing switched LAN internet maps for the 30 five staff several of which are included in the papers development, interaction with clients and disposal of office.3.2 PERSONAL LEGAL TEAMPreviously, the web developers and router had merely a minimal ways of taking the hardware tools at the clip of purchasing a engineering for their organisation webs. Hubs are by and large used for wiring cupboards and routers which are responsible for information centre or important communications operation.3.3 BUSINESS LEGAL TEAMIn the instance of concern legal squad staff and legal workers, maestro in marketing Torahs. Function of LAN exchanging and UNIX router engineering in organisation web Several web developers are get downing to present shift tools into their present running shared-media webs to achieve the illustrated aims: Involve the maintainability of VLANs by structuring web clients into logical work sets that are non dependent of the physical topology of wiring cupboard hubs. This could cut down the disbursals of alterations, interpolations and alterations while maximising the easiness of usage of the webs. Shared-media LANs separates the clients into two or more independent LAN units, minimising the figure of clients that are in conflict for bandwidth. LAN exchanging technique, which constructs this attack, involves micro divider, which besides partitions the LAN to lesser clients and eventually a lone client with a changeless regular LAN unit. Switch overing technique is the best opted coveted solution for heightening LAN traffic for the so called facets.Not like hubs and repeaters, a switch provides many informations watercourses to reassign at a clip.Switchs by the micro divider ways, have the capacity to manage maximized gait and bandwidth of turning engineeringsSwitched cyberspace and UNIX router solutionsNetwork developers have observed that assorted systems which facilitate switched cyberspace and UNIX router work solutions are really few. Some provide a restricted figure of hardware platforms back uping little or no machine execution with the present substructure. To be signifi cantly advantageous, a switched cyberspace work solution should achieve the followers:Control strategic influxs in the present communicating substructure which maximising come-at-able bandwidth.Reduce the disbursals of keeping web operations.Provide ways to assist multimedia plans and other most-demanded traffic in between a broad scope of platforms.Attain scalability, traffic ordinance and security to minimum extent up to the present twenty-four hours ‘s router-related internetworks.Achieve a assisting manus for built-in distant monitoring- RMON entity.The chief attack to achieving these is to recognize the functionality of interworking package mechanism inside the switched inter webs. Though LAN and ATM switches are demoing good sweetenings in the functionality facets, they give manner to the new internetworking challenges. Therefore a existent switched internetwork in more important than a group of boxes. It comprises of a machine of devices follow and worked by an internet working package technique. With the innovation of switched interworks, the expertness will be displayed on the whole of the web, demoing out the non centered facet of exchanging systems. The necessity for an internetworking substructure will be in a similar manner.4. COMPONETS OF SWTICHED INTERNETWORKING MODELA switched internetwork is comprised of chiefly three important tools which are: physical shift platforms, a common package substructure, web direction tools and applications, web developers with a entire terminal-to-terminal solution for presenting and keeping sweetening belongingss, robust, switched internetworks4.1 SCALABLE Switch PLATFORMS4.1.1 EVALUATE IPV4 AND IPV6 FOR THE STAFFIPv6 security is similar to that IPv4 security in assorted attacks. In truth the similar adversities that occur IPv6 1Psec execution IPv6 is usually implemented without the necessity of cryptanalytic security of any type. Along with this, due to several security restraints that are faced at the application degree, even the important execution of 1Psec with IPv6 will non supply any farther security sweetening for those onslaughts Inspite of the advantageous capableness of happening out the ground of the onslaught. There are some of import differentiations between IPv4 and IPv6, out of the authorization of 1Psec. These distinguishable facets will change the sorts of onslaughts which IPv6 webs are largely to face. It is besides non normal that the optimum house will alter wholly to IPv6 in a little clip period ; it will largely pull off IPv4 fall ining for the whole of multiyear migration to IPv6. At present, this has non a proper solution for the onslaughts which those type webs will confront and the development alterations necessary to turn to those onslaughts. This gives a brief of several of the basic onslaughts towards IPv4 and so evaluates and contradicts how these onslaughts or 1s that resemble like these might impact an IPv6 web.4.1.2 THIS DOCUMENT BENEFITS THE FOLLOWING GROUP OF INDIVIDUALSNetwork and security designers: – This broad association of people are the chief behind the building of the universe broad web at present and has restrictions for peculiar states, chiefly which are non involved in the IPv6 protocol and its alterations.Security research workers: – By taking into consideration of this thesis they must expertise with solutions for research in IPv6 security.IETF members: – The IETF, this association is the necessary 1 for the growing and sweetening of the IP Protocol, must be advantageous from a comparative survey of the deficiencies in IPv4 as in contrast to IPv6.Government Policy shapers: – The US section of defence has made out its thoughts a complete displacement to IPv6 by 2008, confused a spot by its aim for security. This purpose is appreciatable, but IPv6 is non a solution for all security concerns on a whole, a valid portion of influxs in the growing of new research stuffs for authorities workers is necessary demand to necessitate the end with in 2008.Other associations within the authorities have concerned on IPv6 as a manner of sweetening in worldwide wed security. This thesis is considered to be a helpful reso urce for such association for indicating out instances where there is a demand of attending. This engineering, IPv6 geographic expedition is varied from the IPv6 in two chief facets. The first is that the ping expanse or port scan, when used to measure the hosts on a subnet, are considerable difficult to carry through in IPv6 web. The 2nd, new multicast references in IPv6 gives out a manner to pick out specific set of cardinal machines with easiness. Additionally, go forthing these separating characteristics, geographic expedition methods in IPv6 are the similar 1s when compared with IPv4. IPv6 are besides more dependent on ICMPv6 to work decently. Strong filtering of ICMPv6 may go forth sick effects on web methods.5.1 NETWORK MANAGEMENT TOOLS AND APPLICATIONSThe units of a switched internetworking theoretical account is comprised of web maintain tools and applications. A important switched internetworking method should include the advantages of routers and switches together in each portion of the web, along with this it should supply a easiness of usage mechanism from shared-media networking to exchange internetworks. In normal switches which are non collaborating in the organisation web development gives out the undermentioned advantages: Large bandwidth, quality of service, less expensive, Time frame, Ease of constellation is high precedence facet and appraisal disbursals.5.2 comparings of LAN switches and routers:Routers provide the undermentioned maps:Conveying firewall, Communication between distinguishable LANs, Convergence in less clip, Policy routing, Security, Load rating and Idleness, Traffic transportation care and multimedia association rank.5.2.1SUBNETWORKINGEasy to entree switched internet maps are comprised of physically distinguishable dividers, but are logically taught to be as a one individual web. This facet is included to the me thod that LAN switches operate- they regulate at OSI layer2 and must supply connectivity to hosts as if every host is located on a individual overseas telegram. Layer 2 turn toing considers a level reference infinite with broad assortment and scope of particular references. Routers regulate at bed 3, evaluate and stick to a hierarchal addressing construction. Route webs can associate a logical addressing method to a physical substructure so every web divider substructure so every web divider has a TCP/IP subnet or IPX web. Traffic transmittal on routed webs is distinguishable from that is on switched webs. Routed webs have more flexible traffic transmittal as they utilize the hierarchy to indicate out minimum paths based on dynamic facet Such as web concern. Datas can be gained by the staff to routers and switches that can be used to set up maximal unafraid webs. LAN switches may use created filters to supply entree control depending on mark reference, beginning reference, protocol sort, package size, and inside the clip frame. Routers can filtrate on logical web references and supply a regulative depending on facets accessible in layer 3 or halt traffic depending on specific TCP/IP socket related informations for a set web references.5.3 BENEFITS OF LAN SWITCHESAn independent bed 2 switch may supply some or all of the illustrated advantages:Bandwidth: – Local area network switches provide important growing and sweetenings for single clients by giving specific bandwidth to each switch port ( for illustration, each web divider ) . This method of allotment is called Micro divider.VLANs- LAN switches can organize a set of independent ports into logical switched work sets termed as VLANs hence ; by this they restrict the transmission sphere to valid VLAN member ports. VLANs are besides called as switched spheres and independent shift spheres. Transmission between VLANs needs a router.5.4 NETWORK DESIGN PRINCIPLESSignificant web development is dependent on assorted surveies that are illustrated in brief based on the chief facets described below:Examine individual points of failure carefully: There must be a minimizing manner in the web so that a lone malfunction will non halt any portion of the web. There are two cardinal characteristics of minimising that are load equilibrating. In the instance of a malfunction in the web, there must be a alternate path. Load equilibrating happens when two more paths to a mark are present and can be used based on the web burden. The degree of minimising technique required in a specific web differs from web to web.Characterize application and protocol traffic: Taking into consideration, the transmittal of plan information will sketch the client-server exchange of informations and is of import facet for important resource allotment, like the figure of users utilizing a specific waiter or the figure of user a specific waiter or the figure of user workgroups on a divider.Analyze bandwidth handiness: – Taking into consideration, the must non be order of measure differentiation between the several distinguishable sorts of the hierarchal theoretical account. It is critical to take a note that the hierarchal theoretical account relates to knowledge beds that provide functionality. The bandwidth return provide functionality. The bandwidth takes important part in the topology where a big figure of Stationss are at that place. The beds need non hold to be a physical connection it can be the anchor of a specific device.Build webs using a hierarchal or modular theoretical account:The hierarchy gives manner to independent dividers to go the yesteryear of cyberspace and map together. In the individual router layout, the chief and distribution beds are included in a individual unit. The router chief functionality is shown by the backplane of the router and distribution is shown by the router. Permission allowing for terminal clients is achieved by independent or chassis-based hubs. The distributed anchor construction utilizes a really fast anchor media, usually FDDI to convey routing engineering between several routers. This besides makes the anchor to go across floors, a flat or an organisation. Switched LAN web design rules: When developing switched LAN organisation webs, the assorted facets that are to taken into history are described below:Accessible bandwidth to entree routing functionality: Inter-VLAN traffic should be routed, by which the web development will give sufficient bandwidth to several inter-VLAN traffic from the beginning, by the machine that affords routing methodological analysis and to the mark.Appropriate arrangement of administrative boundaries: Switch has the possibility of agony of multiport webs and the execution of exchanging external of our administrative bounds can oppositely had to enduring the webs inside our administrative bounds. Organization web development are heightening significantly with the execution of exchanging at all degrees of the web from desktop to the anchor. Three topologies have been come out as generic web development techniques: scaled shift, big shift, minimum routing, distributed routing, shift, and scaled shift.To mensurate the upper limit switched, min imum routing design, a logical hierarchy should be implemented. The logical hierarchy comprises of VLANs and routers that facilitate inter-VLAN broadcast medium. In this topology, routing is used merely in the distribution bed and the entree bed based on bandwidth by the distribution bed to achieve permission to really fast exchanging methodological analysis in the major bed.Chapter 6The information mentioned in this chapter illustrates us the research techniques that I have used for theUracilnothings based router.6.1 Research Methodology6.1.1 LAN and Router planing for an organisation and scenarioA organisation which have hundred and 50 worker, five staff are related to the betterment of the selling state of affairs. The IP web development series speaks about the concern related with organisation LAN development. The selling technique related on the footing of searchnetworking.com, tells the advantages of concern by Ethernet exchanging in contrast to the traditional hub ambiance. The chief nonsubjective beneath the execution networking inside the house is by practical LANs is seen besides with the facets related to the characteristics like gauging and constellation of router for the house and all the workers are utilizing the MAC OS. This thought besides illustrates for doing certain a adjustable and resilient organisation web development with the usage of UNIX router. [ 14 ] Intranet is a basal set platform, which tells us that merely a individual terminus can convey information onto the platform at merely tome which is specific. Internet hub systems take the restrictions of any entree related issues by development and implementing router for the house and all the workers are utilizing the MAC OS. Ethernet exchanging alternatively of configuring shared Ethernet attains the described functional facets: Every port on a switch is in the sphere which collides of its ain and therefore a workgroup joined to the LAN through a switch port alternatively of a hub port need non hold to fight for entree to the wire by looking for hits prior the information is sent. This maximizes the bandwidth on the LAN.Router switches in a campus anchor6.2 Data Management within the web 1. Datas Administration Data plus, Data administration, Data steward 2. Data Architecture, Analysis and Design Data analysis, Data architecture, Data mold 3. Database Management Data care, Database disposal, Database direction system 4. Data Security Management Data entree, Data erasure, Data privateness, Data security 5. Data Quality Management Data ripening, Data unity, Data quality, Data quality confidence 6. Mention and Master Data Management Data integrating, Master Data Management, Reference information 7. Data Warehousing and Business Intelligence Management Business intelligence, Data mart, Data excavation, Data motion ( extract, transform and burden ) , Data repositing 8. Document, Record and Content Management Document direction system, Records direction 9. Meta Data Management Meta-data direction, Metadata, Metadata find, Metadata publication, Metadata register In the present age direction use, each can merely put out a manner deviated from the cardinal word ‘data ‘ in compound nomenclature to the cardinal word information or may be cognition when saying in non-scientific attack. Therefore there will be informations direction along with the information direction and cognition direction. Even though informations may be present in footings of information or even knowledge they will be every clip in the head of the individual and hence they will be evaluated in the several criterions.6.3 Wireless LANsAdvantages of radio LANs include:The important demand for the radio LANs is clearly seeable because of their cost less expensive nature and simple to execution when compared to staying webs and web devices. The big figure of machines available in present market scenario is largely fitted signifier the beginning with the radio LAN nomenclature.Convenience:The Wi-Fi belongings of these sorts of webs facilitates users to acquire permissio n to use web resources form any suited topographic point inside their basic networking environment either it is a large or a little one.Mobility:With the rapid growing and use of public Wi-Fi webs, users can acquire permission to use the cyberspace even from finish external to their work atmosphere. Mast coffeehouse, for illustration, provide users a wi-fi connexion for acquiring entree to internet at minimal monetary value or even free of charge. With the lessening in the usage of laptop-level machines, this is specifically related.Productiveness:Clients joined to a Wi-Fi web can pull off a about steady relationship with their suited webs as they shift from location to location. For a chance in the concern, this tells us that a worker can significantly be efficient as his or her work can be finished from any suited topographic point. By taking into consideration of this illustration, a infirmary or depot may present voice against WLAN technologies that gives manner to mobility any best monetary values in the market.Deployment:For get downing up of an infrastructure-related Wi-Fi web it is needed to hold little sweetenings to the individual entree point. When compared with the wired webs, they have higher costs and complications of utilizing physical wires that are used for the puting up the connexion to more topographic points.Expandability:Wi-Fi webs can work even in instances with unexpected rise in the figure of users with the tools that are present merely. Whereas, a wired web more the figure of users require increased physical overseas telegrams.Cost:Wi-Fi webs require hardware which is of extremely expensive when compared to wired networks demands. This significantly raised the disbursals which are of really high when taken into consideration of the nest eggs it had made by non utilizing any wiring hardware.Disadvantages:Wi-Fi LAN engineering, by looking at the above mentioned allowances and characteristics which seem to be extremely important there are some drawbacks besides. For a given web topographic point, Wi-Fi LANs need non be the best suited 1s based on several characteristics. Several of these have work on with the built-in limitations of the engineering.Security:Wi-Fi LAN communicators are developed to ease machines on a whole unit without any dungs in the webs by the usage of wireless frequences. As a ground of infinite and disbursals, the signal receiving systems that exist on Wi-Fi networking cards in the finishs machines are largely less quality. In order to acquire proper signals by utilizing those type of receiving systems even in a best location, the Wi-Fi LAN communicator uses a maximal energy while transmittal.Scope:The normal scope of a basic 802.11g web with the common tools and engineering will lie in a scope of 10s of metres.Dependability:Similar to any other wireless frequence broadcast medium, Wi-Fi networking signals are affected to big figure of perturbations, every bit good as hard transmittal troubles like several way, or specifically in this Rican attenuation that are above the custodies of web admin. In the scenario of basic webs, transition is attained by hard stairss of phase-shift keying-PSK, amplitude modulation-QAM, doing engagement and transmittal facets all the maximized attempts.Speed:On several of the Wi-Fi webs usually 1-108Mbits/s gait is well less in contrast to the minimal degree of the basic wired webs 100Mbitsp/s to a tallness of several Gbit/s. there is besides some transmittal concerns raised by the TCP and its built-in obstructor ordinance techniques. For several users, on the other manus this illustration is non related as the velocity restriction point is non in the Wi-Fi web but taken into consideration of the external web connectivity is ensured. Taking the illustration, the highest ASDL end product usually 8Mbits/s or even lesser given by telecommunication industries to normal users is form start onwards is much lesser than the minimal velocity Wi-Fi webs to which it is fundamentally joined. Enhanced attacks such as 802.1 1n are being work outing this restriction and will backup highest end product in the scope of 100-200Mbit/s. Turning concerns that are looking frontward for rise in the web coverage of the Wi-Fi webs and less figure of limitations, needed to make up one's mind new bill of exchange 802.11n Wi-Fi tools. New bill of exchange 802.11n devices are expected to demo high degrees of efficiency and maximal connectivity country.6.4 FEATURES AND ADVANTAGES OF WIRELESS ROUTER NETWORKIn this Earth of advanced engineering, several people opt for non to fall in machines with Ethernet wiring due to maximal extent of wiring is spread around their office or abode is non a coveted one to hold. We can choose to implement a Wi-Fi web to forestall maximal wiring. For a Wi-Fi web, there is no demand to utilize Ethernet wiring to fall in our machines to the DSL or router. Basically, a Wi-Fi web transmits signal utilizes one or more Wi-Fi routers or Wi-Fi entree points. The admittance points or router are gained with an aerial and an Ethernet port. The Ethernet port in the Admission point must be joined to the modern who is provided by our cyberspace service giver, we can besides do a brotherhood of cabled and Wi-Fi connexions with an admittance point or Wi-Fi router. IEEE 802.11 constructs of Wi-Fi transmit is used in a Wi-Fi local country web ( WLAN ) . Particular other Wi-Fi networking constructs like Bluetooth are admirable at present. On the other manus, 802.11 constructs are described as the several efficient networking solutions. By and large, the aim of the interior decorators of this web entree point was to fall in machines through a local country web. On the other manus, at present it was modified and a Wi-Fi web interface is besides used for voice over cyberspace protocol ( VoIP ) and permission to utilize internet depends on the research done up to now, it is apparent that we can remain united in our web for maximal clip frame every twenty-four hours. If we have a laptop with Wi-Fi handiness, we can roll throughout the office premises without laptop while there will be no dropping in the signal or there wo n't be any connexion losingss. At present, specific urgent services are airing their private informations through a Wi-Fi web. We can make up one's mind this as an clear position for information protection which provided by Wi-Fi web. We can reassign and pass on information spontaneously by a Wi-Fi web. This is a valid facet why concern and people opt for this web base for informations sharing. Some of the valid facets which make Wi-Fi web significantly advanced are:Suitable facets like we can use this web at a abode, the office or at any topographic point and with easiness of usage.WLANs are admissible everyplace around the Earth at a minimal cost.While switching to a new topographic point, we can reassign the interface and configure it at our new topographic point with easiness.There is no demand for an Ethernet wiring to fall in machines one another.In a concern point of position, one of the important benefits in implementing a Wi-Fi web is the nest eggs, we can hold permissions for alterations in our concern in minimal clip frame after configuring the Wi-Fi web. There is no demand to sell out hard currency on wiring and other devices. The disbursals of pull offing Wi-Fi web are besides less when taken into contrast to other webs. In the present yearss, we can have Wi-Fi routers at a best coveted monetary value. Besides holding a Wi-Fi web can maximise growing and heighten the operation atmosphere in our organisation. Surely, one of the of import drawbacks of this web is that it may ensue in physical wellness conditions and atmosphere related concerns. [ 22 ]AN IDENTIFICATION OF THE SECURITY THREATSNow yearss, a mail was posted to the editor asking about the security characteristics of Wi-Fi webs and how to protect them. All Wi-Fi systems have certain sort of security issues based on how they are implemented or used. The different sorts of Wi-Fi connexion provide distinguishable methods of linking conditions on the corporate web or the cyberspace. Before stoping up the treatment and enter into the research treatment let us one time once more guarantee weather the definitions and methodological analysiss based on the subject are up to day of the month.7.1 IntroductionMany of us in the public funding occupation need to travel from office for a considerable clip frame to ease our users or travel to the events. Whole traveling from topographic point to topographic point, we trust on the user or the no cabled or wireless connexion in the accommodating topographic points to link back to the organisation to look for electronic mail updates or update the proceeding of the concern or to entree informations of the organisation or sometimes work separately by a terminal waiter.7.2 LIMITATIONSThere are several drawbacks of client-server design. Those are illustrated below:Security: In immense plan implementing security facets is a minor undertaking. But in a client-server depended design is provided with a great extent of flexibleness and a client can fall in anyplace in the web. This turns out to be a chance for interlopers to come in into the web. Hence, doing certain about the client-server engineerings is really important.Waiters can be constrictions: Waiters can move as the restricting points d ues to assorted users may fight to fall in to a waiter at the same time. This restraint occurs because of the easiness of entree provided to any client to fall in the web at any specific clip.Compatibility: Client and waiters might non to be in good footings with each other. Because of distinguishable industry may plan the client and waiter devices, they might non be suited to each other because of facets like informations types, linguistic communication and so on.Incompatibility: Cloning of waiters is a serious concern as it can originate the job of informations incompatibility.7.3 RESEARCH SCOPE7.3.1 WIRELESS OFFICE NETWORKS:Many of the funding organisations have been taught of Wi-Fi networking in their organisations but taking into consideration about the security concerns it decides. We have all known sing the WEP and intelligence in the media universe above how it had been attacked by the interlopers. In malice this is right and is a issue for Wi-Fi WEP- encoded webs, WPA-secur ed webs does non hold the similar issue, provided a rigorous security key is used. A rigorous security key could be termed as a large twine of characters taken at random from the 95 accessible keys. Taking into consideration, the lamb which Mary had spent 20 yearss in the forests is a better encoded key when compared to ABTY1386. It may necessitate several old ages to brute force Rhine wine the lamb phrase, but merely a few hours clip to chop the AB phrase. If used in good manner, WPA can supply a secure Wi-Fi web connexion for a funding organization.WEP must non be used at anytime as the encryption has been easy attacked. Using WPA is a obviously a easy technique of configuring the device for WPA connexions and so edifice that protocol on all the different Wi-Fi machines in the organisation. Provided a rigorous pre-shared key is used, the chance of the Wi-Fi web being attacked is really less. WPA can be used provided best methods are used. If WEP is being used in our Wi-Fi web, it is the state of affairs to alter to WPA.7.3.2 THE TRAVELLING WIRELESS OFFICEIn instance the client web is predicted to be to the full protected, the hotel or other Wi-Fi topographic point is estimated to be unafraid. This widens our machines and our information to be show cased to other who wanted to measure the topics of our machine. Using a package firewall does non give entree to ports which are non in usage, but there are assorted ports free to see on a machine that can give entree to person to hold a expression at informations. Some of these ports may be given entree by the package, and we may non even know that the ports are free to be entree. For illustration, in instance of horsepower pressman package this gives entree to ports on the machine that grants permission for wired web connexi ons to be granted with the machine. In laptops the cards will be installed and while fall ining the laptop in direct contact to the cyberspace through the

Friday, August 30, 2019

Human Environment Interaction Ccot Essay

-Much land is deforested and disrupted as diamond and silver mining emerges. -New crops from Americas causes India’s population to rise almost double in size. -Columbian Exchange brings new crops to this region, allowing for the farmers of the region to exploit more of their land for extra crops. -American crops such as potatoes and corn increases population of the region. -Traders of the region utilize the monsoon winds in order to navigate across the Indian Ocean. -Silver mining causes deforestation and erosion. -Slaves in the region are used to harvest and plant crops for agriculture. -Coastlines are leveled in order to increase trade over the seas. -Deforestation occurs in large areas in order to make space for sugar crops. -Few ports and small passageways allowed for many pirate raids on trading ships. -Animals brought to the region from Americas bring diseases that affect life expectancy and population growth. -Pollution increases around the ports along the Red Sea. -European explorers utilize ocean currents and trade winds to move between the region and the Americas. -To prepare for the construction of Versailles, deforestation is practiced. -New crops from the New World are grown and harvested. -Large-scale silver mining occurs which causes deforestation. -Cattle and other domesticated animals from other regions cause destruction of pastures by overgrazing. -Horses and other imported animals affect the lifestyles of many indigenous peoples. A. Silver mining occurs on a larger scale. B. New crops are planted and harvested in all regions of the world. C. New animals are introduced to various regions which cause new diseases to appear. Deforestation continues to occur to provide new space for development. Iron is still mined and utilized. Ocean winds and currents are used to move between continents via sea. -Traders of SE Asia used the monsoon winds to explore and trade. -Crops imported from various regions of the world made up a large portion of agricultural production in the region. -Deforestation for large-scale agricultural production was carried out. A. Increased diamond and silver mining led to deforestation, soil poisoning, and erosion. The soil mining was increased because it allowed for the regions at the time to gain wealth easily. B. New crops were introduced to different regions of the world due to the Columbian Exchange. It was important because it allowed for more agricultural production and less starvation around the world. C. New animals that are introduced by the Columbian Exchange alter the lives of people around the world. These new animals are utilized for more efficient manual labor and leads to a more abundant agricultural yield as well as more wealth in certain regions. 1. Deforestation was continued because new land was always required for further development in many regions. The deforestation allowed regions to expand their space for agriculture and mining although it destroyed the home of many plants and animals. 2. The use of iron never diminished because it is a key component for tool making, weapon making and warfare. The mining and use of iron was very popular because it was abundant and very durable. 3. The use of ocean winds and currents continued to be used in overseas travel as it allowed for traders and travelers to move around more efficiently. The use of these winds and currents allowed for more wealth to be accumulated as trade continued.

Thursday, August 29, 2019

The day I went to the Department of Motor Vehicles

When I decided to go to the United States, my friends were really envious of me. They called the United States ‘Dream Land’, and so did I. Yes, I came here to make my dreams come true. I was so excited. When I boarded the airplane, my heart was beating faster and faster. And when I got off in the San Francisco International Airport, everything looked different from my country. Everything was beautiful. I admired the buildings, the people, I even thought that the sky here was so beautiful that home could not compare. Back home I hated it when it rains but here I thought of rainy days as romantic. The wind here was as cool as strawberry ice cream. I just loved everything in this ‘Dream Land’.   This was paradise to me, where I thought everyone is an angel. Little did I know that this illusion would soon be over, and this is the story of how my ‘Dream Land’ crumbled before my very eyes. Everything started when I decided I needed a car. Back home, I never felt the inconvenience of not having a car. I could go almost everywhere by foot and if I had to go somewhere far the bus can be relied on. However, ‘Dream land’ is huge; I could not go to market without a car. Everything was far from my place and the buses never came on time, so I spend hours on the road to get to where I need to go. That’s why I decided to buy a car. My parents however did not understand my situation. My father thought I envied friends who have cars, but eventually he agreed and said that if I can get a license he will buy me a car. My teacher gave me driver’s hand book to study and wrote a letter for the DMV to explain that I am an international student and that I needed assistance to get my driver’s license. During that time I was as student in the English as a Second Language center at Sac State. My English was not good. I had difficulty expressing myself in English. I could understand what they are saying but I could not give a reply since it was so hard for me to say what I am thinking. That’s why my teacher wanted the DMV officer to read her letter. When I went to DMV, I had to wait an hour and half until my number was called even if I had a reservation. An hour and a half was really a long time to wait, but that was still okay with me. My frustration started right after that. I went to the window which has my number on the screen. There was old white lady. She looked very blunt and never smiled. I said, â€Å"Hi, um,, I   want to take a test for the driver’s license.† But, she did not understand what I said. She repeatedly said â€Å"Excuse me, what? What?† I was losing my confidence. Americans would never understand, how scary it is for a foreigner when they say ‘What?’ in a condescending if not antagonizing way. Any way, when she finally understood me, I showed her my documents, including my   passport, I-20 and the letter that my teacher wrote. The blunt old white lady said to me. ‘No, you can not take a test because you do not have social security number.’ I politely explained to her that I could not understand because international students can not get social security number, and some of my friends took test just a day before, but she said ‘why are you talking about your friends? I do not care about them. The problem is that you do not have social security number.’ I felt that she was annoyed and did not want to listen to my poor English. So, finally I asked her to read the letter. However, she did not read it and said ‘Sac State is not my government.’ I was speechless with amazement, and I could not accept what she said. When I tried to say something, she said ‘why are you still here? If you can not follow American law, go back to your country.’ She was really rude. And the experience was   so frustrating for me. That was the day I realized that this place is not the ‘Dream Land’ I thought it to be. The angel has turned into a scary antagonizing monster, whom I hate. As I walked to the bus stop I could not stop my tears from falling and soon I was crying so hard. It was a very painful experience for me. I was so humiliated by the way the rude white lady who does not know what is legal. I hated her. I hated myself for not being able to express my thoughts in English. And I hated this ‘Dream land’ where they do not give social security number to international students, and want to us pay ten times expensive tuition fee than that paid by their citizens. That was the day I understood what racism means. I am an Asian who could not speak English well, so the white lady did not listen to me. I thought to myself, this not ‘Dream land’ after all, the old lady at the DMV made me realize just that and she did it in a really painful manner. I went to the mall to meet my friend and tell this story because if I did not tell this story that day, I think I would have died.   We sat at the food court, and spoke in Korean. I felt so relieved that I could speak in my mother tongue and be understood by my friend. Suddenly, an old white man came to us. He asked us, ‘What language are you guys talking with?’ We said, ‘Korean’. We thought he was interested in listening to another language. However, it was another illusion. He explained that we have to speak only in English in the ‘Dream land.’ We were so offended by what he said but what offended us more and made us very angry were his last words to us. He said ‘Go to the restroom and wash your mouths.’ I could not believe he was insulting us because we did not speak in English. From that day, ‘Dream land’ is not dream land to me any more. And I realize how wrong I was to think that this is ‘Dream Land†. There is no dream land and no angels. It was really a sad experience for me to be treated unfairly because of my race and poor English. From then on, I studied English very hard until I could speak very well. Nowadays, when I see people who can not speak English well at the mall or on the road, I try my best to help them and I am always careful not to say anything that would ruin their confidence because I do not want to break their dreams like the old white lady did to me. If they still think this is ‘Dream Land’ I do not want to ruin it for them.      

Wednesday, August 28, 2019

Common book Essay Example | Topics and Well Written Essays - 250 words

Common book - Essay Example The message was received the same day and it was relatively cheap. Letters and the postal service was another method. There were transistor radios as well, these were new radios that could be carried anywhere. Ans2. Well there was this thing called the teletype. It was a huge machine that could communicate with another machine of its type. Computers started replacing the teletype slowly. I think it was the 80s when the modem was introduced. It used the landline to connect to computers. I am not sure how it worked but you couldn’t call if the modem was in use. It was mostly an office thing. Ans3. Television was a very new thing when I was young. We didn’t get one for a long time but lots of people I knew did get it. It was magical at first. They said that the radio and print will soon become obsolete. We saw so many things on the box like other cultures and world views. It really opened your eyes. Ans4. It has changed it immensely. Letter writing was an art form and sitting down with a nice fountain pen and some good quality paper to write a letter was really something. A lot of effort went into buying postcards and writing those letters. It all meant something. Now its all about instant messaging and instant gratification. You can connect in seconds and its all so cheap. We had to think twice before making a call. Ans5. I wouldn’t say that. You look at the television now or the internet and you can see that it has a lot of good uses. There is information at your fingertips and easy access. Anyone can open a YouTube channel and communicate with millions. But I do know that personal or one on one communication has suffered. Since we put in so much time to talk to someone else, it all meant something. There was heart felt thought behind every

Managing Contract Risks Assignment Example | Topics and Well Written Essays - 2500 words

Managing Contract Risks - Assignment Example It is evidently clear from the discussion that contract is a legal agreement which binds parties with the intention of performing obligations in exchange for substantial consideration which is generally done formally in writing or by verbal agreements. It is either bilateral or unilateral. The mutual assent of parties, however, gives rise to obligations between parties involved and breaches thereof are remedied by law either by payment of damages, otherwise known as monetary compensation. As an economic activity, contracts also consider the sociological, anthropological and environmental terms of the agreement. Contract moreover is described as an offer accepted by another party based on the meeting of minds and some evidence showing their mutual assents to discourage ambiguities of terms. The consideration inherent in this agreement is of value in exchange for goods and services that will be rendered or delivered. Such consideration must be sufficient on its own. A contract can be i llustrated in purchase agreements where one party delivers a thing or good in exchange for payment. Other examples can be mirrored in specific performance of services in exchange for just compensation or payment. This is evident in a contract of employment or in case of constructing facilities as in the case of hiring engineers to perform the actual construction. Generally, contracts are made if parties have the legal capacity to make a contract; the purpose is legally warranted and forms are legal; parties have the intention to create legal relations, and mutual consent is adduced. Under the law, the contract can be vitiated when one of the parties of the contract made an irreparable mistake; is legally incapacitated; if contact is exacted out of duress and undue influence; if the contract is done in unconscionability and of misrepresentation; and, contract frustrate the purpose.

Tuesday, August 27, 2019

Special Education in General Ed classroom Essay Example | Topics and Well Written Essays - 750 words

Special Education in General Ed classroom - Essay Example If there are any areas of concern, consult with an educator, occupational therapist or low vision specialist to evaluate your pupil's school environment. These evaluations can give essential information about your pupil's areas of strength as well as areas that need support services. Educational materials should be presented against a simple background. Keep the work area uncluttered. If pupil finds light too irritating and glaring, he/she will be allowed to wear a hat and dark glasses to protect him. If the situation permits, she may come inside a room to avoid too much light. 2. Children and youth from culturally diverse groups are often under-represented in programs for students with special gifts and talents. Describe procedures, using the content provided in this course that will minimize this under-representation. Different students with different abilities and personality types learn more with varying techniques. Students low in authoritarianism, low in tendency to dichotomize, low in the need for structure, and high in the ability to tolerate frustrations have been found to learn more when the Socratic questions and answer method is used while children of different reasoning skills learn more with the discovery and expository methods. Researchers found that lo... It is worth watching carefully to find out what the smallest toys are that a child can see and play with. Then try to only play with toys that are the same size or bigger. 2. Children and youth from culturally diverse groups are often under-represented in programs for students with special gifts and talents. Describe procedures, using the content provided in this course that will minimize this under-representation. The teacher who recognizes individual differences among his pupils has an edge over those who do not recognize the same. Recognition of these variations helps the teacher maximize learning. Varying the techniques of instruction Different students with different abilities and personality types learn more with varying techniques. Students low in authoritarianism, low in tendency to dichotomize, low in the need for structure, and high in the ability to tolerate frustrations have been found to learn more when the Socratic questions and answer method is used while children of different reasoning skills learn more with the discovery and expository methods. Selection of instructional materials In choosing instructional materials, the following are some implications of individual differences. 1. "complex" and "simple" materials vary with the levels of anxiety 2. carrying the sequence of instruction 3. "visual" and "oral" methods used with students of different perceptual preferences 4. Difficulty level of instructional materials to fit the personality of learners. Researchers found that low anxious, low achieving subjects learned better when materials were sequenced in an easy-to-difficult manner, while anxious, high achieving subjects did better with materials presented in difficult-to-easy manner. Varying setting of instruction. The setting

Monday, August 26, 2019

Project Management Essay Example | Topics and Well Written Essays - 4000 words - 1

Project Management - Essay Example Management Information System package is discussed at length putting into consideration the impacts that it brings with it. It was found to provide information that organization need in order to effectively manage their businesses. This package was found to be the best in managing a company’s data and information. An Integrated Accounting System was also discussed in detail comparing its significance to the company and the impacts that accompany it. Various challenges were found to face the company in absentia of the package which can be solved with the application of that software. This system was found to be able to manage different accounts which are essential to the operation of the company. The package worked with use of modules which include the following: the financial Management Module, Accounts Receivable Module, Account payable module, fixed assets module, the inventory control model, sales order module, and purchase order module. The report further recognizes the im portance of Michael Porter’s generic strategy to be used by the ABC Ltd in order to make appropriate strategic decisions and the rationale that accompany the same. The strategy relied on two major aspects in its operations which were competitive advantage and competitive scope. Various functions of customer care were also discussed in the report. Contents Abstract 2 1.0 Introduction 4 1.1 Purpose 4 1.2 Scope 4 1.3 Method 5 1.4 Limitation 5 1.5 Assumptions 5 1.6 Background 6 2.0 SWOT Analysis 6 Strengths 6 Weaknesses 7 Opportunities 8 2.1 Alternative solutions 8 2.2 Management Information System (MIS) 9 2.3 Integrated Accounting System 10 2.4 Cost of Installing an MIS in the company 12 2.5 Discussion 13 3.0 Conclusion 15 4.0 Recommendations 17 Project management Gantt chart 19 1.0 Introduction 1.1 Purpose The purpose of this report was to analyze and determine the suitable management system and an integrated accounting system to be used by the ABC Ltd. The report considered bo th the internal and external environment surrounding the company and identified the challenges posing a threat o the company and opportunities available to the company. Customer service was rather discovered to be the best solution in identifying and satisfying the customer needs. This is because the service was found to be more effective and efficient way of handling the customer needs in any business. 1.2 Scope While determining ways to link Management Information System to an Integrated Accounting System, there are various factors that are put into considerations. Identify ways to increase sales of the firm’s products, regular staff training, management strategies to be used by the company, improve the product line of the organization and to crown it all, conduct customer service to increase the effectiveness and efficiency of their service. The reports looks at was in firm’s strategic decision are reached and how effectively and efficiently an organization should b e managed. ABC Ltd had problem of facing their system which had not been up-dated since the date of its installation. The report puts across rationale of using an up-dated system and the returns that comes with it. Considering the findings obtained in the study and the discussion thereby, a conclusion and recommendation of appropriate measures was done. It was concluded that IT usage in the business was necessary in the organization’

Sunday, August 25, 2019

Revising Messages Assignment Example | Topics and Well Written Essays - 500 words

Revising Messages - Assignment Example We assure you that we’ll make sure that our airline personnel become more careful next time. Kindly mail us back with a detailed list of items you lost by completing the following questionnaire, to enable us process your compensation. We apologize for making you wait for a long time; we had a lot of resumes to go through. We are however pleased to inform you that you made it to the final 10 candidates who have been shortlisted for an interview. The interview has been scheduled for June 15 at 3:00 p.m. Kindly inform us before the end of the workweek if you will be able to attend as this is our busy season. We use over a ton of paper every year out of which, much of it goes to waste creating more environmental waste. It is because of this that, beginning on Monday, white plastic bins will be placed outside the elevator on every floor to recycle the paper and minimize pollution. d. In today’s meeting, we were privileged to welcome Paul Eccelson, who reviewed the shopping cart function on our website and offered some great advice. Feel free to call for any inquiries concerning the new forms. c. Kindly call our hotline at 1-800-555-8765 to schedule an appointment with one of our knowledgeable mortgage specialists in your area, as well as ask more questions about mortgage rates, closing procedures or any other aspect of the mortgage process. Remember, we’re here to make the home-buying experience as painless as

Saturday, August 24, 2019

Annotated bibliography Research Paper Example | Topics and Well Written Essays - 3750 words

Annotated bibliography - Research Paper Example This implies that TORAP can be used to put together suitable counteractive steps to avoid or regulate accidents. The authors added that â€Å"TORAP enables accident simulation and damage potential estimation of petroleum and petrochemical industries† (262). Thus, the most important feature of TORAP that can help reduce the risks of petrochemical companies is its ability to forecast possible accidents. Being able to determine the probability of accidents is a huge leap for risk analysis at petrochemical companies. The authors further promoted TORAP by declaring that it â€Å"incorporates a larger number of models to handle a larger variety of situations specific to petroleum refineries and petrochemical industries† (260). The complexity of the entire structure of the petrochemical industry will hence be captured and clearly explained by TORAP, reducing the difficulty of developing appropriate safety regulations and risk management strategies. The unique contribution of t his book to the present study is its thorough discussion of risk analysis through the application of computer-automated tools. The authors of Accident precursor analysis and management: reducing technological risk through diligence agree that predicting probable accidents is the best way to prevent or minimize the impacts of accidents in petrochemical companies. On the contrary, the author of Inherently Safer Technology: The Cure for Chemical Plants Which Are Dangerous by Design argues that predicting probable accidents is just one of the many steps to avoid them, and that the real solution rests in the adoption of safer technology. Alson, Gregory. How safe is safe enough?: leadership, safety, and risk management. London: Ashgate Publishing, Ltd., 2003. The author mainly argues that even though many people think that all accidents are preventable, accidents will still happen. The imperfect human attribute and the intricacies of industrial operations attest to the fact that attaining ‘zero’ accidents is not likely. Hence, the author argues that leaders should make every effort to develop the most beneficial and efficient safety measures. As stated by the author, â€Å"such unthinkable accidents can indeed happen, sounding a siren for safety to reduce loss of resources and enhance social responsibility† (19). The value of competent leaders in any organization, especially those which are prone to accidents, is largely manifested in the management of physical resources and human capital. Thus the author suggests, â€Å"an organization can incorporate system safety into a system’s life cycle, bringing with it management’s commitment toward safety† (20). This solution is sound for it has the capacity to create a permanent safe environment for petrochemical companies. This method can significantly lessen the risks associated with petrochemical operations. The author believes that â€Å"while many organizations worry about los t workdays due to unnecessary injuries, in some cases an accident can cause indescribable disaster and grief† (17). It is very crucial that petrochemical accidents are prevented because of the widespread and severe effects of these accidents on the local population, the

Friday, August 23, 2019

Understanding Human Behavior & Prejudice can be hurtful and Essay

Understanding Human Behavior & Prejudice can be hurtful and destructive - Essay Example Understanding Human Behavior & Prejudice can be hurtful and destructive The key reason behind the understanding of human behaviour is that all the individuals in an organization cannot be the same in terms of nature, behaviour, personality and attitude (Freeman, 1999, p.229). The modern theories of human behaviour are based upon the differences in each and every individual within an organization. Before the study proceeds to realize and understand the human behaviour, it is important to determine what the human behaviour actually means. Behaviour is specific responses that can be observed directly or indirectly (Griffin and Moorehead, 2011, p.19). Indirect observations can be executed through the attitudes and decision making process of the leaders. On the other hand, direct observation process can be executed through understanding the responses of the individuals in a particular work or organizational environment (Martin, 2005, p.104). This organizational human behaviour process is quite unpredictable and critical to understand. The human behaviour can be classified into three components: motivated behaviour, goal oriented behaviour and caused behaviour. Human behaviour is the factor that depends upon the inner emotion of the individuals, such as anger, motivation, joy and sorrow (Henderson, 1996, p.195). It is important for the leaders to understand the past organizational behaviour in order to make any kind of decision or implement a strategy in the organizational human resource management process (Hernandez and O’Connor, 2009, p.12). ... Each and every individual has a distinctive combination of several characteristics, as behaviour is the outcome of interaction between the environmental and individual characteristics (Dutt, 2008, p.5). Some of these characteristics develop over time or present from the time of birth. These characteristics are known as learned and inherited. Some characteristics (Clawson and Bevan, 2008, p.9) and behaviour types have been provided in the following table: Characteristics Behaviour Relationship Conflict Tolerance Perception about role conflict Huge tolerance for limited role conflict. Significance of Job satisfaction Leaders express intrinsic rewards versus extrinsic less job satisfaction. Work Ethic Attendance Strong value and work ethic related with high work attendance. Interest Diversification Compensation and Salary Measurement Higher interest of performance diversity. Locus of Control Job stress experience Huge stress with external and emphasized locus of control. In order to und erstand the human behaviour, the leaders or managers should understand the Psychoanalytical model. Psychoanalytical model is based upon the ego, id and super ego. Ego generally represents the conscious stage of an individual. On the other hand, id represents the inner pleasure of an individual (Denisi and Griffin, 2005, p.21). Id in an individual can be both constructive and destructive. Destructive tendency of individuals can be dominating, aggressive and fighting (Cardwell and Flanagan, 2003, p.144). Throughout the life of an individual, id generally comes in a conflict with ego. On the other hand, ego depends upon the super ego. In terms of super ego, an individual cannot be aware about the functions of super ego (Guindon, 2010, p.71). Super ego generally represents

Thursday, August 22, 2019

Hiring an Employee for Secretary Position Essay Example for Free

Hiring an Employee for Secretary Position Essay Hiring an employee for secretary positions It is always a better idea to implement the specific process to hire an employee. Hiring department has developed series of process to begin the search and hire three desired candidate for the empty secretary positions. This will include distribution of application forms, understanding policies of hiring and conduction of interviews. I am reporting on me and my department’s role. My main role is to ensure the process has been followed in correct manner to hire the right person for this position. Our first significant step is to understand policies and procedures. Our application form will be available in our company’s official website. We make sure that every applicant are treated equal, there is no discrimination for employment in terms of race, color, national, origin, sex, religion, age, veteran status, sexual orientation or disability. The applications are reviewed to find the candidate with desired qualification for this position i. e. graduate degree in management from the university and outgoing positive personality with true passion of work. They will be called for the first interview. We have created certain questionnaire to ensure we get required information from the candidate. After this, we will hold a meeting to select most desired ten candidates. Then they will be called for second interview. Out of ten we will choose three for the position. Our department were discussing about providing one week training on application of our latest company software. We saw that employees took time to get used to the software when we updated it. So, it will be beneficial that new employees will have knowledge about it and can start the job right away without any hindrances. We are glad to let you know our procedures to hire employees. We are waiting for your approval so that we can start this process as soon as possible.

Wednesday, August 21, 2019

The country wide changing demographics Essay Example for Free

The country wide changing demographics Essay Since the last decade the trend of ageing in the UK population is increasing, making it important for the researchers and policy makers to investigate and respond to the consequences and demands of the trends. National Statistics says that the UK population has grown by 7 per cent in the past 30 years, increasing from 55. 9 million people in 1971 to 59. 8 million in mid-2004. (Noorwood, 2005) But growth is not even across all age groups: the proportion of those under 16 has fallen from 25 to 19 per cent; the proportion of people aged 65 and up has risen from 13 to 16 per cent. And older people are older; of that aged 65-plus, the proportion living to 85 and over has risen from 7 per cent in 1971 to 12 per cent in 2004. (Noorwood, 2005) As stated by Warnes et al. (2002) the older population is likely to peak at around 16 million in 2040 nationally and then begin a slow decline. Objectives: The company’s broad objectives are: To increase customers by a policy of communication, public relations, and collaboration   To make use of the new technologies which will help the company to promote itself all over United Kingdom. To blend the new concepts of modernisation and design according to need   To ensure permanence through: i) Premises, implying continuity ii) Consistent, steady revenue, guaranteeing development and progress. In order to analyse the strategic situation first of all SWOT analysis have been under taken, which are presented as under: SWOT Analysis the Bob’s Bicycle STRENGTHS Average Collection: The collection of the products is more than average for a small level company. Presence awareness despite the lack of proper marketing – Marketing Department.   Enthusiastic staff   Good relations with media Web based presence WEAKNESSES   Over-reliance on state and local authority programs.   Absence of discount schemes.   Lack of marketing department marketing efforts No relevant researches regarding Company’s competitiveness   Lack of proper space and exposure.   Lack of facilities for people with special needs.   Absence of on line shop. OPPORTUNITIES. Major national trend of promotion and introduction of cultural activities related to conservation and heritage issues   More people moving into area Computer technology for promotion purposes   Renovation of existing shop. THREATS   Current economic climate.   Shop and leisure city centre expanding   Results to be achieved in future can be less than projected After performing the SWOT analysis the following objectives are found important to be considered urgently. In order to formulate the goals it is important to align them according to their importance. Marketing Research: The company should try its level best to get the primary and secondary data regarding its audiences demand and taste regarding their needs and leisure activities. Because before formulating a marketing plan the opinion of the customers is important to know. The products available at Bob’s Bicycle are unique and the company has the cutting edge of product differentiation over their competitors. But this advantage can only be used effectively through effective marketing campaign (Kotler, 2000). Appropriate Market Segments: The potential segments, which needed to be addressed, are.

The role of tourism in the development of Nigeria

The role of tourism in the development of Nigeria In discussing this, earlier work conducted on similar research will be made will be made reference to. This include: a research carried out by (Oji-Chukuwka, 2013) entitled Economic development of Nigeria-The Role of Tourism. This study was carried out using structured questionnaire and based on the notion that the federal government has heavily depended on agriculture and crude oil as the main stay of the Nigerian economy. As such, the researcher decided to carry out a research to unravel how well or otherwise the Ebonyi State Tourism Board has contributed to the Nigerian economy through the promotion of its tourism-related activities. The following were the objectives of the study: 1. If the Nigerian tourism sector has met the objectives with which it was set up? 2. If Government’s interference in the activities of the Ebonyi State Tourism board affects its performance in the long-run 3. If Tourism has created equal job openings for all classes of people. In another study, carried out in 2006, Noà «lleOConnor examined how television induced tourism has influenced Ballykissangel’s Residential Community in the long run. Ballykissangel is the title of a BBC television drama that was shot in Ireland. It aired from 1996 to 2001 and had six episodes. OConnor, simply wanted to find out if and how the decision to shoot the series in the rural Irish suburb has affected the tourist inflow into the community. The purpose of the study, according to her, was to examine the influence of television induced tourism on asmall rural basedcommunityinIrelandandhowitcanactuallyinfluencetourist development to adestination. Specifically, the researcher sought to find out the role of the television series’ in developing an area for tourism related activities. The case study chosen therefore for this research was Avoca, a small village in County Wicklow, Ireland that was the setting for the filming ofthe BBCtelevision series Ballykissangel. The major data for the work were collected fromasystematic sample of residents of Avoca and through personal interviews. 2.4. Empirical Literature During the course of consulting other research works that are in line with my research, the different methodologies used proffered different findings and conclusions. These would be highlighted here as part of the empirical literature. The first study, (Oji, Chukwuka, 2013,) discovered that the lukewarm and inadequate funding of the Ebonyi State tourism board was the one of the banes confronting the development of tourism in the state. Also, findings of his study revealed that the government were the major beneficiaries of the tax revenues derived from civil servants, visitors’ expenditure and tourism attraction. On the other hand, OConnor, discovered that alarge number of tourists were attracted toAvoca as due to the fact that the then popular seriesBallykissangel was being shot in the locality. Today , tourism hasbecome Avoca’s most vitalindustry since the closure of its cooper mines. The residents have also realised that not only has this increased their earnings, it has attracted the international attention to the once quiet suburb. It has also created job opportunities for the locals whilst instilling a sense of pride for the natives of the community. With regards to the tourism promotion, this study revealed that Television is currently the most potent of all media used in promoting tourism activities. In view of this, more consideration should be given to television as a medium of advertising. This may be because Television combines motion, sound, and special visual effects. The product can be demonstrated and described on TV. It also offers wide geographic coverage and flexibility as to when the message can be presented (Arens, 1996). 2.5 .Other relevant literature 2.5 .1 The Nature of the Nigerian Tourism Industry Nigeria currently boasts of an array of beautiful landmarks, amazing water-bodies which include the beaches, rainforests in the southern part of the country ,monuments, sites and sound, down to the hustle and bustle which is prevalent in the cosmopolitan cities like Lagos, Abuja and Port-Harcourt. All these have become particularly conducive and attractive for holidaying. Besides the tourist attractions, the culture, norms, artefacts, food, language, mode of dressing which all differ from one part of Nigeria to the other, have all contributed in making the country extremely unique in many ways. On many occasions, international tourists are in awe of the unique selling points of Nigeria despite the attendant issues like corruption and high poverty index. However according to (Uche, 2003) many of these attractions are largely still untapped notwithstanding the fact that they are largely exploited. They are savoured by visitors either rich and in search of adventure, new terrains and exploits. One cannot help but mention some of these attractive tourist sites which Nigeria boasts of. They include the Yankari Games Reserve, Olumo Rock, Mabilla Plateau, Zuma Rock, Gashaka Games Reserve and of course the coastal beaches which are unique and enchanting. Tourism is relatively at an infancy stage in Nigeria. This is more so because of the running neglect of the abundant resources naturally endowed on the country rather than the lack of them. Nigeria’s rich cultural diversity and tourist attractions are inexhaustible. Apart from Cultural sites and reserves which serve as potential tourist attractions, African countries like Nigeria have abundant cultural festivals that are very rich in mythology and diversity which can also be harnessed to generate revenue as well as serve as a means of creating some feeling of shared love and brotherhood among the various ethnic groups in Nigeria. These festivals include the fishing and New Yam festivals celebrated in almost all the nooks and corners of the country at various seasons of the year. The uniqueness of Nigeria’s tourism potentials have been confirmed and recognized by UNESCO, which has singled out the Sukur Kingdom in Adamawa State as a world heritage site. Other unique sites also recognized include the Three Sisters’ Rock, Kamala Mountains, Obudu Cattle Ranch, Lokoja Confluence, Osun Oshogbo Shrine, Gurara Waterfalls, Ikogosi Warm water springs, Oguta Lake, Kwa Waterfalls, Bwasu Hot water spring, Mboi pond, ancient natural and man-made caves and a host of other sites. Many years after the advent of television in Nigeria as well as the proliferation of private television stations across the country very little has been done to promote the tourism sector, which is a neglected goldmine, (Da Silva, 1999). However, despite the rich number of tourist sites and attractions in Nigeria, there have been a lot of impediments to the growth of the sector. These impediments are numerous and include acute conditions of advanced fee fraud popularly called 419, underdevelopment and poverty as well as the growing level of insecurity-fuelled by the activities of the insurgent group, Boko Haram, which many potential Nigerian bound tourist’ many not like to be confronted with. A survey on tourist activities in different geographical areas of Africa shows that Nigeria is one of the least favourite destinations which by extension earn less income. However, in spite of the enormous tourism potentials in Nigeria, the investigation shows that tourisms contribution to economic development in Nigeria leaves much to be desired, (Ovat, 2003). Sensing the impediments to the growth of the tourism sector and realising the important role that tourism can play in the economic and national development of Nigeria, led to the establishment of the National Tourism Policy. (Da, Silva, 1999) says the national tourism policy prescribes various ways of promoting the development of tourism in Nigeria through the following ways: Increase the flow of foreign exchange through the promotion of international tourism Encourage even development of tourism based enterprises. Accelerate rural/urban integration Foster socio-cultural unity among the various groups in the country through the promotion of domestic tourism Promotion and encouragement of active private sector participation Preservation of our cultural heritage and historical monuments Massive and aggressive publicity campaign to facilitate the growth and development of tourism Simplify the issuance of visas to intending visitors. Re-orientation for all security agencies including customs and immigrations,( Da, Silva,1999) While all these promises are okay, revenue from tourism sector has not been encouraging. A careful study of tourism statistics and data reveals that Nigeria in particular is one of the least favourite destination in the world, this by extension results in a colossal loss of revenue with untold hardship and effect on Nigeria’s gross domestic products , (Uche, 2003). On the other hand strongly believes that the Nigerian coastal waters and beaches are dirty and therefore unattractive to tourist. The negative publicity launched by the international media against Nigeria has also affected the tourist traffic in the country with (Nnadozie, 2007) identifying some of the problems affecting tourism development in Nigeria as follows -Government’s nonchalant approach to the tourism industry -The scourge of political instability which encourages wastage and poor resource management -Lack of foresight on the part of the elite who control virtually every sector of the economy. -Inadequate enlightenment and improper coverage of the tourism sector by the mass-media. Nigeria also has key rivals in the tourism industry namely Ghana, The Gambia, South Africa, Egypt, Kenya, Morocco and Mauritania. These countries have a better and more developed tourism industries in terms of infrastructure, maintenance, security and enlightenment. Another impediment to the growth of tourism in Nigeria is the general belief and habit of excessively copying anything western, despite our rich cultural heritage and tourism potentials. It therefore becomes imperative therefore to blame our artists and media practitioners for failing to portray our rich cultural and tourism potentials to the outside world. They often love to portray the culture of the foreigner to the foreigner, they want to speak and dress like them. They want to belong to their kind of caucus, yet they are nothing near them. The end result however is that they have made themselves copy-cats, rather than portraying have their own culture, ( Adekeye, 2007). However in the words of (Nasco, 1986), in this day and age when no country including ours, can’t afford to solely depend on the fluctuating oil market as the primary source of revenue, tourism, my dear friends is indeed an alternative for the mobilization of the much needed foreign exchange and local revenue. The Nigerian Tourism Development Commission, NTDC, traces the advent of tourism in Nigeria back to 1472 with the first Portuguese mercantile mission-trade tourism. However, the first attempt at structuring Tourism in Nigeria came about in 1962 when a group of Nigerians with interest in and commitment to the promotion of tourism set up a body then known as Nigerian Tourism Association (NTA). Prior to the creation of the Department of Tourism in the former Federal Ministry of Trade and Tourism in January 1990, very little or no attention was paid to the development of the sector. However, following the approval for the establishment of the department, a federal bureau was also created to champion the promotion and development of tourism in Nigeria. In the last few years, the Nigerian government has put in a lot of effort aimed at reviving and improving the tourism sector. In an attempt to explore other aspects of the Nigerian economy, economy with an emphasis on the tourism sector, the federal government took some concrete steps at ensuring the development of the culture, travel and tourism industries. They comprised of inauguration of the Presidential Council on Tourism, Federal Ministry ofTourism and its Departments and Agencies with same at the States’ level and Local Tourism Committees which falls in line with the provisions of the National Tourism Policy (NTP) of2005, the Nigerian Tourism Development Corporation (NTDC) of 1992 and the Nigeria Tourism Development Master Plan of 2006. Back in January 2003, President Olusegun Obasanjo, approved the sum of $548 million as grant to the transport, culture and tourism ministries for tourism master plan projects Udeorah, (2004). Primarily, this amount was earmarked to develop transportation, infrastructure, tourist sites, mobilization and public enlightenment towards accelerated tourism development. It is however evident that there is need for the mass media albeit television, to complement government’s effort at tourism development and promotion. Nigeria, with its population and array of tourist attractions and sites is yet to tap into this goldmine as a result of the dearth of tourism programmes on TV stations. Today, the apathy towards tourism, confronts broadcast stations in the country despite the abundance of tourism contents which can be explored to any capacity. The urgency to nurture, promote and sustain the Nigerian tourism sector cannot be over emphasized and can therefore not be overlooked, (Udeorah, 2004) The Nigerian tourism sector is still at an infantile stage amidst the abundant natural human and natural resources. Also, the infrastructures currently in place at the tourist sites and locations in Nigeria are nothing to write home about and consequently not make Nigeria the envy of other nations in this regard. When compared to countries like The Gambia, South-Africa, France and Spain who already have advanced tourism industries, Nigeria does have a long way to go (Dantata, 2011). Speaking at the Nigerian Tourism Investors forum and exhibition in Abuja in May 2014, DirectorGeneral of the Nigerian Tourism Development Board, Sally Mbanefo, noted that tourism is Indeed a tool for national economic development. She said there are several international initiatives that have highlighted the potential of tourism to contribute to economic growth and poverty reduction, as well as to environmental protection, cultural preservation, and job creation .