Tuesday, December 31, 2019

Same-Sex Marriage Essay - 1633 Words

For over four hundred years, African Americans have faced discrimination in the United States, and it took them more than ten years to find some sort of equality. Women have also faced discrimination for hundreds of years and it took them over fifty years to earn minimal rights. While the issue of homosexuality is relatively new to our country, the fight for rights started almost immediately, and people today are still struggling to earn civil liberties, like same-sex marriage. If some change isn’t made now, their struggle for rights could last even longer than other minorities have endured. Since there is no national ruling made to abolish same-sex marriage, each state sets its own laws regarding gay marriage. Currently in the US, five†¦show more content†¦For one person to have further rights and opportunities than another, based solely on who they are married to, is unconstitutional and immoral. Legal rights that gay couples are being denied, since they cannot be f ormally married, include joint parenting and adoption, joint insurance policies and leases, the ability to be stated as next-of-kin, divorce protections, employment benefits, and policies involving inheritances, among many others (Robinson). So now, not only are laws prohibiting same-sex marriage denying a gay couple from officially expressing their love, they are also making it harder to adopt a child or to receive medical benefits. US Senator Chris Dodd feels that marriage should be about rights and responsibilities, and mostly love, and believes for these reasons, every American should have an equal opportunity to marry (Dodd). Our country stands as a nation that protects minorities and offers equal benefits, but something as simple as a piece of paper that declares a marriage between a couple is not being allowed to gay couples, one of our nation’s highly significant and quickly growing minorities. Gay individuals have earned individual rights, like the â€Å"Don’ t Ask, Don’t Tell† policy that allows them to serve with an undisclosed sexuality in the military. And in 2003, a Supreme Court ruling in Lawrence v. Texas established a right to privacy for homosexuals (Freedman). Not only are same-sex marriage laws preventing certainShow MoreRelatedSame Sex Marriage And Marriage948 Words   |  4 PagesSame-sex marriage and same-sex parenting are comparatively new controversial topics in today’s world and its â€Å"mainstream† morality. I was not exposed to any homosexual â€Å"lifestyle† while growing up. I know that I am strongly traditional in my theological views, nevertheless, I vigorously believe that traditional marriage and parenting are devotional commitments between a man and a woman. Therefore, same-sex marriage and parenting are to me, issues of a society with strong traditional cultural identitiesRead MoreSame Sex Marriage754 Words   |  4 Pages 11/8/06 Argument Essay Same-Sex Marriage: Not a Match for Society Marriage, as defined by Merriam-Webster, is â€Å"the legal relationship into which a man and a woman enter with purpose of making a home and raising a family† (358).Although most people in the United States, including myself, agree on that definition, there are a select few who do not. Some feel same-sex marriage should be legalized; I disagree! I disagree because of its effects on children, its unnaturalness, and its religious immoralityRead MoreSame Sex Marriage1418 Words   |  6 PagesGay Couples Should Have the Same Rights As Married Couples Professor PHI 210 June 6, 2013 Same-sex marriage is a topic that has become increasingly more debatable throughout time. America has been said to be the â€Å"land of the free,† but when it comes to homosexual couples, it is far from that. If same-sex marriage was legalized, many positive outcomes could emerge from it; the society would be closer to equality, adoption would increase, gained social support for families would developRead Moreno to same-sex marriage!894 Words   |  4 Pageseverything builds up. I Corinthians 10:23 Against Same Sex Marriage - The Six Point Case Each of these six points against same sex marriage will be explained in detail in the following articles. Click on each link for more explanation. Natural marriage is the foundation of a civilized society. Homosexual behavior is inherently destructive. The law is a great teacher, and it encourages or discourages behavior. Government-backed same-sex marriage would encourage and normalize homosexual behaviorRead MoreSame-Sex Marriage 962 Words   |  4 Pagescaucasian because of laws passing interracial marriages around the 20th century due to Loving V. Virginia (Melina Patria). By the 1960s, the women’s rights movement was in full motion switching male and female roles drastically(Human right’s watch). The home may have no longer been spacious and big with the stock market crash of 1929(First Member Century). Its 2013 and there may be another possible alteration; same sex marriage. Even though same sex marriage may be a sensitive issue with people, as aRead MoreSame Sex Marriage1152 Words   |  5 PagesBiological Sex-Marriage: â€Å"An Alteration to Humanity† Submitted by: Ellicia Jiona Candelaria Submitted to: Mrs. Joan Bataclan ABSTRACT Biological Sex-Marriage: â€Å"An Alteration to Humanity† This study describes the advantages and also the disadvantages of couples of the same sex being married. It aims to explore how it affects the society and most importantly the church. Same-sex marriage, popularly known as gay marriage, is a socially or legally reorganized wedlock between two persons of similarRead MoreSame Sex Marriage884 Words   |  4 PagesSame Sex Marriage Is the definition of marriage being threatened in the United States? President Bill Clinton signed the federal Defense of Marriage Act into law on September 21, 1996. This Act defined marriage at the federal level as between a man and a woman. The federal DOMA statute ensured that no state would be forced to recognize gay marriages performed in other states and prevented same-sex couples from receiving federal protections and benefits given to married heterosexual couples. OnRead MoreSame Sex Marriage990 Words   |  4 PagesSupporters of gay marriage argue around the concept of equality in America. Our country is said to be found on the principle that all men are created equal, so that make it hypocritical to deny the rights of homosexuals, as it was hypocritical to deny freedom to African Americans or to prohibit women s suffrage. Supporters also believe that Gays should be allows the same benefits as regular married couples. For instance, only through marriage do same sex couple s have the rights to their partnerRead MoreSame Sex Marriage1120 Words   |  5 PagesSame sex marriage has been a topic on the rise throughout the U.S. It is what some of us may consider one of the more important topics of discussion for this time period. So far 17 states out of 50 have declared same sex marriage legal (States, 2013). Same sex marriage should be legal throughout the U.S. because same sex couples have a civil right to get married, along with a right to have access to the same benefits as heterosexual couples, and to be treated as equals without fear of discriminationRead MoreSame-sex Marriage604 Words   |  2 Pages in the media, same sex marriage has been widely discussed and debated. Some feel it should be legalized, while others believe that it is a sin and should remain illegal. Their are many pros and cons on both sides of this argument, however there are main points leading to why gay marriage should be legal. Legalizing gay marriage will not harm heterosexual marriages or family values, and society will continue to function normally. This is a true statement, because when two people get

Monday, December 23, 2019

The Effectiveness Of Animal Protection Laws Essay

The Effectiveness of Animal Protection Laws in the United States Almost eight million dogs and cats are surrendered to local shelters each year. Of those nearly three million are euthanized in the U.S. according to the ASPCA. There are only three federal laws in the nation regarding animals, The Animal Welfare Act (AWA), Humane Methods of Slaughter Act, and the Twenty-Eight Hour Act of 1877. The AWA specifies regulation for domesticated pets, while the other two are for livestock and humane killings, but these don’t even include chickens! States are responsible for any other animal laws, while in the European Union (EU), fifteen countries implement and provide legislation on proper animal care across the board. Why is it that the United States hasn’t passed any federal legislation since 1966? Are states laws really enough? Federal domestic animal law should be more stringent. Many owners regard their pets as children. There are an unsurmountable amount of laws regarding the treatment and wellbeing of a child. However, because these animals are seen as personal property, the same type of effort has not been placed forth for the â€Å"fur babies†. Laws are instituted for the protection of humanity; however, this planet is shared with many other species who deserve even the simplest of protections. Legislation focuses heavily on the proper care and treatment of pigs, sheep, and cows; but, not man’s best friend? Legislation for the humane treatment of pets only exists at the stateShow MoreRelatedPros And Cons Of Animal Testing1288 Words   |  6 Pagesâ€Å"Each animal bred or used for research, whether a mouse, fish, or monkey, is an individual capable of experiencing pain, suffering, and distress† (â€Å"Animal† 2013). The advancements in technology today had sparked a debate worldwide on whether it is right or wrong to use animals for experimentation in laboratories. With newly advanced scientific technology, experts are able to utilize advanced technology to simulate functions of the human body on a much smaller scale, including microchips of humanRead MoreAnimal Testing And Its Effects On Human Health1146 Words   |  5 PagesMillions of animals suffer and die unnecessarily each year as they become subjects for medical testing and other horrendous experiments. Although some people believe such activities are necessary to progress in medical research, in reality it does very little to improve human health and development. For decades, drug and chemical safety assessments have been based on laboratory experimentations involving rabbits, dogs, rodents, and other animals. Consequently, nine out of ten drugs proven safeRead MoreAnimal Testing Should Be Banned From Our Society874 Words   |  4 PagesAnimal Rights Demand Protection My thesis is that animal testing should be banned from our society altogether. Animal rights advocates argue that testing is a subject that has been argued countless amount of times in medical journals, and it has shown that it is a waste of animal lives. Subsequently, processing of a single drug requires more than 50 trials and use of as many as 12,000 animals. Moreover, regardless of the ethical issues that derive from animal testing, the infliction of physical/psychologicalRead MoreAnimal Testing Should Be Banned1509 Words   |  7 PagesAnimal testing is intended to express the use of animals in scientific research. Every year more than 115 million animals around the world have been used in laboratory experiments (Human Society International,2012). They include animals that are generally used in medical research such as cats, dogs, guinea pigs, mice, rats and monkeys. This experience has a major role in the progress of medicine. For example, it has been used in the development of drugs and surgical procedures and artificialRead MoreDepartment Of Homeland Securitys Emergency Operation Plan1176 Words   |  5 PagesOrganized for Potential Emergencies† in 1972 (FIRESCOPE, n.d., p. 1). This program was essentially a mutual aid agreement that represents all facets of local, rural, and metropolitan fire departments, the California Department of Forestry, and the fire protection, and federal fire agencies (FIRESCOPE, n.d.). Incident Command System is a standardized on-scene incident management concept designed specifically to allow responders to provide a span of control through an integrated organizational structure equalRead MoreCopyright Laws Of The United States1600 Words   |  7 PagesA copyright is a form of protection provided by the laws of the United States to authors of original works of authorship. â€Å"Copyright law in the United States is based on the Copyright Act of 1976, a federal statute that went into effect on January 1, 1978,† according to FindLaw. FindLaw also states that, â€Å"Individual states cannot enact their own laws to protect the same rights provided by the Copyright Act. Original multimedia works are protected by Copyright.† Literary, dramatic, musical, artisticRead MoreEvent Medical Staff Training Summary1073 Words   |  5 PagesHealth Insurance Portability and Accountability Act (HIPAA). HIPAA, which works to reduce costs while protecting patients and providing better medical care, is a major piece of health care regulation and was instituted to improve the efficiency and effectiveness of the health care system. The Centers for Disease Control and Prevention (CDC) in Atlanta examines public health and warns of possible health threats from infectious diseases. The CDC monitors birth defects, disabilities, diseases and conditionsRead MoreAnimal Testing Should Be Banned1656 Words   |  7 Pagestext] 1 Prejean The use of animals in research is a widely controversial topic in today?s scientific community and raises an important ethical issue. Do animals make appropriate research subjects and is it absolutely necessary to use animals to test the safety of products? Animal testing can be referred to in a number of ways including animal research and animal experimentation, all of which involve experiments performed on animals to test the safety and effectiveness of things ranging anywhereRead MoreAnimal Testing And Its Effects On Society1393 Words   |  6 Pagesdistinguished for being time consuming, costly and complex. However, this timely manner is beneficial for society as it meant to provide an efficient and safe medication. Concerns regarding when animal studies are necessary compared to clinical trials has been a debatable topic among society. For over a decade, animal research has served as a fundamental component in many medical findings. Mousses are commonly used in laboratories, as we as humans share nearly 95% of our genes, making them a useful andRead MoreAnimal Cruelty And Animal Abuse1572 Words   |  7 PagesIII. LITERATURE REVIEW 5 China, US and the EU 5 A. Research Connections to Animal Cruelty and Abuse 6 B. Alternatives to Animal Testing 6 IV. SUMMARY AND CONCLUSION 7 V. REFERENCES 8 â€Æ' I. INTRODUCTION The abuse and cruelty by humans towards animals have been on the rise as producers and retailers of cosmetics and drugs rush to position their products in the global markets. Scientific tests remain a leading player in animal abuse, especially due to the controlled environment while being experimented

Sunday, December 15, 2019

B-Tec Sport Risk Factors Free Essays

Figure 1: Head injuries (e.g. concussion, unconsciousness), spinal injuries, simple and compound fractures, joint injuries (e. We will write a custom essay sample on B-Tec Sport Risk Factors or any similar topic only for you Order Now g. dislocations, tennis and golf elbow, torn cartilage, twisted ankle), soft tissue, cuts, grazes and blisters, dehydration and hypothermia. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Lack of warm-up Football Pulled muscles e.g. pulled hamstring, pulled quadriceps etc†¦ The short term affect of a lack of warm up is that it you could pull your muscles. The time that you are out of action for will depend on the extent of the injury. The normal period of time that you will be out for with pulled muscles is 2-3 weeks. The long term affects of a lack of warm up is that it could take longer for you to recover from any injuries that you might have. A constant lack of warm up will result in you being out of action for a longer period when you are injured in the future. Lack of cool down Football Cramp The short term affect of a lack of cool down is that it can cause a build up of lactic acid which will lead to cramp. To prevent this, all you need to do is do a short cool down at the end of each physical activity e.g. light jog around the playing area. The long term affects of a lack of cool down is that you will be required to warm up more than usual to loosen up any tight muscles before participating in any future physical activities. Constant lack of cool down may cause you to get cramp persistently. Poor physical fitness/physique Football Pulled muscles e.g. calf strain, pulled quadriceps The short term affect of poor physical fitness and a poor physique is that it will cause pulled muscles. To prevent this, all that is required is for you to stay in shape by doing regular exercise. The exercise does not have to be done at a high intensity level as long as you exercise regularly. The long term affects of poor physical fitness and a poor physique is that it will take you longer to recover from injuries. For example if you get a hamstring injury, it will normally take you two weeks to recover from it. However, if you have poor physical fitness and a poor physique, it might take you 3-4 weeks. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Inadequate diet Boxing Back strain, dehydration, unconsciousness. The short term affect of having an inadequate diet is that can cause injury. Carrying extra weight can cause you to get a back strain. It can also cause you to perform poorly. Sports stars especially boxers need to have a good diet consisting of carbohydrates, calcium, fats (not too much), fibre, minerals, proteins and vitamins. The long term affects of having an inadequate diet is that it can limit the amount of time that you are involved in sport at the highest level. If you eat too much fatty foods it will lead to weight gain, which will then be harder to get rid of as you get older. Over dehydrating can also cause you to fall unconscious. This can be a big risk to your general health. Misuse of alcohol drugs Boxing Unconsciousness, drowsiness, dehydration etc†¦ The short term affect of misuse of alcohol and drugs is that it can cause drowsiness and dehydration. Too much alcohol and drugs could even lead to you fainting. There are not many negative short term affects of taking performance enhancing drugs. However, there are negative long term affects. For misuse of alcohol and drugs. The long term affects of misuse of alcohol and drugs are that it can cause permanent damage to organs in the body which can affect performance in sport. Too much alcohol can cause damage to the liver which can make it difficult for the athlete to perform. Misuse and overuse of alcohol and drugs can also result in decrease in stamina. Stamina is one of the most important aspects of a boxer. Drinking alcohol and taking drugs excessively can also slow down your reactions. Environment Football Cuts, grazes and dislocations. The short term affect of an environment with dangerous surroundings is that you could injure yourself e.g. if a player slid into the advertisement boards he could get cut etc†¦ The long term affect of an environment with dangerous surroundings such as advertisement boards is that you can dislocate a part of your body which can result you being out of action for a while. Poor technique Rugby Dislocations, broken arm, broken leg, bruising etc†¦ The short term affect of poor technique can be a minor injury such as bruising. This might keep you out of action for about a week depending on the extent of the bruising. If a rugby player has not been taught the correct way to tackle, he could injure himself as well as the opposing player. The long term affects of poor technique are that it can cause a serious injury. These injuries can include a dislocated shoulder, broken arm, broken leg etc†¦ These injuries can keep you out for quite a long time. Another long term affect is that until you don’t work on your technique, you will continue to cause injury and you will also be a technically poor athlete. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Lack of skill Basketball Twisted ankle, ligament damage. The short term affect of a lack of skill is that you can get an injury such as a twisted ankle. If a basketball player tries to a slam dunk but he lands awkwardly he might twist his ankle. The long term affects of a lack of skill is that you can get ligament damage. This is the type of injury that can affect your future performances even when you have fully recovered. Inappropriate clothing Rugby Torn ligaments, broken leg. The short affect of inappropriate clothing is that it can affect your performance. For example if you make good runs but you have a loose t-shirt, an opposing player is likely to take advantage by constantly pulling you t-shirt which will prevent you from playing your best. The long term affects of inappropriate clothing is that it can cause serious injury. If you have a loose t-shirt on and an opposing player pulls your t-shirt and you fall down in an awkward position you could get seriously injured. You could get torn ligaments there is even a possibility of you breaking you leg. This will keep you out for a long time. Overtraining Football Pulled hamstring, pulled quadriceps, cramp, muscle fatigue. The short term affect of overtraining if muscle fatigue and cramp. Overtraining is bad for the body. You should only train according to how much your body can endure. This will prevent muscle fatigue and cramp. The long term affect of overtraining is also muscle fatigue. If continue to persistently over train, your body will finally give in and you will have to take a long break from any physical activity. Constantly overtraining can also cause you to pull you muscles such as pulled quadriceps. Weather conditions Football Twisted ankle, ligament damage. The short term affect of poor weather conditions is that it can have a negative affect on your performance. If the football pitch is waterlogged, it will be difficult to play well. The long term affect of poor weather conditions is that you can get injured. The weather might be so poor that it might affect the pitch in a bad way which can cause the players to get injuries such as twisted ankles and ligament damage. Playing surface Football Twisted ankle, ligament damage. The short term affect of a poor playing surface is that can affect your performance in the game. If the pitch has lumps and big patches of mud, players will find it difficult to perform well. The long term affect of a poor playing surface is that it can cause injury. Your foot might get caught in the ground which can result in a twisted ankle or ankle ligament damage. Risk Factor Sporting Situation Most likely injury to occur Impact of injury on successful sports performance Short term Effects Long term Effects Lifting and carrying procedures for specialist equipment Rugby Back strain, twisted ankle. The short term affect of not using the correct procedure when lifting something is injuring yourself as well as the player you are lifting. The correct way of lifting something or someone is to bend your knees and back. The long term affect of not using the correct procedure when lifting something or someone is permanent damage. If you lift something or someone in an incorrect way you could do some permanent damage to your back. This will limit what you can do in future physical activities. Inappropriate or lack of specialist sporting equipment Rugby Bruising, cuts, concussion. The short term affect of having a lack of specialist sporting equipment is that it can cause injury. For example If a rugby player is not wearing a mouth-guard, he could get his teeth knocked out. The long term affect of having a lack of specialist sporting equipment is that can affect your performance and it can cause you to get injured more often. Misuse of protective equipment Boxing Groin injury, concussion etc†¦ The short term affect of misuse of protective equipment is that you will be more prone to injuries. For example if a boxer needs to wear a foul protector but he doesn’t he will get injured if he gets punched in the groin. The long term affect of misuse of protective equipment is that you will get injured very easily. If you don’t use a mouth guard when boxing, you could get damage to the mouth. Faulty and damaged equipment Football Twisted ankle, bruising to the shin, shin splits etc†¦ The short term affect of using faulty and damaged equipment is that it might cause injury. If you don’t wear shin pads, you will come out with bruising to the shin in the least possible scenario. The long term affect of using faulty and damaged equipment is that you can get seriously injured. If a player tackles you with a lot of force on your shins, you can split your shins. This is a very painful injury and will keep you out of action for a while. Behaviour of other participants endangering others Football Bruising, cuts, grazes, concussion etc †¦ The short term affect of this is that you will pick up an injury that will probably keep you out of physical action for about a couple of weeks. The long term affect of this is that you might get permanent scaring or cuts if players start going out of order e.g. fighting. How to cite B-Tec Sport Risk Factors, Papers

Saturday, December 7, 2019

Network Design Effective Role and Helps Organization

Question: Starting from the logical design of the network that you completed in Assessment item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received in Assessment Item 1. In order to undertake your physical design, you may need to make further justifiable assumptions. You also have to complete your final network design report. In this process, you are expected to participate in the weekly discussions and find the answers to the recommended discussion questions. Discussion questions have been selected and created not only to gradually increase your knowledge and skills in this course but also to help produce the final network design report. The students who do not attempt weekly discussion questions would very likely produce a report that would not satisfy the requirements and/or that cannot be justified. Answer: 2.0 Introduction 2.1 introduction In technology era, computer network plays an effective role and helps organization to communicate form source to destination end in effective and successful manner. A computer network is group of computer devices such as hardware devices that is connected with the help of communication channel to offers resource sharing and communication among wide range of organizations as well as clients (Shinde, 2009). Thus as per the case study it has been seen that the organization that is based upon the Australia specializes in designing and creating an effective network local as well as global. This organization presently won the contract to design an effective as well as secure computer network of new Philippines based hotels. The hotel has five floors and each floor contains 80 rooms. The organization has to develop network in such a manner that each staffs of hotels communicate effectively with each others. Furthermore as per the given case study, it has been gained that the organization ne eds to create network for one big island and three small surroundings islands. As per the study, it has been seen that the main islands have LTE (long-term evolution) and connected with other island using optical fiber that contains 200Mbps speeds. 2.2Project Goal The aims and goal of the present project is to design an effective as well as most secure network of hotels that is situated in Philippines. Furthermore, the objective of present project is to evaluate the design with the help of testing procedure and analyze the effectiveness of proposed network. As per the given scenario, it has been obtained that company has hotel and that hotel have 5 floors and each floor have 80 rooms we need to design network for 5 floors and also need satellite tower for wireless devices. In addition to this, in present research researcher build such type of computer network that helps the organization i.e. hotels to communicate with one staffs members to others though wireless communication process. 2.3 Business Goals The main goals of the organization or business to build a secure network that helps the organization to communicate with source to destination ends in effective as well as successful manner. In addition to this, the organization wants to communicate with their staffs members, tourists as well as torus guides should have phone communication and internet access from anywhere on these island. Furthermore, it has been seen that an area where hotel is situated known for shark attacks and the surfers should be make available with wireless communication devices that helps them to communicate with the lifeguards easier manner. The goal of this business is connectivity between hotel all 5 floors and big island with three small island. The terrains of all four island need to Access Island currently uninhabited. The network design contacted of your company includes the designs of the network for the hotel on the big island and the internet and phone service on all four islands the tourists and hotel staff and tour guides should have internet access and phone communication from anywhere in the island to the rest of the world. 2.4 Design requirement In order to design an effective as well as secure network firstly designer needs to implements and plans needs to software as well as hardware requirements. In order to build an effective network organization needs to routers, computers, switches and others devices that helps them in communication process. In addition to this, it has been observed that the company wants to secure their clients as well as their own data and information; thereby to gain this company needs to implements firewall techniques. Furthermore, the company requires to server that helps the organization to communicate with each others in effective manner. Moreover, organization needs to purchase internet protocol address that helps them to communicate with one device to others in easier manner. 2.4.1Business Goals If you keep in mind the changes in business strategies and enterprise networking discussed in the previous sections, it becomes possible to list some typical network design business goals: Increase revenue and profit Increase market share Expand into new markets Increase competitive advantages over companies in the same market Reduce costs Increase employee productivity Shorten product-development cycles Use just-in-time manufacturing Plan around component shortages Offer new customer services Offer better customer support Open the network to key constituents (prospects, investors, customers, business partners, suppliers, and employees) Build relationships and information accessibility to a new level, as a basis for the network organizational model Avoid business disruption caused by network security problems Avoid business disruption caused by natural and unnatural disasters Modernize outdated technologies Reduce telecommunications and network costs, including overhead associated with separate networks for voice, data, and video Proper execution of network management system can be cooperative to gain weighty profits from business perspectives. Some of those assumed benefits are as follows A network management system can have profound company-wide benefits. After all, your network consists of more than just computers. You also must consider your phone system, fax machine, printers and plotters, payroll system, and even your invoicing system. And if your business operates in more than one location, youll be dealing with several computers and peripherals at each location. With a network management system solution, every piece of equipment communicates with your computer system. More importantly, you can control your entire business operation from a central computer. Not only is a network management solution cost effective it can also dramatically improve efficiency and productivity. Here are three ways in which your business will benefit from a quality network management system: 2.4.2 List of network assumption Save Money Instead of several IT managers monitoring each network at every location, youll only need one sys admin at a single location to control and monitor your entire network. As a result, you can spend your hiring dollars where you need it on research development, customer support, advertising, new equipment, and additional inventory. Save Time A network management system will allow you to give each of your IT provider's direct access to any information they need to do their jobs efficiently. Say goodbye to walking reports around the office from one data entry location to another. Also, you wont have to worry about any more missed emails or interoffice memos. Each of your team members can enter and retrieve data right from their own workstation, and access can be controlled by your network manager. Increase Productivity With a quality network management system, you can monitor all aspects of your office network including hardware, software, and peripherals. All of these components need to be able to communicate with each other. Should one go down, the whole system could be impacted? The minute theres an issue, your network management system detects it so that theres no data loss or productivity slowdown. 2.5 Networking Requirements Application availabilityNetworks carry application information between computers. If the applications are not available to network users, the network is not doing its job. Reliability and security:- The primary purpose of the company to secure network in effective manner thereby to gain this in effective manner the users needs to implements an effective data protection security devices i.e. firewalls that helps the company to secure their network in effective manner (Chao Liu, 2007). On the other hand, reliable is most effective that helps the company to achieve consistence better quality of network related services. 2.6 The Design Problem: Optimizing Availability and Cost In general, the network design problem consists of the following three general elements: Environmental givensEnvironmental givens include the location of hosts, servers, terminals, and other end nodes; the projected traffic for the environment; and the projected costs for delivering different service levels. Performance constraintsPerformance constraints consist of network reliability, traffic throughput, and host/client computer speeds (for example, network interface cards and hard drive access speeds). Networking variablesNetworking variables include the network topology, line capacities, and packet-flow assignments. The goal is to minimize cost based on these elements while delivering service that does not compromise established availability requirements. You face two primary concerns: availability and cost. These issues are essentially at odds. Any increase in availability must generally be reflected as an increase in cost. As a result, you must weigh the relative importance of resource availability and overall cost carefully 2.7 Networks Must Make Business Sense The primary purpose of the company to build an effective network design that helps the company to communicate with the staffs as well as tourism in most effective manner. In addition to this as per the case study it has been seen That the areas where hotels situated known for Shark attacks thus with the help of implements an effective network or wireless communication devices the staffs member communicate effectively if any problem happened in those areas. With the economic downturn that followed the Internet boom, there is an increased need to choose technologies that solve business problems. Although many companies made "technology for technology's sake" choices during the boom, this is no longer the case. Business leaders are more involved in Information Technology (IT) decisions than they once were, and IT managers rely on business managers to help them prioritize and fund IT projects. Network upgrades are made not because some new technology sounds interesting to the engineers, but because it will help an enterprise increase profits, productivity, market share, and cash flow. Network designers must choose solutions that solve a business manager's problem. Network applications have become mission critical. Despite this trend, large budgets for networking and telecommunications operations have been reduced at some companies. Many companies have gone through difficult reengineering projects to reduce operational costs, and are still looking for ways to manage networks with fewer people and reduce the recurring costs of WAN circuits. As the head count at many corporations remains flat or shrinks, there's a renewed focus on using network applications to increase individual productivity in all departments, not just within the networking and IT departments. One result has been the emergence of web-based productivity tools. Most enterprises streamline their business processes, applications, and protocols, and standardize on Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP and web-based applications for selling products and supporting customers have risen in popularity, as have web-based applications for supporting employees and suppliers. Streamlining processes and protocols has also led to an increased use of IP telephony and to the continued convergence of voice and data networks. To save money and to reduce the need for specialized data or voice engineers, companies continue to adopt IP telephony technologies. Until recently, telecommunications and voice networks were separate. Telecommunications engineers knew little about data networks, and networking engineers didn't know the difference between a TDM and a Tandem Switching System (TSS). In today's environment, voice, data, and video networks are merging. In traditional voice and data terminal/mainframe networks, data flow and throughput were predictable. Closed communications systems were the norm, and data sources were well known. In today's networks, Internet surfing is ubiquitous. It is hard to predict data flow and the timing of bursts of data when users are jumping from one website to another, possibly downloading videos or animation files. In addition to web surfing, the move to a network organizational model where the network is used by both inside and outside users affects network data flow. Network design practices must keep pace with these changes in business practices. 2.8 The Need to Support Mobile users Notebook computers have finally become small enough to carry around, and workers now expect to get work done at home, on the train, in hotels, in meeting rooms, at customer sites, and even while having their morning latte at the local coffee shop. These days almost every notebook computer ships with wireless networking built in to facilitate users getting work done outside the office. It shouldn't matter (to the user anyway) where data is and in what format. Network users expect network performance to be uniform, regardless of where the user or data resides. A user should be able to read e-mail on a cell phone, for example, and read voice mail from a web browser while sipping coffee in an Internet cafe. Users should have secure and reliable access to tools and data wherever they are. The challenge for network designers is to build networks that allow data to travel in and out of the enterprise network from various wired and wireless portals without picking up any viruses and without being read by parties for whom it was not intended. One of the biggest trends in network design is virtual private networking, where private networks make use of public service networks to get to remote locations or possibly other organizations. Customers getting involved in VPN projects have concerns about security, reliable and predictable performance, and data throughput requirements. VPNs are covered in Chapter 5, "Designing a Network Topology." Network architectures are taking on a virtual and ubiquitous form for users, while remaining highly structured and managed from the network engineers' point of view. The designer is challenged to develop secure, resilient, and manageable solutions that allow users to work efficiently, wherever they are physically located. 2.9 The Importance of Network Security and Resiliency Network security has filtered to the top of the list of business goals at many companies. Although security was always important, it has become even more important as networks become indispensable and as tools for breaking into networks become ubiquitous. Enterprises must protect their networks from both the unsophisticated "script kiddies" and from more advanced attacks launched by criminals or political enemies. There is also a continued requirement to protect networks from Trojan horses and viruses. Many enterprise managers now report that the network must be available 99.999 percent of the time. Although this goal may not be achievable without expensive redundancy in staff and equipment, it may be a reasonable goal for companies that would experience a severe loss of revenue or credibility if the network were down for even very short periods. This goal is linked to goals for security, as the network cannot be available if security breaches and viruses are disabling network device s and applications (Chao Liu, 2007). When security and operational problems occur, networks must recover quickly. Networks must be resilient. More than ever, IT and business managers require high-availability and resiliency features for their network equipment and protocols, as they realize the extent to which network downtime can jeopardize business success. Thus the primary objective of the organization is to secure network in effective and efficient manner. 2.10 Network Design Project One of the first steps in starting a network design project is to determine its scope. Some of the most common network design projects these days are small in scopefor example, projects to allow a few people in a sales office to access the enterprise network via a VPN. On the other hand, some design projects are large in scope. Ask your customer to help you understand if the design is for a single network segment, a set of LANs, a set of WAN or remote-access networks, or the entire enterprise network. Also ask your customer if the design is for a new network or a modification to an existing one. Explain to your customer any concerns you have about the scope of the project, including technical and business concerns. Subsequent sections in this chapter discuss politics and scheduling, which are tightly linked to the scope of a network design project. (Many network designers have learned the hard way what happens when you don't help your customers match the schedules of their projects to the scope.) Make sure your customers tell you everything they can about the network and the design project. You may want to poke around outside the stated scope of the project; just to make sure nothing essential has been omitted. Double-check that you have gathered all the requirements and that you have accurate information about sites, links, and devices. If the project addresses network security, make sure you know about all external links, including dial-in access. When analysing the scope of a network design, you can refer to the seven layers of the OSI reference model to specify the types of functionality the new network design must address. For example, you might decide that the design project is concerned only with network layer concerns such as routing and IP addressing. Or you might decide that the design also concerns the application layer because the focus is on voice applications, such as Interactive Voice Response (IVR), which directs customers to the correct location in a call centre, or unified messaging, where e-mail can be retrieved via voice mail and text messages can be converted into speech. Figure 1-3 shows the OSI reference model. Open Systems Interconnection (OSI) Reference Model In addition to using the OSI reference model, this book also uses the following terms to define the scope of a network and the scope of a network design project: Segment:- A single network based on a particular Layer 2 protocol. May have one or more Layer 3 protocols associated with it, although most networks are standardizing on IP.Building network. Multiple LANs within a building usually connected to a building-backbone network.Campus network. Multiple buildings within a local geographical area (within a few miles), usually is connected to a campus-backbone network.Remote access. Networking is the solutions that support individual remote users or small remote branch offices to accessing the network.WAN. A geographically is dispersed network including point-to-point, Frame Relay, ATM, and other long-distance connections.Enterprise network. A large and diverse network, are consisting of campuses, remote-access services, and one or more WANs or long-range LANs. An enterprise network is also called an internetwork. 2.11 Network Applications For "Name of Application," simply use a name that your customer gives you. This could be an industry-standard name, such as Lotus Notes, or it could be an application name that means something only to the customer (especially for a home-grown application). For new applications, the name might be a code name for a software-development project. For Type of Application, you can use any appropriate text that describes the type of application, or you can classify the application as one of the following standard network applications: Electronic mail File transfer, sharing, and access Database access and updating Groupware Web browsing Network game Remote terminal Calendar Medical imaging Videoconferencing Video on demand (VoD) Scheduled multicast video Surveillance and security camera video Internet or intranet voice (IP telephony) Internet or intranet fax Sales order entry Management reporting Sales tracking Computer-aided design Document imaging Inventory control and shipping Telemetry Interactive Voice Response (IVR) Unified messaging Desktop publishing Web publishing Electronic whiteboard 3.0 Logical diagram 3.1 The logical network diagram In order to build an effective network design organization needs to implements high-speed communication technology that helps them to connect one device to others in effective manner. Furthermore, in present scenario it has been seen that the organization want to communicate with four island where main island connected with others using fiber optics. Thereby to communicate between one devices to other organization implements routers that helps them to communicate between different network. Furthermore, developer users switch routers as well as several peripheral devices within the network that helps them to protect as well as communicate from one island to others in easier manner. Wireless communication from source to destination end has been done effective manner with the help of antenna (Goralski, 2009). Routers work within the Network with the help of IP address and the organization gain unique IP address from internet service providers. In addition to this router, helps to transf er the packets from one end to other end using shortest route. Switch helps to communicate one devices to others using MAC address. 3.2 Justification of logical diagram: The main motive to design this logical network is to offer access system services to the users. Use of different kinds of web servers is helpful to mitigate the network abuse from the business system. Implementation of this kind of network system contributes to sending useful data and information to the different ports and devices of the network system. Present aim of the Hotels organization to build such type of network that helps their staffs as well as tourists to communicate effective manner. In order to perform this job organization implements router devices that help them to connect different devices or network within one network (Goralski, 2009). The main purpose of selection of router devices is that it connects different type of computer network with one and helps the organization to send data and information from source to destination end effective as well as easier manner with the help of shortest path algorithm. Apart from that the organizaiaton implements antenna that he lps them to communicate wireless devices i.e. as per the study it has been observed that the areas where organization i.e. hotels situated are suffered from shark attacks thus for some reason if any problems has been indentified then staffs members easily communicate with each other using wireless devices. To protect the network in secure manner organization implements firewall techniques that helps them to secure their network from unauthorized users in easier and effective manner. 3.3 protocol mechanism and Security mechanism: Border Gateway Protocol: Border Gateway Protocol(BGP) is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems.BGPis a Path Vector Protocol (PVP), which maintains paths to different hosts, networks and gateway routers and determines the routing decision based on that (Kuhn, Sriram, Montgomery, 2007). Open Shortest Path First (OSPF): Open Shortest Path First(OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It isdefinedasOSPFVersion 2 in RFC 2328 (1998) for IPv4 Enhance Interior Gateway Routing Protocol: Enhanced Interior Gateway Routing Protocol(EIGRP) is an advanced distance vector routing protocol based on the principles of the Interior Gateway Routing Protocol (IGRP).EIGRPis a successor to the Interior Gateway Routing Protocol (IGRP). Both are owned by Cisco and operate only on their devices. Routing Information Protocol: Routing Information Protocol(RIP) is a dynamicprotocolused to find the best route or path from end-to-end (source to destination) over a network by using a routingmetric/hop count algorithm. 3.4 The list of security mechanisms Firewall: Generally thefirewallhas two network interfaces: one for the external side of the network, one for the internal side. Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most basic level,firewallscan block traffic intended for particular IP addresses or server ports In order to secure network well effective manner the company implements firewall techniques that helps the company to secure their network from unauthorized users (Judd, 2009). Furthermore with the help of proxy sever the organization also secure their network successfully manner. Moreover, network access control procedure employed in bolstering the computer network security. It helps the organization to employ the mechanism of not allowing or blocking free available network. 4.0 Physical network design 4.1 Cost of network devices The network is a strategic element in your overall information system design. As such, the cost of your network is much more than the sum of your equipment purchase orders. View it as a total-cost-of-ownership issue. You must consider the entire life cycle of your networking environment. A brief list of costs associated with networks follows: Equipment hardware and software costsconsider what is really being bought when you purchase your systems; costs should include initial purchase and installation, maintenance, and projected upgrade costs. Performance trade-off costsConsider the cost of going from a 5-second response time to a half-second response time. Such improvements can cost quite a bit in terms of media selection, network interfaces, networking nodes, modems, and WAN services. Installation costsInstalling a site's physical cable plant can be the most expensive element of a large network. The costs include installation labor, site modification, fees associated with local code conformance, and costs incurred to ensure compliance with environmental restrictions (such as asbestos removal). Other important elements in keeping your costs to a minimum include developing a well-planned wiring-closet layout and implementing color-code conventions for cable runs. Expansion costsCalculate the cost of ripping out all thick Ethernet, adding additional functionality, or moving to a new location. Projecting your future requirements and accounting for future needs saves time and money. Support costsComplicated networks cost more to monitor, configure, and maintain. Your network should be no more complicated than necessary. Costs include training, direct labor (network managers and administrators), sparing, and replacement costs. Additional costs that should be considered are out-of-band management, SNMP management stations, and power. Cost of downtimeEvaluate the cost of every minute that a user is unable to access a file server or a centralized database. If this cost is high, you must attribute a high cost to downtime. If the cost is high enough, fully redundant networks might be your best option. Opportunity costsEvery choice you make has an opposing alternative option. Whether that option is a specific hardware platform, topology solution, level of redundancy, or system integration alternative, there are always options. Opportunity costs are the costs ofnotpicking one of those options. The opportunity costs of not switching to newer technologies and topologies might be lost competitive advantage, lower productivity, and slower overall performance. Any effort to integrate opportunity costs into your analysis can help make accurate comparisons at the beginning of your project. Sunken costsYour investment in existing cable plant, routers, concentrators, switches, hosts, and other equipment and software is your sunken costs. If the sunken costs are high, you might need to modify your networks so that your existing network can continue to be utilized. Although comparatively low incremental costs might appear to be more attractive than significant redesign costs, your organization might pay more in the long run by not upgrading systems. Too much reliance on sunken costs can cost your organization sales and market share when calculating the cost of network modifications and additions. 4.2 Estimating Traffic: Workload Modeling Empiricalworkload modelingconsists of implementing a working network and then monitoring traffic for a given number of users, applications, and network topology. Try to characterize activity throughout a normal workday in terms of the type of traffic passed, level of traffic, response time of hosts, time to execute file transfers, and so on. You can also observe utilization on existing network equipment over the test period. If the tested network's characteristics are similar to a prospective network, you can try extrapolating to the prospective network's number of users, applications, and topology. This is a best-guess approach to traffic estimation given the unavailability of tools to characterize detailed traffic behavior. In addition to passive monitoring of an existing network, you can measure activity and traffic generated by a known number of users attached to a representative test network and then extrapolates findings to your anticipated population. One problem with modeling workloads on networks is that it is difficult to accurately pinpoint traffic load and network device performance as functions of the number of users, type of application, and geographical location. This is especially true without a real network in place. Consider the following factors that influence the dynamics of the network: The time-dependent nature of network accessPeak periods can vary; measurements must reflect a range of observations that includes peak demand. Differences associated with type of trafficRouted and bridged traffic place different demands on network devices and protocols; some protocols are sensitive to dropped packets; some application types require more bandwidth. The random (nondeterministic) nature of network trafficExact arrival time and specific effects of traffic are unpredictable. 4.3 Explanation of physical network design LAN configuration IP big island: 192.1.0.0/23 Usable range 192.1.0.1 usable host 192.168.0.255 Subnet ID: 192.1.0.0/23 Broadcast ID: 192.0.1.256/26 IP big island: 192.1.1.0/23 Usable range 192.1.1.1 usable host 192.168.1.255 Subnet ID: 192.1.1.0/23 Broadcast ID: 192.0.1.256/26 Small island1 LAN: 192.1.2.0/26 192.1.2.63 Broadcast ID: 192.168.168.64/276 Small island2 LAN: 192.1.3.0/27 Network devices Routers and switch:- Network routers helps in forwarding and delivering packets form sources to destination end effective manner with the help of transmission control protocol or internet protocol. Furthermore, router has an effective ability to provide security on the network by authenticating and verifying clients accessing the computer network devices. Switch provides the communication between devices using MAC address. Scalability, cost as well as reliability are obtained effectively manner with the help of switch devices. Telephone: Telephones plays an significant roles in gaining and obtaining the distance end node intended for an effective communication. In order to communicate more effective in present network developer users the telephones devices that are connected or communicated with wireless devices. 5.0 Final document 5.1 Testing procedure 5.1.1 Systems Development Life Cycles Systems analysis students are familiar with the concept that typical systems are developed and continue to exist over a period of time, often called a systems development life cycle. Many systems analysis books use the acronym SDLC to refer to the life cycle, which may sound strange to networking students who know SDLC as Synchronous Data Link Control, a bit-oriented, full-duplex protocol used on synchronous serial links, often found in a legacy Systems Network Architecture (SNA) environment. Nevertheless, it's important to realize that most systems, including network systems, follow a cyclical set of phases, where the system is planned, created, tested, and optimized. Feedback from the users of the system causes the system to then be re-created or modified, tested, and optimized again. New requirements arise as the network opens the door to new uses. As people get used to the new network and take advantage of the services it offers, they soon take it for granted and expect it to do more. In this book, network design is divided into four major phases that are carried out in a cyclical fashion: Analyze requirements.In this phase, the network analyst interviews users and technical personnel to gain an understanding of the business and technical goals for a new or enhanced system. The task of characterizing the existing network, including the logical and physical topology and network performance, follows. The last step in this phase is to analyze current and future network traffic, including traffic flow and load, protocol behavior, and quality of service (QoS) requirements. Develop the logical design.This phase deals with a logical topology for the new or enhanced network, network layer addressing, naming, and switching and routing protocols. Logical design also includes security planning, network management design, and the initial investigation into which service providers can meet WAN and remote access requirements. Develop the physical design.During the physical design phase, specific technologies and products to realize the logical design are selected. Also, the investigation into service providers, which began during the logical design phase, must be completed during this phase. Test, optimize, and document the design.The final steps in top-down network design are to write and implement a test plan, build a prototype or pilot, optimize thenetwork design, and document your work with a network design proposal. These major phases of network design repeat themselves as user feedback and network monitoring suggest enhancements or the need for new applications. Figure 1-1 shows the network design and implementation cycle. 5.1.2 Test Planning Now that you and your client clearly understand and agree on the test scope, objectives, and criteria for success, it is finally time to roll up your sleeves and start working on the test plan. As always, it is important to collaborate with the stakeholders on the test plan to determine specifics regarding the application characteristics, behaviors, and new features that are expected of the new system. The prototype network system, equipment specifications, test cases, test tools, data to be collected, and results format must also be discussed and agreed upon. This is an important step in the process because it requires many decisions and significant teamwork. 5.2 Design the Functional Prototype Network System For most types of tests, a working prototype network system of the intended design will serve as the platform upon which functionality, operation, and performance of the new system will be evaluated. A prototype network system is commonly illustrated in a set of network topology diagrams that represent a miniaturized version of the end-state network. 5.3 Identifying the Test Suites and Test Cases A test case in the context of internetworking is a set of conditions or variables under which a tester will determine whether or not a design element (network service, component, or feature) is working correctly. Test cases are the essence of the test plan, and they are sometimes collected or aggregated into test suites. Identifying the right test cases and expected output is an art form in itself, often requiring a series of conversations with the project stakeholders, architects, and operators of the network? A simple description of the test cases you expect to run, and accompany the network topology diagram you have prepared, is sufficient to begin the test plan dialog. Your client may already have some ideas of the kinds of tests they want to see, so you should request their input right away. However, some clients have no idea on how testing is conducted; in these situations, you need to rely on your own testing experience and an understanding of the design goals, test triggers, and motivations for the testing. Table 4-1. Example Test Suites and High-Level Test Cases Test Suite # Test Suite Test Case 1 Open Shortest Path First (OSPF) Routing ABR Summarization Default Route Announce OSPF NSSA Redistribution BGP to OSPF Timer Optimizations 2 Border Gateway Protocol (BGP) Routing Data Center iBGP Optimizations CE-PE eBGP Optimizations BGP Aggregation BGP Policy (Communities and Local-Pref) 3 Quality of Service (QoS) Marking Queuing Traffic Shaping Policing Remarking at CE-PE to MPLS QoS Transparency Across MPLS CoPP 4 Cisco Wide Area Application Services (WAAS) WCCP Redirects CIFS/FTP Acceleration 5 LAN Campus Switching Branch Switching HSRP 6 Multicast PIM Sparse Mode AnyCast RP with MSDP MVPNMPLS 7 Cisco Performance Routing (PfR) Fast Reroute Load Balancing Interop with WAAS 8 Cisco Group Encrypted Transport VPN (GET VPN) Group Member at Branch and WAN Distribution Cooperative Key Servers 9 Network Management SNMP SSH AAA NTP Logging NetFlow 10 Performance/Scalability Branch Router Performance (RFC 2544) WAN Route Saturation WAAS Scale 11 Negative Testing Circuit Path Failover Line Card Failover Route Processor Failover Power Failures MPLS Cloud Hard Failures MPLS Cloud Soft Failures BGP Flapping Testing of pc connectivity Testing using packet tracer References Convery, S.Network Security Architectures. Indianapolis, Indiana: Cisco Press; 2004. Edney, J. and Arbaugh, W.Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Reading, Massachusetts: Addison-Wesley; 2003. Fleck, B. and Potter, B.802.11 Security. Cambridge, Massachusetts: O'Reilly; 2002. Flickenger, R.Wireless Hacks. Cambridge, Massachusetts: O'Reilly; 2003. Kaeo, M.Designing Network Security. Indianapolis, Indiana: Cisco Press; 1999. O'Hara, B. and Petrick, A.IEEE 802.11 Handbook. Piscataway, New Jersey: IEEE Press; 2005. Peikari, C. and Fogie, S.Maximum Wireless Security. Indianapolis, Indiana: Sams Publishing; 2002. Roshan, P. and Leary, J.802.11 Wireless LAN Fundamentals, Indianapolis, Indiana: Cisco Press; 2003. Shankar, K., Sundaralingam, S., Balinsky, A., and Miller, D.Cisco Wireless LAN Security. Indianapolis, Indiana: Cisco Press; 2005. Swaminatha, T.M. and Elden, C.R.Wireless Security and Privacy: Best Practices and Design Techniques. Reading, Massachusetts: Addison-Wesley; 2002. Vladimirov, A.A., Gavrilenko, K.V., and Mikhailovsky, A.A.Wi-Foo: The Secrets of Wireless Hacking. Reading, Massachusetts: Addison-Wesley Professional; 2004. Chao, H. Liu, B. (2007).High performance switches and routers. Hoboken, N.J.: Wiley-Interscience. Goralski, W. (2009).The illustrated network. Amsterdam: Elsevier/Morgan Kaufmann Publishers. Huang, S., MacCallum, D., Du, D. (2010).Network security. New York: Springer. Judd, C. (2009).Firewall. New York: Saint Martin's Press Inc. Kizza, J. (2013).Guide to computer network security. London: Springer. Kuhn, D., Sriram, K., Montgomery, D. (2007).Border Gateway Protocol security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology. Lee, R. (2012).Software and network engineering. Berlin: Springer. Perez, A. (2014).Network Security. London: ISTE. Shinde, S. (2009).Computer network. New Delhi: New Age International Ltd.

Friday, November 29, 2019

Lab Report Final Draft Essay Example

Lab Report Final Draft Paper The student conducted the experiment given, using safe lab practices, that found the polarity of two separate solvents, and it has been shown through experimental exults that the hypothesis formed in the beginning of this experiment is true. It has been deducted from this experiment that solvents which dissolve, or pick-up, water soluble inks are polar, while solvents that dissolve, or pick-up, non water soluble inks are non-polar. Introduction In order to determine the polarity of two solvents, slime and silly putty, an experiment is being conducted that will provide data to formulate a conclusion on the matter. This lab will answer whether or not the tested solvents are polar or non-polar, as well as whether the inks used are polar or non-polar. Information was given in the beginning of the lab explaining that only polar solvents will dissolve or pick-up polar ink, and only non-polar solvents will dissolve or pick-up non-polar solvents. Chromatography will be used to verify conclusions made on the polarity of the inks. Background The lab provided information as the basis for the experiment. It was provided that polar solvents only pick-up or dissolve polar substances, as well as that monopole solvents only pick-up or dissolve monopole substances. We will write a custom essay sample on Lab Report Final Draft specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Lab Report Final Draft specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Lab Report Final Draft specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Also, in the lab introduction, the information examines covalent and ionic bonds teaching that he polarity characteristics of substances are due to their atomic structure and molecular shape. For example: Water is a polar molecule due to the electrons being shared between the oxygen atom and the two hydrogen atoms. As the electrons are pulled close to the oxygen atom it leaves a slightly positive charge on the outside of the hydrogen atoms, while the other side of the molecule contains a slightly negative charge. The knowledge of the polarity of water is a control within this experiment. Objective Using the knowledge of polar and non-polar molecules, we can observe the heartsickness of the effects of the experiment on the inks, and determine the polarity of the solvents. Hypothesis Knowing the composition of the Slime being mainly water, the slime will dissolve or pick-up the water soluble inks and the silly putty will pick up the non-water soluble inks. Materials and Methods Materials: (1) 250 ml Beaker 5 ml 4% Borax Solution Dry Erase Marker (1) 10 ml Graduated Cylinder (1) 100 ml Graduated Cylinder Filter Paper (Disk) Filter Paper (Square) 0. G Guar Gum Highlighter Permanent Marker 1 Popsicle Stick Silly Putty Ruler Wooden Stir Stick [emailprotected] Roller Pen Distilled Water Newspaper Notebook Paper Scissors Part 1: Making Slime 1. Weigh out 0. 5 g of guar gum into a 250 ml beaker. 2. Measure 50. 0 ml of distilled water into a 100 ml graduated cylinder and pour it into the 250 ml beaker that contains the guar gum. 3. Rapidly stir the mixture with a wooden stir s tick for three minutes, or until the guar gum is dissolved. 4. Measure 4. 00 ml of a 4% Borax solution into a 10 ml graduated cylinder and add it to the guar gum and water. . Stir the solution until it becomes slime. This will take a few minutes. If the slime remains too runny, add an additional 1. Ml of the 4. 0% Borax solution and continue to stir until the slime is the slightly runny or gooey. 6. Once you are satisfied with the slime, pour it into your hands. Be sure not to drop any of it on to the floor. 7. Manipulate the slime in your hands. Write down observations made about how slime pours, stretches, breaks, etc. In Part 1 of the Data section. CAUTION: Slime is slippery and if dropped it can make the work area slick. . Place the slime back into the beaker and WASH YOUR HANDS. Part 2: Slime and Putty Ink Tests 1 . On a piece of notebook paper make one 20 25 mm long mark of each of the inks you are testing (permanent marker, highlighter, Dry Erase, and [emailprotected] Roller Pen). Space the marks at least one inch apart. Use a pencil to label each mark with its description. A. Water soluble inks include those in highlighters and certain pens. B. Water insoluble inks include those in a permanent pen/markers, newsprint, and a dry-erase markers. 2. While the inks are drying, select a passage or a picture in the newspaper to test with the slime. 3. Develop a hypothesis stating whether or not you believe the slime produced in Part 1 will pick up newsprint ink. Record this hypothesis in the Post-Lab Questions section. Then, break off a small piece of slime that is 3 5 CM in diameter. Gently place this piece on top of the newspaper print, then carefully pick it up again. 4. Observe and record in Table 1 whether or not the ink was picked up onto the slime. 5. Break off another small piece of slime. Once the inks from Step 1 have dried gently place the slime on top of the first spot on the notebook paper, then carefully pick it up. Repeat this for each of the inks. Observe and record which inks were picked up (dissolved) by the slime in Table 1. 6. Repeat this ink testing two more times for accuracy. 7. Hypothesize which inks the silly putty will pick up in the Part 2 of the Data section. Then, perform the ink tests with the Silly [emailprotected] according to the procedure outlined in Steps 5 6. Part 3: Chromatography of Ink Samples 1. Use a pencil or scissors to poke a small hole in the center off piece of filter paper (see Figure 7). 2. Spot the filter paper evenly spaced approximately 2 CM from the small hole with the two insoluble inks and the two soluble inks that were used in Part 2, Step 1. 3. Obtain a h piece of filter paper. Fold the paper in half several times so that it makes a narrow wick. . Insert the wick into the hole of the spotted paper so that it is above the top of the filter paper by approximately 2 CM. 5. Fill a 250 ml beaker 3/4 full with water. 6. Set the filter paper on top of the beaker so that the bottom of the wick is in the water. The paper should hang over the edge of the beaker with the spotted side up. 7. Allow water to travel until it is approximately 1 CM from the edge of the filter paper. Remove the filter paper from the beaker. 8. Observe which inks moved from where they were originally spotted. Record your observations in Part 3 of the Data section. In the experiment, we were given the above instructions on how to create slime. Silly putty was provided in the lab kit. A 25 CM mark was made on notebook paper using four types of ink: highlighter ink, nun-ball roller pen ink, permanent sharpie ink, and dry erase marker ink. There was also a newspaper clip used to test the solvents on the newspaper ink as well forming the total of 5 experimental groups. The inks are the dependent variables in this experiment. The solvents were then placed on each of the five inks, three times each, to see if they picked-up or dissolved the inks. The solvents are the independent variables n this experiment. The result of whether the solvent picked or dissolved the ink was recorded. After completing this part of the test, filter paper was placed on top of a beaker filled % full with water, with a wick placed through the filter paper into the water. Dots of the four individual inks were placed on the filter paper. The reactions of the inks, as the water traveled up the wick into the filter paper were recorded. The experiment can be explored further in the above experiment procedural steps. Results, Data, and Observation Table 1: Results of Ink Testing for Silly [emailprotected] Name of Ink Picked up (dissolved) Did not pick up Trial 1 Trial 2 Trial 3 Newsprint Table 1: Results of Ink Testing for Slime x The above graph illustrates the findings in the experiment. The silly putty picked-up, or dissolved, both the dry erase marker ink, and the newspaper ink. The slime picked-up, or dissolved, the highlighter and unable roller pen ink. Neither the silly putty, nor the slime, picked-up or dissolved the permanent marker ink. When the ink was placed on the filter paper and water was placed in the beaker as the solvent, the highlighter and the roller pen ink were both dissolved and pulled toward the wick. The permanent marker and the dry erase marker both ere unaffected by the water. Discussion, Data Interpretation, and Experimental Conclusions Seeing the results in the tables above shows the polarity of both the inks and the solvents used. Water is a polar molecule which supports the results of the chromatography as well. The information of the water solubility of the inks used was given in the beginning of this experiment, and the information was verified by the chromatography, which showed the inks that dissolved in water. Both the highlighter and the roller pen were soluble inks. Knowing this, and in knowing the properties of water, means they are, in fact polar. After seeing the slime dissolve and pick-up traces of both of these inks, it can be concluded that the slime is polar as well. The newspaper ink, permanent marker, and dry erase marker were insoluble inks. The newspaper ink was not verified by chromatography, however, both the permanent marker ink, and the dry erase marker were; they did not move across the filter paper when water was added. In seeing that the silly putty picked up the dry erase marker ink, and the newspaper ink, it can be concluded that the silly putty is a non-polar solvent. Error was found in my experiment in seeing that the non-polar solvent did not solve or pick-up the permanent marker.

Monday, November 25, 2019

1984 Essays - Fiction, Literature, Nineteen Eighty-Four, Politics

1984 Essays - Fiction, Literature, Nineteen Eighty-Four, Politics 1984 Nineteen Eighty-Four is a compelling novel, written in the period just after W.W.II. It details the life of one man, Winston Smith, and his struggles with an undoubtedly fascist government. The book is set approximately in the year 1984, in which Winston's society is ruled by a governing force known as The Party. At the head of this government is a fictional figure known as Big Brother, to whom all citizens must love and respect. In this society, privacy and freedom do not exist. People are constantly monitored by telescreens, and subjected to a constant barrage of propaganda. Any devious thought or action is dealt with by cruel and deadly punishment. Winston is a worker in one of the government agencies. His job: to rewrite the past so that The Party, specifically Big Brother, appears to be omnipotent. From as long as he can remember, he has despised The Party and what it stood for, although he doesn't reveal his true feelings to anyone around him. When Winston begins a torrid love affair with one of the young women in his agency named Julia, he finds someone else who shares in his beliefs. The two have several meetings throughout the book, in which they discuss their hatred for the government. They join a secret alliance called The Brotherhood, who's specific purpose is the end of The Party. Through the literature of The Brotherhood, they learn about the inner workings of The Party and how it accomplishes its stronghold on the people. The world as Winston knows it comes crashing down when he and Julia are arrested by the thought police, a faction of the government which deals with those who do not agree and abide by the ways of The Party. They are taken to a prison unlike any other. Winston is constantly tortured and beaten, until he confesses to crimes which he didn't commit or never even happened. If the party just killed Winston right away, they might run the risk of making a martyr out of him. Instead they re-educate him with the morals of The Party, using such techniques as pain, starvation, and using Winston's greatest fear against him. Once re- educated, he is introduced back into society. But he is not the same person, just a hollow shell. Winston had once said in the novel that if he could die hating Big Brother, then he would have won. But when Winston is finally killed, the only thing he can think is that he loves Big Brother. As this book was written just after the reign of Hitler in W.W.II, one can easily guess where Orwell got the basis for it. The world was in a general state of disbelief and panic after the atrocities that Hitler had committed. It was hoped that nothing like this would ever happen again. Nineteen Eighty- Four is a good reason why. The novel shows what could have happened if Hitler was able to continue upon his quest for power. The novel can also apply to the present era, as the novel was actually set in more modern times. Not only does the novel apply to Hitler's way of thinking, but also to Stalin. Even though both are at opposite sides of the political spectrum, they both established totalitarian governments. The Party also ran a totalitarian government but on a much larger scale. A large part of the novel deals with the relationship between The Party and society. Many of the techniques used by The Party are similar to those used by Hitler or any controlling government for that matter. One of these ways is by propaganda. With telescreens in everyone's homes, it was very easy to broadcast the views and beliefs of The Party. Also, as this was the only form of broadcasted media, the government could easily control what the people watched and listened to. Another form of propaganda was by means of posters and slogans. In this society it was impossible to go anywhere without seeing a poster of Big Brother and reading slogans such as BIG BROTHER IS WATCHING YOU and War is Peace...Freedom is Slavery...Ignorance is Strength. Hitler was a big fan of propaganda and used it a great deal. Also, The Party controlled all written media, and therefore could write and re-write anything it chooses to. During his reign, Hitler realized that he needed to get younger people involved in

Friday, November 22, 2019

Organized Crime Essay Example | Topics and Well Written Essays - 500 words - 1

Organized Crime - Essay Example Stefano’s leadership of the group collapsed in 1969 because of divided loyalties and in 1974; Stefano died of a heart attack (Kilpinen). This crime organization still operates actively in some parts of New York. Its membership has significantly decreased throughout the years; nevertheless, it is still a major crime organization. In order to investigate this crime organization, I would prosecute the members of the organization under the provisions of the 1970 Organized Crime Control Act, where Title IX is specified as RICO or Racketeer Influenced and Corrupt Organization. RICO specifies various criminal activities in relation to organized crime which are punishable by the law. Activities include bribery, extortion, and murder (O’Connor, 2009). This law also decreased the minimum qualifications of conspiracy, enabling the prosecution of organized criminals even without meeting the strict qualifications of conspiracy. I would also prosecute them under RICO which would allow law enforcement officials to seize the assets, proceeds, and instrumentalities of their criminal activities (O’Connor, 2009). I would offer deals to the younger members of the organization for them to turn states’ witness and testify against the organization. I believe that these younger generations would be easier to c onvince than their older counterparts. Most of them are reluctant to face prison sentences as members of the organization and would prefer to get their lives out of the control of the organization (O’Connor, 2009). In the process of investigating the Buffalo Family, I would also call on the assistance of the Organized Crime Council who shall ask the assistance of other federal agencies like the FBI, DEA, ATF, ICE, IRS, Postal Security, Department of Labor, Diplomatic Security, and the Office of the Inspector General (Finklea, 2010). With all these agencies involved in the process of investigating the Buffalo Family, I would

Wednesday, November 20, 2019

The Negative Effect Of Middle Name Atsitso Essay

The Negative Effect Of Middle Name Atsitso - Essay Example These myths have made it worse for me especially in an effort to accept that name as my own. This name has really had negative implications in my life. As seen in the research conducted by Crook, it is in the shrines that bodies are laid and at times the reasons behind the deaths are very unclear (67). The author gives a good example of the ones at Bardney that were laid in a shrine (Crook 67). This explains the mysteries that lie in the shrines as the author claims that the ones at Bardney were indeed unclear. Relating this to my name meaning a shrine, I do not like this aspect at all. Persons may relate to the cultic features of the shrine to my name as well as my personality which does not sound good to me at all. In the work as well, Crook is of the thought that shrines are constructed using the remains of materials that were used to put up other buildings (104). A good example is that of Eadwig’s time when shrines were rebuilt using the old front and back plates (Crook 104). In the event that I relate this fact to my life, I strongly feel that I do not want anyone to call me by that name Atsitso ever again. In my opinion, I relate the construction of the shrines as an afterthought of other constructions. I do not believe I am a product of an afterthought. This hurts my self-esteem a great deal; that is why I forbid people to ever call me using that name. In shrines, dead bodies are laid to rest. Even after burials, some bodies are normally raised from the ground and laid to rest in the shrines. Crook gives an example of Aldhelm who was exhumed and laid to rest in a shrine (104). Who would want a name that relates to shrines and a place for dead bodies? This explains why I renounce my name that has a lot to do with ones and dead bodies. At times people ridicule me because of the same. At times people ridicule me because of the same. As the days pass, my personality is greatly affected and will continually ask people to never call me by that name.

Monday, November 18, 2019

Experimental economic summary paper Essay Example | Topics and Well Written Essays - 500 words

Experimental economic summary paper - Essay Example 25 per cent of the non-economists called â€Å"all of the endowment† as fair investment whereas 75 per cent of them considered it to be â€Å"half or more† of the donation. The behavior of economics students was significantly different. To public account, they offered no more than 20 per cent of the donation. All non-economists said that they valued â€Å"fairness† in deciding about the investment whereas most of the economics students did not know what â€Å"fairness† is. Likewise, Carter and Irons (1991) who compared the behavior of economists and non-economists using an ultimatum bargaining game, found economists to be more complying with the characteristics of the self-interest model in the roles of both the allocator and the receiver than their non-economics counterparts. The charitable giving survey and results of the prisoner’s dilemma also supported the opinion that the likelihood of free riding is more profound in economists than non-econom ists.

Saturday, November 16, 2019

The effects of homelessness: Literature and research

The effects of homelessness: Literature and research Mini Paper #1:Intervention Research with the Homeless Introduction The effects of homelessness as a social condition are both wide reaching, and difficult to grasp in its scope. It is a circumstance of varying severity, which people may move through for different lengths of time and for different reasons, making it challenging to establish an accurate breadth of its range (Biswas-Diener Diener, 2006; Parsell, 2011). Link and colleagues (1994) have estimated that 14% of the United States may experience homelessness at some point in their life. According to The US Department of Housing and Urban Development (2011) there may be as many as 400,000 homeless individuals in the United States on a given day, and that 1,500,000 people may experience homelessness within the span of a year (HUD, 2011). A person’s familiarity with the homeless condition will vary depending on whether they experience it chronically, temporarily, or periodically (Rivlin, 1990). People may experience homelessness as a result of unemployment, natural or human-constructed ad versity, mental illness, or a combination of factors (Hagen, 1987). The influences that contribute to the condition of homelessness may also play a hand in the progression and outcome of the person experiencing it, be it mental health or substance abuse issues, personal crisis, or systemic pitfalls (Chamberlain Johnson, 2013). As a result of the potential reasons someone may enter homelessness, the rates and demographics of the homeless population vary among regions of the United States (HRI, 2012), and fluctuate in time. From the period of 2009 to 2012, homelessness as a whole decreased by 1% despite the conditions of the economic downturn, while the number of people who would have been homeless but instead doubled up with friends or family increased by 13% during this same time period (HRI, 2012). Predictors – risk problem While any number of circumstances may contribute to the condition of homelessness, The Homeless Research Institute (2012) has identified four population groups who are at an increased risk of entering homelessness; people living with family and friends for economic reasons, prisoners who have been recently released, people aging out of foster care, and the medically uninsured. At its core, whether or not someone will enter or exit the condition of homelessness is influenced by a person’s income, their access to supports and social service resources, and the cost of available housing. As a result, other socioeconomic conditions associated with marginalization can increase a person’s risk of entering homelessness, such as unemployment or mental illness, and the condition of homelessness itself may even serve to fortify these things (Goodman, Saxe, Harvey, 1991; Thoits, 1982). Knowledge base/theoretical explanations No clear theory explains the phenomenon of chronic homelessness better or more appropriately than another, although the perspective adopted will affect the explanations and constructs that are accounted and controlled for within research. For example, the social estrangement model posits that upon entering homelessness people experience a general sense of alienation and proceed to adapt to a lifestyle that reinforces this estrangement (Grigsby, Baumann, Gregorich Roberts-Gray, 1990). The concept of estrangement has been adapted into a measured scale, and this model has been used in research to examine the reintroduction of employment into the lives of the homeless as a potential intervention to decrease one’s sense of estrangement and reintegrate back into society (Ferguson et al., 2012). Social constructionism has been used to explain homelessness as an artificial construct that is used to describe an extreme form of poverty that actually exists on a spectrum, and is not the binary distinction that is used to give a blanket idea to what actually amounts to a diverse range of experiences within the homeless population (Tosi, 2010). This idea has led to research and programs that operate with a continuum definition of homelessness (Anderson, Tulloch, 2000). Social alienation theory has also been tested in the form of measuring the change of social support network of homeless adults across time spent homeless (Eyrich, Pollio North, 2003). Key research questions/intervention proposals Because of the variety of factors that may exacerbate or contribute to homelessness, there are consequently any number of potential interventions and areas of concern to address. Researchers have found it useful to distinguish among cultural or demographic subgroups within the homeless population to address the concerns that appear to be more pertinent to a given subgroup (Aubry et al., 2012). Such distinctions may seek to reduce destructive behaviors or victimization associated with the homeless lifestyle itself (Justus, Burling Weingardt, 2006). From a broader perspective, investigators may attempt to identify how the homeless will best establish and maintain long-term housing (Groton, 2013), as well as how to maximize retention and participation of services for the homeless in general (Padgett et al., 2008). Intervention research that concerns itself with the homeless population must make educated assumptions about the most salient issues worth addressing, the causes of those issues that may be controlled, and the types of outcomes that should be attained. Meaningful intervention research should attempt to identify questions that address the preventative conditions of homelessness, the exacerbating conditions that may prolong someone’s experience with it, and the opportunities available to exit it. Social networks play an important role in people’s lives, and the homeless are no exception. Some forms of social support may serve to normalize the homeless experience (Auerswald and Eyre, 2002), while others may offer support for exiting homelessness (Zlotnick, Tam, Robertson, 2003). An appropriate research question in this area would ask; what are the characteristics of social networks that serve to contribute to a person’s successful attempts to exit homelessness? An intervention program that would attempt to capitalize on known social support networks that reinforce a person’s decision to exit homelessness could be as simple as incorporating a series of questions into existing outreach programs that are designed to identify such relationships. Once these relationships are identified, practitioners could be instructed to attempt outreach with these social network members to include them in their work with their clients. One of the issues associated with homeless encampments is their proximity to necessary services (Chamard, 2010), of these healthcare access may be included. To build off of research which has identified that demographics as well as distinct lifestyles among the homeless may mean the difference between healthcare access or not (Nakonezny Ojeda, 2005), a further relevant research question may ask how can people living in homeless encampments attain more consistent and accessible healthcare? Intervention work in this vein could seek to implement medical outreach programs in areas known to have higher concentrations of homeless encampments, identify how medical conditions are impacted as a result, and further modify outreach techniques depending on the results. Homeless youth have been shown to have increased rates of victimization relative to their housed counterparts (Tyler, Gervais Davidson, 2013; Tyler Melander, 2012), and that victimization is associated with higher rates of substance use (Bender et al., 2012). Potential interventions in this area could include fusing a program designed to address substance use among homeless youth with training staff to have heightened awareness of who may be at risk for increased victimization, and address individual cases as needed. The potential for intervention research within the homeless population is plentiful. References Anderson, I., Tulloch, D. (2000). Pathways through homelessness: A review of the research evidence. Edinburgh: Scottish Homes. Aubry, T., Klodawsky, F., Coulombe, D. (2012). Comparing the housing trajectories of different classes within a diverse homeless population. American Journal Of Community Psychology, 49(1-2), 142-155. Auerswald, C. L., Eyre, S. L. (2002). Youth homelessness in San Francisco: A life cycle approach. Social Science Medicine, 54(10), 1497-1512. Bender, K., Thompson, S. J., Ferguson, K., Komlo, C., Taylor, C., Yoder, J. (2012). Substance use and victimization: Street-involved youths perspectives and service implications. Children And Youth Services Review, 34(12), 2392-2399. Biswas-Diener, R., Diener, E. D. (2006). The Subjective Well-Being of the Homeless, and Lessons for Happiness. Social Indicators Research, 76(2), 185-205. Chamard, S., United States, Center for Problem-Oriented Policing. (2010). Homeless encampments. Washington, DC: U.S. Dept. of Justice, Office of Community Oriented Policing Services. Chamberlain, C., Johnson, G. (2013). Pathways into adult homelessness. Journal Of Sociology, 49(1), 60-77. Eyrich, K. M., Pollio, D. E., North, C. S. (2003). An exploration of alienation and replacement theories of social support in homelessness. Social Work Research, 27(4), 222-231. Ferguson, K. M., Bender, K., Thompson, S. J., Maccio, E. M., Pollio, D. (2012). Employment status and income generation among homeless young adults: Results from a five-city, mixed-methods study. Youth Society, 44(3), 385-407. Goodman, L. A., Saxe, L., Harvey, M. (1991). Homelessness as psychological trauma: Broadening perspectives. American Psychologist, 46(11), 1219-1225. Grigsby, C., Baumann, D., Gregorich, S. E., Roberts-Gray, C. (1990). Disaffiliation to Entrenchment: A model for understanding homelessness. Journal of Social Issues, 46(4), 141-156. Groton, D. (2013). Are housing first programs effective? A research note. Journal of Sociology And Social Welfare, 40(1), 51-63. Hagen, J. L. (1987). The heterogeneity of homelessness. Social Casework, 68(8), 451-457. The Homelessness Research Institute (HRI). (January, 2012). The State of Homelessness in America, 2012. National Alliance to End Homelessness. Retrieved from: http://lhc.la.gov/downloads/esg/TheState_of_Homelessness_in_America2012.pdf Justus, A. N., Burling, T. A., Weingardt, K. R. (2006). Client Predictors of Treatment Retention and Completion in a Program for Homeless Veterans. Substance Use Misuse, 41(5), 751-762. Link, B.G., Susser, E., Stueve, A., Phelan, J., Moore, R.E., Struening, E. (1994). Lifetime and five-year prevalence of homelessness in the United States. American Journal of Public Health, 84(12), 1907–1912. Nakonezny, P.A., Ojeda, M. (2005). Health Services Utilization Between Older and Younger Homeless Adults. The Gerontologist, 45(2), 249-254. Padgett, D. K., Henwood, B., Abrams, C., Davis, A. (2008). Engagement and retention in services among formerly homeless adults with co-occurring mental illness and substance abuse: Voices from the margins. Psychiatric Rehabilitation Journal, 31(3), 226-233. Parsell, C. (2011). Homeless identities: Enacted and ascribed. British Journal Of Sociology, 62(3), 442-461. Rivlin, L. G. (1990). The significance of home and homelessness. Marriage Family Review, 15(1-2), 39-56. Thoits, P. A. (1982). Life stress, social support, and psychological vulnerability: Epidemiological considerations. Journal of Community Psychology, 10(4), 341-362. Tosi, A. (2010). Coping with Diversity. Reflections on Homelessness in Research in Europe. OSullivan, Eoin/Busch-Geertsema, Volker/Quilgars, Deborah/Pleace, Nicholas (Hg.): Homelessness Research in Europe. Brà ¼ssel, 221-236. Tyler, K. A., Gervais, S. J., Davidson, M. (2013). The relationship between victimization and substance use among homeless and runaway female adolescents. Journal Of Interpersonal Violence, 28(3), 474-493. Tyler, K. A., Melander, L. A. (2012). Poor parenting and antisocial behavior among homeless young adults: Links to dating violence perpetration and victimization. Journal Of Interpersonal Violence, 27(7), 1357-1373. US Department of Housing and Urban Development (HUD). (2011). The 2010 Annual Homeless Assessment Report to Congress. Washington, DC. (2010 AHAR). Zlotnick, C., Tam, T., Robertson, M. J. (2003). Disaffiliation, substance use, and exiting homelessness. Substance Use Misuse, 38(3-6), 577-599. 1

Wednesday, November 13, 2019

The Importance of Memory Essay -- Personal Narrative Writing

The Importance of Memory I remember lying in my bed one night when I was six years old, staring at the ceiling in the darkness, covers pulled up to my chin, thinking, â€Å"Someday, I’ll wake up and I’ll be twenty years old. And someday I’ll wake up and be forty. What will I look like? What will I be doing? Will I be happy? Will I remember what it was like to be six?† Memory has always been a concern of mine – mainly, is mine deficient somehow? Everyone else seems able to remember the minutiae of their childhoods, while mine seems mostly fuzzy at best. Sometimes I’ll get little snatches of an image or a feeling, summoned by something I’ve seen or smelled or heard, or sometimes a memory will just float to the surface, unasked for. And other times, I’ll consciously try to conjure up a particular scene or moment, but my efforts are unsuccessful more often than not. I’m twenty-one. I’m probably a foot and a half taller and twice as heavy as my six-year-old self. I’m in school, reading and writing a lot, trying to figure out my life, wondering (still) what forty will be like. Sometimes I’m happy, sometimes I’m not. I aim for contentment now, mostly. This is what I remember. I’m in first grade. My teacher is Ms. Schultz. She would make the perfect grandmother: a bit chubby, short silvery-blonde hair, smiling blue eyes that crinkle in the corners, and a wardrobe consisting primarily of pink and purple sweatshirts, all cute-fluffy-animal-themed. Her face is so soft-looking I want to reach up and touch it. She likes blue eyeshadow. I’m good at first grade. The other kids like my drawings. I know not to color the sky as a one-inch blue strip at the top of my paper. I like drawing horses and unicorns and Pegas... ... and whites. I race raindrops as we coast along the highway. I guess I remember more than I thought. People tell me it’s a terrible tendency I have sometimes of focusing on the past. They say, â€Å"You should live in the now.† They insist, â€Å"You should enjoy the present.† I feel guilty at first, but I smile to see through the eyes of a six-year-old again. The guilt slides away easily because I know not to let a cloud of memories obscure the present, to freight the moment with past regrets. Instead, I use my memories to elevate my experiences now, to see everything around me with greater clarity. The past gives every moment a little more meaning. To me, it seems critical to know where and whence I came from, how I came to be like this, to think the way I do or act the way I do. Memory offers a claim of permanence, a means of positioning myself in time and in space.