Monday, August 24, 2020

Comparative Business Ethics Of British Petroleum †Free Samples

Question: Examine about the Comparative Business Ethics Of British Petroleum. Answer: Presentation English Petroleum (BP) works as a worldwide association working in the oil and gas industry and is headquartered in London. The organization runs dependent on the teamed up endeavors of around 75,000 individuals that help in meeting the expanded vitality needs of clients both along the local and corporate front. Some key realities about BP are created as follows. (English Petroluem , 2017) The report preferably points in understanding the recorded development of moral wrongdoings relating to BP. It likewise centers around comprehension and assessing the maintainability practices and implicit rules of the association despite potential ecological issues. History of BP and Questionable Conducts English Petroleum is seen to hold up under a recorded linkage with faulty behaviors. The organization has a long history of being related with various kinds of risks both natural and furthermore connected with that of neglecting to meet the rights and needs of laborers. Essentially, the oil and gas organization additionally face potential prosecution issues concerning the age of extensive measure of ozone depleting substances in the environment. History mirrors that from 2005, British Petroleum is the focal point of moral discussions owing not exclusively to the presence of various sorts of non-moral behaviors like extortion, age ecological and social debasement and furthermore in influencing the regular and untamed life territories. The blast of a treatment facility run by BP in Texas during 2005 murdering around 15 people and harming around 170 individuals was named blameworthy by the administrative authority of the Southern District in Texas for not agreeing to the Clean Air Act. Themanagement of BP conceded in a press meet that the organization had appropriately not conformed to various administrative systems concerning mechanical honesty and furthermore age of a sheltered beginning up. BP in this way dealt with arraignment indictments under the Clean Air Act that prompted the conclusion of the Texas Unit(Ferrell Hartline, 2013). For another situation during the ensuing year during 2006, British Petroleum inferable from its inability to properly react to warnings that prompted the spilling of the oil pipelines in Alaska prompting the spilling of raw petroleum in the tundra area and the solidified lakes. The equivalent required the association to render a great many measure of fines to the distinctive administrative specialists working in the area. The spilling of the pipelines that drove the organization to pay enormous measure of fines could have been effectively maintained a strategic distance from with a solid focal point of the companysmanagement to routinely check and clean the channels. Once more, the oil and gas organization came into spotlight attributable to itsmanagement being engaged with a demonstration of misrepresentation concerning both mail and wire extortion and furthermore due to effectively plotting to abuse the Commodity Exchange Act. English Petroleum being blameworthy of such charges was again required to pay a great many dollars as far as fines to the administrative specialists situated in United States. The above realities conceivably demonstrate that BP has had a long history of not taking appropriate consideration and consideration of the requirements and desires for both the interior and outer stakeholders(Ferrell et al., 2011). BP thusly centered around Greenwashing its picture through the age of impressive measure of speculation with respect to the advancement of sustainable power source assets and furthermore in upgrading the degree of maintainability through decrease of ozone depleting substance outflows. Essentially, age of compelling stories to make another reality than that reflected as far as confirmations were likewise completed by the association to extend its ecological and partner agreeable picture before the public(Ferrell Hartline, 2013). Assessment of BPs Efforts with respect to Sustainability English Petroleum (BP) ventured out manageability during 2005 with its drive of making strides toward environmental friendliness. At first the manageability activity was embraced by the organization as far as creating a little speculation of around $1.4 billion. It was anyway assessed that throughout the years the manageability activity of the organization would increase required significance. Wind Energy BP had introduced around 500 Mega Watts of wind vitality frameworks where around 432MW is seen as operational. The Wind Energy came into activities from 2008 with cooperation of BP with other breeze ranches like the Cedar Creek situated in Colorado. The breeze limit introduced by BP is assessed to meet the vitality flexibly of around 6 million habitations. Sun based Energy BP concentrated on going into concurrences with enormous number of sun oriented board delivering organizations based along various Asian economies. In United States, BP produces just around 4MW of sun oriented vitality that helps in the running of Wal-Mart stores arranged in California. A bigger piece of the sun powered business completed by BP is related with the European nations like advancement of two huge sunlight based force plants situated in Spain that helps in meeting the vitality needs of million habitations. Sunlight based Cities are likewise being arranged by BP that encourages in giving vitality to around seven Australian urban communities. As far as decreasing discharges of ozone harming substances, BP has built up a siphon framework run on sunlight based vitality arranged at Moxa Gas Field situated in Wyoming. The running of the siphons lessens the odds of the workers and the neighborhood networks from getting influenced by discharges of nursery gases(Ferrell Hartline, 2013). Biofuels BP recognizes Biofuels as a critical piece of its sustainable power source portfolio and subsequently focuses on its ceaseless turn of events and development for around two entire decades. BP in its offer to create on its biofuel ventures got perhaps the biggest partner in a bioethanol organization situated in Brazil, Tropical Energy S.A. The Brazilian organization contributes in the advancement of bioethanol items from sugarcane and along these lines creates around 115 million gallons of bioethanol. Further, BP is additionally concentrating on the improvement of a Special Purpose Entity (SPE) regarding cooperating with a cellulosic ethanol organization, Verenium Corporation(Ferrell Hartline, 2013). Carbon Sequestration and Storage (CCS) Concerning, BP has concentrated on the improvement of the Salah Gas Field situated in Algeria that contributed in catching and putting away around 1 million tons of carbon dioxide gas from the climate. BO further points in meeting its CCS goals at Hydrogen Energy for growing low carbon radiating force plants in locales like Abu Dhabi and California. BP had additionally built up the BP Zhuhai Plant (BPZ) Plant that contributes in diminishing Carbon Dioxide discharges as well as in restricting the work of Liquefied Petroleum Gas (LPG). From 2005, BPZ had contributed in diminishing the carbon dioxide outflow levels by around 35 percent and decrease of LPG use by around 48 percent(Ferrell Hartline, 2013). Suggestions to BP In spite of the above manageability exercises embraced by British Petroleum the oil and gas organization has part to gain from the grave wrongdoing during 2010 prompting the blast of the oil well working undersea and arranged in the Mexican Gulf. The blast prompted the murdering of 11 group individuals while rendering impressive harm on sea-going life and furthermore to other coast focused communities(Bredeson, 2012). The enormous scope spreading of oil on the sea depths caused the passings of huge number of winged creatures, angles, dolphins, turtles and shrimps. Themanagement of BP created a huge scope pay reserve of around $20 billion for countering the incident however the equivalent neglected to meet the maintainability necessities. The blast of the oil very much caused the spilling of raw petroleum of more than 134 million gallons that influenced the marine and untamed life in the region(Freudenburg Gramling, 2011). In the light of the above issue, BP is required to create on its administrative principles worried that with shielding the local situations from such developing disasters. The administration of BP is required to upgrade on its straightforwardness parameters for creating more prominent responsibility towards its diverse stakeholders(Mauk Metz, 2015). Additionally, possibility arranging frameworks are required to be created by BP for both the Coast Guard of United States and furthermore the administration of BP. English Petroleum is required to likewise create on its spill reaction initiatives(Kramer Pittinsky, 2012). BP is likewise required to create on its innovation parameters with respect to oil penetrating and furthermore work for the age of successful activity preparing for the apparatus administrators. The equivalent would contribute being developed of a more secure workplace for BP staffs working in such seaward projects(Barnett, 2016). BP as a potential customer of Transocean arranged in the Gulf of Mexico was required to adequately administer for creating precautionary measures in forestalling the rise of fiasco. It was later seen that the debacle plan of BP contained various paradoxes and was lacking for taking care of such possibilities. In this way, BP is required to constantly screen and create on its possibility and fiasco structure to appropriately deal with such terrible occasions like the Deepwater Horizon Spill(Ferrell Hartline, 2013). Intensity of BP Code of Conduct and Ethics Initiatives English Petroleum is seen to have experienced a significant stretch with respect to the issue of moral unfortunate activities. The Ethics and Compliance Team in BP during 2005 possibly worked in making, distributing and furthermore conveying the implicit rules for the organization. The Code of Conduct for BP is both accessible practically and truly and can be successfully gotten to by the representatives and staffs working in the oil and gas association. English Petroleum being a global firm has confined the Code of Conduct with the end goal that similar aides in joining people rising up out of assorted foundations and ethnicities under widespread guidelines planned by the association. The Code of Con

Saturday, August 22, 2020

History Of The American Mafia Essays - Genovese Crime Family

History Of The American Mafia Envision experiencing a daily reality such that wrongdoing dominated. A reality where hoodlums were more remarkable than government officials, claimed the police, and ran the city in the manner in which they felt. They looted whom they needed and murdered when they didnt get their direction. Presently quit envisioning and understand this occurred here in the United States of America during the 1920s. It was controlled by an association made up for the most part of Italians called the Mafia. The word Mafia itself has numerous implications. In Arabic it implies shelter, which alludes to the inceptions of the Mafia as a general public that fled to the slopes of Italy to stay away from assault. A few Italians hold it as an expression of high regard suggesting quality, boldness, spryness, snappiness, continuance, and insight (Brief History 2). This is the reason being an individual from the Mafia is such a respect to its individuals. Another importance of the word alludes to the Mafias beginnings as an abbreviation in Italian, Morte Alla Franciese Italia Annela. This makes an interpretation of to Death to French is Italys Cry regarding Italians abhorrence for the French during their intrusions during the 1800s. The Mafia began in Sicily as a mystery society to join Sicilian locals against intrusions by France and Arabs in the late 1800s. These Mafia individuals drove a rebel against the French and Arabs and picked up control after some time. As time advanced, the Mafia controlled the administration, banks, and police movement and went to wrongdoing for benefit. A Mafia-run Sicily thrived until the ascent of Benito Mussolini. As a backer of communism, he started to get serious about Mafia movement in Italy (Brief History 2). This constrained a considerable lot of the conspicuous crowd supervisors to escape America where they would succeed for 10 years and a half. As muddled as it may be, the Mafia spins around one fundamental rule called Omerta. Omerta is a vow where each official individual from the Mafia must be confirmed under. This code expresses that all family-based exercises are over all local family matters in the home, it implements quiet, a strike upon another part resembles a strike on the supervisor himself. Disregarding any of these laws is deserving of death with no preliminary or regret (Whizkid01 3). This one worth is the thing that kept Mafia families incredible and prosperous. As the Mafia developed in America, they succeeded off illicit betting and prostitution. It wasnt until 1919 with the confirmation of the eighteenth Amendment to the Constitution that the Mafia truly picked up power. The eighteenth amendment restricted the conveyance and assembling of mixed refreshments in America (Prohibition 2). In spite of the fact that this alteration amounted to only great, it did the specific inverse to America. While legislators saw an improved country with this alteration, hoodlums saw green. Americans presently thought drinking as a rush, it was something unlawful that they can do however pull off. It was the surge of pulling off it that made speakeasies so well known. Speakeasies were Mafia-run diversion clubs, comprising of free drinks of the best bootlegged alcohol alongside feasting and amusement (Prohibition 5). One of the best Mafia managers associated with bootlegging and prostitution was Charles Lucky Luciano. He was conceived in 1897 in Sicily, Italy. At 9 years old he moved to the Lower East Side of New York. In 1920 he started his own prostitution ring in New York. By 1925 he had control of all the prostitution rackets in Manhattan. He moved into bootlegging alongside Meyer Lansky in 1931. That equivalent year, he composed a gathering for all the families in New York after the execution of his opponent, Masseria so as to look after harmony. The association of the five families depended on Caesars administering of the Roman Empire, implementing association and discipline and the code of Omerta. Albeit all the cash he made was illicit, Luciano still revealed all charges and kept his desk work clean. Be that as it may, he didn't get away from the anger of the ravenous Thomas E Dewey, an incredible head prosecutor. The black market engineer was raised on 90 charges of racketeering however was discharged sound. Luciano and the US worked an arrangement where Luciano would uncover imperative realities

Sunday, July 19, 2020

MindMeister now available to SAP StreamWork users - Focus

MindMeister now available to SAP StreamWork users - Focus SAPs StreamWork solution is an enterprise-class suite of collaboration tools incorporating various methods and practices to facilitate corporate decision making. The goal of the platform is, “[to] bring together the people, information, and proven business approaches to drive fast, meaningful results.” As StreamWork continues to grow, SAP is paying close attention to what users are interested in seeing in their collaboration and decision-making toolkit. Leveraging the power of user voice, SAP invites participants to suggest, vote on, and rank these requested tools. Just after the Google Docs integration, SAP StreamWork users unanimously voted  that a mind mapping solution is a “must have,” with many of them recommending MindMeister. We’re pleased to announce that SAP and MindMeister have answered this call, as MindMeister is now available to StreamWork users worldwide as a fully integrated gadget via the newly launched OpenSocial API. MindMeister and SAP Streamwork from MindMeister on Vimeo. Once users have added MindMeister to their SAP StreamWork accounts, the MindMeister service is then available under: Tools Catalogue Gadgets MindMeister As with any MindMeister service, SAP StreamWork users’ mind mapping data is securely based in the cloud, thus allowing them to access up-to-the-minute data and changes, no matter where they are. Likewise, our convenient iPhone and iPad apps can keep the collaboration going, even if StreamWork users are away from their main workplace. The MindMeister for SAP StreamWorks does not currently contain all of MindMeister’s features, but rather, offers users a quick, easy-to-get-started, version. Rest assured, all of our core functionality is present, but we’ve stripped down a few of the “extras” in favor of ease of use, stability, and speed. “With MindMeister now available within SAP StreamWork, our users now have a powerful, free-thinking, concept-exploring and open-collaboration option available for use at the ready,” said Holly Simmons, senior director, OnDemand Marketing, SAP. Update 22 March 2017: Please note that StreamWork was unfortunately sunset in December 2015.

Thursday, May 21, 2020

Juvenile Crime And Juvenile Justice System - 906 Words

In Society, many are concerned about the high percentage of crimes that are committed, we tend to turn immediately to our youth thinking that if we somehow manage to keep youth under control we will deter crimes. As discuss in chapter 9 and the OJJPD reports, the juvenile justice system had determined that by waiving and transferring minors who commit crimes to criminal courts to be tried and punished like an adult, there would be a decrease on violent crimes. On the other hand, there are many intake alternatives and diversion programs that can be considered instead of crowding up the criminal courts with juveniles delinquents. Research have point out various types of studies, which makes a comparison of the effects on youth who were transferred to adult criminal court with those who were retained in juvenile justice system. In the processes, youth were matched with their age, gender, race, and prior offense history through automated data systems. By doing so, it concluded that it wa s more likely to see an increase recidivism in youth when they were transferred to criminal courts than to see an end of it. Therefore, placing youth in criminal court will give that young person less opportunity to regained the possibility to become a better citizen. It is clearly that placing kids in adult jails, gives them the urge to learn how to be tough and defend themselves by proving to real criminals that they can be good criminals too, making them want to reoffend when they getShow MoreRelatedJuvenile Crime And The Juvenile Justice System1278 Words   |  6 PagesBryn Conley November 7, 2014 Juvenile Crime and the Juvenile Justice System in North Carolina: Informative Speech Specific Purpose Statement To inform my audience about the seriousness of juvenile crime and the problems that North Carolina faces when dealing with underage offenders. Introduction I. According to the Annual Summary Report done by the North Carolina Department of Justice and the State Bureau of Investigation, in 2012, approximately 36,000 juveniles were arrested in the state of NorthRead MoreJuvenile Justice System And For Reducing Juvenile Crime Rates2187 Words   |  9 Pagesuniversally important. Examples include crime, economics, education, family, healthcare, homelessness, poverty, and many others. The United States is now the world leader in its rate of incarceration. Over the past 25 years, juvenile crime has skyrocketed, with drug crimes, gang violence, school shootings, and other violent acts being regularly featured in the news. During the past 10 years, nearly all 50 states have overhauled their juvenile justice laws, allowing more youths to be tried asRead MoreJuvenile Crime : The Criminal Justice System1031 Words   |  5 PagesIn the 1990s, violent juvenile crime rates had reached record high levels throughout the United States. During these years, many Americans considered the criminal justice system too easy on violent juvenile offenders and demanded reform. Many states, including Florida began to focus efforts on juvenile crime. â€Å"Florida’s criminal sentencing laws and punishment policies from 1980 to 2000 reflected an ongoing, focused effort to deter serious crimes† (Taylor). Crimes were given stricter sentencing guidelinesRead MoreJuvenile Justice System As A Form Of Crime Control882 Words   |  4 PagesSocial control has been a central concept in sociological discussions of law for the past century (Black, 1976), the juvenile justice system as a form of social control is no exception (Blomberg, 1977). Juvenile justice has a rich history in early British Law, but as a separate entity in the US, its history is relatively short but no less important. What began as a movement to separate youths from adults to shield them from contamination of incorrigibility (Fox, 1996), appears to have become an otherRead MoreJuvenile Crime Issues in Today’s Criminal Justice System18893 Words   |  76 Pages ©  ©  ©  © chapter 15 Juvenile Justice chapter 16 Drugs and Crime chapter 17 Terrorism and Multinational Criminal Justice chapter 18 The Future of Criminal Justice These individual rights must be effectively balanced against these present and emerging community concerns: Widespread drug abuse among youth The threat of juvenile crime Urban gang violence High-technology, computer, and Internet crime (cybercrime) Terrorism and narcoterrorism Occupational and whitecollar crime  ©  © A right to privacyRead MoreAnalysis Of The Cycle Of Juvenile Justice1342 Words   |  6 PagesRunning head: CYCLE JUVENILE JUSTICE​ ​1 Analysis of the Cycle of Juvenile Justice Theory Name School ​​ Professor Class Date Analysis of the Cycle of Juvenile Justice Theory ​In the text, Thomas Bernard examines the cyclical nature of the juvenile justice system (Weisheit Culbertson, 2000, p. 13-31). The author posits that the implementation of juvenile justice is constantly swinging from one extreme to the other based, largely, on the public’s perceptionRead MoreFuture of the Juvenile Justice System1280 Words   |  6 PagesFuture of the Juvenile Justice System The future of the juvenile justice system is uncertain. There is a struggle to try a find a way to serve the needs of the juvenile delinquents and issue them a punishment for violating the law. In order to improve the direction of the juvenile justice system, recommendations are needed regarding community involvement, law enforcement, courts, corrections, and the private sector. These recommendations address issues that the system is currently facing and offersRead MoreThe Juvenile Justice System Is A System Modeled To Provide1066 Words   |  5 PagesThe Juvenile Justice System is a system modeled to provide a legal setting where youths account for their wrongs or are offered official protection. A distinct juveniles justice system commenced in the United States over 100 years ago. The first juvenile court was established in 1899. The system is founded under a range of core principles. First, juveniles are different from adults and hence need to be handled differently by the Justic e System. Second, it is argued that juveniles differ from oneRead MoreEssay on Juveniles Tried as Adults843 Words   |  4 PagesQuestion #1 A juvenile being tried as an adult is a very sensitive and controversial issue over the past years. There has been a significant increase in the number of juvenile offenders being tried in adult courts for serious crimes. Juveniles should be tried as adults depending on the seriousness of the crime that they commit. There are many factors that contribute to juvenile courts and to what extent a juvenile should be tried as an adult. The juvenile justice system was intended to rehabilitateRead MoreCrime And Juvenile And Adult Crimes1019 Words   |  5 PagesIn today’s criminal justice system in the United States, there is a lot of dispute between what the qualifications are for juvenile and adult crimes. Some believe that the only difference is age. Others say it is the severity of the crime. It’s obvious that when adults commit crimes, whether they are a misdemeanor offense or a felony, they pay for it. The confliction comes when a juvenile commits a crime. What exactly determines if they are tried as an adult or a juvenile? Does it vary by state-to-state

Wednesday, May 6, 2020

The Civil War Of The United States - 1440 Words

The Civil War was one of the most deadly wars the United States ever fought it was fought between the North and South and to this day still leaves a big mark on the history of the United States. Though the Civil War seemed to be clear cut on what happened during the conflict its cause is to this day seemingly undecided. Was it the simple piece of legislature called the Kansas-Nebraska act that started it or the election of the United States president Abraham Lincoln that caused the turmoil? Either way these two causes have their starting points in slavery in the United States. Slavery was the ultimate cause of the Civil War. As the United States furthered its land and power by expanding west the land had to be divided equally between free states and slave states. As the United States expanded west it had to equally divide the land between the North(free) and the South(slave). This need to distribute the land equally lead to the compromises before the Civil War. The compromises that where made only prolonged the Civil War until its start. First there was the Missouri Compromise which stated that anything above 36- 30 degrees North was free with the exception of Missouri. But the Missouri Compromise did not last long as the Mexican Cession soon gave the United States more territory to divide among the North and South. The Compromise of 1850 prolonged the Civil War but more land was obtained and more compromises to keep stability between North and South. But all great thingsShow MoreRelatedThe Civil War : The United States1622 Words   |  7 PagesThe Civil War divided the United States with its’ or igin in the struggle to preserve the Union from the Confederacy’s succession. A war to maintain the United States quickly progressed to battles fought because of the controversial beliefs on slavery in the North and South. In the coming of the Civil War there were questions and confusion that many Americans were faced with in the words of the South’s succession. During the war, families were torn due to the men lost to the Union or Confederate causesRead MoreThe United States Civil War918 Words   |  4 PagesThe United States civil war is thought of as what determined what kind of country we would be today. The U.S. civil war, otherwise known as the war of the states, began on April 12, 1861, and lasted until 1865. It consisted of the North (the Union) or the â€Å"free states†, against the South (the confederates) the slave states. When Abraham Lincoln became president in 1860 he made promises of free territories, which caused a division between men who owned slaves and men who agreed with Lincoln. SlavesRead MoreUnited States And The Civil War1668 Words   |  7 PagesUS Civil War United States of America was formed as a result of the revolution that continued from 1776 to 1783. After that, United States was divided into two wings/ parts that are the southern and the northern parts. Then conflict between the two aroused because the northern and the southern societies were totally different of each other in terms of economic structure, social class, politics and other social matters especially slavery. The civil war, that started in 1861 and ended in 1865, wasRead MoreThe Civil War : The United States909 Words   |  4 PagesThe Civil War was one of the most pivotal and significant moments in the history of the United States of America. Therefore, its impact of the Civil War was tremendous, and in many ways has shaped the way the United States has evolved into the present. The Civil War brought lots of beneficial changes to America including economic, agriculture, military, and people’s lives. During the Civil War, women stepped out of their domestic do mains to help or support their husbands in the field, or other soldiersRead MoreThe Civil War Of The United States1605 Words   |  7 PagesThe Civil War of the United States was a major and influential event in the history of our country. The Civil War shaped our nation and how we think of liberty in general. Such a big event in our antiquity must have been caused by a series of dominant events. However, a War of this size has many effects to go along with it. The most common effect thought of is the freedom of slaves, however, the Civil War was not just a war fought for freedom. One major cause of the Civil War was the issue of slaveryRead MoreThe Civil War Of The United States1561 Words   |  7 PagesCivil War Slaves Freedom can be defined as, â€Å"the power or right to act, speak, or think as one wants without hindrance or restraint†. (Definition) Everyone in the United States of America is entitled to this basic human right, presented to us by our founding fathers, though it was not always that simple. Even though it was in the Constitution, many people living before the mid 18th century in the United States were not extended this right, due to their nationality or lack of fortune. Someone lackingRead MoreThe United States And The Civil War920 Words   |  4 Pagesknown in the United States as simply the Civil War as well as other sectional names, was a civil war fought from 1861 to 1865 to determine the survival of the Union or independence for the Confederacy. Among the 34 states in January 1861, seven Southern slave states individually declared their secession from the United States and formed the Confederate States of America. The Confederacy, often simply called the South, grew t o include eleven states, and although they claimed thirteen states and additionalRead MoreThe Civil War Of The United States1233 Words   |  5 Pages â€Å"Blundering Generation† Division among a population for opposing goals wasn t a new concept brought to light by the Civil War. Almost one hundred years prior to the Civil War, inhabitants of the thirteen colonies fought against each other towards their differing support for their wages of unity. Patriots fought Loyalists for coalition of the colonies, and likewise Northerners now fought Southerners for the preservation of the Union. The imminent breakup of the Union, likewise to the dissolutionRead MoreThe Civil War : The United States1455 Words   |  6 PagesThe fairly young United States was a family of emancipated children who now had to fend for themselves, and with any group of young people, arguments are bound to arise. To continue with this metaphor the Civil War can be compared to siblings resulting to violence to get rid of the tension that had been increasing since is conception. The main issues that led to this war were that the north and the south had different views on slavery. Furthermore t he south felt that the north would impose its lifestyleRead MoreThe Civil War Of The United States1082 Words   |  5 Pagesof the United States was the Civil War. The Civil War is often remembered as the war to end slavery. While that did play a part of the Civil War the larger issue at hand was the annihilation of the United States of America. The Confederate States of America wanted to break away from the United States and form their own country. The Confederate States of America, or more commonly known as the Confederacy, was formed by seven slave states located in the southern region of the United States. The economy

Live and Let Live Free Essays

string(40) " is available by using %telnet sri-nic\." The Hitchhikers Guide to the Internet 1 The Hitchhikers Guide to the Internet Ed Krol krol@uxc. cso. uiuc. We will write a custom essay sample on Live and Let Live or any similar topic only for you Order Now edu Get any book for free on: www. Abika. com Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet 2 This document was produced through funding of the National Science Foundation. Copyright (C) 1987, by the Board of Trustees of The University of Illinois. Permission to duplicate this document, in whole or part, is granted provided reference is made to the source and this copyright is included in whole copies. This document assumes that one is familiar with the workings of a non-connected simple IP network (e. . a few 4. 2 BSD systems on an Ethernet not connected to anywhere else). Appendix A contains remedial information to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the â€Å"oral tradition† of the Internet to the point that that net can be connected to the Internet with little danger to either. It is not a tutorial, it consists of pointers to other places, literature, and hints which are not norm ally documented. Since the Internet is a dynamic environment, changes to this document will be made regularly. The author welcomes comments and suggestions. This is especially true of terms for the glossary (definitions are not necessary). In the beginning there was the ARPAnet, a wide area experimental network connecting hosts and terminal servers together. Procedures were set up to regulate the allocation of addresses and to create voluntary standards for the network. As local area networks became more pervasive, many hosts became gateways to local networks. A network layer to allow the interoperation of these networks was developed and called IP (Internet Protocol). Over time other groups created long haul IP based networks (NASA, NSF, states†¦ ). These nets, too, interoperate because of IP. The collection of all of these interoperating networks is the Internet. Two groups do much of the research and information work of the Internet (ISI and SRI). ISI (the Informational Sciences Institute) does much of the research, standardization, and allocation work of the Internet. SRI International provides information services for the Internet. In fact, after you are connected to the Internet most of the information in this document can be retrieved from the Network Information Center (NIC) run by SRI. Operating the Internet Each network, be it the ARPAnet, NSFnet or a regional network, has its own operations center. The ARPAnet is run by Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet BBN, Inc. under contract from DARPA. Their facility is called the Network Operations Center or NOC. Cornell University temporarily operates NSFnet (called the Network Information Service Center, NISC). It goes on to the -2regionals having similar facilities to monitor and keep watch over the goings on of their portion of the Internet. In addition, they all should have some knowledge of what is happening to the Internet in total. If a problem comes up, it is suggested that a campus network liaison should contact the network operator to which he is directly connected. That is, if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet†¦ ) and have a problem, you should contact your regional network operations center. 3 RFCs The internal workings of the Internet are defined by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel (postel@isi. edu). He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically of course). It may go through multiple revisions. Should it be generally accepted as a good idea, it will be assigned a number and filed with the RFCs. The RFCs can be divided into five groups: required, suggested, directional, informational and obsolete. Required RFC’s (e. g. RFC-791, The Internet Protocol) must be implemented on any host connected to the Internet. Suggested RFCs are generally implemented by network hosts. Lack of them does not preclude access to the Internet, but may impact its usability. RFC-793 (Transmission Control Protocol) is a suggested RFC. Directional RFCs were discussed and agreed to, but their application has never come into wide use. This may be due to the lack of wide need for the specific application (RFC-937 The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891 Hello). It is suggested that should the facility be required by a particular site, animplementation be done in accordance with the RFC. This insures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable. Informational RFCs contain factual information about the Internet and its operation (RFC-990, Assigned Numbers). Finally, as the Internet and technology have grown, some RFCs have become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a new one to be issued obsoleting others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and subsequent RFCs Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet on the topic. -3(Appendix B contains a list of what are considered to be the major RFCs necessary for understanding the Internet). 4 The Network Information Center The NIC is a facility available to all Internet users which provides information to the community. There are three means of NIC contact: network, telephone, and mail. The network accesses are the most prevalent. Interactive access is frequently used to do queries of NIC service overviews, look up user and host names, and scan lists of NIC documents. It is available by using %telnet sri-nic. You read "Live and Let Live" in category "Papers" rpa on a BSD system and following the directions provided by a user friendly prompter. From poking around in the databases provided one might decide that a document named NETINFO:NUG. DOC (The Users Guide to the ARPAnet) would be worth having. It could be retrieved via an anonymous FTP. An anonymous FTP would proceed something like the following. (Th e dialogue may vary slightly depending on the implementation of FTP you are using). %ftp sri-nic. arpa Connected to sri-nic. arpa. 220 SRI_NIC. ARPA FTP Server Process 5Z(47)-6 at Wed 17-Jun-87 12:00 PDT Name (sri-nic. arpa:myname): anonymous 331 ANONYMOUS user ok, send real ident as password. Password: myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 12:01 PDT, job 15. ftp; get netinfo:nug. doc 200 Port 18. 144 at host 128. 174. 5. 50 accepted. 150 ASCII retrieve of NUG. DOC. 11 started. 226 Transfer Completed 157675 (8) bytes transferred local: netinfo:nug. doc remote:netinfo:nug. doc 157675 bytes in 4. 5e+02 seconds (0. 34 Kbytes/s) ftp; quit 221 QUIT command received. Goodbye. (Another good initial document to fetch is NETINFO:WHAT-THE-NIC-DOES. TXT)! Questions of the NIC or problems with services can be asked of or reported to using electronic mail. The following addresses can be used: NIC@SRI-NIC. ARPA requests REGISTRAR@SRI-NIC. ARPA General user assistance, document User registration and WHOIS updates Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet HOSTMASTER@SRI-NIC. ARPA Hostname and domain changes and updates ACTION@SRI-NIC. ARPA SRI-NIC computer operations SUGGESTIONS@SRI-NIC. ARPA Comments on NIC publications and services -4For people without network access, or if the number of documents is large, many of the NIC documents are available in printed form for a small charge. One frequently ordered document for starting sites is a compendium of major RFCs. Telephone access is used primarily for questions or problems with network access. (See appendix B for mail/telephone contact numbers). 5 The NSFnet Network Service Center The NSFnet Network Service Center (NNSC) is funded by NSF to provide a first level of aid to users of NSFnet should they have questions or encounter problems traversing the network. It is run by BBN Inc. Karen Roubicek (roubicek@nnsc. nsf. net) is the NNSC user liaison. The NNSC, which currently has information and documents online and in printed form, plans to distribute news through network mailing lists, bulletins, newsletters, and online reports. The NNSC also maintains a database of contact points and sources of additional information about NSFnet component networks and supercomputer centers. Prospective or current users who do not know whom to call concerning questions about NSFnet use, should contact the NNSC. The NNSC will answer general questions, and, for detailed information relating to specific components of the Internet, will help users find the appropriate contact for further assistance. (Appendix B) Mail Reflectors The way most people keep up to date on network news is through subscription to a number of mail reflectors. Mail reflectors are special electronic mailboxes which, when they receive a message, resend it to a list of other mailboxes. This in effect creates a discussion group on a particular topic. Each subscriber sees all the mail forwarded by the reflector, and if one wants to put his â€Å"two cents† in sends a message with the comments to the reflector†¦. The general format to subscribe to a mail list is to find the address reflector and append the string -REQUEST to the mailbox name (not the host name). For example, if you wanted to take part in the mailing list for NSFnet reflected by NSFNET@NNSC. NSF. NET, one sends a request to Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet -5NSFNET-REQUEST@NNSC. NSF. NET. This may be a wonderful scheme, but the problem is that you must know the list exists in the first place. It is suggested that, if you are interested, you read the mail from one list (like NSFNET) and you will probably become familiar with the existence of others. A registration service for mail reflectors is provided by the NIC in the files NETINFO:INTEREST-GROUPS-1. TXT, NETINFO:INTEREST-GROUPS-2. TXT, and NETINFO:INTEREST-GROUPS3. TXT. The NSFNET mail reflector is targeted at those people who have a day to day interest in the news of the NSFnet (the backbone, regional network, and Internet inter-connection site workers). The messages are reflected by a central location and are sent as separate messages to each subscriber. This creates hundreds of messages on the wide area networks where bandwidth is the scarcest. There are two ways in which a campus could spread the news and not cause these messages to inundate the wide area networks. One is to re-reflect the message on the campus. That is, set up a reflector on a local machine which forwards the message to a campus distribution list. The other is to create an alias on a campus machine which places the messages into a notesfile on the topic. Campus users who want the information could access the notesfile and see the messages that have been sent since their last access. One might also elect to have the campus wide area network liaison screen the messages in either case and only forward those which are considered of merit. Either of these schemes allows one message to be sent to the campus, while allowing wide distribution within. Address Allocation Before a local network can be connected to the Internet it must be allocated a unique IP address. These addresses are allocated by ISI. The allocation process consists of getting an application form received from ISI. (Send a message to hostmaster@sri-nic. arpa and ask for the template for a connected address). This template is filled out and mailed back to hostmaste r. An address is allocated and e-mailed back to you. This can also be done by postal mail (Appendix B). IP addresses are 32 bits long. It is usually written as four decimal numbers separated by periods (e. . , 192. 17. 5. 100). Each number is the value of an octet of the 32 bits. It was seen from the beginning that some networks might choose to organize themselves as very flat (one net with a lot of nodes) and some might organize hierarchically -6(many interconnected nets with fewer nodes each and a backbone). Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet To provide for these cases, addresses were differentiated into class A, B, and C networks. This classification had to with the interpretation of the octets. Class A networks have the first octet as a network address and the remaining three as a host address on that network. Class C addresses have three octets of network address and one of host. Class B is split two and two. Therefore, there is an address space for a few large nets, a reasonable number of medium nets and a large number of small nets. The top two bits in the first octet are coded to tell the address format. All of the class A nets have been allocated. So one has to choose between Class B and Class C when placing an order. (There are also class D (Multicast) and E (Experimental) formats. Multicast addresses will likely come into greater use in the near future, but are not frequently used now). In the past sites requiring multiple network addresses requested multiple discrete addresses (usually Class C). This was done because much of the software available (not ably 4. 2BSD) could not deal with subnetted addresses. Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet switches. Some of these nodes have a limited capability to store and exchange routing information (limited to about 300 networks). Therefore, it is suggested that any campus announce (make known to the Internet) no more than two discrete network numbers. If a campus expects to be constrained by this, it should consider subnetting. Subnetting (RFC-932) allows one to announce one address to the Internet and use a set of addresses on the campus. Basically, one defines a mask which allows the network to differentiate between the network portion and host portion of the address. By using a different mask on the Internet and the campus, the address can be interpreted in multiple ways. For example, if a campus requires two networks internally and has the 32,000 addresses beginning 128. 174. X. X (a Class B address) allocated to it, the campus could allocate 128. 174. 5. X to one part of campus and 128. 174. 10. X to another. By advertising 128. 174 to the Internet with a subnet mask of FF. FF. 00. 00, the Internet would treat these two addresses as one. Within the campus a mask of FF. FF. FF. 00 would be used, allowing the campus to treat the addresses as separate entities. (In reality you don’t pass the subnet mask of FF. FF. 00. 0 to the Internet, the octet meaning is implicit in its being a class B address). A word of warning is necessary. Not all systems know how to do subnetting. Some 4. 2BSD systems require additional software. 4. 3BSD systems subnet as released. Other devices -7and operating systems vary in the problems they have dealing with subnets. Frequently these machines can be used as a leaf on a network but not as a gateway within the subnette d portion of the network. As time passes and more systems become 4. 3BSD based, these problems should disappear. 7 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet There has been some confusion in the past over the format of an IP broadcast address. Some machines used an address of all zeros to mean broadcast and some all ones. This was confusing when machines of both type were connected to the same network. The broadcast address of all ones has been adopted to end the grief. Some systems (e. g. 4. 2 BSD) allow one to choose the format of the broadcast address. If a system does allow this choice, care should be taken that the all ones format is chosen. (This is explained in RFC-1009 and RFC-1010). 8 Internet Problems There are a number of problems with the Internet. Solutions to the problems range from software changes to long term research projects. Some of the major ones are detailed below: Number of Networks When the Internet was designed it was to have about 50 connected networks. With the explosion of networking, the number is now approaching 300. The software in a group of critical gateways (called the core gateways of the ARPAnet) are not able to pass or store much more than that number. In the short term, core reallocation and recoding has raised the number slightly. By the summer of ’88 the current PDP-11 core gateways will be replaced with BBN Butterfly gateways which will solve the problem. Routing Issues Along with sheer mass of the data necessary to route packets to a large number of networks, there are many problems with the updating, stability, and optimality of the routing algorithms. Much research is being done in the area, but the optimal solution to these routing problems is still years away. In most cases the the routing we have today works, but sub-optimally and sometimes unpredictably. -8- Trust Issues Gateways exchange network routing information. Currently, most gateways accept on faith that the information provided about the state of the network is correct. In the past this was not a big problem since most of the gateways belonged to a single administrative entity (DARPA). Now with multiple wide area networks under different administrations, a rogue gateway somewhere in the net could cripple the Internet. There is design work going on to solve both the problem of Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet gateway doing unreasonable things and providing enough information to reasonably route data between multiply connected networks (multi-homed networks). Capacity Congestion Many portions of the ARPAnet are very congested during the busy part of the day. Additional links are planned to alleviate this congestion, but the implementation will take a few months. 9 These problems and the future direction of the Internet are determined by the Internet Architect (Dave Clark of MIT) being advised by the Internet Activities Board (IAB). This board is composed of chairmen of a number of committees with responsibility for various specialized areas of the Internet. The committees composing the IAB and their chairmen are: Committee Chair Autonomous Networks Deborah Estrin End-to-End Services Bob Braden Internet Architecture Dave Mills Internet Engineering Phil Gross EGP2 Mike Petry Name Domain Planning Doug Kingston Gateway Monitoring Craig Partridge Internic Jake Feinler Performance Congestion ControlRobert Stine NSF Routing Chuck Hedrick Misc. MilSup Issues Mike St. Johns Privacy Steve Kent IRINET Requirements Vint Cerf Robustness Survivability Jim Mathis Scientific Requirements Barry Leiner Note that under Internet Engineering, there are a set of task forces and chairs to look at short term concerns. The chairs of these task forces are not part of the IAB. -9Routing Routing is the algorithm by which a network directs a packet from its source to its destination. To appreciate the problem, watch a small child trying to find a table in a restaurant. From the adult point of view the structure of the dining room is seen and an optimal route easily chosen. The child, however, is presented with a set of paths between tables where a good path, let alone the optimal one to the goal is not discernible. *** A little more background might be appropriate. IP gateways (more correctly routers) are boxes which have connections to multiple networks and pass traffic between these nets. They decide how the packet is to be sent based on the information in the IP header of the packet and the state of the network. Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Each interface on a router has an unique address appropriate to the network to which it is connected. The information in the IP header which is used is primarily the destination address. Other information (e. g. type of service) is largely ignored at this time. The state of the network is determined by the routers passing information among themselves. The distribution of the database (what each node knows), the form of the updates, and metrics used to measure the value of a connection, are the parameters which determine the characteristics of a routing protocol. Under some algorithms each node in the network has complete knowledge of the state of the network (the adult algorithm). This implies the nodes must have larger amounts of local storage and enough CPU to search the large tables in a short enough time (remember this must be done for each packet). Also, routing updates usually contain only changes to the existing information (or you spend a large amount of the network capacity passing around megabyte routing updates). This type of algorithm has several problems. Since the only way the routing information can be passed around is across the network and the propagation time is non-trivial, the view of the network at each node is a correct historical view of the network at varying times in the past. The adult algorithm, but rather than looking directly at the dining area, looking at a photograph of the dining room. One is likely to pick the optimal route and find a bus-cart has moved in to block the path after the photo was taken). These inconsistencies can cause circular routes (called routing loops) where once a packet enters it is routed in a closed path until its time to live (TTL) field expires and it is discarded. Other algorithms may know about only a subset of the network. To prevent loops in these protocols, they are usually used in a hierarchical network. They know completely about their own area, but to leave that area they go to one particular place (the default gateway). Typically these are used in smaller networks (campus, regional†¦ ). -10Routing protocols in current use: Static (no protocol-table/default routing) Don’t laugh. It is probably the most reliable, easiest to implement, and least likely to get one into trouble for a small network or a leaf on the Internet. This is, also, the only method available on some CPU-operating system combinations. If a host is connected to an Ethernet which has only one gateway off of it, one should make that the default gateway for the host and do no other routing. (Of course that gateway may pass the reachablity information somehow on the other side of itself). One word of warning, it is only with extreme caution that one should use static routes in the middle of a network 10 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet which is also using dynamic routing. The routers passing dynamic information are sometimes confused by conflicting dynamic and static routes. If your host is on an ethernet with multiple routers to other networks on it and the routers are doing dynamic routing among themselves, it is usually better to take part in the dynamic routing than to use static routes. 11 RIP RIP is a routing protocol based on XNS (Xerox Network System) adapted for IP networks. It is used by many routers (Proteon, cisco, UB†¦ ) and many BSD Unix systems BSD systems typically run a program called â€Å"routed† to exchange information with other systems running RIP. RIP works best for nets of small diameter where the links are of equal speed. The reason for this is that the metric used to determine which path is best is the hop-count. A hop is a traversal across a gateway. So, all machines on the same Ethernet are zero hops away. If a router connects connects two networks directly, a machine on the other side of the router is one hop away†¦. As the routing information is passed through a gateway, the gateway adds one to the hop counts to keep them consistent across the network. The diameter of a network is defined as the largest hop-count possible within a network. Unfortunately, a hop count of 16 is defined as infinity in RIP meaning the link is down. Therefore, RIP will not allow hosts separated by more than 15 gateways in the RIP space to communicate. The other problem with hop-count metrics is that if links have different speeds, that difference is not -11reflected in the hop-count. So a one hop satellite link (with a . 5 sec delay) at 56kb would be used instead of a two hop T1 connection. Congestion can be viewed as a decrease in the efficacy of a link. So, as a link gets more congested, RIP will still know it is the best hop-count route and congest it even more by throwing more packets on the queue for that link. The protocol is not well documented. A group of people are working on producing an RFC to both define the current RIP and to do some extensions to it to allow it to better cope with larger networks. Currently, the best documentation for RIP appears to be the code to BSD â€Å"routed†. Routed The ROUTED program, which does RIP for 4. 2BSD systems, Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet has many options. One of the most frequently used is: â€Å"routed -q† (quiet mode) which means listen to RIP information but never broadcast it. This would be used by a machine on a network with multiple RIP speaking gateways. It allows the host to determine which gateway is best (hopwise) to use to reach a distant network. (Of course you might want to have a default gateway to prevent having to pass all the addresses known to the Internet around with RIP). There are two ways to insert static routes into â€Å"routed†, the â€Å"/etc/gateways† file and the â€Å"route add† command. Static routes are useful if you know how to reach a distant network, but you are not receiving that route using RIP. For the most part the â€Å"route add† command is preferable to use. The reason for this is that the command adds the route to that machine’s routing table but does not export it through RIP. The â€Å"/etc/gateways† file takes precedence over any routing information received through a RIP update. It is also broadcast as fact in RIP updates produced by the host without question, so if a mistake is made in the â€Å"/etc/gateways† file, that mistake will soon permeate the RIP space and may bring the network to its knees. One of the problems with â€Å"routed† is that you have very little control over what gets broadcast and what doesn’t. Many times in larger networks where various parts of the network are under different administrative controls, you would like to pass on through RIP only nets which you receive from RIP and you know are reasonable. This prevents people from adding IP addresses to the network which may be illegal and you being responsible for passing them on to the Internet. This -12type of reasonability checks are not available with â€Å"routed† and leave it usable, but inadequate for large networks. 12 Hello (RFC-891) Hello is a routing protocol which was designed and implemented in a experimental software router called a â€Å"Fuzzball† hich runs on a PDP-11. It does not have wide usage, but is the routing protocol currently used on the NSFnet backbone. The data transferred between nodes is similar to RIP (a list of networks and their metrics). The metric, however, is milliseconds of delay. This allows Hello to be used over nets of various link speeds and performs better in congestive situations. One of the most interesting side effects of Hello based networks is their great timekeeping ability. If you consider the problem of measuring delay on a link for the metric, you find that it is not an easy thing to Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet do. You cannot measure round trip time since the return link may be more congested, of a different speed, or even not there. It is not really feasible for each node on the network to have a builtin WWV (nationwide radio time standard) receiver. So, you must design an algorithm to pass around time between nodes over the network links where the delay in transmission can only be approximated. Hello routers do this and in a nationwide network maintain synchronized time within milliseconds. 13 Exterior Gateway Protocol (EGP RFC-904) EGP is not strictly a routing protocol, it is a reachability protocol. It tells only if nets can be reached through a particular gateway, not how good the connection is. It is the standard by which gateways to local nets inform the ARPAnet of the nets they can reach. There is a metric passed around by EGP but its usage is not standardized formally. Its typical value is value is 1 to 8 which are arbitrary goodness of link values understood by the internal DDN gateways. The smaller the value the better and a value of 8 being unreachable. A quirk of the protocol prevents distinguishing between 1 and 2, 3 and 4†¦ , so the usablity of this as a metric is as three values and unreachable. Within NSFnet the values used are 1, 3, and unreachable. Many routers talk EGP so they can be used for ARPAnet gateways. -13Gated So we have regional and campus networks talking RIP among themselves, the NSFnet backbone talking Hello, and the DDN speaking EGP. How do they interoperate? In the beginning there was static routing, assembled into the Fuzzball software configured for each site. The problem with doing static routing in the middle of the network is that it is broadcast to the Internet whether it is usable or not. Therefore, if a net becomes unreachable and you try to get there, dynamic routing will immediately issue a net unreachable to you. Under static routing the routers would think the net could be reached and would continue trying until the application gave up (in 2 or more minutes). Mark Fedor of Cornell (fedor@devvax. tn. cornell. edu) attempted to solve these problems with a replacement for â€Å"routed† called â€Å"gated†. â€Å"Gated† talks RIP to RIP speaking hosts, EGP to EGP speakers, and Hello to Hello’ers. These speakers frequently all live on one Ethernet, but luckily (or unluckily) cannot understand each others ruminations. In addition, under configuration file control it can filter the conversion. For example, one can produce a Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet configuration saying announce RIP nets via Hello only if they are specified in a list and are reachable by way of a RIP broadcast as well. This means that if a rogue network appears in your local site’s RIP space, it won’t be passed through to the Hello side of the world. There are also configuration options to do static routing and name trusted gateways. This may sound like the greatest thing since sliced bread, but there is a catch called metric conversion. You have RIP measuring in hops, Hello measuring in milliseconds, and EGP using arbitrary small numbers. The big questions is how many hops to a millisecond, how many milliseconds in the EGP number 3†¦. Also, remember that infinity (unreachability) is 16 to RIP, 30000 or so to Hello, and 8 to the DDN with EGP. Getting all these metrics to work well together is no small feat. If done incorrectly and you translate an RIP of 16 into an EGP of 6, everyone in the ARPAnet will still think your gateway can reach the unreachable and will send every packet in the world your way. For these reasons, Mark requests that you consult closely with him when configuring and using â€Å"gated†. -14†³Names† All routing across the network is done by means of the IP address associated with a packet. Since humans find it difficult to remember addresses like 128. 174. 5. 50, a symbolic name register was set up at the NIC where people would say â€Å"I would like my host to be named ‘uiucuxc'†. Machines connected to the Internet across the nation would connect to the NIC in the middle of the night, check modification dates on the hosts file, and if modified move it to their local machine. With the advent of workstations and micros, changes to the host file would have to be made nightly. It would also be very labor intensive and consume a lot of network bandwidth. RFC-882 and a number of others describe domain name service, a distributed data base system for mapping names into addresses. We must look a little more closely into what’s in a name. First, note that an address specifies a particular connection on a specific network. If the machine moves, the address changes. Second, a machine can have one or more names and one or more network addresses (connections) to different networks. Names point to a something which does useful work (i. e. the machine) and IP addresses point to an interface on that provider. A name is a purely symbolic representation of a list of addresses on the network. If a machine moves to a different network, the addresses will change but the name could remain the same. Domain names are tree structured names with the root of the tree at the right. For example: 14 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet 15 uxc. cso. uiuc. edu is a machine called ‘uxc’ (purely arbitrary), within the subdomains method of allocation of the U of I) and ‘uiuc’ (the University of Illinois at Urbana), registered with ‘edu’ (the set of educational institutions). A simplified model of how a name is resolved is that on the user’s machine there is a resolver. The resolver knows how to contact across the network a root name server. Root servers are the base of the tree structured data retrieval system. They know who is responsible for handling first level domains (e. g. ‘edu’). What root servers to use is an installation parameter. From the root server the resolver finds out who provides ‘edu’ service. It contacts the ‘edu’ name server which supplies it with a list of addresses of servers for the subdomains (like ‘uiuc’). This action is repeated with the subdomain servers until the final subdomain returns a list of addresses of interfaces on the host in question. The user’s machine then has its choice of which of these addresses to use for communication. -15A group may apply for its own domain name (like ‘uiuc’ above). This is done in a manner similar to the IP address allocation. The only requirements are that the requestor have two machines reachable from the Internet, which will act as name servers for that domain. Those servers could also act as servers for subdomains or other servers could be designated as such. Note that the servers need not be located in any particular place, as long as they are reachable for name resolution. (U of I could ask Michigan State to act on its behalf and that would be fine). The biggest problem is that someone must do maintenance on the database. If the machine is not convenient, that might not be done in a timely fashion. The other thing to note is that once the domain is allocated to an administrative entity, that entity can freely allocate subdomains using what ever manner it sees fit. The Berkeley Internet Name Domain (BIND) Server implements the Internet name server for UNIX systems. The name server is a distributed data base system that allows clients to name resources and to share that information with other network hosts. BIND is integrated with 4. 3BSD and is used to lookup and store host names, addresses, mail agents, host information, and more. It replaces the â€Å"/etc/hosts† file for host name lookup. BIND is still an evolving program. To keep up with reports on operational problems, future design decisions, etc, join the BIND mailing list by sending a request to â€Å"bind-request@ucbarp. Berkeley. EDU†. BIND can also be obtained via anonymous FTP from ucbarpa. berkley. edu. There are several advantages in using BIND. One of the most important is that it frees a host from relying on â€Å"/etc/hosts† Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet being up to date and complete. Within the . uiuc. edu domain, only a few hosts are included in the host table distributed by SRI. The remainder are listed locally within the BIND tables on uxc. cso. uiuc. edu (the server machine for most of the . uiuc. edu domain). All are equally reachable from any other Internet host running BIND. BIND can also provide mail forwarding information for interior hosts not directly reachable from the Internet. These hosts can either be on non-advertised networks, or not connected to a network at all, as in the case of UUCP-reachable hosts. More information on BIND is available in the â€Å"Name Server Operations Guide for BIND† in â€Å"UNIX System Manager’s Manual†, 4. 3BSD release. There are a few special domains on the network, like SRINIC. ARPA. The ‘arpa’ domain is historical, referring to hosts registered in the old hosts database at the NIC. There are others of the form NNSC. NSF. NET. These special domains are used sparingly and require ample justification. They refer to servers under the administrative control of -16the network rather than any single organization. This allows for the actual server to be moved around the net while the user interface to that machine remains constant. That is, should BBN relinquish control of the NNSC, the new provider would be pointed to by that name. In actuality, the domain system is a much more general and complex system than has been described. Resolvers and some servers cache information to allow steps in the resolution to be skipped. Information provided by the servers can be arbitrary, not merely IP addresses. This allows the system to be used both by non-IP networks and for mail, where it may be necessary to give information on intermediate mail bridges. 16 What’s wrong with Berkeley Unix University of California at Berkeley has been funded by DARPA to modify the Unix system in a number of ways. Included in these modifications is support for the Internet protocols. In earlier versions (e. g. BSD 4. 2) there was good support for the basic Internet protocols (TCP, IP, SMTP, ARP) which allowed it to perform nicely on IP ethernets and smaller Internets. There were deficiencies, however, when it was connected to complicated networks. Most of these problems have been resolved under the newest release (BSD 4. 3). Since it is the springboard from which many vendors have launched Unix implementations (either by porting the existing code or by using it as a model), many implementations (e. g. Ultrix) are still based on BSD 4. 2. Therefore, many implementations still exist with the BSD 4. 2 problems. As time goes on, when BSD 4. 3 trickles through Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet vendors as new release, many of the problems will be resolved. Following is a list of some problem scenarios and their handling under each of these releases. ICMP redirects Under the Internet model, all a system needs to know to get anywhere in the Internet is its own address, the address of where it wants to go, and how to reach a gateway which knows about the Internet. It doesn’t have to be the best gateway. If the system is on a network with multiple gateways, and a host sends a packet for delivery to a gateway which feels another directly connected gateway is more appropriate, the gateway sends the sender a message. This message is an ICMP redirect, which politely says â€Å"I’ll deliver this message for you, but you really ought to use that gateway over there to reach this host†. BSD 4. 2 ignores these messages. This creates more stress on the gateways and the local network, since for every packet -17sent, the gateway sends a packet to the originator. BSD 4. 3 uses the redirect to update its routing tables, will use the route until it times out, then revert to the use of the route it thinks is should use. The whole process then repeats, but it is far better than one per packet. Trailers An application (like FTP) sends a string of octets to TCP which breaks it into chunks, and adds a TCP header. TCP then sends blocks of data to IP which adds its own headers and ships the packets over the network. All this prepending of the data with headers causes memory moves in both the sending and the receiving machines. Someone got the bright idea that if packets were long and they stuck the headers on the end (they became trailers), the receiving machine could put the packet on the beginning of a page boundary and if the trailer was OK merely delete it and transfer control of the page with no memory moves involved. The problem is that trailers were never standardized and most gateways don’t know to look for the routing information at the end of the block. When trailers are used, the machine typically works fine on the local network (no gateways involved) and for short blocks through gateways (on which trailers aren’t used). So TELNET and FTP’s of very short files work just fine and FTP’s of long files seem to hang. On BSD 4. 2 trailers are a boot option and one should make sure they are off when using the Internet. BSD 4. 3 negotiates trailers, so it uses them on its local net and doesn’t use them when going across the network. 17 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Retransmissions TCP fires off blocks to its partner at the far end of the connection. If it doesn’t receive an acknowledgement in a reasonable amount of time it retransmits the blocks. The determination of what is reasonable is done by TCP’s retransmission algorithm. There is no correct algorithm but some are better than others, where better is measured by the number of retransmissions done unnecessarily. BSD 4. 2 had a retransmission algorithm which retransmitted quickly and often. This is exactly what you would want if you had a bunch of machines on an ethernet (a low delay network of large bandwidth). If you have a network of relatively longer delay and scarce bandwidth (e. g. 56kb lines), it tends to retransmit too aggressively. Therefore, it makes the networks and gateways pass more traffic than is really necessary for a given conversation. Retransmission algorithms do adapt to the delay of the network -18after a few packets, but 4. 2’s adapts slowly in delay situations. BSD 4. 3 does a lot better and tries to do the best for both worlds. It fires off a few retransmissions really quickly assuming it is on a low delay network, and then backs off very quickly. It also allows the delay to be about 4 minutes before it gives up and declares the connection broken. -19Appendix A References to Remedial Information 18 Quaterman and Hoskins, â€Å"Notable Computer Networks†, Communications of the ACM, Vol 29, #10, pp. 932-971 (October, 1986). Tannenbaum, Andrew S. , Computer Networks, Prentice Hall, 1981. Hedrick, Chuck, Introduction to the Internet Protocols, Anonymous FTP from topaz. rutgers. edu, directory pub/tcp-ip-docs, file tcp-ip-intro. doc. -20Appendix B List of Major RFCs RFC-768 RFC-791 RFC-792 RFC-793 RFC-821 User Datagram Protocol (UDP) Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) Simple Mail Transfer Protocol (SMTP) Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet RFC-822 RFC-854 RFC-917 * RFC-919 * RFC-922 * Subnets RFC-940 * RFC-947 * RFC-950 * RFC-959 RFC-966 * Protocol RFC-988 * RFC-997 * RFC-1010 * RFC-1011 * Standard for the Format of ARPA Internet Text Messages Telnet Protocol Internet Subnets Broadcasting Internet Datagrams Broadcasting Internet Datagrams in the Presence of Toward an Internet Standard Scheme for Subnetting Multi-network Broadcasting within the Internet Internet Standard Subnetting Procedure File Transfer Protocol (FTP) Host Groups: A Multicast Extension to the Internet Host Extensions for IP Multicasting Internet Numbers Assigned Numbers Official ARPA-Internet Protocols 9 RFC’s marked with the asterisk (*) are not included in the 1985 DDN Protocol Handbook. Note: This list is a portion of a list of RFC’s by topic retrieved from the NIC under NETINFO:RFC-SETS. TXT (anonymous FTP of course). The following list is not necessary for connection to the Internet, but is useful in understanding the domain system, mail system, and gateways: RFC-882 RFC-883 RFC-973 RFC-974 RFC-1009 Domain Names – Concepts and Facilities Domain Names – Implementation Domain System Changes and Observations Mail Routing and the Domain System Requirements for Internet Gateways -21Appendix C Contact Points for Network Information Network Information Center (NIC) DDN Network Information Center SRI International, Room EJ291 333 Ravenswood Avenue Menlo Park, CA 94025 (800) 235-3155 or (415) 859-3695 NIC@SRI-NIC. ARPA NSF Network Service Center (NNSC) NNSC BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 (617) 497-3400 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet NNSC@NNSC. NSF. NET -22Glossary core gateway The innermost gateways of the ARPAnet. These gateways have a total picture of the reachability to all networks known to the ARPAnet with EGP. They then redistribute reachability information to all those gateways speaking EGP. It is from them your EGP agent (there is one acting for you somewhere if you can reach the ARPAnet) finds out it can reach all the nets on the ARPAnet. Which is then passed to you via Hello, gated, RIP†¦. ount to infinity The symptom of a routing problem where routing information is passed in a circular manner through multiple gateways. Each gateway increments the metric appropriately and passes it on. As the metric is passed around the loop, it increments to ever increasing values til it reaches the maximum for the routing protocol being used, which typically denotes a link outage. hold down When a router discovers a path in the network has gone down announcing that that path is down for a minimum amount of time (usually at least two minutes). This allows for the propagation of the routing information across the network and prevents the formation of routing loops. split horizon When a router (or group of routers working in consort) accept routing information from multiple external networks, but do not pass on information learned from one external network to any others. This is an attempt to prevent bogus routes to a network from being propagated because of gossip or counting to infinity. -23- 20 Get any book for free on: www. Abika. com How to cite Live and Let Live, Papers

Sunday, April 26, 2020

John SteinbeckS The Chrysanthemums Essays - The Chrysanthemums

John Steinbeck'S ?The Chrysanthemums? Elisa Allen, Confused? Like many short stories, John Steinbecks The Chrysanthemums deceives most readers by appearing to be a simple short story. The Chrysanthemums, which only occupies about eight pages in textbooks, captures the emotional pain of a woman trying to live in the 1930s. As critic Stanley Renner wrote, The Chrysanthemums shows a strong capable woman kept from personal, social, and sexual fulfillment by the prevailing conception of a womans role in a world dominated by men (Renner 306). Elisa Allen, the only female in The Chrysanthemums displays her sexual frustrations throughout the short story by slipping in and out of masculine and feminine characteristics. The Chrysanthemums begins by describing Elisas surroundings. The fog covers the valley like a closed pot (Steinbeck 220), which symbolizes Elisas isolation from the world. Because the Allens live away from town, Elisa rarely encounters other people besides her husband, Henry Allen. The work on Henry Allens foothill ranch, (220) as it is described, is scarce, leaving Elisa to work in her garden. Wearing a mans black hat, . . . clod-hopper shoes, and heavy leather gloves, Elisas appearance begins as very masculine (220). This masculine vision of Elisa is the first sign she is sexually frustrated. Elisa continuously glances at her husband, who is speaking with two men, almost adoringly. When first reading this image, the reader may pass it off as useless information, but after studying Elisas character, it is evident Elisa is envious of the male meeting. She asks her husband, curiously who the men were, and he answers her as short as possible. Henry avoids speaking about masculine busin ess with Elisa for too Whitaker 2 long. For instance, when Henry comments about Elisas chrysanthemums, he first uses the word strong which implies masculinity. Elisa then speaks about how she would be good at working in the orchards. Henry apparently feels Elisa has spoken too much about masculine subjects because he resorts back to calling the chrysanthemums simply flowers (221). This first scene between husband and wife sets the tone of the entire story. Elisas gestures and actions change as different words and topics are mentioned to her. She feels unimportant and inferior as a woman and strong enough to be a man. Soon after Henry leaves to finish he work, the tinker is introduced into the story. Here is where Elisas sexuality is tested. Elisas first reaction to the tinker is similar to that of a mans, for she resists giving him work (Marcus 56). She show strong qualities as she tells the tinker she as no work for him. The tinker begins to weaken Elisa, though, and eventually breaks her strong stance by using her pride and joy - her chrysanthemums. The tinker captures the beauty of the chrysanthemums in a poetic, feminine nature. He describes them as a quick puff of colored smoke, which appeals to Elisas feminine side. Suddenly, Elisa begins to unveil her womanliness. She tears off her hat and shakes out her dark pretty hair (Steinbeck 224). By being interested in Elisas feminine flowers, the tinker makes Elisa comfortable with her sexuality. Allowing her feminine nature to appear, Elisa becomes emotional vulnerable during the business transaction involving her chrysanthemums. This is feminine nature because men tend to be unemotional during business related activities (Sweet 213). After the tinker leaves, Elisa finally appears content with her sexuality. As she gets ready for her outing with Henry, Elisa shows complete femininity. She scrubs her Whitaker 3 body until her skin turns red, as if she is rinsing away the masculine way about her. Elisa then dries herself off, and studies her body in the mirror. She has become comfortable with being a woman just by receiving attention from a male who is interested in her life. After studying herself, Elisa applies her makeup and puts on her newest under-clothing. Henry then comes home and they leave to go to town. As the Allens are on their way to town, Elisa spots a dark speck in the road. She knows this speck is her prize chrysanthemums. As they pass the chrysanthemums lying in the road, Elisa cannot bear to look. The tinker appears in the road next. For this situation, Elisa has to