Wednesday, July 31, 2019

Death Penalty Paper Essay

The death penalty is something that many people do not have a clear decision on. Many people support the death penalty, while others wish for the death penalty to be abolished, yet there are some that support the death penalty, but only in certain cases. My personal opinion is that a person commits murder and is sentenced to death there should be no waiting. I believe 24 hours from the time the person is sentenced to death, the state should follow through with their punishment and execute. There are people in the world that support the death penalty and often say that the death penalty is a deterrent for future criminals who are thinking and plotting out their heinous crimes or murder as we sit in our living rooms right now. Capital Punishment does not act as a deterrent force. Crime rates do not decrease in states where capital punishment is used. This statement can be neither proven nor disproven. How do you measure the amount of people who have been deterred from crime? Do you take a poll? Is there a survey conducted where people voluntarily admit they would have murdered had they known they would not be executed if they were caught? No. You can’t prove that it deters crime. So, even if it does, there is not enough evidence to support this theory. Do you agree with this statement? For me, when I think of a criminal they are not thinking of consequences of their actions, they are not thinking of whom they are going to hurt, they are only thinking of getting what they want. They think in the â€Å"Now†, they simply just do not care. If they had any sort of emotion or remorse before the crime is committed then our prisons wouldn’t be so over populated as they are today. Amnesty International, which opposes the death penalty, reports that scientific studies have not produced any conclusive evidence showing that capital punishment, is a deterrent for future crimes to be committed. I believe the only deterrent for a murderer not to commit a horrific crime again would be execution. Executing a dangerous criminal ensures that he will not kill again. There have been several notable cases where men were paroled, or escaped from prison after being convicted of murder and killed again. The death penalty protects our community by eradicating a harmful criminal from society. A few good examples are Randy Greenwalt, Arthur Shawcrossm, Kenneth McDuff, and  Daniel Camargo Barbosa. Various people who are opposed to the death penalty say that Capital Punishment condemns the innocent to die. According Amendment V in the United States Bill of Rights, â€Å"No person shall be held to answer for a capital crime, or otherwise infamous crime unless on a presentment of an indictment of â€Å"grand jury†. While it is true that a few innocent people have â€Å"slipped through the cracks† of the justice system and been convicted and executed unfairly, it   is extremely rare. Usually, attorney’s find new evidence to support a criminal’s innocence by the time all appeals have been exhausted. Perhaps the most important factor in determining whether a defendant will receive the death penalty is the quality of the representation he or she is provided. Almost all defendants in capital cases cannot afford their own attorneys. In many cases, the appointed attorneys are overworked, underpaid, or lacking the trial experience required for death penalty cases. There have even been instances in which lawyers appointed to a death penalty case were so inexperienced that they were completely unprepared for the sentencing phase of the trial. Other appointed attorneys have slept through parts of the trial, or arrived at the court under the influence of alcohol. FACTS ABOUT ATTORNEY S AND THE DEATH PENALTY: †¢Almost all defendants who face capital charges cannot afford an attorney and rely on the state to appoint one for them. However, often times appointed attorneys are overworked, underpaid, lack critical resources, and are either incompetent or inexperienced. As a result when death sentences are set aside by the federal courts, it is often because among other reasons the trial attorney was so incompetent that the accused’s constitutional right to effective counsel was violated. Slipski 4 †¢In 2009, the U.N. Special Rapporteur on extrajudicial, summary or arbitrary executions conducted an official visit to the United States to examine the administration of the death penalty in Alabama and Texas. Alabama has the highest per capita rate of executions in the United States, while Texas has the largest total number of executions and one of the largest death row  populations after California and Florida. The Special Rapporteur expressed concern about deficiencies in the administration of the death penalty in Alabama and Texas, including â€Å"the lack of adequate counsel for indigent defendants.† He called for the two states â€Å"to establish well-funded, state-wide public defender services† and recommended that â€Å"oversight of these should be independent of the executive and judicial branches.† The state of Alabama has no statewide public defender system even though its death row occupants are overwhelmingly poor with 95% indigent. †¢An examination of 461 capital cases by The Dallas Morning News found that nearly one in four condemned inmates has been represented at trial or on appeal by court-appointed attorneys who have been disciplined for professional misconduct at some point in their careers. †¢An investigation by the Texas Defender Service found that, â€Å"Death row inmates today face a one-in-three chance of being executed without having the case properly investigated by a competent attorney and without having any claims of innocence or unfairness presented or heard.† †¢In North Carolina, at least 16 death row inmates, including 3 who were executed, were represented by lawyers who have been disbarred or disciplined for unethical or criminal conduct. With all this being said regarding lawyers and the accused what do you think? Do you think if the accused had an expensive attorney that they would not be facing the death penalty and get life in prison instead? I guess that this is a question that we all would love to have the answer to. As they say money makes the world go round. Think of all the costs that are involved with the death penalty. Tax payers pay to house, cloth, food, and the medical bills alone for this one inmate will cost us millions. All the millions of dollars that are spent on this one life can be used to better our communities, or schools, educate our children, who are our future. We should stop wasting money on rehabilitation for these inmates, and put the money into what is important, our children, the future of The US. I fully support the death penalty, it makes me so upset to think back to the Cheshire, CT murders, the amount of money spent on two men who were caught at the scene of the crime, confessed to murdering an innocent woman and her kids, and beating her husband almost to death.  They should have been executed the day after they committed that horrific crime. Instead, the government wasted and is still wasting millions of dollars on two criminals who do not deserve to see the light of day. Something needs to change in our government. I believe Connecticut should be more like Texas. A state that enforces Capital Punishment to the fullest. Enough is enough! Criminals should not be running our lives and getting away with murder, literally! In conclusion, after reading all the facts stated above, how do you feel about the death penalty? Do you think we should be paying for these criminals to live in prison with a meal, a bed to sleep in, medical attention, and clothes on their backs? In my opinion the answer would be, no. Then again, everyone is entitled to their own opinion. The punishment should fit the crime, and I am all for an â€Å"eye for an eye†, â€Å"a tooth for a tooth†, what about you? Works Cited: Bureau of Justice Statistics. 16 Feb. 2006. The U.S. Department of Justice. 29 Nov. 2006. Texas Department of Criminal Justice www.tdcj.state.tx.us/stat/dr_facts.html U.S. Death Penalty Facts Amnesty International USA, www.amnestyusa.org Death Penalty Information Deathpenaltyinfo.org

Planning Human Resource Essay

Human resource planning has a major role to meet the company objectives in professional and efficient comportment. In this case study planning process is to meet the short term, by having the right people and the right skills of workforce to supply demands of the new contract at the same time to adjust staffing change for long term objectives. As an HR manager main role is to meet business needs through workforce planning. Part of the planning is to investigate and gather information where the company stands now where we want to take it and how to do that. I can employ the Manpower requirement approach for Human resource planning, to analyse the current situation and estimate future needs and implement the new strategy. The manpower requirement approach enables the HR to investigate the quality and the quantity of the existing workforce and analyse the company situation, forecast an adequate number of skilled manpower to satisfy future needs and achieve targets. 1- Analyse the current workforce: to learn about employees profile, expertise, age education, roles and gather information about staff rotation, this data base permit the company to evaluate the core competences and the power of it is human capital, identify surplus or shortage for short term and long term targets and measure it up with the company objectives and capabilities to appraise the current productivity, Moreover to evaluate the corporate strategy alignment with the vision and mission. 2- Forecast future manpower: identify supply and demand. Expect the quantity and characteristics of the manpower in demand for future needs based on projecting employer past trends. Using previous trends of employment of a specific qualifications and expertise employed earlier in the past years by the company to ensure productivity. â€Å"In this approach an attempt is made to forecast future requirements of educated manpower to fulfil a future target of Gross National Product (GNP) or specified targets of industrial production†. (According to Mahapatro, et al. 2010) Predict directions and development in each size of individual sectors of the economy. Use series of data and historical trends to acquire the ratio between the growth of the skills of the workforce and output growth. This method allow to associate experienced manpower and their productivity influencing the economic growth in a specific sector. According to Mahapatro, et al. 2010, â€Å"the fundamental axioms of manpower requirements approach is that there is a definite link between the education and the economic growth and the lack of skilled manpower in required number impedes growth†. Analyse and estimate the requirements of educated manpower to develop and advance, by assessing different factors engagement level, wastage and recession rate. Estimate the level of labour force participants by comparing the participant’s rates and the number of graduates for a specific occupation. The main strengths of this method are estimating and comparing the demand and supply over a period of time in a specific economy and correlate this with the total population level of employment and production. Moreover this approach helps the company to identify future needs for development and training allowing them to categorise. According to Mahapatro, et al. 2010,† this approach assess the skill requirements to achieve any predetermined economic growth, and to gear the expansion of educational system to provide the needed education and training† However there are some flaws in the Manpower Requirements approaches. The first limitation: The Manpower requirement approach, link skilled manpower to a specific occupation task, however it’s limited to be valid since it is not including the price and the cost of formal training and education to produce such educated level required, and it can only be relevant to developing countries, where high proportion of manpower have obtained these skills through informal learning and job experience. According to Mahapatro, et al. 2010, â€Å"in the Indian context, it has been observed that over 30 percent of the manpower do not have the basic minimum qualification. They have reached these levels through on-the-job training and such other informal training in the requisite skills.† The second limitation: This method confirms that there are no replacements for the required skilled manpower; however we cannot expect to find in one country all jobs requiring a specific skill to be executed by manpower having the same category of education. According to Mahapatro, et al. 2010, â€Å"the educated manpower of different types are used in fixed proportions and that there no substitutions possibilities among the various categories of educated manpower†. The future is uncertain, technological and economical factors constantly changing affect the patterns of demands predicted in an earlier stage, since estimated skilled or unskilled labour force is derived from the patterns of services or goods in demand, this approach is relatively unreliable for future for long turn estimates and can produce large errors. According to Mahapatro, et al. 2010, â€Å"Any error in judgment, in this regard, will seriously affect manpower balances at a later date resulting in either excess supply or excess demand†. Flexibility For example the Audit Commission, they have developed different type of employment to meet their business needs. â€Å"†These different contracts help the Audit Commission to cope with all of its changing needs. They also help it to be flexible.† (The Times 100, 2013) The Audit Commission is constantly faced with peaks and troughs in the workload that cannot be met simply by having its employees on full-time contracts. There are situations where they need either more staff or fewer staff. By increasing or reducing staff in these situations the Audit Commission has developed numerical flexibility. (The Times 100, 2013) As we know the organisation had some success stories and some unstable situation, HR planning at this phase after winning a new contract is extremely crucial. We can learn from the Audit Commission and apply flexibility to be able to meet future business needs without raising employment cost and by avoiding downsizing. I can suggest developing and applying flexible working patterns by introducing different type of employment contracts. The internal labour market 350 employees 95% of them have permanent contract consisting the core group of the organization having the skills and knowledge to work in many roles, the abovementioned manpower enable the organisation to run the daily operation having the expertise the knowhow of the company production standards and quality, and they can meet the enquiries in an efficient ways. However the company has recently won a new contract that might implicate needs for recruitment. The existing 95% will remain on permanent contracts and will consist the 75% of the company new structure, as for the new workforce joining the company we can introduce different type of contract to hire them in order to maintain the flexibility of the organisation. They consists the first peripheral and the second peripheral. In the company situation we are examining to hire the first peripheral group that is numerically flexible and the second peripheral group that include employees on short-terms or contractors from agencies, where the organisation needs more staff, that will not by necessary after the production demands of the new contracts are met. As for a construction company that have just signed a new hotel construction project that will end in 5 years, they cannot afford to hire employees on permanent contracts for the new project, as they will have surplus after the hotel is build. In this situation by applying the new working patterns the manufacturing company can meet the new contract needs and ensure that we will not have a manpower surplus after the project is done, it is always easy to increases the number of the workforce but not simple to reduce it. Since the company have liabilities toward their workforce. The cost is extremely high to offer all its employees benefits, health insurance, schooling, bonuses and end of service indemnities. Question 2: As we have discussed before temporary workers play a significant role in current fast pace evolving industries, no matter how skilled or unskilled they are, a certain amount of training is required to make sure they can perform well the assigned tasks. We have to plan the training process and identify the gaps. According to Gomez-Mejia et al, 2012 â€Å"The trainng process consists of three phases: (1) needs assessment, (2) development and conduct of training, and (3) evaluation.† 2.1 Assessment Needs: The type of training should be linked to the organisation goals, in our organisation situation the company needs to meet the new project production needs on time efficiently without compromising the quality. By hiring the new temporary workforce, the company is not looking to develop them or invest in them, as they are only hired to assure the production for a certain period. However we need their contribution to achieve company goals and meet business demand, the required training should enable them to acquire the skills and the knowledge, by identifying a certain type of training that will ensure they are prepared to do the assigned tasks and have the complete knowledge of the company procedures and safety related issue. 2.2 Development and conduct of training We can refer to Aldi’s company case study that was experiencing a rapid expansion and needed to recruit more than 4,000 employees. It is not so easy to involve a large number of employees and engage them to the company objectives, we can examine below how Aldi’s planned to train the new workforce and make them committed to their new roles. They have chosen to provide the on-the-job-training. â€Å"On-the-job training is training that takes place while employees are actually working. It means that skills can be gained while trainees are carrying out their jobs. This benefits both employees and the business. Employees learn in the real work environment and gain experience dealing with the tasks and challenges that they will meet during a normal working day. The business benefits by ensuring that the training is specific to the job. It also does not have to meet the additional costs of providing off-the-job training or losing working time†. (The Times 100, 2013) we can use the same training approach to apply it to our organisation, as we have to be careful about the cost. At the beginning we have to introduce them to the work place they are joining, an induction training should be provided to familiarize the new group joining to the company and colleagues, this orientation ensure their understanding to the company structure and the corporate culture and we can gain their involvement from day one to the organisation objectives and goals. We are examining here the instrumental learning type. On job training approach is applicable in this case study as it is considered cost effective and does not require an expert trainer to be hired from outside the company to teach them specific skills or to provide a certain knowledge. â€Å"OJT also spares the organisation the expense of taking employees out of the work environment for training and usually the cost of hiring outside trainer, because employees generally are capable of doing the training† †. (Gomez-Mejia et al, 2012) At the same it can deliver a clear message about the company expectation while saving time, as senior skilled staff can train new employees divided in groups depending on job requirement and the group can actually learn the required skill while conducting day-to-day activities, it allow them to observe and try. One of benefits for the company will be having skilled employees that will need less supervision to perform tasks in the future, furthermore that will increase the loyalty to the employer and employees relationships, since they will be interacting closely with the senior staff for the training period. In addition they can get guidance and learn new technologies practically rather than theorist, where most of the times theories are not so clear to be applicable. â€Å"The guided on the-job training approach helps build relationships†. (Gomez-Mejia et al, 2012). The informal training or the OJT can enhance relationships between the workforce interacting together to acquire skills and learn better about our organisation, it can be also considered as socializing activity since they can be more open and communicate easily with no barrier, this process will make effective the on-boarding new employees. â€Å"Socialization is not a single event. Rather, socialisation is the iterative process between the new employee and the organisation as the individual develop skills, knowledge, role behaviour, and adjustment to norms and values in response to needs and expectations of organisation. (Jolton et al, 2010). For the employees it helps them to be more motivated and self confident about the job, where they can gain more skills in a practical way. They can get guidance and learn new technologies practically rather than theorist, where most of the times theories are not so clear to be applicable. We have to plan carefully the On-the-Job-Training, to allow immediate benefits and reduce the unproductive breaking-in period of the new joiners. If we leave them to learn through unplanned methods employees may feel anxious unmotivated as they are not confident about their job roles and performance. Since we are aiming for temporary manpower and flexible working patterns this method is considered efficient to make them productive as quickly as possible. In addition the OJT permit to examine at early stage employees basic skills problems, for this scenario we can plan for further training for a certain group, simply it can eliminate skills deficiency. Question 3: 3.1 Benefits of Diversity at the workplace. a. Internal advantages. Emerging economy, constantly changes in lifestyle and social demands stimulate people to move from their native countries to a better place, society are becoming more diverse. One car type cannot fit to one population; diversity in choice can make a difference and appeal to everyone. By recruiting a diverse workforce we won’t be only addressing legislation or avoiding discrimination lawsuits, but we ensure engaging our stakeholders’ demands. Avoiding the stereotype in recruitment is the key success for the company to become an employer of choice. Diversity at the workplace can bring a pool of creativity and new ideas; contribution from people coming from different background can advance work and give the ability to the company to comprehend better our stakeholders’ needs and demands. People having different cultural perspectives and lifestyle can give different ideas about the same subject and convey wider exposure for the company. According to Gomez-Mejia et al, 2012, â€Å"to survive and prosper in an increasingly heterogeneous society, organisations must capitalize on employee diversity as a source of competitive advantage†. Regardless that managing employee diversity is politically correct, diverse workforce enhance better problem solving, in our manufacturing company people tend to work in groups, interacting together can solve occurring problems easier as their life experience is dissimilar and they will approach the arising problems differently. Demographic and Cultural diversity can draw more flexibility to the company culture; sharing different experiences can make the work smoother and enjoyable, since learning is wider and more open. b. External advantages A team of different people sharing life experiences and values can improve our corporate culture to become a multicultural organisation having the experience to understand better international market, this advantage can aid the company to generate more profits and widen our market. Talented people are not limited to one culture, certain age or religion, our aim is to match the right people to the right job, so why to slim our choices since we can recruit from a pool of talents. By offering equal opportunity and overlooking differences we can focus better on having the right skills, Cultural diversity at the workplace can promote competitive advantage over rivals, Moreover respecting individual diversities in recruitment can increase productivity and promote the business image. Diversity at the workplace is the key to stay competitive and to be able to cope to the fast changing economy. â€Å"Given the global nature of business today, organisations have to create very specific and effective recruitment efforts to build a deep reservoir of global as well local talent to staff all their organisational levels. (Jolton et al, 2010) As example we can spot the light to Tesco operating in UK where people from different culture and background lives. â€Å"Tesco recognises that every person is different and will bring unique talents and experiences to a role†. (The Times 100, 2013). According to Tesco; â€Å"Difference can be our strength because talent and diversity are two sides of the same coin. To focus on one while ignoring the other is like trying to run a store with no customers – it just won’t work’†. (The Times 100, 2013). 3.2 Employee Diversity Challenges. However some challenges can draw, if diversity is not correctly managed in our organisation, as we can face negative outcomes in communication and productivity Resistance to change from majority and cultural clashes may occur, people tend not to accept each other easily especially if they consider minority inferior, or not as qualified to compete for a promotion or a career development. Cultural diversity may create a barrier between majority and minorities what can affect teamwork and participation. Communication flow might be distracted; people tend to be more involved in relationships with colleagues having the same culture and background, as they share same point of view and lifestyle, minorities can be left out of the company mainstream. Minorities will start to be unmotivated and not satisfied in the work environment and significant turnover and absenteeism can face the company. Diversity can enhance creativity, however minorities being ignored and less valued, will affect their enthusiasm and involvement in the company goals and achievement, and they won’t be able to perform efficiently and effectively due to the low morale. â€Å"Conversely, the proponents of relativity argue that failure to adapt HR practices to the needs of a diverse population may alienate much of the workforce and reduce their potential contributions†. (Gomez-Mejia et al, 2012) References: 1- Mahapatro,. Bhussan,B., 2010. Human Resource Management. New Delhi: New Age International Limited. Available from: http://web.ebscohost.com [Accessed 30 June 2013]. 2- The Times 100 Business Case Studies, 2013. Flexible working patterns An Audit Commission Case Study. The Times 100. Available from: http://businesscasestudies.co.uk/audit-commission/flexible-working-patterns/conclusion.html#axzz2Z2peExn1 [Accessed 3 July 2013]. 3- Gomez-Mejia,L., Balkin,D., and Cardy,R,. 2012. Managing Human Resources. Seventh Edition. United States of America. Pearson Education, Inc. 4- Jolton,J,. Lundby, K,. 2010. Going Global: Practical Applications and Recommendations for HR and OD Professionals in the Global Workplace. United States of America: Jossey-Bass. Available from: http://web.ebscohost.com [Accessed 16 June 2013].

Tuesday, July 30, 2019

Learning Skills Improvement Service Essay

In my position as a workshop trainer at Deerbolt young offenders’ institute, the education I deliver for The Manchester College as part of their Offender Learning is supported, monitored and shaped by various professional bodies. The purpose of these bodies or sector skills councils vary however they all have a common goal in ensuring and enriching the quality of education being delivered. LSIS or the learning and skills improvement service are such a body who umbrella over every organisation that delivers qualifications throughout the country, and they do exactly what they say on the tin. LSIS improve quality, participation and increase standards in education and training. A lot of their work involves developing resources, implementing schemes, sharing delivery aids that improve quality and achievement and tailoring support to learners needs. â€Å"Colleges and providers helped by LSIS improved by one inspection grade at their next inspection.† (LSIS [ND] [online]) LSIS don’t just support the educational improvements though; in 2010 they recognised The Manchester College as a Healthy FE college, healthy initiatives offered throughout the college like loyalty cards, gym memberships and better eating schemes aimed to improve the health of students and staff. Another group that oversee our work as teachers is the professional body the IFL or the Institute for Learning. Their role is to register everyone practicing as a teacher or trainer in FE on to their database. They promote themselves as supporting professional excellence; they aim to increase the status of teachers as professionals, requiring a membership fee and proof of qualifications which is supported by the employer. They also champion the importance of CPD and require members to provide evidence of this and their teaching hours each year. This is seen to keep standards of teaching high, and promote quality and teaching as a profession. Until very recently this is how the IFL worked but due to the loss in government funding and teachers reluctantly to pay their own subscription the number of people renewing their subscription to the IFL fell by over half to just 85,000 signalling a loss of confidence in the body and an end to its presences. For many teachers and trainers in FE it was seen as a welcomed downfall as many believed the IFL did nothing for them, however now this professional body has collapsed there is no one regulating the qualifications or standard required to teach in FE which may lead to competiveness for jobs and or poor standards of teaching and training. These developments seemingly leave only Ofsted in place to assess the quality and standards of colleges and the individual teachers. â€Å"Ofsted would be made responsible for ensuring that FE teachers were appropriately qualified through inspections† (TES [30/03/2012] [Online]) However I see a huge flaw in this method of assessing quality and knowledge, not every Ofsted inspector can have the depth in knowledge of every subject of every teacher he or she is going to observe. For example if I am teaching bricklaying and I’m teaching unacceptable practices how is that inspector meant to know I am teaching the wrong methods? Surely the only way to overcome this problem is to have employed properly qualified teachers and trainers and not just people with some subject knowledge. Now that the IFL is a voluntary body the employers themselves have discretion over this matter. Construction Skills is another organisation that oversee and support the vocational training we deliver in offender learning. They are a massive organisation and have a lot of different strands from providing qualifications, courses and assessment and training support through CSkills as an awarding organisation. They also developing courses and provide support and training to local businesses through being an industry training board. In 2003 Construction Skills were awarded Sector Skills Council status, this allowed them to deliver valued support across the industry. Their main aims are to help reduce a shortage in specialise skills and help to bring a diverse workforce into the industry. They are also involved in improving business performance and developing professional standards for construction occupations both trade and professional. The other area that they cover is probably most relevant to my work as a vocational trainer; they have a large input on the improvement of education for apprenticeships and higher and further education. They achieve this by awarding grants for training, providing businesses with advice on getting the best from their work force offering card schemes, recognised qualifications and helping to link college learning with on the job experience. Professionalism As teachers, trainers, tutors or whatever you what to call us in FE we all have more than one hat we wear that makes us a professional. The IFL although seemingly no more used to keep everybody who worked as a ‘teacher’ under the status of a professional. They did this by having in place the requirement to achieve QTLS or ATLS within five years of working within the education sector. QTLS stand for qualified teacher learning and skills and ATLS associate teacher learning and skills. Everybody working as a teacher was required to register as one or the other of these statuses depending on your level of teaching qualification, the full Cert Ed being a level 5, I myself would have had to apply for QTLS status. However the following quote suggests that very little teachers working in the sector today have taken out the required status of QTLS/ATLS. â€Å"Only a small number of lecturers have become ‘fully qualified’ under the current arrangements: between 2,900 (GHK, August 2011) and some 6,000 (IfL submission, 2012). Whilst this number may rise as the five-year watershed approaches, some 85 per cent of FE lecturers have not embarked on the final supervised practice phase, following the diploma. We do not believe that so slight a result after such a long delay makes this qualification credible as a licence to practise which, properly speaking, should be earned before starting work, as it would be in other professions.† (Bis [03/2012] [Online]) By making this a requirement the IFL aimed at ensuring each individual teacher had the ability to work at the standards expected of a licenced practitioner. To meet this requirement you were expected to submit evidence of your teaching practice, subject and background knowledge, your continued professional development and your own reflective practice. I feel this was affair approach to the matter They may say the â€Å"licence to practice should be earned before starting work† but the profession of teaching is like no other. Its not really something you can learn out of a book you have to get out there and do it then reflect on it, prepare and do it again. My personal two hats consist of my subject specialism, Carpentry and Joinery level 3 qualification, and hopefully in a couple of months my Cert Ed teaching qualification. Other training and development also comes into it, like holding a CSCS card, which is the Construction Skills Certificate Scheme. Another initiative that Construction Skills mentioned earlier are responsible for putting in place. It means you must hold a valid card to work on any building site in the country. To get a card you must pass a construction health and safety test, the cards also state on the back your profession and level of qualification. This is another method of keeping this industry safe, to required standards and professional. â€Å"Professional formation allows teachers to describe how these standards are evidenced in their teaching practice, along with aspects of subject currency, teaching and learning, reflective practice and planning for continuing professional development.† (IFL [11/2008] [Online]) Professional formation isn’t just about your status or qualifications though. It’s a lot about your actions too. As professionals we are expected to present, conduct and discipline ourselves in a particular manor. However with this status we also have the benefits of being rewarded recognition for our work, enhancing collaborations, sharing good practices and having support and respect from our colleagues, colleges and partnering bodies. The importance of engaging in CPPD CPPD or Continuing Personal and Professional Development is something as professionals we should all be doing on a regular basis. It was a requirement of the IFL to record our CPPD hours each year and although a lot of teachers possibly never took this serious it is a good method of keeping in touch with current affairs and adapting to changing trends. The key thing to remember is that this is not just about completing a list of activities undertaken during the year that add up to 6 or 12 or 30 hours. The time spent can be meaningless unless it makes a difference. (IFL [08/2009] [online]) Education is one such sector that never stands still, the requirement to change and reform is evident and we do this to keep things interesting, relevant and to continually push up standards. From a personal point of view, if I’m teaching my subject specialism I want to be a fountain of knowledge in it, I think it’s important to have good subject knowledge and as I have been out of the trade a couple of years now this is something I aim the address on completion of the Cert Ed. I will look at gaining further qualifications in my subject, or maybe completing an assessor’s award. I have even considered going back to construction site work to gain further experience and update my knowledge. Ideally being out in the field working on actual jobs with students would be the perfect scenario for continually developing myself and I feel this would also benefit the learners immensely. As for CPPD in my teaching, I aim to complete all training events offered, for example we had smart board training at work the other day. I also aim to relish being thrown in at the deep end which regularly happens as a cover tutor. I’m lucky in the way my support role at the prison lets me observe a lot of different teachers each week and taking on their good practices and addressing learners needs is excellent CPPD for me. The importance of reflective practice Reflecting on our work as teachers is the best way to develop, its important to have regular teaching practice. We learn valuable things when were in lessons, under pressure and on the spot, however the real learning comes afterwards when we reflect and analyse the session. This is our time to put things right in our heads and prepare ourselves for the same scenarios the next time. It would be extremely difficult to pre-empt every situation that could occur and almost impossible to prepare for each. â€Å"teachers who explore their own teaching through critical reflection develop changes in attitudes and awareness which they believe can benefit their professional growth as teachers, as well as improve the kind of support they provide their students.† (tttjournal [ND] [Online]) Not only should we be reflecting from our own experiences but it’s also extremely valuable to reflect on observations, hearing opinions from another person’s point of view can really pin point things that may have been frustrating us for weeks. Critical reflective practice is more complex than just reflecting. It’s about planning how you will evaluate a lesson or even a CPPD event; it is good practice to critically review these situations through different people’s points of view. Your colleagues, students, boss, or even a person in the field actually doing what you’re teaching or being taught. With this in mind reflection is one of our most important tools. Bibliography Bis [03/2012] Professionalism in further education [Online] http://www.bis.gov.uk/assets/biscore/further-education-skills/docs/p/12-670-professionalism-in-further-education-interim [Accessed 27/05/2012] IFL [08/2009] Guidelines for your continuing professional development (CPD) [online] http://www.ifl.ac.uk/__data/assets/pdf_file/0011/5501/J11734-IfL-CPD-Guidelines-08.09-web-v3.pdf [Accessed 12/06/2012] IFL [11/2008] Professional Formation [Online] http://www.itslifejimbutnotasweknowit.org.uk/files/IfL-professional-formation-overview.pdf [Accessed 12/06/2012] LSIS [ND] Our Impact in the Sector [Online] http://www.lsis.org.uk/AboutLSIS/LSIS-impact/Pages/default.aspx [Accessed 20/06/12] TES [30/03/2012] FE professionalism gets radical shake-up [Online] http://www.tes.co.uk/article.aspx?storycode=6202944 [Accessed 15/04/2012] Tttjournal [ND] Towards Reflective Teaching [Online] http://www.tttjournal.co.uk/uploads/file/back_articles/towards_reflective_teaching.pdf [Accessed 03/06/12]

Monday, July 29, 2019

Competitive Advantage Case Study Example | Topics and Well Written Essays - 1250 words

Competitive Advantage - Case Study Example A closer analysis of the case study of Whole Foods shows that it has adopted a differentiation strategy. According to Harasta & Hoffman (2010), differentiation is a business strategy that seeks to build competitive advantage with its product or service by having it different from the other alternative products. This entails that other competitors may find it difficult to offer the market offering. This is the strategy that has been adopted by Whole Foods explained below. The company has differentiated itself from the other competitors by focussing on quality as excellence and innovation that allows them to charge a premium price for premium products. For instance, health conscious people have begun to realise the importance of consuming organic and natural foods and these are mostly found at Whole Foods Market stores. Whole Foods is the world’s leading retailer of natural and organic foods and has 289 stores, 273 stores in 38 states in the US and 6 stores in Canada and 5 stores in UK (Harasta & Hoffman, 2010). All these stores have sustained a competitive advantage by virtue of being unique. Other retail outlets do not specifically focus on strictly organic and natural products like Whole Foods and this is the reason why it has managed to sustain its competitiveness. Essentially, differentiation strategy requires businesses to have sustainable advantages that enable them to provide the customers with something uniquely valuable to them (Harasta & Hoffman, 2010). In case of Whole Foods, this strategy is justifiable because the products it offers are perceived to be of high value by the buyers and this is the reason why they continue to buy them even though they have premium prices. In most cases, buyers purchase products that are believed to be of great value to them. It can also be seen that differentiated products in the market are unique and they can be hardly imitated by other

Sunday, July 28, 2019

Court Reporting. Write up two court reports, from the given material Essay

Court Reporting. Write up two court reports, from the given material each with a commentary - Essay Example While presenting the case, the prosecution reiterated that the girl had been found murdered in a field near Seaburn Metro Station over the weekend. She had five stubs in the stomach and medical reports presented in the court showed that she died from shock and internal bleeding. Before the body was discovered, the 14 year old girl had gone missing since Friday when she failed to return from school. A dog walker discovered the body of the girl lifeless in the field the following morning as police was already conducting a search. According to witnesses, the accused boy had squabbles with the dead girlfriend days before the incident. Detectives are still awaiting the test results of DNA samples collected from a knife used in the murder. The defendant’s lawyer, Doug Richardson asked the court to bail him out, citing the defendant had no previous criminal records. The court denied request for the bail given the weight of a murder charge. The defendant remains in police custody awai ting the next court hearing as the victim awaits burial next month. Commentary Whereas journalists have the responsibility to provide the community with accurate information of the happenings going on around them, there are legal responsibilities they have to consider when reporting events (Banks 2012, 02). Court proceedings are sensitive. While reporting the murder case involving the teenager, Paul Ross, the law requires that the name of the defendant be withheld. Whereas there is never any problem mentioning the name of the victim unless in a sexual assault or rape case, I chose to withhold the name of Monica Smith to protect identity of the accused. Additionally, the report does not detail the names of the parents of the accused and the victim for the same reason of protection of identity. This is particularly imperative given the fact that a defendant remains innocent until proved guilty in a legal procedure. In addition, the report fails to mention remarks reported in the court as having transpired before and after the incident. Before the murder, the defendant is reported to have states, â€Å"If I can’t have her, no one can.† Additionally, Ross is recorded to have broken down and confessed killing his girlfriend during police interrogation. He said, â€Å"I didn’t mean to kill her, just frighten her with the knife.† This report dodges these comments primarily to prevent a scenario that may show prejudice and bias. The journalist report fails to mention these statements as that would seem as though the journalist already has a formed opinion that Ross is guilty. It leaves the legal responsibility of determining innocence or guilt to the judiciary. Second Court Case The Newcastle Magistrates Court on Monday bailed out a revered Newcastle barrister after an awry â€Å"blind date† led to a lawsuit. The 33-year-old resident was charged with attempted rape of 19 year old Sunderland University Law student. The two were strang ers to each other until Friday night when they met at a popular nightclub in town. The young woman claimed that they did not know each other until that evening when the defendant bought her drinks and asked her out to smoke cigarette. She says it was at that moment that the defendant tries raping her, raised an alarm and escaped before calling the police. In his defense, the 33-year old Newcastle resident reiterated that they had mutual consent to spend the night in a hotel room next to the

Saturday, July 27, 2019

What impact do hostile environments have on Soldiers Essay

What impact do hostile environments have on Soldiers - Essay Example Over 1.5 million troops were deployed to Afghanistan and Iraq between 2002 to 2007, several of whom, more than just one time. Thus deployments such as those, usually lead to work-related and personal stress due to long working hours, family separation as well as uncertain schedules. Even on their return from these hostile environments several soldiers continue enduring emotional and mental strain as they try to readapt and cope with family and civilian life (Hall, 2015). Inspite of the above numerous pressures, there has been no significant change in the rate of reenlistment. All the same there are numerous psychological disorders related with a hostile environment in war; for instance shell shock (Combat Stress Reaction) and Post Traumatic Stress Disorder(PTSD).PTSD is thus a diagnosis arrived by doctors on a frequent basis for those patients that have undergone key traumas such soldiers from hostile environment, car accidents and rape(West,2012). PTSD was discovered due to the soldiers returning from the Vietnam war, even though the disorder symptoms had been all along been identified with war veterans for centuries. The real emotional effects of hostile environment on soldiers can also be extremely distressing especially to the friends and family members, because it is seen as unfair that after all they have gone through, they keep on suffering (Ausenda, 1992). The two conditions; shell shock and PTSD are basically manifestations of the attempts by the brain to deal with trauma and unable to do so adequately. Thus with PTSD, a soldier will for instance re-experience and recall the particular trauma of the hostile environment ,maybe in their dreams or even while thinking or closing their eyes. Sleeplessness is another symptom of PTSD and comes along nightmares. Thus the soldier is aware that if s/he happens to fall asleep, they could be having nightmares; hence a vicious cycle results; so as to try and keep awake for

Friday, July 26, 2019

Marketing in the digital age-Kodak Essay Example | Topics and Well Written Essays - 1000 words

Marketing in the digital age-Kodak - Essay Example It was only in the year 1892 that the company was renamed as Eastman Kodak Company of New York, only to be formed again under the New Jersey law as Eastman Kodak Company of New Jersey. Kodak expanded its operation and grew gradually by its low cost mass production concept, international distribution, extensive advertising and customer centric business policy. The initial years of the company was dedicated to the production and supply of low cost photography tools and make it available to the common people. It was not long before the company understood the true potential of the world market. Based on this fact the company expanded its operation to rest of USA, only to be followed by marketing in France, Germany, Italy and other European countries. As of today, Kodak has expanded its manufacturing operations in South America, Europe and Asia. Kodak has great exposure and popularity in the motion picture industry as well. Most of the movies are shot in Kodak film and the company has received 8 Academy Awards for scientific and technical excellence. Over the years especially in the early 1900s Kodak made lot of technical advancement in the world of photography. Kodak Developing Machine was introduced, which helped in processing films without a dark room. It also introduced the Non-Curling film, which has dominated the world of amateur photography for more than 30 years. Aerial cameras were developed by Kodak, which was extensively used during the World War 1. Along with the technical development the company was also doing well financially, with its worldwide employment crossing the figure of 20,000. The thirst for development in the field of photography and its accessories was never ending for Kodak. The company went on introducing new technology and products both for the consumers, the motion picture industry and for business use. It was in

Thursday, July 25, 2019

Topic Essay Example | Topics and Well Written Essays - 1250 words - 3

Topic - Essay Example This paper aims at discussing the motif of water and ways that it brings people together or keeps them apart. The novel â€Å"The Gangster We Are Looking For† portrays the ways in which water led to displacement of Americans and how refugees of Vietnam and American war-Vietnamese, Cambodians, and Laotians among others were displaced and fled across the pacific to new countries (Manh 32). Throughout this novel, water comes out as the main prominent motif. From the beginning, the author inserts that, â€Å"in Vietnamese, the word water and nation, homeland, and country are all the same and one (Huang 76). In, a similar manner, the concept of water plays a major symbolic role in varied ways throughout the entire text often with opposite/dual meanings. Most of the portrayed themes in this novel associates and entwines with water flow. The novel â€Å"The Gangster We Are Looking For† shows how water led to separation of Vietnams families in America (Ryan 35). Despite the thin character and plot development in this novel, many readers come away with a common overall sense (the sense of mourning). By the time a reader reaches the last two stories/chapters, he or she finds it is clear that misery drives much of suffering and pain in the novel more that the culture shock of settling in America. The family narrated in the novel is still reeling and mourning for the loss of their son (Huang 78). Additionally, the way the son lost his life while Ba was still in prison leads to separation of the family members from each other and from their mother’s community. One of the images that portray the dangers water poses to Americans Vietnams is that of the pool. People did away with the pool due to its dangers by filling and replacing it with the plant. Despite all the boat/water/drowning imagery portrayed in the book, the idea of the boys leaping themselves from the balcony into the pool depicts both senses of freedom and danger symbolized by the concept of water in

Operation management Essay Example | Topics and Well Written Essays - 2750 words - 2

Operation management - Essay Example However, this need not be the case if there business owners are committed to operation management. In this paper, the purpose is to give a report on the findings that were collected after visiting one of the best restaurants in the city. The second part of this paper will explain the types of process technology that were observed in the operations. Thirdly, capacity constraints that existed in the operation will be discussed. Finally, there will be recommendations offered on the best way to improve the operations at this specific restaurant. As noted above, every business would want to make profit and ensure that clients are satisfied since this is the only way to ensure long-term benefits. However, every business’ success is majorly dependent on the quality of management (Schmidle, 2011; Evans, 2004). In short, a business that overlooks the five performance objectives will seldom witness profits and its existence and seemingly, profitability will be short-lived. Having participated in the visit to the mentioned activity, this section will explain how the five performance objectives were utilised in the restaurant. Prices often act as one of the reasons customers flock or forsake a particular business, thus the right pricing ought to be practiced with careful consideration. These assertions are informed by the fact low price does not always translate into profitability. Similarly, high prices are not a clear reflection of high quality products (Heidhues and Kőszegi, 2014; Wacker, 2004). In this particular restaurant, the food prices were set as per size and quality with some costing as much as $100 while others as low as $5. Having observed the place for the at least two days, it became apparent the patrons loved the place because of this seemingly balanced pricing. While clients expect the prices to be low yet the commodities to be of high quality, this is not always tenable because of the requirements. Some of the

Wednesday, July 24, 2019

Market analysis, market segmentation analysis and break even analysis Case Study

Market analysis, market segmentation analysis and break even analysis - Case Study Example The goals for the market analysis are: Demand The product depends on the income of the consumers. From the recent past, I can note that there has been a high demand for the product and thus need to increase the productivity. This will enable me compete for the some market space with my competitors so that I stand out to win the trust of my customers. At his very point, the marketing concept applies effectively because when I respond to demand of my customers, I am in a position to establish a positive relationship with them. It is the only way I am going to make long-term profits from the sales of my stock. Audience of the product Knowing the audience of my product will enable me make effective marketing segmentation. By this, I will be in a position to channel the right products to the right consumers. As Mr. Millar, I will segment my market into four parts: new residential, modernization, replacement and light commercial segment. This is because my company deals with different type s of customers. As Millar, I will analyze all the segments to identify their needs. The new residential segment accounts for 55% of all sales. Unfortunately, I realize that this segment is very competitive and the sales can only be effective if they are done simultaneously. These are some of the problems that the Scotts Company faces. The light commercial segment will include restaurants, schools and churches. This is because they are good uses of air conditioners. As for the modernization segment, the good news is that it outshines the new residential segment. This is the where the future of the company lies and thus the appropriate segment that can be used to capitalize on the investments. Price models I know that every company has its own way of determining it prices. It all depends on the model in use. As Millar, the best price model is the Chinese feint trick. With this, the company may announce a price increment in a trade press but delay the implementation. The Scott’s company has the problem of implementing the prices immediately thus will lose its competitive advantage in the market. However, using alternatives will save the company great loses. Basing my argument on the market definition and dynamics concept, I recommend that my market share be made clear so that when am making pricing issues, I do not base on what others are offering. I know that Ben Millar is at crossroads because the company has failed to identify its market share. It is currently missing opportunities because it looks at its market narrowly. I see at tough time for the Scott’s company in future because of the competition that is currently prevailing in the market. In this case, the new residential segment will exist since very little consideration is given. What-If Scenario 1 Sales $112,000,000.00 FC Manufacturing $20,363,636.36 *Fixed Sales Force $3,000,000.00 *Fixed Communications $1,300,000.00 *Fixed R&D $1,200,000.00 *Fixed Materials $61,600,000.00 *Lowered to 5 5% Bottom Line $24,536,363.64 Return on Sales 21.9% Doubling of cumulative production vastly increases profitability The above table reveals that a volume of $ 61,600,000 will enable the company realize its profitability and that the sales force will give the company a good opportunity of ensuring that the sales are very high. Identifying paths to reach customer segments These paths will help my

Tuesday, July 23, 2019

Review Essay Example | Topics and Well Written Essays - 1000 words - 4

Review - Essay Example He goes on to explain that there are possibilities for a wrongful diagnosis that then poses the question what do the parents do with the information? Is it ethical for a parent to make the decision for their child’s life when a mutation in a gene does not necessarily prove they will contract the disease? David Devore was a participant in the Woodrow Wilson Biology Institute where he conducted much research on the topic in this article. He has extensive knowledge in genetics and has provided a lot of detailed information from many other sources. Devore believes genetic screening for diseases such as Lesch-Nyhan syndrome which causes mental retardation after the first few days of life is necessary and beneficial to both the parents and the offspring but that screening for diseases like alcoholism or Alzheimer’s is not beneficial and may be detrimental to the child’s life. Even though a child may possess the gene responsible for the disease does not mean they will contract it. Therefore Devore believes genetic counseling should also be available after the results are received. I chose this source because it not only describes the techniques of genetic screening but also the positives and negatives of screening for different diseases and the consequences of both choices. I t provides rich information on my argument as to whether it is ethical to conduct these tests and the consequences of the parents’ decisions based on that information. I found this source on the internet in another institution publication. The only thing missing are first-hand accounts from individuals. The article â€Å"Genetic Screening, the Social Impact of Genetic Knowledge† by Boris Sagredo describes the process of genetic screening and the use of assays to compare individuals in a population to determine a difference in the genes. Although genetic screening can predict a possibly contraction of a disorder based on the

Monday, July 22, 2019

Steam Distillation of Eugenol Essay Example for Free

Steam Distillation of Eugenol Essay Introduction: This experiment involves an extraction of a natural product using the techniques of steam distillation. The principle component of oil of cloves is an aromatic compound, which is identified by thin layer chromatography (TLC). Eugenol is widely used in dentistry, due to its analgesic, antiseptic balsamic qualities. It is ideal for curative for pulp hyperemia (the soft, sensitive substance underneath the enamel and dentine of a tooth) and pulp its. In dentistry eugenol is also used to cover cavities, fill canals, etc. It also keeps food fresh and kills off bacteria and viruses. Eugenol helps keep meat fresh and prevents stomach upset, diarrhea, and wound infections. In addition, it might play a part in relieving indigestion, controlling diarrhea, and healing cuts and bites. Eugenol is the main active ingredient in cloves. Procedure: 1. In a 250 mL round bottom flask, place 10.0g of ground cloves and 80 mL of water. Set up for a simple distillation 2. Heat to boiling and collect the distillate until you no longer see droplets of organic liquid coming out of the condenser (about 40 minutes). 3. Place the distillate in a separatory funnel and extract with three 10 mL portions of Dichloromethane 4. Combine the dichloromethane extracts and dry over Sodium Sulfate. 5. Examine the purity of the extract using thin-layer chromatography (TLC). Spot a small sample of the extract using a capillary spotter about 1 cm from the end of TLC plate. 6. Visualize using a UV light and mark the visualized spots with a pencil. 7. Record the number of spots and the Rf values from the spot(s). 8. While the plate is developing set up a clean and dry distillation set up and distil off most of the dichloromethane solvent. 9. The remaining solution of Eugenol in Dichloromethane can be removed using a disposable pipette and placed into a clean pre-weighted vial. 10. The vial can be heated on a steam bath under the hood to remove the small amount of dichloromethane. 11. The pure Eugenol should be weighted to determine the percent oil recovered based on the mass of cloves originally used. Results: Density of Eugenol: 1.34 g/mL BP of Eugenol: 40Â °C Initial mass of Eugenol: 18.545 g Mass of vial: 18.0063 g Mass of Eugenol Oil: 18.434 g % Recovery = (18.545 g 18.434 g)/18.434 x 100 = 0.602% Thin layer chromatography: Rf=(Distance substance moved/Distance solvent moved) Rf=(4.2/5.1) Rf=(.824) Conclusion: The experiment was successful in that we did isolate eugenol as proven by thin layer chromatography. Our Rf value was somewhat high. This is probably because the beaker with the chloroform was not 100 % closed during the time we did the thin layer chromatography. Our watch glass was not 100% efficient. Also when we were heating the liquid in the condenser, heating the liquid at a rate too high could cause excess materials to come out in the final product. Other than that, human error is a concern. This can be minimized by careful observation, and proper procedure. Still, our percent error was under 1 percent, which is very favorable.

Sunday, July 21, 2019

Sensory Systems in Animals

Sensory Systems in Animals All animals have some kind of nervous system that can receive and interpret information about its internal and external environment. Sensory organs provide a means for communication from the external environment to the internal. Sensory receptors contain receptor cells that are specialised to respond to specialised stimuli. These sensory organs may be found all over the body or in localised areas. Afferent neurons carry the sensory information from the periphery toward and into the central nervous system while the efferent neurons carry information away from the central nervous system. Sensations arising when signals initiated in sensory receptors are transmitted in certain parts of the brain, producing signals in certain parts of the brain. (Hickman, Roberts, Keen, 2009) Stimulus types possess features that can be distinguished from one another. In the body of an animal the sensory receptor cells are usually modified. For example, certain receptors detect pressure, heat, chemicals, light and even pain. The stimulus for light detection and chemical detection is different and in addition, the same type of stimulus may possess different features. This can be seen, in for example the detection of blue and red light, both being perceived as a stimulus of light. In the first part of this practical the sensory structures of a number of invertebrate organisms were studied and compared to each other. Mainly chemoreception, photoreception and mechanoreception were studied. Chemicals in the animals surrounding is detected by a number of chemoreceptors. Chemoreceptors may be divided into two main categories; olfactory (smell), which respond to airborne molecules and gustatory (taste), responding to dissolved molecules. Mechanoreceptors are made up of undifferentiated nerve endings found in connective tissue on the periphery of the animal such as the skin. More complex accessory structures have accessory structures that transfer mechanical energy to the receptive membrane. These mechanoreceptors are also able to filter the mechanical energy and they may also include the muscle stretch receptors Photoreception consists of transducing photons of light into electrical signals that can be interpreted by the nervous system and photoreceptive organs such as the eyes. These sensory structures in different animals have taken many different shapes and sizes that have been adapted to the particular environment best for them. Although quite different all the sensory structure of particular receptor has the same function of collecting information from the environment and responding in the best way possible to enhance its survival. Apparatus Light Microscope cardboard Stereomicroscope 1g-5g, 10 g, 20 g, 50, 100 g weights Pencil x3 500 mL water bath Pointed forceps heater/Bunsen to heat water Stop watch thermometer X3 5 c coins Method Refer to attached sheet Precautions The plastomounts were placed under a stereomicroscope for better viewing of small body features The same pair of forceps was used to apply the stimulus since different instruments could result in different outcomes. As much as possible the coin was placed in the sample place for all subjects since different area may have a different amount of receptors. The temperature in the water baths was measured before the experiment was conducted. This was done so that the initial temperature of the water for all the subjects would be the same. Thus the results would be more comparable. Sources of Error Due to the clothing worn the experiment of tactile response using the forceps had to be carried out over the clothing. This thus formed an extra layer that could decrease the response of the nerve. Not all the sensory structures of the organisms may have been identified. The experiments on each subject were only carried out once. More accurate results would have been obtained if carried out at least 3 times Results Part A Refer to attached diagrams Thermoreception For all 3 subjects the cold water was almost painful, while the water at 45 degrees was soothing. On placing the hand in the water at room temperature the right hand felt the water warm while the left hand (previously in the warm water) felt the water cold. Discussion Part A: Invertebrates These sensory structures in different animals have taken many different shapes and sizes that have been adapted to the particular environment best for them. These mainly have evolved from simple to more complex sensory organs that enhance the ability of the animal in collecting information from the environment and responding in the best way possible to enhance its survival. The Cnidarian Hydra, has relatively simple sensory cells scattered all over the body among the other epidermal cells, especially the mouth and tentacles. It is of utmost importance for sensory structures to be located all over the body due to the fact that the animal is radially symmetrical and can detect stimuli from all direction, including the detection of predators. The free end of every sensory cell bears a flagellum, which is the sensory receptor for chemical and tactile stimuli. The other end branches into fine processes, which synapse with nerve cells. On the surface of the animal is a modified cilia called a Cnidocil, that when simulated by any mechanical stimulation releases a nematocyst that is toxic to the predator. (Barnes Cawlow, 2002) These sense organs then lead into a diffuse nerve network, forming two interconnected nerve nets. It is of utmost importance for sensory structures to be located all over the body due to the fact that the animal is radially symmetrical and can detect stimuli from all direction, including the detection of predators. (Hickman, Roberts, Keen, 2009) From the radially symmetrical Cnidarian one can move on to the bilaterally symmetrical Platyhelminthes that is represented here by the Planaria. Here the nervous system is organised into two longitudinal nerve chords that end in the anterior of the animal. This forms an anterior head and cephalisation is introduced. (Hickman, Roberts, Keen, 2009) The Planaria, unlike the Hydra are seen to have an eye spot and auricles. The auricles are lobe like and are found on the sides of the head. The auricles act as a means of chemoreception while the eye spot serves as photoreceptor detecting light. Like the Hydra, it may also contain a statocyst for equilibrium and rheoreceptors for sensing water currents. Cephalisation allowed the animal to develop a bilaterally symmetrical shape. The animal moved forward and can detect changes in the environment with the part of the body with the most sensory organs, its anterior region. (Leineschh, 2007) The Pulmonate gastropod, belonging to the class Gastropoda is seen to further develop its sensory in the anterior of the body. In the anterior of the body the animal is seen to have paired eyes that function as photoreceptors, even though they are not capable of forming an image. Also the labial  and  cephalic tentacles  are mechanoreceptors, sensitive to tactile stimuli, and are probably also chemoreceptive.  Ã‚  Ã‚  (Hickman, Roberts, Keen, 2009) The general body surface is also sensitive to chemical and mechanical stimuli.  Ã‚  The gastropod also has a structure that acts as both a mechanical and chemoreceptor. This is seen to be the osphradium  which is located in the inhalant respiratory water current where it monitors water on the way to the gill. A common structure with the previously studied animals is the statocyst which functions as a detector of gravity. (Hickman, Roberts, Keen, 2009) The next three species studied all belong to the phylum Arthropoda, but are found in different classes. The first to be studied was the Tarantula found in the class Arachnida (order Aranea). This animal has hair like receptors called sensory setae that function as mechanoreceptors all over the body of the animal. Also, in addition they have small, extremely sensitive tactile hairs called trichobothria that are sensitive to even airborne vibrations, including sound frequencies. Chemoreception is associated with fine hairs surrounding the mouth, on the pedipalps. (Hickman, Roberts, Keen, 2009) The tarantula also has 8 simple eyes that are made up of a lens, optical rods, and a retina. Even though most only can detect movement like the previously studied animals, some are able to form images. Since the spider is more accustomed to capturing prey within webs, vision is relatively unimportant and thus in most remain simple. (Underwood, 2009) Another member of the phylum Arthropoda is the scorpion, classified in the class Scorpionida. Although they are equipped with venom for defence the scorpion is still seen to be the prey of many other animals, thus they require specialised sensory structures for detection of danger. This animal is seen to possess a unique sensory structure know as a pectine. This is used primarily in detecting vibrations which are used for capturing prey. (Gaoge Smith , 2000) This is seen to be the primary chemosensory organs of scorpions. The pectines are found in the ventral medial part of body and are seen to be paired appendages that brush the substrate as the scorpion walks. Comb-like organ consists of a supportive spine and an array of teeth. Each tooth supports hundreds of setaform sensilla called pegs. The neuronal cell layer within the teeth is seen to be further divided into inner and outer sub-larninae, comprised of chemosensory and mechanosensory neurons. (Melville, 2000) Similar to the arachnids described previously, the scorpion has sensory hairs called setae that function as tactile and chemosensory hairs. These sensory hairs are also found on the pedipalps of the animal to sense air-borne vibrations. Also, thicker setae are found all over the body to detect direct touch. In contrast to the spiders the scorpions possess six pairs of eyes as part of their photoreceptor structure. The last arthropod group to be described is the centipede, classified into the sub-phylum Myiapoda and order Centipedes. These animals are seen to possess one pair of antennae instead of the usual two paid found in other arthropods. The antennae are sensory appendages found in the head of the animal that are sensitive to airborne chemicals and also possibly humidity. Similar to the planaria, Centipedes also bears a pair of simple eyes made up of ocelli. (Barnes Cawlow, 2002) Part B: Sensory function in Mammals Mechanoreception Somatosensory system has a large number of receptrors which vary in location and type. Receptors are located in the superfial skin, dermal, epidermal and depper in dermis, and in subcutaneous tissue. Meissners corpusles are located in the dermal papillae, Merkels receptors in the dermal papillae, and bare nerve endings. Subcuateous receptors, beneath both the previously mentiones layers, possess pacinian and Rufflin corpusles. Pacinian may be both cutaneous and subcutaneous. (Wang , 2007) The Pacinian corpusles are present in the skin, muscles, mesentery, tendons, and joints of mammals that are rapidly adapting. Each Pacinian corpuscle contains a region of receptor membrane that is sensitive to mechanical stimuli and that is surrounded by concentric lamellae of connective tissue structures (Anonymous, 2007) Pressure on the corpuscle transmits mechanically through the layers to the sensitive membrane of the receptor neuron. The receptor membrane normally responds with a brief, transient depolarization at both the onset and the offset of the deformation. The mechanical properties of the intact corpuscle, which preferentially pass rapid changes in pressure, confer on the receptor neuron its normally phasic response. (Randall, Berggren, French, 1997) This behaviour explains why the sensation of the coin was lost after a few seconds. The added coin did not produce enough mechanical force to excite the Pacinian corpustle once again, thus it was not felt. The time taken for the coin to stop being felt varied from person to person. This could be due to the different amount of tissue between the skin and the nerve. The thicker the less the coin is felt and the quicker is sensation is lost. A mechanoreceptors  receptive field  is the area within which a stimulus can excite the cell. If the skin is touched in two separate points within a single receptive field, the subject will be unable to feel the two separate points. If the two points touched span more than a single receptive field then both will be felt. The size of mechanoreceptors receptive fields in a given area determines the degree to which detailed stimuli can be resolved: the smaller and more densely clustered the receptive fields, the higher the resolution. For this reason, the density of the Merkel nerve endings and Meissners corpuscles determine the sensitivity of the particular area. (Wang , 2007) From the results obtained the fingertip is seen to be the most sensitive and thus will have a high density of Merkel nerve endings and Meissners corpuscles. On the other hand the fore arm is seen to be one of the least sensitive and thus will have a small density of the nerves Besides physical contact detected by mechanoreceptors, more complex accessory structures are able to transfer mechanical energy to the receptive membrane. These most complex accessory structure associate with mechanoreceptive cells is the vertebrate middle and inner ear. Hair cells are found in all vertebrate animals including humans, and are extremely sensitive mechanoreceptors. They are responsible for transducing mechanical stimuli to electrical signals. They are found in several locations. For example, in vertebrate fish and amphibians, an external set of receptors are called the lateral line system. This system is based on series of hair cells that detect motion in the surrounding water and when stimulated produces an action potential as in the mammalian ear. This lateral line is, however, not present in mammals. (Hickman, Roberts, Keen, 2009) The ears of vertebrates perform two sensory functions. The organs of equilibrium perform like the statocysts in invertebrates that allow the animal to detect its position with respect to gravity. The organ of hearing provides formation about vibrational stimuli in the environment, thus detecting sound. (Hickman, Roberts, Keen, 2009) Sound waves enter the external ear of a vertebrate aided by the pinna and the tragus. The entire external structure has a function similar to that of a funnel, amplifying and then concentrating sound waves. Vibrations from sound waves cause changes in air pressure, which travel from the external ear, down the auditory canal, and then move the eardrum. The ear converts energy of sound into nerve impulses. The vibration of the eardrum causes the fluid of the cochlea to move. The basilar membrane containing the floor of the cochlea, and the scala media, containing the organ of corti is where these vibrations undergo the conversion to neuronal impulses. The organ of corti contains sensory hair cells, and the waves of fluid in the cochlea press the hair cells against an overhanging tectorial membrane, and then pull them away. These hair cells are just across synapses from sensory neurons, and this action provides a stimulus that opens sodium channels in the sensory cell membranes. This provides for an action potential in the environment of high potassium concentrations that the endolymph has. Auditory nerves located in a spiral ganglion carry the action potential to the brain. (Randall, Berggren, French, 1997) Invertebrates, such as the insects have ears located on their thoracic legs and are associated with respiratory passages, called the trachea. The ear tympanum has an analogous function to the tympanic membrane of the mammalian ear. Similar to a mammal, sound waves stimulate the membrane to vibrate, but in the insect, this directly activates nerve impulses. (Barnes Cawlow, 2002) Some insects also have a related tracheal system that directs information on air pressure changes, inside the insect, to the eardrum. If the right tympanum is stimulated, it will send the signal through the tracheae to the left tympanum. The delay in stimulus between the left and the right ear helps the insect locate the direction from which the sound came. Webers law states that the ratio of the difference threshold to the value of stimulus is constant. According to this relationship, doubling the value of the stimulus will cause a doubling of the difference in the threshold. As seen in the results the just noticeable difference or intensity difference for the 50 g and 100 g was seen to be constant for all the subjects. Chemoreception Vertebrates, including humans detect chemicals using general receptors and two types of specialized receptors, gustatory and olfactory. Many aquatic vertebrates have generalized chemical receptors scattered over their body surface. Vertebrates usually accomplish chemoreception by moving chemically rich air or water into a canal or sac that contains the chemical receptors. Mammals together with other vertebrate have taste receptor cells located in taste buds which are supported by basal cells. Chemoreception is much different in invertebrates than in vertebrates. For example, planarians find food by following chemical gradients in their surroundings. Their simple chemoreceptors are found in pits on their bodies, over which they move water with cilia. Insects have chemoreceptors in their body surface, mouthparts, antennae, forelegs, and, in some cases, the ovipositor. Moths, for example, smell with thousands of sensory hairs on their antennae. (Barnes Cawlow, 2002) Photoreception In vertebrates such as humans, the surface of the eyeball is made up of the sclera, a white connective tissue, and under that a thin pigmented layer called the choroid. The sclera contains the cornea which is transparent, and is where light initially enters the eye, and the choroid contains the iris which contracts and expands to regulate the amount of light entering the hole in its centre, known as the pupil. The rear internal surface of the eye is the retina, which contains the actual photoreception cells. In the retina, there are two types of receptor cells, rods and cones. Rods and cones contain visual pigments made up of light absorbing retinal molecules. (Randall, Berggren, French, 1997) Compound eyes of arthropods are image forming eyes composed of many optic units called ommatidia. These are able to detect a very small fraction of the spectrum of light that the eye as a whole is exposed to; like the rods and cones of the vertebrate eye. In compound eyes, the photoreception cells are called retinular cells, and they surround a single eccentric cell. Because the receptive field of each unit in a compound eye is relatively large, compound eyes have lower visual acuity than vertebrates. (Randall, Berggren, French, 1997) Thermoreception Temperature is an important environmental variable, and many organisms acquire sensory information about temperature from the action of specialized nerve endings known as thermoreceptors, in the skin. Both the external skin and upper surface of the tongue of mammals contain warmth and cold receptors. the warmth receptors detect an increase in temperature in the environment by increasing the firing rate transient. On the contrary cold receptors increase its firing rate transient when a cool environment is detected. (Randall, Berggren, French, 1997) These receptors are quite sensitive. Their firing rate is seen to increase the more the temperature of the external environment varies from the internal body temperature of about 37 OC. when the temperature becomes sufficiently different the patter changes for both types of receptors and the frequency of the action potential is seen to drop. The response of the thermoreceptors consists of a large transient change in firing rate, followed by a longer-lasting, steady-state phase. Other sensory structures that are not present in humans also exist. For example, snakes have thermoreceptors that are able to detect emitted heat energy. This is advantageous for them to detect warm-blooded prey. Also fish are able to use very low frequency electrical signals to communicate in murky water, thus they are able to locate each other. (Hickman, Roberts, Keen, 2009) Conclusion From this experiment it was concluded that different organisms have different sensory structures adapted to their unique modes of life. One could also not that as animals become more complex, their sensory structures are also seen to be more developed. This can be seen from the evolution of the simple eye spot in planaria to the complex eye found in humans. Not only are humans seen to be able to detect movement but also colour. However, one may also note that humans do not always possess the most advanced sensory structures. This can be seen in for example, the ability of reptile snakes to detect infrared radiation. This being absent in humans.

Wireless Networking And Malicious Association Computer Science Essay

Wireless Networking And Malicious Association Computer Science Essay Wireless security is to prevent unauthorized user to access the wireless network or damage the computer by using wireless network. When the wireless technology has been first introduced to the world, it already has few danger methods that will harm the users desktop or laptop, but that time cracker and hacker dont have any resources to crack or hack a network by using wireless technology. At that time, the wireless network only use by the big company. But now day, wireless network is very common, every corner of the world like cafà ©, shopping mall, school, or college that has provide wireless access for the people to access it. Not only cafà © and college using wireless network, at other country it use wireless technology to connect whole citys network. With this technology, people that around the wireless router can easily to access the wireless network to do the search of the information, check mail or play online game. Because of the wireless technology, now day, every laptop has wireless adapter card pre-install inside and make the laptop more portable and let them can connect to internet easily. Not only for laptop, wireless technology also make benefit for the desktop. Desktop can connect to network by installing a wireless adapter card or plug in an USB wireless adapter then desktop can connect to a network and without cable messy around the floor. In this case, wireless technology has become widely use and because of this reason, the risk of using wireless technology has increase and let many hacker found the way to hack the wireless network. All of security risk is related to the current wireless protocol and encryption method. Most of the wireless networks use IEEE 802.11b for standard communication and IEEE 802.11b have already became standard wireless networking technology among the small business user and home user. The IEEE 802.11b can support the indoor distance from several meter to several hundred meters, and can support the outdoor from several kilometer to several ten of kilometers by using unlicensed wireless band. Now day, the wireless network devices normally are equipped with Wired Equivalent Privacy (WEP) data encryption. WEP data encryption was based on 64-bit RC4 encryption algorithm. Other that 64-bit RC4 encryption algorithm, 128-bit encryption algorithm is another data encryption on the WEP data encryption. But this kind of device is more expensive compare with 64-bit RC4 encryption and beside that, all the nodes must use the same encryption level. 1.2 Aim of Research Aim of the research is to implement the wireless security into the CSC System to prevent unauthorized user to access the wireless network. To increase the security level of the wireless network. To avoid the data or information inside the server or computer been hacked by unauthorized user. To increase the safety of the data transfer between server and computer. To add extra encryption method to encrypt the packet need to be transfer. To prevent unauthorized user to shut down whole system though the wireless access point. Chapter 2: Main Body 2.1 Wireless Security Concept A research has been carried out about the concept of the Wireless Security and how to enhance the wireless security. Wireless Security is to prevent an unauthorized user to invade the server database and bring harm to entire network. Below are the results of the research. 2.1.1 Unauthorized Access According to the research, have a lot of way to break into the wireless access point without an authorization. The unauthorized access will cause companys daily operation failure and lose profit. Below are the some of the examples unauthorized accesses. 2.1.1.1 MAC Spoofing MAC spoofing is a technique to change an assigned MAC (Media Access Control) address to another different MAC address. When a person using this technique, he/she has his/her reason to changes a network devices MAC address, whether is legitimate or illegitimate. Changes a network devices assigned MAC address allows bypass the access control list on the server or router, either hiding a computer on a network or attacking a network by simulate another network device. MAC spoofing occurs when a cracker or hacker has the ability to listen the network traffic that passed by and through it; the cracker or hacker can identify the MAC address of the computer with network privileges. Most of the wireless system allows MAC filtering to only allow authorized computer that with specific MAC address to access the network. The computer that dont has specific MAC address cant access the network, so the cracker or hacker use a program which has network sniffing capability and combine with other software or program to pretend the computer has any MAC address that the cracker desires. (Wikipedia, 2010) 2.1.1.2 Malicious Association The Malicious Association is hacker that can connect to company network by using their cracked laptop. This type of laptop is known as soft AP (Access Point) and this type of laptop is created by using some software that makes the hacker laptops wireless adapter card look like a legitimate access point. After the hacker has already gained the access to the company network, the hacker can steal the password or plant the computer virus into the network. (Wikipedia, 2010) 2.1.1.3 Ad-hoc Network Ad-hoc network, also known as peer-to-peer network built up between two or more wireless computers and these wireless computers dont have access point in between them. Ad-hoc network usually provide little protection, encryption method to the network. When a company or person using Ad-hoc network and wired infrastructure network together at the same time, and will link up a secured network to an unsecured network. Connect two different network topology need to have a bridge between them. Bridging is in two forms. User can connect the network topology y a direct bridge and indirect bridge. Direct bridge need to configure by the user and indirect bridge is user share resource on the user computer. The indirect bridge is provides two security problems. The first problem is the data can be obtained through the secured network on the user computer and this data exposed to other user discovery via the Ad-hoc network bypassing the user secured network. The second problem is a Trojan, computer virus or worm can be placed on the user computer through the Ad-hoc network. The unauthorized user no needs to crack the password of the network and can place the computer virus through the Ad-hoc network. (Wikipedia, 2010) 2.1.1.4 Denial of Service C:UsersZoukyDesktop424px-Stachledraht_DDos_Attack.jpg DoS (Denial of Service) or DDoS (Distributed Denial of Service) will occurs is when an attacker continues non-stop bombards an attacker targeted access point with bogus request, failure messages, or other commands. Denial of service will cause other users cant get into the network and also will cause a network crash. The DoS attack will expose a little bit of the data to the attacker, when the DoS attack happen, the interrupted network will prevents the data flow and also indirectly prevent the data from being transmitted. After the DoS attack has been performed, the attacker will start to observe recovery of the wireless network. During the initial handshake code is start to re-transmitted to the wireless network, the attacker continue what he remain. The attacker will record down the initial handshake code and use cracking tools to analyze the security weakness and exploit this code to get an unauthorized access to the system. (Wikipedia, 2010) 2.1.1.5 Man-in-the-middle Attack Man-in-the-middle attacker using a computer to sets up a soft AP (Access Point) and enticing other computers to log into the computer that already been sets up to soft AP. After this all are done, the attacker connects to a real access point by using other wireless card and the attacker will offers a steady flow of the network traffic through the done hacking computer to real network. Man-in-the-middle attack forces other computers AP drop the connection to real network and reconnect to attackers soft AP. This allows hacker to receive what other computers want data need to send out to real network. (Wikipedia, 2010) 2.2 Basic Security for Wireless Wireless network exist in this world already has a decade, at that time the security for the wireless network still not strong enough to prevent infiltrate by hacker or cracker. But at that time the hacker doesnt familiar on technology or technique to hack the wireless network. One of the reasons is the hacking device to hack the wireless network still hard to achieve on that time market. After a decade, the technology and technique to hack a wireless network and the step to build up the hacking device can found on internet. So now day the wireless network users need to have a strong and better wireless security to secure the wireless network. Below are the basic securities for wireless network for the first wireless network has been introduced. 2.2.1 Service Set Identifier SSID (Service Set Identifier) is a common network name for a device in a wireless LAN and some of the wireless device has its own default SSID. The default SSID can be replaced by other string and normally this string is generated randomly. SSID is to identify a name for particular wireless access point. All wireless network need to have SSID within the wireless access point just can communicate each other. The client doesnt know the SSID of the access point, then that client cant simply access the network; this is to prevent hacker to invade network by access through access point. The hacker need to know the SSID of a network just can complete the 802.11b protocol to access the network. The access point will broadcasts the SSID by the beacon inside the wireless device. However, even the broadcasting of the access point is turn off, the SSID still can detected by hacker with undetected monitoring of particular network or sniffing. So, all the clients need to know the SSID of the acce ss point before can make connection to the wireless device. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.2 Medium Access Control Address Filter Each wireless access point can be configured only accept the clients MAC address that already registered inside the wireless access point. With this function, the network administrators can limit the access of the client into wireless network by register the clients MAC address into the wireless access point. Most of wireless devices MAC address is unique and MAC address filter only allow the clients MAC address already registered in the wireless access point to access the network. The entire clients MAC address will store into MAC address ACL (Access Control List) and wireless access point will denied other wireless device if the wireless devices MAC address is not register inside wireless access points MAC address ACL. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.3 Wired Equivalent Privacy WEP (Wired Equivalent Privacy) is intend to give wireless users have a security scheme is equivalent to the wired network security. WEP doesnt provide any superior level or higher than that level of security, although WEP doesnt has superior level of security but it security level is equivalent with wired network. In the practice, the result show that the security level of WEP need to equivalent to wired network security is hardly to achieve. The use of WEP is to prevent the wireless client from sending and receiving data from the wireless access point, the wireless clients need to have the correct WEP key just can connect to the wireless access point. Now mostly of the network devices is equipped with the WEP data encryption and the encryption algorithm for the WEP is 64-bit RC4. Some of the network device capable to uses 128-bit encryption algorithm. After WEP is active, each 802.11 packet will encrypted by 64-bit RC4 key with RC4 cipher stream. This key is composed of 24-bit IV (I nitialization Vector) and other 40-bit is WEP key. IV is chosen by the sender and the IV can be change, this make every packet wont encrypt with the same key. Another additional 4-byte is for ICV (Integrity Check Value); ICV is computed and appended on the original packet. RC4 cipher stream is generated by 64-bit RC4 encryption algorithm. The WEP encryption algorithms work on a key that share between wireless device and wireless access point. The packet is encrypted by using the key before packet is send out and all packets wont have same cipher stream. The packet receiver use integrity check to ensure that the packet is not modified during the transmission. Most of the systems are share a single key among all the wireless device and wireless access point. The Integrity Check Field is to ensure the packets are not been modified during the transmission and Integrity Check Field also encrypted with the RC4 cipher stream. WEP is using CRC-32 (Cyclic Redundancy Code 32) mechanism for i ntegrity check. CRC is defined as a class of checksum to prevent overflow by dividing the message into binary. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Prasad, 2007) 2.3 Comparison between SSID, MAC Address Control Filter and WEP From the research, SSID (Service Set Identifier), MAC (Medium Access Control) address control filter and WEP (Wired Equivalent Privacy) are the basic security for the wireless network. This three security methods can implement together in one network. Because these are basic security for wireless network, so the security methods are easy to break by unauthorized user. If not implement other security methods and only just implement SSID, MAC address control Filter and WEP into wireless network, that wireless network will not secure under protection of these three security methods. The wireless access point will broadcast the SSID to the wireless client and wireless client just can access to the access point. When the access point broadcast its own SSID, the entire nearby wireless client will know the SSID of that network or access point, even the unauthorized users also will know the SSID of the network. The unauthorized users will attempt to access the wireless access point. And the wireless access point can close the SSID broadcast function; mean that the SSID is hidden. But when the authorized user requires connecting to the access point, the authorized user will broadcast the SSID to the wireless access point, if the SSID broadcast by the authorized user is match with the SSID of the access point. The authorized user just can make connect to the access point. This make hacker a chance to hack the access point because when authorized user is broadcasts the SSID to the access point, hacker can capture the packet that broadcast by the authorized user and make connection to the wireless access point. The wireless devices MAC address will store inside the wireless access point ACL (Access Control List), the wireless devices MAC address need to be match with MAC address inside the wireless access point ACL just can connect with wireless network. If that wireless network has more than 20 computers need to connect to the wireless network, then the network administrator need to enter all the computers MAC address into the wireless access point ACL. This will make the network administrator very troublesome enter the MAC address one by one and MAC address can be forged. WEP has been considered as a failure in wireless security, at the end it still accepted by the IEEE because WEP wasnt aim for provides fully security for wireless. WEP encryption is very easy to crack by the unauthorized user. WEP only authenticates the wireless client. This allows an unauthorized user to capture the packet send by the wireless client. WEP key is easily lost or stolen by unauthorized user and if the stolen WEP key hasnt been report to the network administrator, the network administrator wont able to detect the unauthorized user has already infiltrated the wireless network. If the stolen WEP key has been reported, network administrator require to change the entire devices that have use the same WEP key with stolen devices WEP key. If the company or enterprise has more than thousands of wireless user using that wireless network, this can be a very difficult task for the network administrator to change the entire WEP key for each wireless users. Like just mentioned, the WEP authentication message is easy to forging by the unauthorized user. Unauthorized user can capture the authentication message that send by the wireless client and forge a new authentication message; unauthorized user can use this forged message to associate with wireless access point. The management for WEP key in not specific in WEP standard. Since dont have management for WEP key, then WEP key will be use for a long term and lack of quality. Most of the wireless network uses one WEP key and share between the entire network and the entire wireless clients access point need to program with same WEP key. Because of this reason, network administrators rarely change the WEP key. SSID, MAC address control filter and WEP is basic security for wireless network; these methods still cant apply in wireless network. Just using SSID, MAC address control filter and WEP are not enough to prevent the security break. These methods require associate with other security methods to enhance the wireless security to prevent security break. 2.4 Advanced Security for Wireless From the research that carried out, advanced wireless securities are to replace the basic wireless security and improve what basic wireless security vulnerability. 2.4.1 Wi-Fi Protected Access WPA (Wi-Fi Protected Access) is a certification program that created by Wi-Fi (Wireless Fidelity) Alliance; WPA is a subset of the IEEE 802.11i. This technology is designed to response to the weaknesses that found in WEP. WPA will generate the key based on the master key and the master key never use by WPA. To encrypt the data, WPA is much more secure than WEP. Key management and updating in WEP is poorly provided, the secure key management is a built-in function in WPA. Mean that WPA can update and manage the key easily, not like WEP. If WEP need to manage or update the key, the network administrator needs to change entire wireless client key that has connection with the wireless network. WPA got one key only and that is master key like just mentioned, network administrator only require to change that master key then WPA will generate the key based on the master key. Generated key is hierarchy of the master key. So this make the management and updating become much easier. The IV (Initialization Vector) values can be reuse and the length of the IV is become longer, from 24-bit increase to 48-bit. Another additional part, the IVs are the sequence counters for the TSC (TKIP Sequence Counter), to protect the loop of the data. The WEP message integrity protocol CRC-32 has been proved ineffective. Because of this reason, WPA uses a MIC (Message Integrity Check) mechanism to replace the WEP message integrity protocol. The correct MIC is very difficult to guess. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) WPA has 3 improvements over WEP: Improved Data Encryption WPA improves the data encryption through the TKIP (Temporal Key Integrity Protocol). TKIP generates the key by using hashing algorithm and adding the integrity checking feature, this will ensure the key havent been edited by other person. TKIP is a Temporal Key hash Function and it is another option to WEP to fix all security problems that WEP has and it doesnt require installing other new hardware. TKIP same like WEP, use RC4 stream cipher to encrypt and decrypt data and all involved clients require share the same key. This key must be 128-bit and it calls Temporal Key (TK). The Initialization Vector also include in TKIP. Even if the TK is shared among all the wireless clients, all wireless clients generate different RC4 key stream. Since the communication participants perform a 2-phase generation of a unique Per-Packet Key (PPK), which is used as the key for the RC4 key stream. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) User Authentication User authentication in WPA is through the EAP (Extensible Authentication Protocol). This function is missing in WEP and WEP access to the wireless network is based on computers network cards MAC address and MAC address is very simple to be stolen. The purpose of EAP is to create a more secure public-key encryption system to ensure that only authorized user can access the wireless network. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Integrity WPA has a new mechanism call (MIC) Message Integrity Code for TKIP is computed by a new algorithm, name Michael. MIC is computed to detect errors in the data contents, either is transfer errors or purposely change the data content. The Michael is a 64-bit MIC and need to add to the data and ICV (Integrity Check Value). (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) 2.4.2 Robust Security Network RSN (Robust Security Network), also call as WPA (Wi-Fi Protected Access) 2. At year 2004, concept of RSN has been released, where the wireless devices need to support by additional capabilities. RSN is fully tested by Wi-Fi Alliances. RSN has a whole new standard and architecture to utilize the IEEE 802.1X standard for AES (Advanced Encryption Standard) and access control. RSN is using a pair-wise key exchange (Four Way Handshake) protocol, RSN also utilizing with 802.1X for key management process and mutual authentication. Now, 802.11i allows for the network implementation and also can use TKIP (Temporal Key Integrity Protocol). By default RSN uses CCMP (Counter Mode MAC Protocol) and AES (Advanced Encryption Standard) to provide for a scalable and stronger solution. AES is a replacement for RC4. Data transmission between the wireless access point and wireless device, RSN uses encryption algorithms and dynamic negotiation of authentication on the data transmission. The authentication of RSN is based on 802.1X and EAP (Extensible Authentication Protocol). Encryption algorithms and dynamic negotiation of authentication make RSNs security more secure and save. RSN is stronger and better than WEP and WPA because RSN is using dynamic negotiation, 802.1X, EAP and AES. Unfortunately only the latest devices have the capability let RSN to accelerate the speed of algorithms calculation in wireless client and wireless access point; now day of wireless product cant fully provide the performance of RSN. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) 2.5 Comparison between WPA and WEP WPA (Wi-Fi Protected Access) is the solution for the WEP vulnerability, has some critics done for the WEP, the WPA has numerous enhancements over WEP. WPAs TKIP encryption algorithm has fully enhances the WEPs RC4 encryption algorithm. TKIP make the data encryption more efficient and replace the RC4 vulnerability. WPA has made the key management became much more easier compare with WEP, because the WEPs key require enter one by one to the wireless client, if the company has more than thousands users then the network administrator need to enter more than thousands keys into the users computer. If the key is hacked by unauthorized user, then network administrator need to change key for entire companys computers. On the other hand, WPA no needs so troublesome, WPA only needs to enter one master key, and then WPA will generate key according with the hierarchy of master key, after that WPA will assign the key to the clients and the key is generated in 48-bit of IV size. Even the company g ot more ten thousands users also no need to trouble the network administrator. If one of the key has been hacked by unauthorized user, TKIP just need to generate a new key then network administrator can info the wireless client to change the key. WPA has EAP to authenticate the wireless user. WEP is using MAC address to authenticate the wireless user and some of the wireless devices MAC address can be forged. If the wireless devices MAC address has been forged by unauthorized user then the unauthorized user can easier to connect the wireless network without known by the network administrator. Network administrator also wont notify the wireless network is infiltrated by the unauthorized user until the wireless user report there is a missing MAC address. WPA is using EAP to authenticate the wireless user and the EAP for each wireless client is hard to forge by unauthorized user. If the EAP of the client is forging, but the unauthorized user still need wireless clients private key just can access the wireless network. WEP dont have error checking for the data content, and this will cause the looping of the data. If cant prevent replay attacks and will cause the wireless network crash. WPA has inserted the MIC into TKIP and IV sequence mechanism; this is to prevent replay attacks in the wireless network. MIC and IV sequence mechanism support for the existing wireless infrastructures not require installing new wireless device. Adding MIC and IV sequence mechanism without install new wireless device, adding these two methods can increase the wireless security and also without increase the installation cost of wireless device. Compare WPA with the WEP, WPA has solved a lot of WEP vulnerabilities. This make WPA is more secure compare with WEP because WEP only is basic security for the wireless network; it doesnt provide any protection for the wireless network. WEPs security methods can let a small enterprise to setup a small wireless network. For the big company, WEPs security methods are hard preventing the unauthorized access from outsider. 2.6 Comparison between WPA and RSN For now, never the less, RSN (Robust Security Network) is the strongest wireless security protocol for the wireless network. RSN provide stronger data encryption algorithm and all advantages of WPA. The RSN data encryption algorithm method is using AES (Advanced Encryption Standard) to encrypt the data. What advantages WPA have all included in RSN, expect the RSN data encryption algorithm is more advance. For WPA require upgrade for the software and firmware of the wireless device for the existing wireless network infrastructure, but the RSN doesnt support existing wireless network infrastructure, require upgrading the wireless device in order to implement AES. Implement RSN into the existing wireless network infrastructure require extra cost for just upgrade the hardware. RSN need large amount of processing resources in order to protect the wireless network. Mean that implement RSN will reduce the wireless network performance by processing the data transfer or verify the wireless client. 2.7 Table of Comparison between WEP, WPA and RSN Below is summary of the comparison between WEP, WPA and RSN: Features of Mechanism WEP WPA RSN Encryption Cipher Mechanism RC4 RC4 / TKIP AES / CCMP CCMP / TKIP Encryption Key Size 40 bits 128 bits 128 bits Encryption Key Management None 802.1x 802.1x Encryption Key Per Packet Concatenated Mixed No need Encryption Key Change None For Each Packet No need IV Size 24 bits 48 bits 48 bits Authentication Weak 802.1x EAP 802.1x EAP Data Integrity CRC 32 ICV MIC (Michael) CCM Header Integrity None MIC (Michael) CCM Replay Attack Prevention None IV Sequence IV Sequence (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Chapter 3: Conclusion 3.1 Achievement of Objectives 3.1.1 To increase the security level of the wireless network. In chapter 2.2 until 2.4, the different wireless securities provide different service. 3.1.2 To avoid the data or information inside the server or computer been hacked by unauthorized user. In chapter 2.1, the type of the unauthorized user that can infiltrates the wireless network and chapter 2.2 and 2.4 the methods to prevent hacking. 3.1.3 To increase the safety of the data transfer between server and computer. In chapter 2.2 until 2.4, increase the safety of the wireless access point of wireless network. 3.1.4 To add extra encryption method to encrypt the packet need to be transfer. From chapter 2.2 until 2.4, the extra encryption methods that can hide the data detail. 3.1.5 To prevent unauthorized user to shut down whole system though the wireless access point. In chapter 2.2 until 2.4, the methods to prevent the unauthorized user to connect with wireless access point. 3.2 Research Conclusion A research has been carried out to finish this seminar report by studying the type of the unauthorized access, concept of the wireless security and how efficiency is the wireless network security by determine the wireless security method. Now wireless has already became widely use by company or enterprise, even at home also can using wireless to connect to internet for home purpose like surfing the internet. The reason why so many people like to use wireless network compare with wired network, is because the structure of wireless network is more neat and easy to manage. At the time wireless just came out to the market, the security for the wireless still breakable by hacker or cracker but need a lot of resources to break the security of wireless network. Because last time, wireless network just introduced, the hacker or cracker lack of technology and technique to break the wireless network. Still after few years, the technology and technique to break the wireless security can found in internet. At that time the wireless network has sound the alert and organizations are finding the solution for solve the wireless security problem. But now, the new technology of wireless security has out to market and the security methods are easy to install. So, now wireless security is not a problem. In the report got mentioned is RSN can be the most dependable wireless security for the wireless network. But it still has certain problem like higher cost. Installation for the RSN needs to change whole wireless network infrastructure. WPA got a lot of security methods that cant compare with RSN but WPA still dependable just like RSN. Doesnt mean the expensive item is the good item. As long as the item is reliable then that item is a good item.