Wednesday, October 30, 2019

Economics of Industry Essay Example | Topics and Well Written Essays - 1500 words

Economics of Industry - Essay Example buy problem. Therefore, firms and companies can anatomize their Human Resource Management system in order to develop the necessary skills in-house or they can constitute their Human Resource Management to attract the workmen with the obligatory skills on the extrinsic market. For developing consistent as well as competitive manufacturing strategies, the need is somewhat established. This fundamental subject in the development of a manufacturing strategy is the grit of what the company makes and what it buys (Platts et. al, 2000). Chronologically, such decisions have always been made primarily on the grounds of cost, however, in recent years there has been a successive cognizance on the strategic implications of these decisions and the requirement of pondering over a wide range of other factors as well. This paper determines and analyzes the problems related to agency relationships, asymmetric information, and undesirable assortment which are faced by firms who face such decisions. Moreover, it critically evaluates the possible remedies which can address the three problems discussed, which are associated with agency costs. The analysis of effects of the private agents being less than fully rational in their expectations can lead to depletion of the values and position of the firm. In the context of monetary policy, where the Central Bank may possess come uncertain preferences, the innovative characteristic could be the allowance of public to react in two different ways. One of them could be the formation of rational expectations, and another could be the internalization of uncertainty about the Bank's reference in complete. The cost of internalization appears to be the most appropriate guess regarding those preferences. In the progression of framing anticipations or expectations, the assumption of rational expectations enables all the agents involved in sharing the information from the same set. Nonetheless, with the breaking down of the assumption of common information, may be due to infeasibility, or because of the high-cost of acquirement of all the information others have, the agents have to resort to second-guessing the reactions of their counterparts. Agents can seem to be wide off the mark while making educated guesses about the characteristics of others and the consequences to the ideal case of full information and rational expectations could be hazardous. From the point of view of the private sector, a monetary policy can be applied where, for example, the Central Bank has tentative preferences. This could be a matter of choice, since, the bank itself does not unleash certain aspects of what it is cognizant of, or because the Central Bank does not possess firm information itself and, as a result, is unable to commit to one specific set of parameters for all the circumstances (Demertzis & Hallet, 2008). Authors like Geraats and Walsh have analyzed the first case

Monday, October 28, 2019

Childhood Essay Example for Free

Childhood Essay Introduction Purpose and aims 2 Context and legal responsibilities 2 About this document 3 A principled approach 4 Setting the standards Providing for equality of opportunity Creating the framework for partnership working Improving quality and consistency Laying a secure foundation for future learning 4 4 5 5 5 Section 2 – Learning and Development Requirements Overview of the areas of learning and development 7 The early learning goals and educational programmes Personal, Social and Emotional Development Communication, Language and Literacy Problem Solving, Reasoning and Numeracy Knowledge and Understanding of the World Physical Development Creative Development 7 8 8 9 10 11 11 The assessment arrangements Assessment during the EYFS 12 `12 Assessment at the end of the EYFS – the Early Years Foundation Stage Profile 12 Assessment requirements 13 Section 3 Welfare Requirements Overview of the welfare requirements 15 Safeguarding and promoting children’s welfare Suitable people Suitable premises, equipment and environment Organisation Documentation 17 24 25 32 33 Section 4 – Other information Other legal duties 35 Competency in English 35 Exemptions Inspection and regulation Local Authorities Where to go for help 35 36 36 37 Appendix 1 Assessment Scales Appendix 2 Specific requirements for qualifications and ratios of adults to children SECTION 1 INTRODUCTION Purpose and aims 1. Every child deserves the best possible start in life and the support to fulfil their potential. A child’s experience in the early years has a major impact on their future life chances. A secure, safe and happy childhood is important in its own right, and it provides the foundation for children to make the most of their talents as they grow up. When parents choose to use early years services they want to know that provision will keep their children safe and help support them to thrive. The Early Years Foundation Stage (EYFS) is the framework that provides that assurance. 2. The overarching aim of the EYFS is to help young children achieve the five Every Child Matters outcomes of staying safe, being healthy, enjoying and achieving, making a positive contribution, and achieving economic well-being by: setting the standards for the learning, development and care young children should experience when they are attending a setting outside their family home, ensuring that every child makes progress and that no child gets left behind;  promoting equality of opportunity and anti-discriminatory practice and ensuring that every child is included and not disadvantaged because of ethnicity, culture or religion, home language, family background, learning difficulties or disabilities, gender or ability; creating the framework for partnership working between parents and professionals, and between all the settings that the child attends; improving quality and consistency in the early years sector through setting a universal set of standards which apply to all settings, ending the distinction between care and learning in the existing frameworks, and providing the basis for the inspection and regulation regime; and laying a secure foundation for future learning through learning and development which is planned around the individual needs of the child, and informed by the use of ongoing observational assessment. Context and legal responsibilities 3. The EYFS is part of a comprehensive package flowing from the ten year childcare strategy Choice for parents, the best start for children and the landmark Childcare Act 2006. The Act provides the context for the delivery of the EYFS and taken together with the other elements of the strategy, the EYFS will be central to the delivery of the new duties on improving outcomes and reducing inequalities. 4. The EYFS builds on the significant recent developments in early years curriculum and standards. Practitioners will recognise continuity with the principles, pedagogy and approach of the Curriculum Guidance for the Foundation Stage, the Birth to Three Matters framework, and the National Standards for Under 8s Day Care and Childminding. These three frameworks are replaced by the EYFS and will be repealed. 5. The EYFS will be given legal force through an Order and Regulations made under the Childcare Act 2006. From September 2008 it will be mandatory for all schools and providers in Ofsted registered settings attended by young children – that is children from birth to end of the academic year in which a child has his or her fifth birthday. The term â€Å"early years provider† includes maintained schools, non-maintained schools, independent schools, and childcare registered by Ofsted on the Early Years Register, all of which are required to meet the EYFS requirements. . 6. It is the legal responsibility of these providers to ensure that their provision meets the learning and development requirements, and complies with the welfare regulations, as required by section 40 of the Childcare Act 2006. About this document 7. This document forms part of the statutory framework for the EYFS. It sets out the learning and development requirements (the early learning goals; the educational programmes; and the assessment arrangements) in Section 2 and the welfare requirements (safeguarding and promoting children’s welfare; suitable people; suitable premises, equipment and environment; organisation; and documentation) in Section 3. The learning and development requirements are given legal force by the Early Years Foundation Stage (Learning and Development Requirements) Order 2007 made under section 39 (1) (a) of the Childcare Act 2006. The welfare requirements are given legal force by Regulations made under section 39 (1) (b) of the Childcare Act 2006. Together, the Order, the Regulations and the Statutory Framework document make up the legal basis of the EYFS. This document has statutory basis by virtue of section 44(1) of the Childcare Act 2006. 8. Providers must ensure that their early years provision complies with the learning and development requirements, and the welfare requirements. In addition, this document contains statutory guidance issued pursuant to Section 44 (4) of the Childcare Act 2006. All providers must have regard to this guidance, which means they must take it into account and, if they decide to depart from it, they must have clear reasons for doing so and be able to demonstrate to the Chief Inspector of Schools in England (Ofsted) that their alternative approach achieves the same ends as the guidance conveys. 9. This document is referred to as the EYFS Statutory Framework and is part of a package of  materials which comprise: this document (legal requirements including the Learning and Development Requirements Order and the Welfare Regulations and statutory guidance); EYFS Practice Guidance (contains the learning and development grids, non-statutory guidance, additional advice and information); and EYFS re sources for providers and practitioners (CD-ROM, poster and Principles into Practice cards). A Principled Approach 10. The EYFS principles which guide the work of all practitioners are grouped into four distinct but complementary themes, as set out below: A Unique Child Positive Relationships Enabling Environments Learning and Development 11. These four guiding themes underpin effective practice in the EYFS, put the requirements into context, and describe how practitioners should support the development, learning and care of young children. Each theme is supported by four commitments which describe how the principles can be put into practice, and these are expanded on in the EYFS Principles into Practice cards. 12. The four themes also underpin the five aspirations set out in paragraph two which tie into the Every Child Matters Outcomes. Setting the standards 13. The EYFS sets the standards for providers to enable them to reflect the experience which many parents give their children at home. As parents do, providers should deliver individualised learning, development and care which enhances their child’s development and gives them the best possible start in life. Every child should be supported individually to make progress at their own pace and children who need extra support to fulfil their potential should receive special consideration. All providers have an equally important role to play in children’s early years experiences – for example a childminder who sees a child for two hours a day should consider what a child’s individual needs are at that time of day, and ensure that the provision they deliver is both appropriate to those needs and complementary to the education and care which the child receives in its other setting(s). All types of providers have the potential to deliver the EYFS to an excellent standard. Providing for equality of opportunity 14. Providers have a responsibility to promote positive attitudes to diversity and difference – not only so that every child is included and not disadvantaged, but also so that they learn from the earliest age to value diversity in others and grow up making a positive contribution to society in this respect. Practitioners should focus on each child’s individual learning, development and care needs: removing or helping to overcome barriers for children where these already exist; the early identification of and response to needs which could lead to development of difficulties; and stretching and challenging all children. 15. All children, irrespective of ethnicity, culture or religion, home language, family background, learning difficulties or disabilities, gender or ability have the opportunity to experience a challenging and enjoyable programme of learning and development. Creating the framework for partnership working 16. Partnership working underpins successful delivery of the entire EYFS. Many children will receive education and care in more than one setting and in these cases practitioners must ensure effective continuity and coherence by sharing relevant information both with each other and with parents. Patterns of attendance should be a key factor in practitioners’ planning. Early years practitioners also have a vital role to play in working with parents to identify learning needs and to respond quickly to any area of particular difficulty. It will regularly be appropriate for practitioners to work together with professionals from other agencies, such as local and community health services, or where children are in care to identify needs and use their knowledge and advice to provide the best learning opportunities and environments for all children. Improving quality and consistency 17. The EYFS brings together and simplifies the learning and development and welfare requirements, in addition to ending the distinction between care and learning and between birth-to-three and three-to-five provision.

Saturday, October 26, 2019

The Effect of Music on Psychology and Behavior Essay -- A Level Essays

The Effect of Music on Psychology and Behavior There have always been discussions of the effects music has on ones behavior, and how it’s related to Psychology. The truth has never really been verified among common knowledge, but it’s usually something that intrigues people. They say heavy metal and rap can make teenagers violent, sad and depressing music can make teenagers sad and depressed, and some say it’s best to listen to classical music when doing schoolwork because it makes your brain more active. There have been many people that reported how music has effects on their behavior. It can lift their mood, â€Å"fuel the fire† when they’re angry, or even make it easier for them to fall asleep. People never really get the chance to research the actual science of music, and how it changes people attitudes. It’s also interesting to think about how music plays a role in someone’s identity. Many articles found discuss the Social Identity Theory, and the people who conduct these experiments always keep this in mind, â€Å"Social identity theory (SIT; Tajfel, 1978; Tajfel & Turner, 1979) maintains that individuals gain a social identity from the groups to which they belong. The theorists claim that members have a desire to evaluate their own group positively and that they achieve positive evaluations through social comparisons with relevant other groups along valued dimensions. One maintains positive social identity and self-esteem through in-group favoritism, positive distinction from the out-group, and, occasionally, out-group derogation (e.g., Noel, Wann, & Branscombe, 1995)† (Tarrant, North, Hargreaves, 2001). Towson’s online database is an excellent place to research what has been found on music’s effects on psychology, and ... ... also determines their place in society. Ones place in society can then determine how their life will develop because you associate with the people and characteristics of that group. If one were to listen to rap and become associated with the people in that group, it’s likely that they will become sexually active and become involved in illicit drug use. This could then determine their education (whether or not they drop out of school) and eventually what they end up doing for a living. Music has a very strong influence on the lives of adolescents. It seems almost as if music has a stronger role than things like religion and politics. People usually think that music just determines how adolescents act, but after researching in depth you find that music determines much more than that. Music can be a determining factor in their education, social status, and their future.

Thursday, October 24, 2019

First Aid and Buttercups Cc Pin

Name: Kirsty Beale Nursery: Buttercups CC PIN: MU2. 4 Contribute to Children and Young People’s Health and Safety 3. 1 Identify non medical incidents and emergencies that may occur in the work setting * Fires * Flooding * Loss of property * Lack or loss of electricity,gas,water and heat * Data loss * Breach of confidentiality * Legal issues * Personal relationships * Bad management * Bad planning . 1 Identify the signs and symptoms which may indicate that a child or young person in injured or unwell. * Temperature over 37. 5c * Unresponsive * Lethargic * Nausea * Vomiting * Dizziness * Difficulty breathing * Rash * Diarrhoea * Chronic Headaches * Stomach pains 4. 2 Identify circumstances where children or young people may need urgent medical attention. * Broken bones * Unconscious/unresponsive * Shallow Breathing Asthma attack * Temperature over 80c * In severe pain * Dislocation * Confusion * Allergies * Chocking 4. 3 Outline own role and responsibilities in the event of a ch ild or young person requiring urgent medical attention. If I found a child showing any of the above symptoms I would evaluate what the symptoms are to the treatment needed if non-emergency I would immediately alert the appointed first aider so the child’s care can proceed. Related reading: Situations That Require Urgent Medical AttentionIf the child needs more substantial medical care an ambulance will be called and the parent/carer of the child will be informed what is wrong and where the child will be, when the situation is under control the settings medical forms will be filled out for legal purposes. 6. 2 Describe Personal Protective Clothing that is used to protect spread of infection. * Disposable gloves * Disposable aprons * Wounds to be dressed properly * Appropriate clothing and footwear to be worn * Body piercing’s covered or removed * Offensive tattoo’s covered or removed * Hair tied back

Wednesday, October 23, 2019

Early Childhood Education application essay Essay

This article gives a study of how we can apply the material in an Early Childhood institution from the novel `Different Children Different Needs` by Charles F. Boyd. This book can be taken as a channel showing parents and teachers in any institute on how to be more efficient by knowing the personality God has given each child. Boyd applies a DISC style of traits of parents’ personality for application in parent-child affiliations. Although, this book is mainly on good parenting which allows you to review your and your child’s qualities and as a result, helps you in improving communication with no friction between parents and children. The material in this book can also be very useful in any institutional environment. Based on this knowledge, this study gives a brief evaluation of the application and knowledge specifically in an institute’s environment and the experience from it. Knowledge and Application This book assists you in understanding that every child has a unique personality and none of them are right or wrong but just different. As in the novel Boyd writes â€Å"As parents, we need to discover our children’s natural styles and help each one grow up according to his unique, in-born, God-given design† (Charles Boyd. 4). Writer uses the DISC personality sketch descriptions to understand and help you to re-open blocked communication with your child. It’s as easy as opening by inquiring yourself if your child is a bit lazy or active, people person or a loner? The material and tools presented in ‘Different Children, Different Needs’ will take the anonymity out of the way on how you interrelate with each other. In the book, we look at a tool referred to as â€Å"the art of flexible parenting† or parenting by plan. It is a method which presents us with an opportunity to raise our kids that procures into account equally how God has designed our style and personality and how He has designed our children. This uncomplicated and realistic model enables us to realize our normal bent and the way it influences our parenting style, determine our children’s design, comparison between the first two and adjusting our style so as it fulfils the style and requirements of our children. It helps in fashioning an atmosphere of encouragement and support which results in enhanced parent-child communication and eases common areas of clashes. The methods and tools given in this book can not only help parents in understanding their children better but also prove helpful in Children institutes by giving teachers an insight to his/her pupils mind and personality and making them realize that not every student cannot be the top person and that someone has to take the bottom position whether it be academic performance or co-curricular activities. After having an understanding of such basics, these Institutes can make sure that each student is treated as an individual and not be compared with others who are either doing better or worst than him and thus improved student-teacher relation which will result in better results. This model will assist in developing an atmosphere of encouragement and support and can have results like an increased self-confidence and self-discovery. After reading this book, you will start to comprehend things you never understood in relation to the most excellent way to communicate to each unique student in a class. Students will appear to appreciate how God has designed them and made each and everyone of them exceptional in his own way, maturing in self-confidence and discovering a sense of fitting in somewhere. And you will get pleasure from fulfilling your mentoring experience you’ve forever wished for. Understanding and Experience A Childs education starts from home. Education plays a very significant part in altering lives of children. This book gives a concept of parenting pollution. Parenting pollution refers, to the desire of every parent to raise their children the way they think they should. If we observe carefully, we see that the same idea is applied in children institutions where teacher expects the student to be as smart as the teacher was when he was students’ age, or think the same way as he used to think and mostly compare students with each other. The truth is, it is important to realize that with changing times, minds maturity level changes, and children nowadays, grasp and perceive things differently then we used to. The one part of the book that I thought could be really helpful if all could read it and enjoy is a number of pages of encouraging â€Å"one-liners† which can be used to build your child’s or your students self-confidence some of which includes sayings like when asked a student to perform a task in classroom and if he is taking longer than some other students, instead of saying this discouraging thing â€Å"What’s taking you so long? â€Å", what you can say is, â€Å"You do things specifically and correctly. † (Haim Ginott, 23) That line sums up the â€Å"observe, don’t judge† philosophy of child psychologist Haim Ginott which one should try very often for miraculous results. (Haim Ginott, 23) Some stuff you read in this book is pretty basic on parenting like be patient with a child , Don’t hurry or push him, be open at times when your child wants to do things differently than you feel like etc. But observe carefully that do you really do all this basic stuff all the time or you are really a moody person Conclusion The DISC character system on which all of the suggestion in this book is based is not exactly a specific personality test but in actually just a self-discovery test where you can ponder over you actions and those of your children and then apply them in Children Institutions. The concluding remark is that Parenting by plan is a technique you can utilize to fine-tune your parenting technique according to your children and students as each of them has different personality and psychology. It can really help is making parents and teachers understand that even if the personalities of their children clashes with their own, it can still be a positive relation and parents being older have to take the first step which may just include getting a copy of this book. References Boyd, Charles. 2004. Different Children, Different Needs. Published by Multnomah Books Ginott, Haim. 1996. Between

Tuesday, October 22, 2019

Battle of the Thames in the War of 1812

Battle of the Thames in the War of 1812 The Battle of the Thames was fought October 5, 1813, during the War of 1812 (1812-1815). In the wake of the American victory at the Battle of Lake Erie, Major General William Henry Harrisons army recaptured Detroit before crossing into Canada. Outnumbered, British commander Major General Henry Proctor elected to withdraw east with his Native American allies. On October 5, he turned his army and made a stand near Moraviantown. In the resulting battle, his army was routed and the famed Native American leader Tecumseh was killed. The victory secured the United States northwest frontier for the remainder of the war. Background ​Following the fall of Detroit to Major General Isaac Brock in August 1812, American forces in the Northwest endeavored to recapture the settlement. This was badly hampered due to British naval forces controlling Lake Erie. As a result, Major General William Henry Harrisons Army of the Northwest was forced to remain on the defensive while the U.S. Navy constructed a squadron at Presque Isle, PA. As these efforts progressed, American forces suffered a severe defeat at Frenchtown (River Raisin) as well as endured a siege at Fort Meigs. In August 1813, the American squadron, commanded by Master Commandant Oliver Hazard Perry emerged from Presque Isle. Outnumbered and out-gunned, Commander Robert H. Barclay withdrew his squadron to the British base at Amherstburg to await the completion of HMS Detroit (19 guns). Taking control Lake Erie, Perry was able to cut off the British supply lines to Amherstburg. With the logistical situation worsening, Barclay sailed out to challenge Perry in September. On September 10, the two clashed at the Battle of Lake Erie. After a bitter fought engagement, Perry captured the entire British squadron and sent a dispatch to Harrison stating, We have met the enemy and they are ours. With control of the lake firmly in American hands, Harrison embarked the bulk of his infantry aboard Perrys ships and sailed to recapture Detroit. His mounted forces advanced along the lake shore (Map). The British Retreat At Amherstburg, the British ground commander, Major General Henry Proctor, began planning to withdraw east to Burlington Heights at the western end of Lake Ontario. As part of his preparations, he quickly abandoned Detroit and nearby Fort Malden. Though these moves were opposed by the leader of his Native American forces, the famed Shawnee chief Tecumseh, Proctor proceeded as he was badly outnumbered and his supplies were dwindling. Detested by the Americans as he had allowed the Native Americans to butcher prisoners and wounded after the Battle of Frenchtown, Proctor began retreating up the Thames River on September 27. As the march progressed, the morale of his forces fell and his officers became increasingly dissatisfied with his leadership. Fast Facts: Battle of the Thames Conflict: War of 1812 (1812-1815)Dates: October 5, 1813Armies Commanders:United StatesMajor General William Henry Harrison3,760 menGreat Britain and Native AmericansMajor General Henry ProctorTecumseh1,300 menCasualties:United States: 10-27 killed, and 17-57 woundedGreat Britain 12-18 killed, 22-35 wounded, and 566-579 capturedNative Americans: 16-33 killed Harrison Pursues A veteran of Fallen Timbers and the victor of Tippecanoe, Harrison landed his men and re-occupied Detroit and Sandwich. After leaving garrisons at both locations, Harrison marched out with around 3,700 men on October 2 and began pursuing Proctor. Pushing hard, the Americans began to catch up to the tired British and numerous stragglers were captured along the road. Reaching a location near Moraviantown, a Christian Native American settlement, on October 4, Proctor turned and prepared to meet Harrisons approaching army. Deploying his 1,300 men, he placed his regulars, largely elements of the 41st Regiment of Foot, and one cannon on the left along the Thames while Tecumsehs Native Americans were formed on the right with their flank anchored on a swamp. Shawnee leader Tecumseh. Public Domain Proctors line was interrupted by a small swamp between his men and Tecumsehs Native Americans. To extend his position, Tecumseh lengthened his line into the large swamp and pushed it forward. This would allow it to strike the flank of any attacking force. Approaching the next day, Harrisons command consisted of elements of the U.S. 27th Infantry Regiment as well as a large corps of Kentucky volunteers led by Major General Isaac Shelby. A veteran of the American Revolution, Shelby had commanded troops at the Battle of Kings Mountain in 1780. Shelbys command consisted of five brigades of infantry as well as Colonel Richard Mentor Johnsons 3rd Regiment of Mounted Riflemen (Map). Proctor Routed Nearing the enemy position, Harrison placed Johnsons mounted forces along the river with his infantry inland. Though he initially intended to launch an assault with his infantry, Harrison changed his plan when he saw that the 41st Foot had deployed as skirmishers. Forming his infantry to cover his left flank from Native American attacks, Harrison instructed Johnson to attack the main enemy line. Splitting his regiment into two battalions, Johnson planned to lead one against the Native Americans above the small swamp, while his younger brother, Lieutenant Colonel James Johnson, led the other against the British below. Moving forward, the younger Johnsons men charged down the river road with Colonel George Paulls 27th Infantry in support. Battle of the Thames, October 5, 1813. Library of Congress Striking the British line, they quickly overwhelmed the defenders. In less than ten minutes of fighting, the Kentuckians and Paulls regulars drove off the British and captured Proctors one cannon. Among those who fled was Proctor. To the north, the elder Johnson attacked the Native American line. Led by a forlorn hope of twenty men, the Kentuckians soon became engaged in bitter battle with Tecumsehs warriors. Ordering his men to dismount, Johnson remained in the saddle urging his men forward. In the course of the fighting he was wounded five times. As the fighting raged, Tecumseh was killed. With Johnsons horsemen bogged down, Shelby directed some of his infantry to advance to their aid. As the infantry came up, the Native American resistance began to collapse as word of Tecumsehs death spread. Fleeing into the woods, the retreating warriors were pursued by cavalry led by Major David Thompson. Seeking to exploit the victory, American forces pressed on and burned Moraviantown despite the fact that its Christian Munsee inhabitants had played no role in the fighting. Having won a clear victory and destroyed Proctors army, Harrison elected to return to Detroit as the enlistments of many of his men were expiring. Aftermath In the fighting at the Battle of the Thames Harrisons army suffered 10-27 killed, and 17-57 wounded. British losses totaled 12-18 killed, 22-35 wounded, and 566-579 captured, while their Native American allies lost 16-33 killed. Among the Native American dead were Tecumseh and the Wyandot chief Roundhead. The exact circumstances regarding Tecumsehs death are not known though stories quickly circulated that Richard Mentor Johnson killed the Native American leader. Though he never personally claimed credit, he used the myth during later political campaigns. Credit has also been given to Private William Whitley. The victory at the Battle of the Thames saw American forces effectively take control of the Northwest frontier for the remainder of the war. With Tecumsehs death, much of the Native American threat in the region was eliminated and Harrison was able to conclude truces with many of the tribes. Though a skilled and popular commander, Harrison resigned the following summer after disagreements with Secretary of War John Armstrong.

Monday, October 21, 2019

Forieng Author Project Essay

Forieng Author Project Essay Forieng Author Project Essay Ellen Wiah English 12 March 22, 2013 Period 4th Octavio Paz was a renowned poet, essayist who won the Nobel Prize for Literature. He was recognized for being the first Mexican to win a Nobel Prize in literature. Using poetry combine with prose, Paz explored multifaceted and paradoxical forces in contemporary life, while revealing his love for Mexican history and customs as well as his interest in surreal literature, and some other literary movement of the 19th century (Octavio, Paz-biography). Octavio Paz was a spokesperson for 20th-century Mexico, a poet whose work today exceeds his native land to connect with the world. Influenced by surrealism, Paz wrote of contradictions; but in his work opposites are blended and seen as part of the whole. Paz always used his art to establish relationships among cultures, people, and time (Hamm16).Octavio Paz was born in Mexico City in 1914, his father, a journalist and lawyer, was serving as assistant to Emiliano Zapata, a leader of the 1911 revolution. Paz's mother was from a prominent family of Spanish descent (Hamm16). During the revolutionary turmoil of the decade of Octavio's birth, the Paz family and many others were forced to flee the country. After living in Los Angeles for a few years, Paz's family returned to Mexico City. Although the family was now poor; Paz had access in the Macao house to an expansive library and was taught by Marist brothers. He reported that he first learned the craft of writing by immersing himself in the classics of Spanish literature and the great writers of Latin America. Paz attended the National University of Mexico but left without obtaining a degree to concentrate on writing (Hamm18). Paz was already published when he began his university studies. Several poems and stories had been printed in small regional publications. He also began publishing his own literary magazine, Barandal, at 17. Later he helped launch several other magazines, including Vuelta, one of Mexico's most influential publications. Luna Silvestre (Forest Moon), Paz's first book of poetry, was published when he was 19 (Diamond18). At the encouragement of Chilean poet Pablo Neruda, Paz travelled to Spain to attend a meeting in 1937 of leftist writers. While there Paz became so involved in the Spanish civil war (1936–39) that for a period he joined a unit fighting against Francisco Franco. In 1944 Paz received a Guggenheim Fellowship that allowed him to study in the United States. There he continued his education in poetry, reading the works of Walt Whitman, T. S. Eliot, Ezra Pound, and William Carlos Williams (Hamm17). In 1950 Paz published one of his most influential works: a philosophical essay about the nature of the Mexican character. El laberinto de la Soledad (The Labyrinth of Solitude) is part autobiography, part Mexican history, and part philosophy, all played out against the background of the dual cultural heritage of Mexico. Paz's style is often experimental at the same time that it draws on tradition. The 1953 volume Piedra de sol (Sun Stone) is a lyrical poem following the circular structure of the ancient Aztec calendar. Written in one sentence of 584 lines, the poem explores love, myth, the art of writing, and time (Diamond17). Among his diverse literary activities, Paz was an expert translator fluent in several languages, and he used this skill to help introduce upcoming writers from Latin America to the modern world by translating their work. Paz died of cancer of the spine in 1998. He had become so much of a national figure that the public announcement of his death was made by the president of Mexico, Ernesto Zedillo (Hamm19). Octavio Paz is a poet and an essayist. His style of writing is inspired by his belief that poetry establishes "the secret religion of the modern age." His work displays an ever-deepening intelligence and complexity as it explores the connection of philosophy, religion, art, politics, and the role of the individual within our

Sunday, October 20, 2019

Dwarf Elephant Facts and Figures

Dwarf Elephant Facts and Figures Name: Dwarf Elephant; genus names include Mammuthus, Elephas, and Stegodon. Habitat: Small islands of the Mediterranean Sea Historical Epoch: Pleistocene-Modern (2 million-10,000 years ago) Size and Weight: About six feet long and 500 pounds Diet: Plants Distinguishing Characteristics: Small size; long tusks About the Dwarf Elephant Few prehistoric mammals have been as baffling to paleontologists as the Dwarf Elephant, which didnt comprise just one genus of prehistoric elephant, but several: the various Dwarf Elephants that lived on various Mediterranean islands during the Pleistocene epoch were made up of stunted populations of Mammuthus (the genus that includes the Woolly Mammoth), Elephas (the genus that includes modern elephants), and Stegodon (an obscure genus that seems to have been an offshoot of Mammut, aka the Mastodon). Further complicating matters, its possible that these elephants were capable of interbreedingmeaning the Dwarf Elephants of Cyprus may have been 50 percent Mammuthus and 50 percent Stegodon, while those of Malta were a unique blend of all three genera. While the evolutionary relationships of Dwarf Elephants are a matter of dispute, the phenomenon of insular dwarfism is well understood. As soon as the first full-sized prehistoric elephants arrived on, lets say, the small island of Sardinia, their ancestors began evolving toward smaller sizes in response to limited natural resources (a colony of full-sized elephants eats thousands of pounds of food every day, much less so if the individuals are only one-tenth the size). The same phenomenon occurred with the dinosaurs of the Mesozoic Era; witness the shrimpy Magyarosaurus, which was only a fraction of the size of it continental titanosaur relatives. Adding to the mystery of the Dwarf Elephant, it hasnt yet been proved that the extinction of these 500-pound-beasts had anything to do with the early human settlement of the Mediterranean. However, there is a tantalizing theory that the skeletons of dwarf elephants were interpreted as Cyclopses (one-eyed monsters) by the early Greeks, who incorporated these long-gone beasts into their mythology thousands of years ago! (By the way, the Dwarf Elephant shouldnt be confused with the Pygmy Elephant, a smaller relative of African elephants that exists today in very limited numbers.)

Saturday, October 19, 2019

The Inuit in the Age of Globalization Essay Example | Topics and Well Written Essays - 500 words

The Inuit in the Age of Globalization - Essay Example This essay researches the modern lifestyle of Inuit tribes. A lifestyle that has been profoundly affected by the process of globalization. Relatively healthy from their lives as subsistence hunters and gatherers of the sparse Arctic tundra, the Inuit were completely self-sufficient until they first came into contact with Europeans in the 19th century. By the late 1880s, the Inuit Eskimos were already strongly affected by the same sorts of ‘white man’s diseases’ that had affected more southern tribes, such as measles and smallpox, brought in by traders and whaling ships. At the same time, however, the Inuit have been able to gain increased access to medical care, making it possible for the population to restore itself following initial introduction. This essay also describes significant economic changes that were brought about, both for the good and the detriment of the indigenous people. Positive changes included the introduction of metal, which could be used for everything from knives to fish hooks and increased the Inuit’s ability to catch food for their villages. Negative changes included the over-fishing of their waters, making it increasingly difficult for them to continue competing for their necessary food with outsiders who were better equipped with new technologies. Increasingly, Inuits are turning to money and store-bought items as preferable alternatives to the traditional hand-made products once relied upon. Author of this essay also covered climate change topic and the way in which the Inuit live through the actions of other countries.

Friday, October 18, 2019

1.What role did the industrial revolution play in reshaping recreation Essay

1.What role did the industrial revolution play in reshaping recreation and sports - Essay Example Professional sports men are earning their living from participating in sports. For example, football and athletics are among the highly profitable and commoditized sports. Some sporting activities are costly such as car racing. People from all over the world come together in sports either as spectators or players. It has helped in enhancing interaction between people from various cultural backgrounds. Recreation on the other hand is a practice whereby people engage in activities in which they derive pleasure. It provides an important opportunity for people to engage in activities away from the monotonous day to day engagements. People usually engage in adventurous activities such as visiting parks, mountain climbing or entertainment such as watching sports, dances and creative performances and many other activities that are refreshing. Most of these activities have also become an income source for service providers. For example, entertainment centers charge a price for using the facility, which may be a swimming pool or dance halls. Adventurous activities such as visiting parks are also paid for. Developments in sports have been continuous since the industrial revolution that had a great impact on sports and recreation. This paper is a critique of the role of that the industrial revolution played in reshaping recreation and sports. Before the industrial revolution, sports were not advanced as they are in the contemporary situation. Charles (1998) observes that people remained calm during their free time, drinking ale, dancing and other village based games and sun bathing before the industrial revolution. The industrial revolution brought to a stop the long-standing practices as people began getting involved in industrial activities that were highly demanding. Industries were developed and the calm environment and fresh air were filled with smoke and

Masking Poor Communication Essay Example | Topics and Well Written Essays - 500 words - 2

Masking Poor Communication - Essay Example Perhaps this is because we tend to take the allegiance of our family members for granted. Over time, we start navigating through our communication approaches, believing that those who are close to us will never leave us and our bond with them is too strong to withstand any misunderstanding or miscommunication. It is only when our kids turn rebellious and problematic, or our spouses file a divorce petition that we begin to realize that irrespective of strong family bonds, relationships need to be constantly worked on. I do remember one such instance in my life when I failed to communicate properly with a loved one. My 14 year old sister Victoria was chronically obese. The doctors had diagnosed that unless she engages in some fitness activity, she could develop serious health problems. Being a fitness conscious person, I decided to help Victoria. I woke up Victoria at 5 in the morning and she gladly changed into her track suit and sport shoes to go for a walk with me. I told Victoria that we will have a half an hour brisk walk followed by some exercises. However, after a couple of minutes I notice that Victoria was lagging behind me by at least 300 meters. Moved by my concern for her, I simply yelled at her, believing that this will encourage her. However, to my dismay, Victoria broke into tears and ran back home, leaving me alone. Standing there I mulled over this problem. It was then that I realized that I simply failed to understand the fact that being an overweight and sedentary person, engaging in brisk fitness activities on the very first day must have been too much for Victoria. I was assessing Victoria by my standards. Just because she was my sister, I had turned blind to her problems and had not even tried to talk about them with Victoria. So, on returning home I apologized to Victoria for my aggressiveness. The next day onwards, I redesigned a fitness regimen after taking Victoria into

Thursday, October 17, 2019

Confessions of an economic hitman Essay Example | Topics and Well Written Essays - 1250 words

Confessions of an economic hitman - Essay Example Secondly I need to evaluate the economic value of this jungle in terms of how much its worth in both nominal and real value. For instance, assuming the jungle is rich in oil, then how much is that oil worth and how much does it benefit the small population in the jungle? If for instance am supposed to trash the jungle by either burning the resources, the value of $ 10 million a year in relation to the damage I will cause to the environment and the benefits I would deprive the people, in the annual analysis of the value of the jungle and its resources would be roughly more than $10 million promised and considering the welfare of the people who depend on it either directly or indirectly, and the long term analysis of the benefits; in a bigger perspective than the annual remuneration, it is not worth the price. According to the â€Å"confessions by economic hit man†, most citizens of once rich nations are sabotaged to pay recurring costs/interests of mistakes done by a few indivi duals for longer time than these individuals took to benefit from these mistake which is not fair. Question2: Do the CEOs of major oil companies know about the Economic Hit Man? Discuss why they might not and how they might look at this book. No, I don’t think they know because from his story where he is headed to shell in 2003, he is on a mission to â€Å"end a war he probably created†. This is to mean that his mission was to talk to these communities about their control of the reserves which communities were ready to die for in the name of survival of their generations. If we have to look at the operations of the CEOs of these companies they are truly in the dark on the â€Å"favors† extended to their companies by these economic hit men just to be surprised by the interests to be paid back. The fact that EHTs is a group of elite men and women who utilize the financial organizations that foment other nation’s subservient to corporatocracy, the fact that they give loans and grants for ports, pipe lines and high ways, and the fact that they demand access to precious resources such as oil reserves when economies/ these firms default on the loan grants, then it’s a true indication that the CEOs of these oil companies do not know the existence of EHMs and/or these EHMs use unclear paths to camouflage their activities and existence thus making it hard for recognition. They will look at this book as the revelation of their unending financial problems because of high cost of servicing loans and grants that come with intrinsic but latent consequences. If they decide to look at this book as an insight of new opportunities, they might decide to cut the dependence on loans extended with an infrastructural motive and/or cut the supply of their output to the countries associated with EHMs. Question3: How does patriotism and religion allow â€Å"them† to get away with activities described in the book? First, they extend grants in go od favor to either governments or financial institutions in form of development assistance in which they later control the operations of the grant. For instance, when they give grants in form of loans to

The Impact of the Great Depression on the African American Community Essay

The Impact of the Great Depression on the African American Community - Essay Example The civil war which gave people of black origin relatively equal rights had occurred only in 1861 and the misery that it had caused was fresh in the minds of many who were young at that time. In many ways, the great depression brought back for America the memories of the civil war. The community which suffered the brunt of the Great Depression was the African American community, which suffered from a greater racial discrimination during this time than during times of normalcy. In the absence of plentiful employment opportunities, the little that was available was fought for fiercely. The alternative was to stand in long queues for food where there was always the possibility of going hungry. In such a scenario, there was a propensity for job-givers, who were then mostly white, to discriminate on the basis of race when they gave out jobs. As a result of such discrimination the unemployment rates of African Americans during this period, in urban areas was thirty to sixty percent higher than the rates for people of white origin (Davis 82, 2003). Most of the available jobs were taken up by white people and the African Americans were left in a miserable situation. This was the result of many factors. One of the most important of these was the dismissal of African American workers to make way for white workers. This was compounded by the loss of domestic jobs that many African American depended on for their livelihood. Even after the emancipation of the slaves, many people of black origin continued to work for white masters, for a salary, in these domestic jobs. Many of them lost their jobs since their employers could no longer afford the luxury of domestic servants. They also depended to a great extent on the construction industry which provided them with employment in unskilled positions. With the construction industry suffering great losses, even this avenue was not open to them. Moreover in the few of these opportunities, they faced tough competition from skilled white workers. They however, were provided with a reservation in the reduced-rent government housing construction projects that turned out to be extremely beneficial for them as it kept many members of their race afloat during a difficult period of time (Davis 82, 2003). The loss of jobs owing to reservation in certain sectors, however, gave rise to widespread discontent among the whites who had lost their jobs. There was a revival of the Ku Klux Klan, an organization that worked for white supremacy over people who were racially black. This period thus was one when the blacks suffered in many ways. Not only was their livelihood taken away in most cases, but they were also culturally marginalized. The racist nature of arguably the most iconic work of literature to come out during this period, Margaret Mitchell’s Gone with the Wind stands testimony to the nostalgic desire of the whites for the return of the old order of which slavery was a part (Mitchell, 2008). Due to the wide spread migration from the countryside, a lot of African Americans who worked in farms faced unemployment. Having lost their jobs, they were faced with poverty and starvation, which the government of the time was not in a position to remedy. African Americans of the countryside of the south thus had to face a lot of hardships during the Great Depression. The African Americans

Wednesday, October 16, 2019

Confessions of an economic hitman Essay Example | Topics and Well Written Essays - 1250 words

Confessions of an economic hitman - Essay Example Secondly I need to evaluate the economic value of this jungle in terms of how much its worth in both nominal and real value. For instance, assuming the jungle is rich in oil, then how much is that oil worth and how much does it benefit the small population in the jungle? If for instance am supposed to trash the jungle by either burning the resources, the value of $ 10 million a year in relation to the damage I will cause to the environment and the benefits I would deprive the people, in the annual analysis of the value of the jungle and its resources would be roughly more than $10 million promised and considering the welfare of the people who depend on it either directly or indirectly, and the long term analysis of the benefits; in a bigger perspective than the annual remuneration, it is not worth the price. According to the â€Å"confessions by economic hit man†, most citizens of once rich nations are sabotaged to pay recurring costs/interests of mistakes done by a few indivi duals for longer time than these individuals took to benefit from these mistake which is not fair. Question2: Do the CEOs of major oil companies know about the Economic Hit Man? Discuss why they might not and how they might look at this book. No, I don’t think they know because from his story where he is headed to shell in 2003, he is on a mission to â€Å"end a war he probably created†. This is to mean that his mission was to talk to these communities about their control of the reserves which communities were ready to die for in the name of survival of their generations. If we have to look at the operations of the CEOs of these companies they are truly in the dark on the â€Å"favors† extended to their companies by these economic hit men just to be surprised by the interests to be paid back. The fact that EHTs is a group of elite men and women who utilize the financial organizations that foment other nation’s subservient to corporatocracy, the fact that they give loans and grants for ports, pipe lines and high ways, and the fact that they demand access to precious resources such as oil reserves when economies/ these firms default on the loan grants, then it’s a true indication that the CEOs of these oil companies do not know the existence of EHMs and/or these EHMs use unclear paths to camouflage their activities and existence thus making it hard for recognition. They will look at this book as the revelation of their unending financial problems because of high cost of servicing loans and grants that come with intrinsic but latent consequences. If they decide to look at this book as an insight of new opportunities, they might decide to cut the dependence on loans extended with an infrastructural motive and/or cut the supply of their output to the countries associated with EHMs. Question3: How does patriotism and religion allow â€Å"them† to get away with activities described in the book? First, they extend grants in go od favor to either governments or financial institutions in form of development assistance in which they later control the operations of the grant. For instance, when they give grants in form of loans to

Tuesday, October 15, 2019

Acer Case Analysis Study Example | Topics and Well Written Essays - 500 words

Acer Analysis - Case Study Example This is the reason why technology and IT companies have to strive to adapt and innovate constantly to remain alive. Since technology and processors were a significantly newer concepts at the time of multitech’s expansion and it chose to focus on geographical areas where the concept was still fairly alien. They set the market and developed strong holding in these regions, which were ignored by the developed world. Once the company succeeded in these markets and gained a strong foothold, it made use of its expertise and resources to design a complex commercial product that could cater to the needs of the developed world. In emerging motivation strategy, foreign ventures are seen as an eventual step and not as an expansion move. One major factor that asserts its use of emerging motivations is making use of its low cost of production and supportive subsidies in the developing countries like Malaysia and Indonesia to provide cost efficient technology to the developed world, making it a quick success. The main concern of the CEO is whether company’s radical market changing invention, aspire, would actually be a good move or negatively affect the already dwindling profit margins (Harvard Business Review). However, if one studies the innovation strategies that can be adopted by a firm operation on a global scale, aspire would get a green signal for a number of reasons. As mentioned earlier, technology has a short product life cycle thus it is imperative to constantly innovate and update one’s offerings. Transnational innovation model focuses on the development of innovations locally and then offering them globally. By collaboratively working with the subsidiaries the firm is in a better position to accommodate the unique needs of each region and gain an understanding of their capabilities. As Acer’s important growth initiative, the management has to take into account the cost saving aspect which can

Monday, October 14, 2019

Explore Shakespeares Essay Example for Free

Explore Shakespeares Essay Richard II is a play that centres on Kingship; Shakespeare presents vanity and flattery using rich language throughout the play to articulate the hazards a King must avoid to ensure their position as King is maintained. During the play we see the character of Richard presented as vain and tyrannical; as a man who is attempting to escape the responsibilities that Kingship brings such as succession and leadership. Written almost wholly in verse, Shakespeare contrasts Richard with his successor Bolingbroke to emphasize how care of the kingdom of England and good judgement is inextricably linked with being a successful King. From the onset, Shakespeare presents Richard as vain. In Act I of the first scene Richards interruption of the duel suggests his egotism. The duel gives Richard the opportunity to make a dramatic and grand public gesture, asserting himself as King. As the brawl develops Richard calls Mowbray and Bolingbroke to forgive, forget, conclude and be agreed. Shakespeares use of verbs in the imperative makes this statement a command. It implies Richard has paid little attention to the reason behind the quarrel, and is instead more interested in people concentrating on his lavish words and public display. The repetition of the o sounds and alliteration of the fs also brings a certain finality to the speech, perhaps hinting at Richards self-important and haughty nature which we see resulting in his demise as King. This narcissistic portrayal of Richard is continued as the duel unfolds. Shakespeare then further emphasizes Richards enjoyment of power and pleasure in set piece displays of authority with his statement Lions make leopards tame. Richard is referring to himself as the lion and again, Shakespeare uses language to reflect Richards flattery-driven personality whilst perhaps indicating that without firm governing, leopards such as Mowbray and Bolingbroke will be able to attack Richards position of King. Shakespeare emphasises how ineffective kingship is dominated by flattery and vanity by surrounding the doomed Richard with sycophants who ultimately result in his downfall. Men such as Bushy, Bagot and Greene are all characters that give the king bad advice leading him to lose the crown. Indeed, it is the inadequate guidance that Richards flatterers give such as to leave England, which enables Bolingbroke to return and subsequently force Richard to abdicate. Shakespeare conveys Richards foolishness in listening to these men through the comments from the other characters he creates. Bolingbroke, Gaunt and York all refer throughout the play to Richards self-deception and craving for flattery. In Act II for example, York remarks that flattery sounds, / As praises emphasising that although Richard considers the flattery he receives to be accurate in terms of truth, it is not; and that he is so blinded by sycophancy and self adulation that he cannot realise his weaknesses and inadequacy as King. Bolingbroke also makes the audience aware of Richards reliance on obsequiousness with his references to the caterpillars of the Commonwealth. We interpret the caterpillars to be men such as Bushey and Greene and the term caterpillar conjures up imagery of greedy, lazy almost parasitic vermin who are both a detriment to Richard and the rest of England. Bolingbroke then swears he shall weed and pluck away these men. This continues the portrayal of Bolingbroke as a hero and develops England as an organic entity, which is a recurrent theme throughout. Finally, when Gaunt states the King is basely led by flatterers he indicates his antipathy of Richards reliance upon flattery. This speech can be seen to be an implied condemnation of Richards kingship and is arguably a climax in the tensions between Richard and Gaunt. Undeniably Gaunt expresses his despair at Richards predisposition to flattery at other points in the play too. A thousand flatterers sit within thy crown, conveys the extent to which the King surrounds himself with sycophants. The number thousand can be seen to imply a powerful, almost army-like force which, as well as hating, Gaunt also fears. To say that they sit within thy crown also reflects their proximity to the King as one associates the word sit with a sense of comfortableness and security. With this line Shakespeare suggests the flatterers feel no threat from others surrounding the King such as Gaunt. A certain hopelessness is inherent in Gaunts situation, as he will never be able to make Richard understand the cost of being surrounded by flatterers before its too late and they lead to his failure. Indeed, it is through characters such as Gaunt that Shakespeare is able to encapsulate the weak character of the King as he shows Richard as being governed by his flatterers as opposed to governing them, which is presented as the true role of a King. Richards choice to distance himself from his family and make an enemy of his cousin Bolingbroke is a critical error. His aloofness and hostility towards other members of his family jeopardizes the succession. The succession is presented as an essential element of Kingship as without an heir, Richard could plunge the country into bloody Civil War after his death if those around him disagreed about his successor. This, in conjunction with the divine right of kings is presented as a key element to kingship. According to Richard himself Not all the rough rude sea/ can wash the balm off from an anointed King. Whilst this sums up Richards self-image of being invincible due to his position of King, it also emphasizes the contemporary view of Shakespeares time that a King is appointed by God and for this reason Kingship is sacred. The term anointed also reflects the sanctity of the Divine Right Of Kings and the word balm conjures up imagery of a King being coated in a shield created by divinity, thus emphasizing Richards prestigious role. According to Gaunt, a King is Gods substitute, his deputy anointed in his sight. As before, Shakespeare chooses the term anointed perhaps to symbolise how sacrosanct the role of King is. The length of sentence combined with the rich words such as Gods substitute sums up the attitude of Shakespeares time about the tasks of a king and emphasizes the contemporary belief of providence, which dominates the play. Indeed, Shakespeare illuminates the importance of maintaining the succession using many themes and motifs in the play as well as in the storyline. Ideas about blood and Englands condition at the time of Richards rule dominate the story. In Act II for example, Northumberland refers to the dead Gaunt as a royal prince of noble blood. As before in Richards speech at the beginning of the play, Shakespeare controls the assonant o sounds to draw the audiences attention to the relationship between being royal and having noble blood. Richards comment lets purge without blood also suggests his keenness to prevent some sort of conflict between him and Bolingbroke. This could be interpreted as showing his pacifistic side as demonstrated in the scene of the duel or that he is worried about his own blood, as his death will endanger the succession. It is through this type of language that Shakespeare emphasises the responsibility of a King to ensure the succession and the countrys well being. In addition to succession, Richard II reflects the importance of looking after your realm whilst King. Shakespeare presents England as being in a poor state whilst Richard reigns, with the Bishop of Carlisle foreseeing disorder, horror, fear and mutiny- all words which describe disaster. However it seems due to Richards preoccupation with vanity, he has ignored the importance of good and effective governance. Richard himself realises this towards the end of the play and water is another pattern of language Shakespeare draws on to illustrate this. In Act III scene 3 we see Richard consciously relinquish the crown. The flamboyancy of his language continues as before in the play as he abdicates, Mine eyes are full of tears, but his comment that the salt water blinds them not so much/But they can see a sort of traitors here suggests a realisation that his downfall can be attributed to those around him as much as himself and can be interpreted as showing a change in Richards character as he is faced with a kingdom in turmoil. By describing his tears as containing salt, Shakespeare leaves the actual interpretation of the word ambivalent. One might associate the salt with bitterness either reflecting his enemies resentment towards him, which led to his downfall with men such as Bolingbroke or his own bitterness. Yet the salt also can be seen to suggest corrosion and the deterioration Richards incompetence caused to England, something he has just begun to realise. Shakespeare then develops the water motif into what can be seen as, a metaphor of Richard. He talks of being a mockery king of snow who has before the sun of Bolingbroke melted away in water-drops. This self-description as a King of Snow perhaps hints at Richards previous self-alienation from family and friends whilst evoking images of Richard as being a cold, unfeeling character. On the other hand, the fact Richard refers to himself as only a King of Snow possibly can be seen to emphasise, consciously or not, that Richard never had genuine control of England at all and that his power never truly existed in any other form stronger than the fragile substance of snow and this is what made his renunciation inescapable. The subsequent reference to Bolingbroke melting this Snow King into water-drops can then be interpreted as a direct reference to Bolingbrooks seizure of Richards crown which literally, like heat from the sun does to snow, dissolved his power. This self-conscious speech from Richard gives us a sense of his despair at losing the kingship but also his relief. Shakespeares linking of Bolingbroke to the sun can also be seen as Richard considering his cousin to in some ways, be a saviour who has removed him of the responsibility of Kingship, which we have seen him to grapple with unsuccessfully. As we see a change in Richards personality, other motifs in the play also alter. The significance of blood from bloodlines to the spilling of blood and damage done to England changes for example changes; Thy fierce hand hath with the Kings blood stained the Kings own land powerfully relates to us how Richard has exploited his role as King and damaged England rather than nurturing it which is the true task of a King. To describe the hand as staining the land with blood creates a very powerful image of Richard damaging his Kingdom. By referring to his hands as the tools that created such destruction, Shakespeare strengthens the amount of responsibility the audience feels Richard has for the strife the country finds itself in. Also to a modern audience at least, the idiom to have blood on ones hands adds to the impact of Richards words. Bolingbrokes allegory of Richards flatterers as caterpillars is expanded later on in the play as Shakespeare presents the country metaphorically as a garden. The gardeners speak with pitiful regret of the countrys condition and emphasize Richards folly in not looking after his Kingdom. He had not trimmed and dressed his land as we this garden-here the Gardener presents England as out of control and poorly tended to, emphasising how determination and fortitude which are both strengths associated with a gardener are an important layer to Kingship. The gardeners references to noisome weeds also convey the parasitic nature of Richards flatterers and that as Bolingbroke vows to do, they should be plucked and rooted away. The gardener then goes on to describe these weeds as without profit suck/ the soils fertility from wholesome flowers. The imagery of Richards sycophants preventing flowers of England from flourishing has several connotations; firstly that it is Richard who has inhibited Englands emotional well-being. Secondly it can be seen as a symbolic reference to the sparring Houses of Lancaster and York who fought for the Crown after Richards abdication. However, the Garden scene also gives a sense of sympathy for Richard. He states that although he suffered this disordered spring/Hath now himself met with the fall of leaf. This perhaps suggests that as a man Richard does deserve some pity when we consider he had no choice in becoming King and that it is only his role as King that has made him inept and destructive. By the end of Richard II the audience has come to realise the intricacies of Kingship. The tone at the end of the play, when Bolingbrook sentences Richard to death is one of grief. Bolingbroke has assumed the cares of Kingship of which had led to Richards self-destruction. However, during the play we only get a glimpse of Bolingbroke as King and as an audience realise that he has not had time to make mistakes such as those made by Richard. We can instead only see more of Bolingbrokes character in the rest of the series of historical plays, such as Henry IV. It is in Richard II however, that Shakespeares rich language articulates the many different concepts of Kingship and how Richard failed them. We see how the King is divinely appointed to rule, but that his kingship is an obligation to his country, not an opportunity for egotism; and the Crown can be forfeited if the King fails to rule well. On the other hand, Richard was born to be King; it is a role for which in the play we see him to be ill suited, but is something in which he has no choice. Through his character we realise the many restrictions of Kingship, its burdens and possible consequences. Ultimately Richard cannot escape the trappings of Kingship unless he forfeits his own life. We then see that the only way to escape the afflictions of kingship is death and Richard conforms to this completely, giving up his life in order to give up his Kingship.

Sunday, October 13, 2019

Intrusion detection system for internet

Intrusion detection system for internet ABSTRACT The visibility to detect the rapid growth of Internet attacks becomes an important issue in network security. Intrusion detection system (IDS) acts as necessary complement to firewall for monitoring packets on the computer network, performing analysis and incident-responses to the suspicious traffic. This report presents the design, implementation and experimentation of Network Intrusion Detection System (NIDS), which aims at providing effective network and anomaly based intrusion detection using ANOVA (Analysis of Variance) statistic. A generic system modelling approach and architecture are design for building the NIDS with useful functionalities. Solving the shortcomings of current statistical methods in anomaly based network intrusion detection system is one of the design objectives in this project as all of them reflect the necessary improvements in the network-based IDS industry. Throughout the system development of NIDS, several aspects for building an affective network-based IDS are emphasized, such as the statistical method implementation, packet analysis and detection capabilities. A step by step anomaly detection using ANOVA (Analysis of Variance) test has been calculated in the report. Chapter 1 Introduction This chapter is introduction to the whole project. This chapter introduce the project, its motivation, main objective and advance objectives. The chapter also give brief methodology of the research. Introduction The Though with the rapid growth of computer networks make life faster and easier, while on the other side it makes life insecure as well. Internet banking, on line buying, selling, on internet, is now part of our daily life, along with that, if we look at growing incidents of cyber attacks, security become a problem of great significance. Firewalls are no longer considered sufficient for reliable security, especially against zero error attacks. The security concern companies are now moving towards an additional layer of protection in the form of Intrusion Detection System. D.Yang, A.Usynin W.Hines (2006) explain intrusion and intrusion detection as: Any action that is not legally allowed for a user to take towards an information system is called intrusion and intrusion detection is a process of detecting and tracing inappropriate, and incorrect, or anomalous activity targeted at computing and networking resources [16]. Idea of intrusion detection was first introduced in 1980 (J.P Anderson) and first intrusion detection model was suggested in 1987 (D.E.Denning). Intrusion Prevention System (IPS) is considered as first line of defence and Intrusion Detection Systems are considered as second line defence [16]. IDS are useful once an intrusion has occurred to contain the resulting damage. Snot is best example of working Intrusion Detection System and Intrusion Prevention Systems (IDS/IPS) developed by Sourcefire. Which combine the benefits of signature, protocol and anomaly based inspection. IDS can be classified in to misuse detection and anomaly detection. Misuse detection or signature based IDS can detect intrusion based on known attack patterns or known system vulnerabilities or known intrusive scenarios where as anomaly intrusion detection or not-use detection systems are useful against zero -day attacks, pseudo zero-day attack. Anomaly based IDS based on assumption that behaviour of intruder is different from normal user. Anomaly detection systems can be divided into static and dynamic, S.Chebrolu, et al A.Abraham J.P.Thomas (2004). Static anomaly detectors assume that the portion of system being monitored will not change and they mostly address the software area of the system [17]. Protocol anomaly detection could be the best example of static anomaly detection [17]. Dynamic anomaly detection systems operate on network traffic data or audit records and that will be the main area of my interest in research. Anomaly IDS has become a popular research area due to strength of tracing zero-day threats, B.Schneier (2002). It examines user profiles and audit records etc, and targets the intruder by identifying the deviation from normal user behaviour and alert from potential unseen attacks [18]. Active attacks have more tendencies to be traced as compared to passive attacks, but in ideal IDS we try to traces both. Anomaly based Intrusion detection system are the next generation IDS and in system defence they are considered as second line of defence. In that research my main concentration will be Denial of service attacks their types and how to trace them. Motivations Though Internet is the well knowing technology of the day but still there are security concerns such as internet security and availability. The big threat to information security and availability is intrusion and denial-of-service attacks. Since the existing internet was developed about 40 year ago, at that time the priorities were different. Then unexpected growth of internet result exhaustion IPV4 address along with that it brings lots of security issues as well. According to the CERT statistical data 44,074 vulnerabilities had been reported till 2008. Intrusion is the main issue in computer networks. There are too many signature based intrusion detection are used within information systems. But these intrusion detection systems can only detect known intrusion. Another approach called anomaly based intrusion detection is the dominant technology now. Many organizations are working on anomaly based intrusion detection systems. Many organizations such as Massachusetts Institute of Technology are providing data set for this purpose. Motivated by the observation that there is lots of work is done using the Massachusetts Institute of Technology (MIT) data sets. Another aspect of the anomaly based intrusion detection system is statistical method. There are too many good multivariate statistical techniques e,g Multivariate Cumulative Sum (MCUSUM) and Multivariate Exponentially Weighted Moving Average (MEWMA) are used for anomaly detection in the wild of manufacturing systems [3]. Theoretically, these multivariate statistical methods can be used to intrusion detection for examining and detecting anomaly of a subject in the wild of information science. Practically it is not possible because of the computationally intensive procedures of these statistical techniques cannot meet the requirements of intrusion detection systems for several reasons. First, intrusion detection systems deal with huge amount of high-dimensional process data because of large number of behaviours and a high frequency of events occurrence [3]. Second, intrusion detection systems demand a minimum delay of processing of each event in computer systems to make sure an early d etection and signals of intrusions. Therefore, a method which study the variation is called ANOVA statistic would be used in this research. But there is no research available that have implemented ANOVA and F statistic on data sets collected by The Cooperative Association for Internet Data Analysis (CAIDA). The data sets provided by CAIDA are unique in their nature as it does not contain any session flow, any traffic between the attacker and the attack victim. It contains only reflections from the attack victim that went back to other real or spoof IP addresses. It creates trouble in estimating the attack. I will take that trouble as challenge. Research Question In this section I will explore the core objective of the research and a road map to achieve those objectives. During that research I will study data sets called backscatter-2008, collected by CAIDA for denial of services attacks. I will use statistical technique ANOVA to detect anomaly activities in computer networks. My research is guided by five questions. What is an intrusion and intrusion detection system? How can we classify intrusion detection system? What are different methodologies proposed for intrusion detection systems? How to analyse the CAIDA Backscatter-2008 data sets and make them ready for future study and analysis. How to figure out the different types of DOS attacks. How to implement ANOVA statistical techniques to detect anomaly in networks traffics Aims and Objectives Dos attacks are too many in numbers and it is not possible to discuss all the dos attacks in one paper. In this paper I will look to detect anomaly in network traffic using number of packets. Main/Core objectives of the research Review literature of recent intrusion detection approaches and techniques. Discuss current intrusion detection system used in computer networks Obtaining a data set from CAIDA organization for analysis and future study. Pre-process the trace collected by CAIDA, make it ready for future analysis. Recognizing the normal and anomaly network traffic in CAIDA dataset called backscatter-2008. Investigate Analyse deviated network traffic using MATLAB for different variants of denial of services attacks. Review of existing statistical techniques for anomaly detection Evaluation of the proposed system model Advance Objectives of the research Extend the system model to detect new security attacks. Investigating and analysing the ANOVA statistical techniques over other statistics for anomaly detection in computer networks. Nature and Methodology The area of research is related with detecting anomaly traffic in computer networks. The revolution in processing and storage capabilities in the computing made it possible to capture, store computer network traffic and then different kind of data patterns are derived from the captured data traffic. These data patterns are analysed to build profile for the network traffic. Deviations from these normal profiles will be considered anomaly in the computer network traffic. This research presents a study of vulnerability in TCP/IP and attacks that can be initiated. Also the purpose of research is to study TCP flags, find distribution for the network traffic and then apply ANOVA statistical techniques to identify potential anomaly traffic on the network. Report Structure Chapter 1: Introduction This chapter is about the general overview of the project .First of all introduction about the topic is given then motivation of the research is discussed. Core objectives and general road map of the project is discussed under the heading of research question. Aims and objectives are described to enable readers to understand the code and advance objectives of the research and general overview of the research. Nature and Methodology includes the nature of research and what methods will be used during that research to answer the research question and to achieve core and advance objectives. Lastly at the end all chapters in the report are introduced. Chapter 2: Research Background The main focus of this chapter to explain what is Intrusion and Detection why we need Intrusion Detection Systems, types and techniques being used for Intrusion Detection Systems, Challenges and problems of Intrusion Detection System. Chapter 3: Security Vulnerabilities and Threats in Computer Networks This area of report is dedicated to the Network Security in general and issues with computer networks. Then types of Denial of services attacks are described in general. This chapter also include Types of DOS attacks and brief description of each attack. Chapter 4: Data Source Data sets collected and uploaded by CAIDA on their web site are not in a format to be processed straight away. This chapter described in detail how to obtain those data sets. Then all the necessary steps that are carried out on the data sets to convert that trace into format that is understood by MATLAB for final analysis. It also includes the problems faced during the pre-processing of data sets as there not enough material available on internet for pre-processing of datasets and the application used during that phase. Chapter 5: System Model As the research is based on TCP/IP protocol So it is vital to discuss the TCP and the weak points that allow that attacker to take advantage and use them for malicious purpose. What measures could be taken to recognize the attacks well before they happen and how to stop them. In this chapter I will discuss the Intrusion detection Model and features of proposed IDS and finally the steps in proposed model. Chapter 6: ANOVA Statistic and Test Results Implementation in Proposed Model This chapter is the core chapter of this project. This chapter all about focus on statistical test in intrusion detection systems particularly on ANOVA statistics. In this chapter first, the existing statistical techniques are analysed for intrusion detection. ANOVA calculation, deployment in intrusion detection system, backscatter-2008 data set distribution and other categories wise distribution will be explained in this chapter. Finally in the chapter, includes the graphs of the data sets and ANOVA and F statistic graphs are shown. Chapter 7: Discussion and conclusion Finally I will sum up my project in this chapter. It will include conclusion of research. Personal improvements of during that project because during that project I been through my experiences that later I found in the project that is helpful in other areas. Finally the goals that are achieved through entire project. Summary This chapter will enable reader to understand the general overview of the research. First of all the different research questions are identified. Then the objectives of the research are described which includes both core and advanced objectives. What is the nature of the research and which method will be used in it are in picture. The topic provides overall background information. Furthermore explanation of the report structure and brief description of all the chapters are also included in this chapter. Chapter 2 Research Background Introduction The focus of this chapter is to explain, what is intrusion and intrusion detection system. Why we need Intrusion Detection System. This chapter also discuss types and techniques used for Intrusion Detection Systems. Goals, challenges and problems are the main parts of the Intrusion Detection System are also explained in this chapter. Intrusion Detection System (IDS) A computer intrusion is the number of events that breaches the security of a system. Such number of events must be detected in proactive manner in order to guarantee the confidentiality, integrity and availability of resources of a computer system. An intrusion into an information system is a malicious activity that compromises its security (e.g. integrity, confidentiality, and availability) through a series of events in the information system. For example intrusion may compromise the integrity and confidentiality of an information system by gaining root level access and then modifying and stealing information. Another type of intrusion is denial-of-service intrusion that compromises the availability of an information system by flooding a server with an overwhelming number of service requests to the server over short period of time and thus makes services unavailable to legitimate users. According to D. Yang, A. Usynin W. Hines, they describe intrusion and intrusion detection as: An y action that is not legally allowed for a user to take towards an information system is called intrusion and intrusion detection is a process of detecting and tracing inappropriate, and incorrect, or anomalous activity targeted at computing and networking resources. Why we need Intrusion Detection System To provide guarantee of integrity, confidentiality and availability of the computer system resources, we need a system that supervise events, processes and actions within an information system [1]. The limitations of current traditional methods, misconfigured control access policies and also the misconfigured firewalls policies in computer systems and computer network security systems (Basic motivation to prevent security failures), along with increasing number of exploitable bugs in computer network software, have made it very obvious to design security oriented monitoring systems to supervise system events in context of security violations [1]. These traditional systems do not notify the system administrator about the misuses or anomaly events in the system. So we need a system which provides proactive decision about misuse or anomaly events, so therefore from last two decades the intrusion detection systems importance is growing day by day. Now a days intrusion detection system plays vital role in an organization computers security infrastructure. Types of Intrusion Detection System Intrusion detection system is a technique that supervises computers or networks for unauthorized login, events, activity, or file deletion or modifications [1]. Intrusion detection system can also be designed to monitor network traffic, so it can detect denial of service attacks, such as SYN, RST, ICMP attacks. Typically intrusion detection system can be classified into two types [1]. Host-Based Intrusion Detection System (HIDS) Network-Based Intrusion Detection System (NIDS) Each of the above two types of intrusion detection system has their own different approach to supervise, monitor and secure data, and each has distinct merits and demerits. In short words, host based intrusion detection system analyse activity occurrence on individual computers, while on the other hand network based IDSs examine traffic of the whole computer network. Host-Based Intrusion Detection System Host based intrusion detection gather and analyse audit records from a computer that provide services such as Password services, DHCP services, web services etc [1]. The host based intrusion detection systems (HIDS) are mostly platform dependent because each platform has different audit record from other platforms. It includes an agent on a host which detect intrusion by examining system audit records, for example audit record may be system calls, application logs, file-system modification (access control list data base modification, password file modification) and other system or users events or actions on the system. Intrusion detection system were first developed and implemented as a host based [1]. In host based intrusion detection systems once the audit records is aggregated for a specific computer, it can be sent to a central machine for analysis, or it can be examined for analysis on the local machine as well. These types of intrusion detection systems are highly effective for detecting inside intrusion events. An unauthorized modification, accesses, and retrieval of files can detect effectively by host based intrusion detection system. Issues involve in host based intrusion detection systems is the collection of audit records for thousands of computer may insufficient or ineffective. Windows NT/2000 security events logs, RDMS audit sources, UNIX Syslog, and Enterprises Management systems audit data (such as Tivoli) are the possible implementations of the host based intrusion detection system. Network-Based Intrusion Detection System Network-based intrusion detection system (NIDS) is completely platform independent intrusion detection system which predicts intrusion in network traffic by analysing network traffic such as frames , packets and TCP segments (network address, port number, protocols TCP headers, TCP flags etc) and network bandwidth as well. The NIDS examines and compared the captured packets with already analysed data to recognize their nature for anomaly or malicious activity. NIDS is supervising the whole network, so it should be more distributed than HIDS. NIDS does not examine information that originate from a computer but uses specials techniques like packet sniffing to take out data from TCP/IP or other protocols travelling along the computer network [1]. HIDS and NIDS can also be used as combination. My project focus on network based intrusion detection systems, in this project we analyse TCP flags for detecting intrusions. Techniques Used in Existing IDS In the above section we discussed about the general existing type of the intrusion detection system. Now the question arises that how these intrusion detection system detect the intrusion. There are two major techniques are used for above each intrusion detection system to detect intruder. Signature Detection or Misuse Detection Anomaly Detection Signature Detection or Misuse Detection This technique commonly called signature detection, this technique first derives a pattern for each known intrusive scenarios and then it is stored in a data base [3]. These patterns are called signatures. A signature can be as simple as a three failed login or a pattern that matches a specific portion of network traffic or it may be a sequence of string or bits [1]. Then this technique tests the current behaviour of the subject with store signature data base and signals an intrusion when there is a same pattern match. The main limitation in this technique, that it cannot detect new attacks whose signatures are unknown. Anomaly Detection In this technique the IDS develop a profile of the subjects normal behaviour (norm profile) or baseline of normal usage patterns. Subject of interest may be a host system, user, privileged program, file, computer network etc. Then this technique compare the observed behaviour of the subject with its normal profile and alarm an intrusion when the subjects observe activity departs from its normal profile [3]. For comparison, anomaly detection method use statistical techniques e,g ANOVA K-mean, Standard Deviations, Linear regressions, etc [2]. In my project, I am using ANOVA statistic for anomaly detection. Anomaly detection technique can detect both known and new intrusion in the information system if and only if, there is departure between norm and observed profile [3]. For example, in denial of service attack, intrusion occurs through flooding a server, the ratio of the events to the server is much higher than the events ratio of the norm operation condition [3]. Issues and Challenges in the IDS An intrusion detection system should recognize a substantial percentage of intrusion while maintain the false alarm rate at acceptable level [4]. The major challenge for IDS is the base rate fallacy. The base rate fallacy can be explained in false positive false negative. False positive means when there is no intrusion and the IDS detect intrusion in the event. False negative when there is an intrusion in the events and the IDS does not detect it. Unfortunately, the nature of the probability includes, and the overlapping area between the observed and training data, it is very difficult to keep the standard of the high rate of detections with low rate of false alarms [4]. According study held on the current intrusion detection systems depicted that the existing intrusion detection systems have not solved the problem of base rate fallacy [4]. Summary An intrusion into information system compromises security of the information system. A system, called intrusion detection is used to detect intrusion into information system. The two major types of IDS are HIDS and NIDS. The host based intrusion detection system monitor mostly the events on the host computer, while the NIDS monitor the activity of the computer network system. There are two approaches implemented for intrusion detection in IDS, anomaly and signature. Anomaly use statistical methods for detecting anomaly in the observed behaviour while signature check patterns in it. Base rate fallacy is the major challenge for IDS. Chapter 3 Security Vulnerabilities and threats in Networks Introduction In this chapter we are going to discuss the computer and network security. For computer security, there are some other terminologies like vulnerability, exploitability and threats are discussed as well in the chapter. Then chapter focus on Denial of Service attack, which is the most dominant attack in the wild of computer science. The chapter also concentrate the all aspects of the denial of service attack. Computer Security In the early days of the internet, network attacks have been a difficult problem. As the economy, business, banks and organization and society becomes more dependent on the internet, network attacks put a problem of huge significance. Computer security preclude attacker from getting the objectives through unauthorized use of computers and networks [5]. According to the Robert C. Searcord Security has developmental and operational elements [5]. Developmental security means, developing secure software with secure design and flawless implementation [5]. Operational Security means, securing the implemented system and networks from attacks. In computer security the following terminologies are used most commonly [5]. Security Policy: A set of rules and rehearses that are typically implemented by the network or system administrator to their system or network to protect it from attacks are called security policies. Security Flaw: A software fault that offers a potential security risk is called security flaw. Vulnerability: the term vulnerability is a set of conditions through malicious user implicitly or explicitly violates security policy. Exploit: a set of tools, software, or techniques that get benefit of security vulnerability to breach implicit or explicit security policy [5]. The term information security and network security are often used interchangeably. However, this project focus intrusion in computer networks, so we are going to discuss network security. The term network security is the techniques that are used to protect data from the hacker travelling on computer networks. Network security Issues There are many issued involved in the network security but the following are the most common. Known vulnerabilities are too many and new vulnerabilities are being discovered every day. In denial of service attack when the malicious user, attack on the resources of the remote server, so there is no typical way to distinguish bad and good requests. Vulnerability in TCP/IP protocols. Denial of service Attacks A denial of service attacks or distributed denial of service attack is an attempt to make computer resources exhausts or disable or unavailable to its legitimate users. These resources may be network bandwidth, computing power, computer services, or operating system data structure. When this attack is launched from a single machine, or network node then it is called denial of service attack. But now days in the computer wild the most serious threat is distributed denial of service attack [4]. In distributed denial of service attack, the attacker first gain access to the number of host throughout the internet, then the attacker uses these victims as launch pad simultaneously or in a coordinated fashion to launch the attack upon the targets. There are two basic classes of DoS attacks: logic attacks and resource attacks. Ping-of-Death, exploits current software flaws to degrade or crash the remote server is an example of the logic attacks. While on the other hand in resource attacks, the victims CPU, memory, or network resources are overwhelmed by sending large amount of wrong requests. Because the remote server, does not differentiate the bad and good request, so to defend attack on resources is not possible. Various denials of service attacks have some special characteristics Oleksii ignatenko explain the characteristics of the denial of service attacks as in the figure 1. Your browser may not support display of this image. Figure 1 Denial of service attack characteristics Attack type: a denial of service can be a distributed (when it comes from many sources) or non-distributed (when it comes from only one source). Attack Direction: attack direction may be network or system resources. Attack Scheme: Attack Scheme can be direct from malicious users source or it can be reflections form other victims systems, or it can be hidden. Attack Method: Method means that vulnerability that allows attack. Targeted attack utilizes vulnerability in protocols, software and services, while consumption method consumes all possible resources. Exploitive attacks take advantages of defects in operating system. operating system Methods for Implementing Denial of Service Attacks A denial of service attack can be implemented in many ways; the following are the most common implantation techniques Attempt to flood a network, thereby stopping legitimate network traffic Attempt to interrupt connections between two systems, thereby preclude access to a service Attempt to prevent a specific user from accessing a service The flood method can be deployed in many ways but the following are well known in the wild of networks system. TCP-SYN Flood ICMP Flood RST attack TCP-SYN Flood: In order to achieve the TCP-SYN flood the attacker tries to establish the connection to the server. Normally a client establishes a connection to the server through three way handshake. In three way handshake, The client or any sender sends the TCP packet with the SYN flag set. The server or receiver receives the TCP packet, it sends TCP packet with both SYN and ACK bits are set. The client receives SYN-ACK packet and send ACK packet to the server. The three way handshake can easily be understood in the figure 2: Client Server Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image. Your browser may not support display of this image. Your browser may not support display of this image. Figure 2 Three way Handshake This is called three way handshake of TCP connection establishment. So in SYN flood what the attacker does, he sends SYN packet to the server and the server responds with SYN-ACK packets but the attacker does not sends the ACK packet. If the server does not receive the ACK packet from the client it will resends a SYN-ACK packet again after waiting for 3 seconds. If SYN-ACK still does not arrive, the server will send another SYN-ACK after 6 seconds. This doubling in time continuous for a total of 4 or 6 attempts (the exact number depends upon the implementation of the TCP protocol on the server side) [8]. So in SYN flood the attacker install Zombies on Internet hosts and sends huge amount of SYN request from spoof IP to the server or any host on the internet and utilize all the server or host memory and data structure. In this way the server get busy and is not able to accept request or respond to