Friday, April 17, 2020
Stranger with a Camera Essay Example For Students
Stranger with a Camera Essay To the audience watching the film ââ¬Å" Stranger With a Camera,â⬠many wonder to what extent does the filmmaker, Elizabeth Barretââ¬â¢s personal connection to the town lead to a bias in the film? Filmmakers and paparazzi have a large amount of power because of their ability to simply alter the stories they publish. Did Barret alter the truth of what happened between Hugh Oââ¬â¢Connor and Hobart Ison? This fact plays a key role in Elizabeth Barrets film Stranger with a Camera and allows the question to arise. Since most people take in the media with a grain of salt because the media never provides the full truth, then to what extent would the filmmakers in ââ¬Å"Stranger with a Cameraâ⬠have been able to document the stories of Hobart Ison and Hugh Oââ¬â¢Conner and also the poverty in Appalachia without portraying a Bias? Although it may be easy to assume a bias knowing Elizabeth Barretââ¬â¢s personal connection to the town, in Stranger with a Camera, Barret did an excellent job at exploring the multiple perspectives of the situation in the film while keeping her views open-ended. We will write a custom essay on Stranger with a Camera specifically for you for only $16.38 $13.9/page Order now Barret decided to include herself in the film because she was able to personally understand what was going on in the town as well as relate to the filmmakerââ¬â¢s dilemmas. ââ¬Å"Stranger with a Cameraâ⬠portrays a poor community in the coal-mining heart of Appalachia that attracted mass media attention that turned Appalachia into an icon in the nationââ¬â¢s War on Poverty. The area was analyzed thru the different cultures and how each culture collided with another. But how the town and cultures were being depicted angered many locals. There was a situation where a picture of a child was published and it gave the impression he was consuming dirt because he wasnââ¬â¢t fed properly. This angered the locals because everyone knew the child was actually fed properly and the media was portraying lies about the town. The townââ¬â¢s people were furiously angered because they knew that the stories they saw published about their community were not being portrayed truthfully and certain characteristics were being left out. When creating the film, Elizabeth Barret explored questions such as; what is the difference between how people see their home and how others represent it? As a storyteller, what are your responsibilities? Is it the filmmakerââ¬â¢s job to just tell what they see or give an analytical perspective? In Clifford Geertz excerpt ââ¬Å"The Impact of the Concept of Culture on the Concept of Manâ⬠Geertz gives an effort to make the point that the concept of culture is the definition of man. In the essay, Geertz criticizes the popular analogy of a man and his culture as a form of an onion. Geertz gives several problems with this analogy, the most important the lack of true human and second that such universals cannot be attached to biological, psychological, or social organizations (Geertz, 38). So how does Geertz arguments relate to Elizabeth Barretââ¬â¢s approach in ââ¬Å"Stranger With a Camera? â⬠Elizabeth Barret displays how the media only cover events they want the public to see. If the eyes behind the camera feel the need to exaggerate or alter what they see through the lens, then they have the frightening capability of doing so. Barretââ¬â¢s approach answers the previous questioned on how things are being depicted are viewed by different audiences and Geertz arguments supports the social consequences of the two cultures collided because Geertz argues that such universals cannot be attached to social organizations, which we see from the two different cultures in the town. When it comes to the media, the consumer is typically told a stretched out and twisted version of the truth. Audiences must learn to question to what extent the material we view is believable and become comfortable with the ambivalence that comes with the mediaââ¬â¢s stories. .ud30a59649a2ce75f12e6682aa62bcf40 , .ud30a59649a2ce75f12e6682aa62bcf40 .postImageUrl , .ud30a59649a2ce75f12e6682aa62bcf40 .centered-text-area { min-height: 80px; position: relative; } .ud30a59649a2ce75f12e6682aa62bcf40 , .ud30a59649a2ce75f12e6682aa62bcf40:hover , .ud30a59649a2ce75f12e6682aa62bcf40:visited , .ud30a59649a2ce75f12e6682aa62bcf40:active { border:0!important; } .ud30a59649a2ce75f12e6682aa62bcf40 .clearfix:after { content: ""; display: table; clear: both; } .ud30a59649a2ce75f12e6682aa62bcf40 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ud30a59649a2ce75f12e6682aa62bcf40:active , .ud30a59649a2ce75f12e6682aa62bcf40:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ud30a59649a2ce75f12e6682aa62bcf40 .centered-text-area { width: 100%; position: relative ; } .ud30a59649a2ce75f12e6682aa62bcf40 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ud30a59649a2ce75f12e6682aa62bcf40 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ud30a59649a2ce75f12e6682aa62bcf40 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ud30a59649a2ce75f12e6682aa62bcf40:hover .ctaButton { background-color: #34495E!important; } .ud30a59649a2ce75f12e6682aa62bcf40 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ud30a59649a2ce75f12e6682aa62bcf40 .ud30a59649a2ce75f12e6682aa62bcf40-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ud30a59649a2ce75f12e6682aa62bcf40:after { content: ""; display: block; clear: both; } READ: Sex and the City: Feminist Fake? EssayAlong with almost everyone else, most people can personally relate to this as viewers. Growing up in a world that consists and communicates mainly through the media, one must grow up to understand that the pictures and the articles we read, are most likely not telling us the full truth. People must develop a sense of ambivalence towards the material we see in the media. The media challenges viewers to decide if what they are viewing is true of false. In Greetz excerpt, he states that culture is the central ingredient in what makes us human rather than a later added addition (Geertz, 47). We can use this claim by Geertz to analyze Elizabeth Barretââ¬â¢s connection to the town and its culture and how she used to portray the film. Barret lived closely to where the filmmakers were working so she was able to relate to how the localââ¬â¢s felt when they saw their community being dishonestly reflected in the media. Some locals were optimistic at first that the media attention would bring change or help to their town. While most others were enraged by the attention they were receiving and how their community was falsely being portrayed to the rest of the world. Barret found that the films being made of the people in Appalachia were insulting because they strictly focused on making the poor people look poorer as opposed to emphasizing the wealth of who these people were. Because of this she was able to understand where Hobert Isonââ¬â¢s indignation came from. Barretââ¬â¢s film is all about the media manipulating what they photograph therefore it makes sense in Barretââ¬â¢s her choice to include her own filmmaking perspectives because it gave the film a more believable aspect. Barret analyzes the conflicting perspectives from the filmmakers and the locals. Specifically, Barret displays Hugh Oââ¬â¢Conner, the filmmakerââ¬â¢s intentions verses Hobert Ison, the landownerââ¬â¢s rage. Oââ¬â¢Conner was very much a people person who traveled frequently. Hobert was a hunter and a good carpenter who was well respected in his town. However he was very proud of his land and did not appreciate anyone messing with it, which was exactly what Oââ¬â¢Conner and the filmmakers did. After there had already been quite some attention brought to the town, most of the residents there were irate. Anyone who saw their home or community in the media shone in a light that they knew to be fallacious would be as well. Eventually this led to Hobert shooting and killing Oââ¬â¢Conner with his gun because Oââ¬â¢Conner was shooting Hobert with his camera. A quote from the film that was said by Colin Low who is part of the National Film Board of Canada said, ââ¬Å"A camera is like a gun, itââ¬â¢s threateningâ⬠. The filmmakers were using their ââ¬Å"gunsâ⬠on Hobertââ¬â¢s land and in response he fired his gun back at them. The camera is an invasive and exploitive device. Hobert had felt invaded and threatened by the multiple cameras in his town while the filmmakers where merely doing their job to cover a story. Barret conducted multiple interviews analyzing the perspectives from Oââ¬â¢Connerââ¬â¢s daughter and other filmmakers, along with the locals from the town who knew Hobert. She displayed that as the filmmakers may have been intrusive, their only task that they were attempting to accomplish was to cover a story. Hubert was undoubtedly wrong to take Oââ¬â¢Connerââ¬â¢s life but pertaining to the situation however, his actions were considered understandable. Barret was successfully able to display the multiple perspectives from the story while keeping the overall perspective of the film open-ended. Barret did not forcibly set out to show the viewer why her opinionated views were right. Her main goal was simply to cover and analyze the entirety of each perspective of the situation through her film. She successfully accomplished this goal because she was able to keep the opinions open-ended and develop multiple questions for the viewer. ââ¬Å"Stranger with a Cameraâ⬠tells a story about a fatal shooting and viewers analyze what led Hobart Ison to shoot Hugh Oââ¬â¢Connor? .uf6da32eab98cab97f62d3b543fbb340b , .uf6da32eab98cab97f62d3b543fbb340b .postImageUrl , .uf6da32eab98cab97f62d3b543fbb340b .centered-text-area { min-height: 80px; position: relative; } .uf6da32eab98cab97f62d3b543fbb340b , .uf6da32eab98cab97f62d3b543fbb340b:hover , .uf6da32eab98cab97f62d3b543fbb340b:visited , .uf6da32eab98cab97f62d3b543fbb340b:active { border:0!important; } .uf6da32eab98cab97f62d3b543fbb340b .clearfix:after { content: ""; display: table; clear: both; } .uf6da32eab98cab97f62d3b543fbb340b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uf6da32eab98cab97f62d3b543fbb340b:active , .uf6da32eab98cab97f62d3b543fbb340b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uf6da32eab98cab97f62d3b543fbb340b .centered-text-area { width: 100%; position: relative ; } .uf6da32eab98cab97f62d3b543fbb340b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uf6da32eab98cab97f62d3b543fbb340b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uf6da32eab98cab97f62d3b543fbb340b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uf6da32eab98cab97f62d3b543fbb340b:hover .ctaButton { background-color: #34495E!important; } .uf6da32eab98cab97f62d3b543fbb340b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uf6da32eab98cab97f62d3b543fbb340b .uf6da32eab98cab97f62d3b543fbb340b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uf6da32eab98cab97f62d3b543fbb340b:after { content: ""; display: block; clear: both; } READ: Movie Summary - Rachel Getting Married EssayA quote from Cifford Geertzââ¬â¢s excerpt says, culture provides the link between what men are intrinsically capable of becoming and what they actually, one by one, in fact become (Geertz, 52). We can use this quote to analyze why Hobart Ison decided to shoot Hugh Oââ¬â¢Connor and the aftermath of the shooting. After Hobert had fired his gun he came to be considered a hero in that small town. Hobert was only sentenced to ten years in prison but was paroled after only one. This is strange because criminals typically serve a much more severe punishment after taking anotherââ¬â¢s life. The film stated how it was almost impossible to find a suitable jury because Hobertââ¬â¢s whole community rallied behind him even though he had shot someone. If someoneââ¬â¢s life is taken out of an enraged act that draws attention to an obvious issue, then should his or her punishment be any less? Barret portrays how both sides, the filmmakers and Hobert, were pushing their limits. Barret vividly demonstrated what happens when those generic borders are pushed. The filmmakers were pushing the Hobertââ¬â¢s property line along with the integrity of the town. In return, Hobert definitely was pushing the boundaries of the law when he pulled that trigger. What Hobert did was wrong but in the context he got off with a rather fair punishment. Hobert knew that what the filmmakers were doing was wrong and although he had an aggressive way of dealing with it, brought attention the how bad the occurring issue was. While some may still believe Barretââ¬â¢s connection to the town led to a bias portrayal, Barret gives multiple angles to every story and did a respectable job at explaining the many varying sides of this one. Barret was able to capture this aspect in her film because she leaves us to question what the responsibilities of anyone who takes images of others and puts them to their own uses are.
Saturday, March 14, 2020
How to Start the Semester Right - Grad Student Study Advice
How to Start the Semester Right - Grad Student Study Advice The most effective way to ensure success in classes learning and getting good grades is to prepare early and often. Most students recognize the value of preparation in ensuring excellent class performance. Prepare for each class, each test, each assignment. Preparation, however, begins before the first reading assignment and first class. Prepare for the semester and youll be off to a great start. So, how do you start the semester right? Start on the first day of class. Get into the proper mindset by following these three tips. Plan to work. Colleges - and faculty - expect you to put in a significant amount of time over the course of the semester. At the undergraduate level, a 3 credit course generally meets for 45 hours during the semester. In most cases, you are expected to put in 1 to 3 hours for every hour of class time. So, for a class that meets 2.5 hours a week, that means you should plan to spend 2.5 to 7.5 hours outside of class preparing for class and studying the material each week. You likely wont spend the maximum time on every class every week - its a big time commitment! But recognize that some classes will require relatively little prep and others may require additional hours of work. In addition, the amount of time you spend in each class will vary during the semester. Get a head start. This one is simple: Begin early. Then follow the class syllabus and read ahead. Try to stay one reading assignment ahead of the class. Why read ahead? First, this permits you to see the big picture. Readings tend to build on each other and sometimes you may not realize that you dont understand a particular concept until you encounter a more advanced concept. Second, reading ahead gives you wiggle room. Life sometimes gets in the way and we fall behind in reading. Reading ahead permits you to miss a day and still be prepared for class. Likewise, start papers early. Papers nearly always take longer to write than we anticipate, whether its because we cant find sources, have a hard time understanding them, or suffer from writers block. Start early so that you wont feel pressed for time. Mentally Prepare. Get your head in the right place. The first day and week of classes can be overwhelming with new lists of reading assignments, papers, exams, and presentations. Take the time to map out your semester. Write down all classes, due dates, exam dates in your calendar.Ã Think about how you will organize your time to prepare and get it all done. Plan time off and time for fun. Think about how you will maintain motivation over the semester - how will you reward your successes? By mentally preparing for the semester ahead you put yourself in the position to excel.
Wednesday, February 26, 2020
Great Works of Western Philosophy pre-final paper 2 Essay
Great Works of Western Philosophy pre-final paper 2 - Essay Example While Anselmââ¬â¢s ontological argument achieved a good amount of support, Aquinasââ¬â¢ cosmological outlook was the result of his strong criticism of the views of the former. However, what seems to be evidently noticeable is that Aquinasââ¬â¢ argument is another improvement of the ontological view of Anselm. Saint Anselm proposes his ontological view on the existence of God in Proslogion, one of the most discussed philosophical discourses of all time. As Anselm argues, he makes certain key points in favor of the existence of God: So the ontological argument states that God is the greatest possible entity to be conceived, and God exists in both reality as well as in our understanding. Whatever we can assume in the mind, it can also be conceived of as existing in reality too. Therefore, God is the greatest being existing in both reality and in the mind. However, Anselmââ¬â¢s ontological theory has been criticized and strongly rejected by a number of Catholic theologians as well as non-Christians, and particularly by Thomas Aquinas, another Italian theologian. Aquinasââ¬â¢ most acclaimed work is Summa Theologiae or ââ¬ËSummary of Theologyââ¬â¢, where he discusses his outlook on the existence of God. Criticizing the ontological argumentation of Anselm, Aquinas elaborates his cosmological view on the existence of God in terms of five arguments or proofs. The first proof is argued from the point of view of motion that everything on earth undergoes change with regard to something existing in reality. That means there must be a first mover from which it starts. This mover is constant and known as God. The second proof argues that every effect must have a cause. The first and efficient cause of everything is known as God. The third proof states that God is the main cause for the necessary existence of everything. The fourth pr oof argues that God is the most perfect thing to possibly conceive of. The fifth proof argues that God is the master planner of everything
Monday, February 10, 2020
Sociology and Class Essay Example | Topics and Well Written Essays - 750 words
Sociology and Class - Essay Example However the Marxist theory of racism bases racism on another interesting premise. The class conflict where as the Proletariat (the working classes mainly composed of the Black and ethnic minorities) will be suppressed by the Bourgeoisie (the ruling classes primarily composed of the White majority who will be economically stronger and thus in a position to marginalize the "proletariat" i.e. the Black minorities) Today the modern African American can be identified with the likes of Opera Winfrey and Barrack Obama, as well as highly educated Hollywood stars like Will Smith etc.This denotes a respectable status for them but academics like in the Article at hand are quick to point to the reality of the ghettos and poor uneducated members of the ethnicity who live on low pay differentials. From the Marxist sociological perspective these economic and wage differentials are responsible for the continuous racial tensions in states like Los Angeles which have a large number of minorities settled there.Most of this crime and disorder is based upon race and ethnicity. The current racial tension is not just the usual white-black conflict but now statistics show that the local African American Population feels economically threatened by the immigrants that come from Latin America. As the article notes the root of most of the violence and unemployment in the Ghettos is poverty and increased immigration. Things are further complicated by racist judicial and law enforcement mechanisms which promote the gang culture and lure poverty stricken and suppressed young people into crime and disorder. The economic and sociological conflicts with in the "proletariat" (working classes) lead to ethnic squabbles between and with in the suppressed minorities in the over crowded metropolitan cities and it is worth noting from a political perspective that the black Latino rivalry for economic opportunities means that in 2008 presidential race there is not Latino support for Mr. Obama. Unemployment has caused a deterioration in race relations based on unequal wealth distribution and the fight for survival within the marginalized groups.As long as these minorities remain economically and socially suppressed there is little chance of reducing these tensions. There is a need for sustainable community measures to counter the problems in this area of racial economic conflict aimed at better race relations. All this however keeps us wondering whether these sociological conditions exist for their own sake or is the conflict theory " a Marxist ideological ploy" which divides the lower classes so that the White and Black and working classes from other races fight each other instead of the bourgeoisie.However one never fails to reflect on the political system and the society which seems to adhere to the well known rhetoric of George Orwell in his well known parody of the Communist Manifesto and the Marxist ideals of race and class i.e. the "Animal Farm" where he stated that , "All animals are equal but some animals are more equal than others". Source: Materials provided in
Thursday, January 30, 2020
Network Design Essay Example for Free
Network Design Essay The objective at hand was to build a network from the ground up. This was accomplished by breaking down all of the sections and building upon all previous assignments. This was a good course as I learned a lot about all of the different sections of building a network. The pros are now I know how to build a network on the design side from the ground up. I learned quite a bit about using a lot of the technologies associated with networking and it allowed me to learn quite a few new concepts. Some of the downfalls about this course and what I have learned are I did not feel I accomplished much as there is no hands on training associated with the course. I do not feel like concepts and design ideas are a great resource to actually learn how to use any of the systems but they do give a pretty good idea. Cabling SpecificationsEthernet is a Local Area Network (LAN) technology with a transmission rate of 10 Mbps and has a typical star topology. Computers and devices must wait-and-listen for transmission time on the network as only one device can transmit at any one time. In order to operate with this network strategy, Ethernet incorporates CSMA/CD (Carrie Sense Multiple Access with Collision Detection). Each device on the network listens for the network to be clear before transmitting data. If more than one computer or device transmits data at the same time, then collisions occur. Once collisions are detected, all devices stop transmitting for a period of time until one of the devices senses the line is free and will then gain control of the line to transmit its data. Receiving devices just sit there waiting and listening for transmissions that are meant for them, which are determined by an IP (Internet Protocol) address. The main advantage to Ethernet is it is one of the cheapest networks to put into service. Compared to other hardware for Token Ring, Ethernet equipment such as hubs, switches, network interface cards, and cable (Cat5 common) is inexpensive. The main disadvantage to Ethernet is related to the collisions that occur on the network. Even though Ethernet cable (Cat5) is fairly inexpensive, it can become a cost issue if designing a large network as each device or computer requires its own cable connection to the central hub. Another disadvantage is distance limitation for node connections. The longest connection that can occur within an Ethernet network without a repeater is 100 meters. Todays Ethernet standards, 100 Mbps and 1000 Mbps, incorporate switched technology, which for the most part, eliminates collisions on the network. The IEEE (Institute of Electrical and Electronics Engineers) specification for Ethernet is 802.3 with three-part names designating the different types. For example, 10BASE-T is for 10 Mbps, and 100BASE-TX is for 100 Mbps. Token RingToken was developed by IBM as an alternative to Ethernet. The network is physically wired in star topology, but is arranged in a logical ring. Instead of a hub or switch like in an Ethernet network, a MAU (Multistation Access Unit) is used. Access to the network is controlled by possession of a token that is passed around the ring from computer to computer as data can only travel in one direction at a time. A computer that wishes to transmit data on the network takes possession of the token and replaces the token frame with data. The data goes around the ring and returns to the transmitting computer, which removes the data, creates a new token, and then forwards it to the next computer. The IEEE specification for Token Ring is 802.5 and it comes in two different speeds: 4 Mbps and 16 Mbps. The main advantage to Token Ring is there are never any collisions within the network, which makes it a highly reliable solution for high-traffic networks. The disadvantage to Token Ring is the network cards and MAU are more expensive than equivalent Ethernet hardware. FDDIFDDI (Fiber-Distributed Data Interface) is an architecture designed for high-speed backbones that operate at 100 Mbps, which are used to connect and extend LANs. A ring topology is used with two fiber optic cable rings. Ità passes a token on both rings and in opposite directions. The specification for FDDI is designated by the American National Standards Institute as ANSI X3T9.5. The advantage to FDDI is that it uses two rings for protection in case one ring breaks. When a break occurs, data is rerouted in the opposite direction using the other ring. It is also considered reliable because it uses a token-passing strategy. The disadvantage to FDDI is the expensive network cards and fiber optic cable. In addition, the amount of fiber optic cable is doubled because it has redundant rings. WirelessLocal Area Network (LAN) TopologiesA mesh topology has a point-to-point connection to every other device (node) within the topology. The point-to-point link is dedicated between each device so it will only carry traffic to the two devices that is connected by that link. The advantage of a mesh topology is it works on the concept of routes, which means that traffic can take one of several paths between the source and destination. The network is also robust in that it will not be crippled if one path becomes unavailable or unstable due to each device being connected to every other device. The Internet uses a mesh topology to operate efficiently. The main disadvantage to a mesh topology is the fact that it requires a large number of cables, which is very expensive. A bus topology is a multipoint topology that entails each device being connected to a common link or path. The common link can be thought of as the backbone to the network. All devices typically connect to the backbone with a T-connector and coax cable. The main advantages of a bus topology are that it is easy to install and is not expensive (cost effective) because it uses very little cable to build. The main disadvantage is if there is a problem with the one backbone cable, then the entire network will no longer have the ability to communicate.à These networks are also very difficult to troubleshoot because any small problem such as a cable break, loose connector, or cable short can cause the outage. The entire length of cable and each connector must be inspected during troubleshooting. Another disadvantage is the lack of amplification of the signal, which results in a limited network size based on the characteristics of the cable because of how far a signal can travel down that cable. A ring topology means that each device is connected in a ring, or daisy-chain fashion, one after another. A dedicated connection only exists between a device and the device on each side of it. Data flows around the ring in one direction. Each device contains a repeater that regenerates the signal before passing it to the next device. The main advantage of a ring topology is that it is easy to install. One disadvantage includes difficulty to troubleshoot because data flows in one direction and it could take time to find the faulty device when there are problems. The entire network could be taken off line if there is a faulty device or cable break within the ring. The star topology has each device in the network connected to a central device called a hub, which can actually be a hub or switch. All traffic must pass through the hub in order to communicate with any other device on the network. There is no direct communication between devices like in a mesh topology. One advantage to a star topology is any failure to one cable or device connected to the hub will not bring the entire network down. Repairs can be done to individual nodes without disrupting traffic flow. Another advantage is expandability of the network. Additional devices can be added to the network without disrupting any of the current users. All that is required is an additional cable run from the device to the hub. One disadvantage includes cable costs because each device must have its own cable connected back to the hub. The other disadvantage is the hub itself.à Since all traffic runs through one device, it becomes the single point of failure. If the hub goes down, so does the entire network. Wide Area Network (WAN) DesignA WAN, also known as a Wide Area Network, is an essential part to bigger corporate networks most government networks and companies with multiple sites as well. A WAN, basically, is 2 or more LANs (Local Area Networks) stuck together and running as one big network over a big geographical area. Although a WAN could cover very small distances, most WANs cover much larger geographical areas such as a country or possibly even the world. The largest WAN today would technically be the internet or the World Wide Web. The internet is, in short, one giant WAN because it consists of many smaller LANs and servers. Most WANs can cover a fairly large geographical area, but some, such as the World Wide Web can cover the globe. The United States Government has quite a big WAN as a lot of their LANs are in other countries. They need to get data from one place to another almost instantaneously, and this is one of the quickest and easiest ways to be able to do so. To be able to get on the internet, a subscriber must go through an ISP (Internet Service Provider) and they will give the subscriber access to the internet for a certain price every month. There are different ways to get access to the internet depending on the geographical location in which you live. A subscriber can go through dial up, which is one of the slowest methods, but it is also one of the most common. There is also DSL (Digital Subscriber Line) through most phone companies if they have access in the area and cable which is usually one of the fastest and most expensive methods to access the internet. The last common method is using a satellite to obtain access. This is usually the most expensive ways to access the internet because the equipment usually needs to be bought. When talking about telephone lines, we start getting into analog versus digital signals and degradation over longer distances. A telephone system works on analog signals. These work by a computer transmitting a digitalà signal to the modem which converts the signal into an analog signal (this is the beeping heard when a computer dials up to access the internet) and later being converted by a different computer back into a digital signal with the use of a modem. DSL is digital all the way, along with T1 and T3 lines. When using DSL or T1/T3 lines, a filter of some sort is used to filter out the digital and analog signals, so the phone and computer are receiving different signals. Companies usually use faster lines to access the internet or to have access to their other sites. Smaller companies can use DSL or Cable internet services, but when talking about larger corporations or the government, most use public systems such as telephone lines or satellites. Usually, when talking about larger companies and going through a public system, we are talking much faster speeds that can hold many more users. T1 and T3 lines are usually used, satellites are commonly used and fiber-optic is becoming much more common. When getting into many users on a WAN, we need to start talking about Network Latency. According to Javvin.com network latency is defined as Ãâlatency is a measure of how fast a network is running. The term refers to the time elapsed between the sending of a message to a router and the return of that message (even if the process only takes milliseconds, slowdowns can be very apparent over multi-user networks). Latency problems can signal network-wide slowdowns, and must be treated seriously, as latency issues cause not only slow service but data losses as well. At the user level, latency issues may come from software malfunctions; at the network level, such slowdowns may be a result of network overextension or bottlenecking, or DoS or DDoS activity.ÃâDos or DDos stands for Denial of Service and Distributed Denial of Service respectively. These types of attacks are usually by hackers or someone who does not want others to access a certain service. There was a recent DoS threat on the CNN webpage as some hackers wanted CNN to stop talking about a certain issue. This works by one or multiple people talking all of the networks latency or bandwidth from them and thus causing other not to be able to access their site or services. There are other issues that may slow down a users PC as well. Not all issues revolve around hacker attacks. A lot of problems could be caused by malicious software, such as, Spyware, Malware, Viruses, or other programs that may be problematic. These can usually be taken care of by installing anti-virus software or even a spyware removal tool. The issue here is instead of the malicious software causing slowdowns on a PC, there are slowdowns due to the software protecting a certain computer in the background. Sometimes a simple fix to this problem is to defragment a hard drive. This can tremendously speed up a PC, because the files will be closer together and easier and quicker to access. On a network, a simple way to test latency is to use the trace route program. To do this, simply go to a command prompt and type tracert and then an IP address if internal or a website if external. This will send out packets of information and check how much time has passed to receive a packet back. The time passed would be the latency time. Usually it says it only took a certain amount of milliseconds which does not seem like very much time, but it was only a tiny packet of information. The higher the milliseconds the higher the latency time. The higher the latency time, the longer it will take to do anything in a network. If a high latency time is present, there is bound to be lag somewhere down the line. In a WAN, the equipment that will be used is as follows. In each LAN there will be PCs connected to a router somewhere (this is a ring topology example) and that router should be connected into a switch. There may be more but this is a basic example. Each of these LANs then connects to a central HUB somewhere which should interconnect all of the LANs. All of the information then travels to the central hub which is then separated out to the correct switch, router and then PC. There are usually central servers that can store and backup all of the data on the network as well, but this was an example of a crude network. Most companies also a very repetitious and redundant with their WANs. This is because they do not want a central failure point to bring the entire company to itÃâs knees. There are usually multiple switches that can tie theà entire system together. If a huge corporations Wan decided to fail, the company could lose a few million dollars in a matter of minutes. This is the main reason redundancy in this situation makes more than enough sense. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. A WAN is an imperative part to any corporation, government agency or company with multiple locations, as it allows them to transfer data quickly, easily and over great distances at the click of a button. There seems to be more and more need for employees in the networking field today, because more and more corporations need to transfer data quicker and easier. There will be new technology soon that will improve our current technology such as fiber optic. Network ProtocolsThere are many solutions to remote access and the most common and one of the most cost efficient methods is the VPN (Virtual Private Network). VPN technology is already built in to most operating systems and is very easy to implement. With bigger environments and corporations, a consideration for concentrated VPN hardware should be in place because of the simultaneous users and stress on the servers. There are a few different types of VPN including IPsec, PPTP and SSL. Once the connection from remote access has been made, you need to make sure the files are readily accessible for the user logging in remotely. One way to do so is to use Samba which is an open source file access system. Thereà are other ways to allow access as well. Using remote desktop connection, the user has the ability to log directly in to their PC and use it as if they were sitting at their desk, rather than away from the company. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. Network Remote AccessMost companies need to be able to access their work from many locations, including home and while traveling. The solution that allows them to access the network is one of two ways to access their network. The first is through a VPN (virtual private network) that allows the user access to remotely log in easily and quickly. The other way is through a dial up remote connection; this way is a bit easier to set up but can become very costly in the long run. The problem with being able to do this is it can be very costly and can eat up much of the IT departments time to set up, configure and implement this system into the current hardware. The definition from whatis.com about a VPN is Ãâ virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizations network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunnelingà Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a tunnel that cannot be entered by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.ÃâA VPN, also known as a Virtual Private Network is a helpful tool that allows users of a specific domain to be able to log in to their PC from anywhere in the world with the help of another PC. With this tool, they would log in with a special piece of software, using their user name and password to gain access to all functionality of the PC they want to log in to. This allows for a lot of comfortable solutions, such as if an employee is sick, they may still have an option to work from home. This allows a flexible company schedule as well because if a user needs to access a document from their home PC, they can essentially log in to their work PC and download t he document. Network Business ApplicationsA second way to access oneÃâs computer from a different location would be using a dial up service, with this you can basically dial in to access all of their resources available within the server. Using this is a very secure and easy route to go, and allows the user access to files they may desperately need. Another good thing about using a remote connection to access a server is if the user is on a business trip, they have the ability to access all of their much needed documents easily and securely with out much fuss. The explanation between these two pieces of technology is Ãâwith dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server. After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. After the virtual point-to-point connection is created, the rest of the connection parameters can be negotiated. ÃâThere are many advantages and disadvantages to using a dial up remote connection over VPN. The biggest advantage I have been able to find is, it is easier to setà up and maintain while using VPN makes you set up and maintain individual accounts for both the VPN and the users name and password on the system. Another advantage of dialing up in to the system would be the fact that no matter where the user is all they need to do is plug into a phone jack and they should be able to log in. The disadvantage of this is depending on where the user is long distance charges may apply and it could rank up a pretty penny or two. Another disadvantage is although the system is cheaper in the short term, the system may be more expensive than VPN in the long run. There are also other methods of using VPN. One specific way is certain ISPs (Internet Service Providers) and other third party support companies are assisting in setting up the VPN and supporting it without a great deal of time spent on it by the current department. This may or may not be more cost efficient than setting it up yourself, but it does remove a lot of the headache that VPNs can give due to different errors. There are also many advantages and disadvantages to using a VPN over a dial up system. One of the biggest advantages to this system over a dial up system is in the long run this is a much cheaper system than a dial up system. This system is a little bit quicker than a dial up system as well. This system is cheaper than a dial up system because using a dial up system, long distance fees may apply, with the virtual private network, you do not need to worry about this as the user may call into a local internet service provider to gain access. Any internet connection will gain a user access to the companyÃâs network through a VPN. Through all of this, there still needs to be security measures put in place to keep unwanted users off of the system while allowing employees or other authorized users access without down time. VPNs can work well with firewalls, all the IT department would need to do is allow the ports to be accessed by the VPN and the user should have full access. All in all, there are two very cost effective solutions at a companyÃâs finger tips and both are fairly easy to set up. The company needs to decide if they want to save money up front and make it easier so they do not needà to set up multiple accounts per user, or if they would rather have a better solution and save more money down the road. The choice also depends on the amount of users logging in at any given moment. Backup and Disaster RecoverySecurity, back ups and disaster recovery are all important very parts of all networks in todays world. The problem with today is information on how to hack, destroy and program any type of malicious software (or malware) is easily accessible via the Internet and other easy to access sources. There are roughly 1.4 billion people on the Internet or that at least have access to the Internet in the world, which is about 25% of the worlds population. All of these people have extremely easy access to hacking networks, creating malware and destroying any personal or private data a user may have and wish to keep. There is not really any way to stop these people from harming our personal software and data from their side, this is why a user needs to make sure they have security on the users side. There are other things that happen besides people trying to maliciously harm a users files and data. Accidents can happen and destroy data as well. There could be many things that can harm a users data such as a fire, earthquake, power surge or worst case scenario, some sort of electro magnetic pulse (EMP). This is where data back ups and disaster recovery come in nicely. There are many companies that specialize in helping a user or company back up their data and store it off site such as SunGard (mostly used in bigger company settings). There are other ways to store a users data as well. One way is to make a physical copy of everything needed on CDs, DVDs, Flash Drive or some other type of media and store it at a friends house or some other persons house they trust. This keeps a hard copy of all of their data off site just in case something happens and it can now be restored. There are a few other companies as well that offer on line backups. For this a user downloads their software and it automatically backs up to a few different location for redundancy which allows the customer more safety and easier access to all of their files. One of the first steps to a business that wishes to be very secure in allà that they do is to set up a backup and disaster recovery plan to start it all off. Like I stated earlier, there are many way s to do it. If this is a larger company they probably want to hire someone internally to make a physical back up of all the data and send it to an off site company for storage. They should also keep another copy close to them at all times, preferably away from where the physical data lies. They should put it on the opposite side of the building than where the file server is. If anything happens to the servers, they can quickly and easily use their backed up copy of all the data and recover it on to the servers in which they lie. Most companies have 2 or 3 backup units on site for redundancy and this allows that if one of those go down as well there are still a couple others in which they can restore all of the data from. Although this can become a little more expensive than just a regular back up system, sometimes it can be well worth it. Network SecurityAccording to devx.com Ãâthe first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them using a simple system: rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high. For example, a small Internet company (less than 50 employees) located in California could rate an earthquake threat as medium probability and high impact, while the threat of utility failure due to a power outage could rate high probability and high impact. So in this companys risk analysis, a power outage would be a higher risk than an earthquake and would therefore be a higher priority in the disaster recovery plan.ÃâAnother big part of any security system development is the company (or department) needs to look at their budget and how much they are willing to spend on their system. A company can get a basic security system for their network (including firewall) for fairly cheap and this may do most of what is needed, but larger companies are going to need to spend quite aà bit more money than that of a small company. Most larger companies spend quite a bit because they usually have higher priced clients that they can not afford to lose and all of their data is invaluable to the company. Some companies actually have their own Information System Security employees to monitor the network in case of any type of attack. They also make sure all of the anti-virus and anti-malware softwares are running and updating properly. Lastly, another thing most companies forget about after they have their equipment and software installed is there is more than just the implementation of the hardware and software to save them. They need to make sure everything continues to run and update itself from newer and bigger threats. These companies need to make sure they continually test and check what needs to be done to continually maintain a network that can not be broken in to. There are people out there that can be hired to try and break into a companies network. They get paid and let the company know what needs to be fixed so others can not break into it as well. In conclusion, a company can be nothing or brought to its knees with out its network and servers. There are many things that can cripple a company without the help of man. The only way to avoid these is to have a proper disaster recovery plan and to make sure the network is not vulnerable in any way. References About, Inc. (2004). Network topologies : bus, ring, star, and all the rest. RetrievedOctober 12, 2004, from http://compnetworking.about.com /library/weekly/aa041601a.htmBrain, M. (2004). How stuff works : how wifi works. Retrieved October 12, 2004,from http://computer.howstuffworks.com/wireless-network.htm/printableNetwork Latency. (n.d.). Retrieved April 27, 2008, fromhttp://www.javvin.com/etraffic/network-latency.htmlBroadband Internet. (n.d.). Retrieved April 27, 2008, fromhttp://www.pcworld.idg.com.au/index.php/id;988596323Wide Area Networks.(n.d.). Retrieved April 27, 2008, fromhttp://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.htmlVirtual Private Network. (n.d.).retrieved May 11, 2008, fromhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213324,00.html#VPN vs. Dial up. (n.d.). Retrieved May 11, 2008, fromhttp://technet2.microsoft.com/windowsserver/en/library/d85d2477-796d-41bd-83fb-17d78fb1cd951033.mspx?mfr=trueHow to Create a Disaster Recovery Plan, RetrievedMay 23, 2008, from http://www.devx.com/security/Article/16390/1954World Internet Usage Statistics, RetrievedMay 23, 2008, from http://www.internetworldstats.com/stats.htm
Wednesday, January 22, 2020
The Growing Problem of Terrorism and Terrorists Essay -- Terrorists E
Individuals often establish belief systems in regard to attitudes, behaviors, religions, and other areas based on beliefs and practices that they accepted during the early stages of maturation when many of their interactions were influenced by their families, who both supported and practiced the same traditions. In America the customary stance toward these varied opinions is to view them with tolerance, regardless of how strange or wrong the belief or action might seem. While individually people may disagree with the beliefs of other people, under ordinary circumstances, most Americans would either offer friendly advice or completely ignore situations that would not lead to dangerous or deadly outcomes. However, it seems to me that some people within practically all groups, regardless of their designations, sometimes decide to carry their belief systems to the extreme. Extremists move into the category of fanatics or radicals who seek to establish their belief systems as the only means for achieving a desired outcome. When people become fanatics, they believe that their ideals are the only acceptable way to live. Some will seek to destroy others who do not believe or act as they do. At that point, extremists become terrorists because they try to force others to accept their practices in such areas as social behaviors, politics, and religion. Terrorists frequently want everyone to practice the same social behaviors. Dressing in a particular style, eating specific foods... The Growing Problem of Terrorism and Terrorists Essay -- Terrorists E Individuals often establish belief systems in regard to attitudes, behaviors, religions, and other areas based on beliefs and practices that they accepted during the early stages of maturation when many of their interactions were influenced by their families, who both supported and practiced the same traditions. In America the customary stance toward these varied opinions is to view them with tolerance, regardless of how strange or wrong the belief or action might seem. While individually people may disagree with the beliefs of other people, under ordinary circumstances, most Americans would either offer friendly advice or completely ignore situations that would not lead to dangerous or deadly outcomes. However, it seems to me that some people within practically all groups, regardless of their designations, sometimes decide to carry their belief systems to the extreme. Extremists move into the category of fanatics or radicals who seek to establish their belief systems as the only means for achieving a desired outcome. When people become fanatics, they believe that their ideals are the only acceptable way to live. Some will seek to destroy others who do not believe or act as they do. At that point, extremists become terrorists because they try to force others to accept their practices in such areas as social behaviors, politics, and religion. Terrorists frequently want everyone to practice the same social behaviors. Dressing in a particular style, eating specific foods...
Tuesday, January 14, 2020
Cjs 210 Week 6 Checkpoint
Reactive Patrol CJS/210 January 17, 2012 Michael Catanzarita Reactive Patrol As I read chapter seven ââ¬Å"Patrol and Traffic ââ¬Å", I learn that a reactive patrol is a form of random patrol. Random patrol is said to be incident driven, or reactive, in that officers are responding to crimes only after they occur, either through rapid response to calls for service or to a violation or call in progress. Due to officer constantly moving it makes responding to these 911 calls easier and faster to respond. The specific activities an officer engages in while on random patrol vary significantly across officers, times, locations, and departments, because much of the time spent on patrol is officer initiated (Grant & Terry, 2008). I also learned about proactive patrol which is known as a Directed patrol. A direct patrol focuses more on targeted hot spots, crime problems, and/or offenders. Directed patrol addresses the problem-identification component of the problem solving process (Grant & Terry, 2008). Sometimes a directed patrol can occur on an informal level; this may be when an officer regularly drives past hot spots during random wanderings or parking the squad car in a specific location when writing reports are examples of an informal level. If policing agencies adopted only one of these patrol styles it would be harder to have police discretion. The condition of officerââ¬â¢s reaction to certain responds would change. If there was only reactive patrol officers would never be able to try to stop crimes before they happen. It would be wonderful to be able to stop all crimes before they happen but in all actuality we know this is not possible and that is why we need reactive and proactive patrol to keep our streets safe. Reference Grant, H. B. , & Terry, K. J. (2008). Law Enforcement. Patrol and Traffic, 7(Chapter 7), 171-172.
Subscribe to:
Posts (Atom)