Saturday, January 25, 2020

Work Based Learning as an Assessment Tool

Work Based Learning as an Assessment Tool Flanagan (2000) defines work-based learning as a collection of acquired knowledge, work experience and basic knowledge. It uses formal structure and the learner management to increase learning and professional development opportunities in the workplace. This definition also includes learning at work and educational activities which enables reflection, values the learners experience and learning opportunities in practice and which enhance the development of professional knowledge. Barr (2002) suggests that learning can occur at the work place or outside of work with the plan of improving work performance. In the context of health care, work-based learning has the potential to meet the needs of nurses by promoting learning that is practice driven (Walker and Dewar 2000). It allow students to find the learning abilities of their experiences, link learning to practice and interpret learning for the purpose of assessment (Swallow et al 2001). It is in view of these operational definitions that I delivered a training during one of my teams practice development sessions on Using KGV as an Assessment Tool. KGV was first published by three Psychiatrists in 1977 by; Krawiecka M, Goldberg D, and Vaughn M. as a standardised psychiatric assessment scale for rating chronic psychotic patient (Gamble, C. Brennan, G. 2000). It was later revised by Stuart Lancashier in 1996 called Manchester Symptom Severity Scale. This is to enables the user to express and measure the severity of those psychotic symptoms that are most commonly experienced by people who have psychotic illnesses such as schizophrenia and bipolar affective disorder. Corrigan et al (2001) argues that there is evidence that work-based training which is interactive with staff and practice development approaches can bring improved outcomes (McCormack et al 2006). These focus on the team in the practice setting, enabling staff to learn new practices together. In this case the training delivered adopts a bottom-up approach tailored more to team needs and, as a result, stronger ownership of the practices being developed at the end. Participants Profile Nine band 5 staff nurses and Six healthcare assistant, from two adjacent single-sex acute admission inpatient wards, took part in the session. This was a relatively mature group: six were over 40 years old and nine under 30 years of age. Some staff has never been formally trained and some need to be refreshed on the use of the tool to make them more versatile. Most had been qualified for many years and they had been working on the wards for over six years. Given the differing range of skills among participants, an important feature was flexibility of approach to meet each learners needs. The main components of the approach adopted included the following: Therapeutic skills teaching because of the topic. A key aspect was the development of a strategic approach to encounters with service users in preference to random dialogue in using this assessment tool. The overall approach aimed to enable participants to change by becoming more self-determined in their team and being more facilitat ive, rather than custodial, in their role with service users when using the assessment tool. The session started by introducing myself and the rest of the team followed. The aim of the session was explained which is to further develop staff knowledge of the use of KGV as an assessment tool within the acute inpatient admission wards. The objective was also elicited; at the end of the session staff are expected to be able to use KGV as an assessment tool to enhance patient care. The team were asked open question to begin with to encourage participant to talk, and to ascertain their needs and expectation of the session. This is also to determine how much they know about the subject. This approach was achieved based on the psychological learning theory described by Kolb (1984), which relates to experiential learning. This involve asking questions which encourage reflection, conceptualisation, and ways of testing the ideas. Learning Theories Psychologists have attempted to explain how the process of learning occurs. The main theories are explored in the context of the clinical environment, and lifelong learning. Behaviourism Psychologists from the behavioural school believe that the environment is crucial to learning: if the environment is right, learning occurs as links are made between what is offered and how people respond to it. (Quinn 2001). In this instance the room used for the session was spacious and well ventilated. The sitting arrangement was oval shape that enabled interactions between everybody in the room. It is secluded and away from the noisy environment on the ward that prevents interruptions. Although often criticised for emphasising performance at the expense of the individuals thoughts and feelings (Quinn 2001), behaviourism has some areas that are beneficial, particularly in the area of skills building and this is particular relevant to the session. Skinner (1990) concluded that hard processes need t o be learned in stages, each stage being organised and built on previous ones. Cognitive theories consider learning as an unconscious process that involves higher order mental activities such as memory, perception, thinking, problem-solving, reasoning and concept formation. Cognitive theories were built in response to behaviourist theories and include meaningful learning and discovery learning (Atkinson et al 1990). Learning occurs according to the relations between new information that the individual accumulates, and the specifically relevant structures that the learner already has (Ausubel 1968). The session was delivered to ensure the interaction results in the assimilation or incorporation of both new and existing information to form a more detailed cognitive structure (Quinn 2001). This implies that information is not just added to the old in a cumulative way; rather it acts on the current knowledge and both are changed into a more recent and detailed cognitive structure. The students starting point is an important principle of Ausubels (1968) theory. With this in mind one of the first thing I did was to ask all the participants to explain their current understanding and/or previous experience of using the KGV. This enabled me as a facilitator to relate learning more closely to individual needs thereby achieving greater effectiveness and saving valuable time. Humanistic psychology and learning is a general term for a group of theories that emerged in response to scientific explanations of the person. It is concerned with the self distinctly human qualities such as personal freedom and choice, and places value on individual experiences (Tennant 1986). Among the humanistic psychologists Rogers (1983) and Maslow (1968) developed theories based on their experience in clinical psychology. They indicated that humans beings have two main needs a need for growth and development and a need for positive regard by others. The above thoeorists focus on how individuals perceive and interpret events rather than on objective scientific interpretation. Rogers (1983) applied to education his extensive experience of observing clients learning through client-centred therapy, concluding that learning is essentially a helping process. This is reflected in the key features that form the basis of his humanistic approach to learning that education should be student-centred and that the teacher becomes a facilitator of learning. The features of the humanistic approach are summarised by Joyce and Weil (1986): individuals have a natural drive to learn, learning can be enhanced by using experience and self-evaluation which promotes independence and creativity. The whole session was interactive and participants were encouraged to be expressive on the topic since some has been using it before. Hinchliff (2004) suggests that social learning theory can be seen as part of the behavioural approach, although it relates with the cognitive areas. It is defined by Atkinson et al (1990) as: learning by watching the behaviour of others and observing what consequences it produces for them. It is often described as learning by sitting next to Nellie, and is probably one of the most common ways that learning takes place in clinical areas. Quinn (2001) believes that people learn by the type behaviour they observe and how they express difficult feelings , although ultimately the quality of the learning depends on the quality expressed by the role model. The scoring system when using KGV is a bit complex, I went through this process with the team and actually completed one to make it practical. Reece Walker (2002) suggests adult learners are able to learn more using humanist approach rather than behaviouristic principle. A humanistic approach was used in facilitating this session because it emphasises the effective aspects of man as being of equal importance to the cognitive and psychomotor elements however a bit of each theory was used (eclectic approach). During the session I was able to encourage participants participation, a relationship of mutual trust can promote the natural potential for growth and development. It was also remembered that for some of us, the deepest learning and the best performances have occurred in the most anxiety-provoking situations. Adopting a humanistic approach does not mean that students were protected from such situations. Rather, they were all supported and guided through them. Skinner (1990) argues that praises and rewards can be used as a positive reinforcement and should be given immediately and regularly to have an impact on the individual. When there is a delay in giving praise and reward, this would no longer have effective because it would not be linked to the behaviour. Hinchliff ( 2004) stated that reward can take form of smiles, nods and verbal encouragement, all these were put into use during the session with the learners. Teaching Methods: Knowles (1984) explains the theory of andragogy as a process through which adult learners takes in knowledge differently to children. He uses the term andragogy to describe the way in which adults learn, and pedagogy to describe how children learn. The andragogical approach to teaching includes of seven elements which a facilitator should take into consideration (Knowles 1984): Setting the climate for learning This involves both the physical and psychological environment and takes account of mutual respect, seating arrangements, working together, supportiveness, openness and being real and a climate of humaneness. In this instance the room used for the session was spacious and well ventilated. The sitting arrangement was oval shape that enabled interactions between everybody in the room. It is secluded and away from the noisy environment on the ward that prevented service users from knocking at the door. Power point was used to present the teaching material that was projected to the wall, this made it visible and distance between the participants and the wall was appropriate. Involving learners in mutual planning The two teams were involved jointly organising and arranging learning opportunities in line with the participants identified learning needs. This was led by two team leaders. Involving learners in identifying their learning needs This is was achieved through discussion with the participants in the light of the focus on the topic. Decision was too focused on the application of KGV and to make it relevant to our client group. Involving learners in the formulation of objectives Prior arrangement had taken place between the two leader of the two acute ward on re enforcement of using KGV on the two units. This was discussed in staff meetings. Involving learners in the design of lesson plans all the participant were aware of the rudiments of practice development forum and the learning contract was tailored to ensure that teaching is centred on the needs of participants and was delivered at their level. Helping learners to carry out their learning plans This is made possible by the facilitator. There was prior arrangement between the facilitator and the participants to read around the subject. Involving learners in evaluating their learning This should include qualitative as well as quantitative evaluation. This was done at the end of the session and all participants filled in a form that has ten questions regarding the session. There was also discussions on how we can improve our forum to make it more relevant to our need. A follow up session was arranged to support staff progress. Reece and Walker (2002) believe that adult learning theory is highly relevant to professions such as nursing, suggesting that facilitators need to provide an appropriate and individualised patient-centred learning that meet patients needs. Andragogy is similar to the humanistic psychology approach to learning as both support shared responsibility for learning and a learner centred approach. Staff Nurses are adults and, as such, are encouraged to take responsibility for their learning. Knowles (1984) seven elements above provide a useful framework for encouraging learning, based on the identified needs of students. Knowles (1990) believed that andragogy would give the field of adult education a balanced theory and a sense of unity. While pedagogy is defined as the art and science of educating young children, and viewed andragogy as any intentionally and professionally guided activity that aims to bring about a change in adults. Andragogy therefore supports a proactive approach to learning in which enquiry and freedom feature predominantly. It has much in common with the student-centred approach. To achieve the goal of this session, andragogical process was used. By adopting the above learning strategies, participants felt effectively supported as adult learner and became relaxed. Two main principles that apply are; student-teacher relationship and learning environment. Learning Styles: Sutcliffe (1993) investigated whether nurses preferred learning styles varied according to subject area studied. The results suggested that there was a change in learning style as different subjects were studied. Other factors emerging were the importance of prior learning experience, they wish to share, acknowledge and the need for close relation between theory and practice. Thus, learning style preferences influence the way in which students respond to an educational programme in relation to mastering its goals and objectives. The topic of the session is familiar but we were trying to re validate it and see how we can better enhance patient care. At the start of the session when the an open question was asked not many responded considering the fact that it a familiar topic to some. Kolb (1985) asserts that it is important for individuals to understand their learning styles so that they can increase their effectiveness as learners. Divergers excel in concrete experience and reflective observation. As with any behavioural model, these styles of learning are dynamic. Nonetheless, most individuals exhibit strong preferences for a given learning style. However, Kolb et al (1995) maintain that each individuals learning style is not necessarily static and that in using them there is a need to prevent the danger of being stereotyped. Honey and Mumford (2001) developed their learning styles questionnaire as a variation on Kolbs model. The four learning styles are: Activists who are dominated by immediate experiences and mainly interested in the here and now. They like to initiate new challenges and to be the centre of attention. I realised most are not forthcoming in responding to some of questions asked and at times lots of prompts before any response. Reflectors are observers of experiences and prefer to analyse them thoroughly before taking action. They are good listeners, cautious and tend to adopt a low profile. As the session progresses participants became more open and interactive possibly after they have ascertain and able to analysis the theory behind the subject in question. Theorists like to adopt a logical and reasonable approach to problem-solving but need structure with a clear purpose or goal. Theorists learn least well when asked to do something without apparent purpose, when activities are unstructured and ambiguous and when emotion is emphasised. There was a great deal of participation when we work through a scenario. Pragmatists are keen on trying out ideas and techniques to see if they work in practice. They are essentially practical, down-to-earth people, who like making decisions and solving problems. The four learning styles: activist, reflector, theorist and pragmatist overlap and are a product of combinations of the learning from stages of experience. On a whole it will be fair to say that the class is mixed with all the learning styles. Evaluation: The session was evaluated by the way of interaction between myself and the participants. One of the highlights was the pace of the delivery, it was too fast but this was due to the time constrain. However the participants did commend the quality of handouts which can serve as reference point for individual and the knowledge of the facilitator of the subject matter. The participant did agreed that a follow up session will be useful to evaluate how much impact the session has on care delivery on the two wards and this will be in relation to multi disciplinary working. Conclusion: With the complexity and degree of change in practice, nurses are being encouraged to take responsibility for their learning. Work-based learning aims to encourage the student to be an autonomous learner. The delivery of work-based learning moves away from the concept of the teacher imparting knowledge towards the model of the teacher being a facilitator of learning (Chapman and Howkins 2003). This method of learning is consistent with the underlying philosophy of adult-centred learning (Knowles et al 2005). This is where adult learners are responsible for their learning which is self-directed and have a readiness to learn. However, even when adults are willing to assume responsibility for their own learning, they will have different aptitudes for certain kinds of learning (Russell 1990). McCormack et al (2006) reckons that work-based learning is not a panacea to providing effective learning that leads to effective practice, the consensus however is that it offers many benefits. Delivering the session on KGV has enhanced my port folio as individual and gives our practice development forum more recognition. It has also contributed to learning environment and training of staff within the clinical environment which will enhance patient care.

Friday, January 17, 2020

Psychological Contract in the Contemporary Organisation Essay

Every human being is an unique individual. This is an undeniable fact, thus organisations have to explore the various antecedences of the psychological contracts between employees and the organisation. Employees have different perceptions and thinking over the concept of psychological contracts. Generation Y is slowly filling up the positions in contemporary organisations. Therefore, what are the influencers revolve around this power craving group of people? Research has concluded that employees and employers have different perceptions on job support and resources (Attridge 2009, 392; Kahn 1990, 708) and even job satisfaction (McShane and Travaglione 2007, 180). Employee disengagement has been occurring more and more often nowadays (Bates 2004, 44). Employee engagement is closely linked with the result of the organisation (Medlin and Green 2009, 948; Harter, Schmidt and Killham 2003, 27), where employee disengagement may cause unsatisfactory employee achievement; leading to undesirable organisational advancement and financial development. Because of these, organisations should examine the psychological contracts between them and the employees, especially that of the Generation Y. Psychological Contracts Ppsychological contract is defined as ones beliefs about shared responsibilities and commitments in the framework of the relationship between employees and the organization (Robert, Kristie and Kathryn 2010, 220). Cyril (2004, 1) mentioned that psychological contracts are the employees’ mindset about what they look forward to from the organization and what they feel they should commit to the organization. The psychological contracts emphasize more on the relationship between an employee and employer as a whole rather than traditional compensation issues (Robert, Kristie and Kathryn 2010, 220). The concepts of the psychological contract are commitments particularly based on perceived obligations by the others (Robert, Kristie and Kathryn 2010, 220). Whether well expressed or not, the perceived obligations create commitment and responsibility that must be executed for the contract to be affirmed (Robert, Kristie and Kathryn 2010, 220). For instance, the organization making use of a relational psychological contract is responsible to account for the individual fairly, provide hazard free working conditions, allow employees justifiable personal time, and provide adequate materials to accomplish their job. On the contrary, the employee is responsible to accomplish given tasks, display a positive attitude, boost the reputation of the company, and abide corporate policy (Robert, Kristie and Kathryn 2010, 220). Given so, these obligations do not only encompass on the quantity of work is to be carried out for a certain amount of pay, but also draw in the whole pattern of rights, privileges, and obligations between employee and organisation (Mario Pepur, Sandra Pepur, and Dr. Ljiljana Viducic 2010, 231). For instance, after serving the company for a number of years, the employee may expect the company not to fire him and similarly, the company may expect that the worker not to tarnish company’s reputation or leak out confidential secrets to rival companies(Mario Pepur, Sandra Pepur, and Dr.  Ljiljana Viducic 2010, 231). Expectations as such are not transcribed into contractual agreement between employees and organisation, yet they work as power determinants of behaviour (Mario Pepur, Sandra Pepur, and Dr. Ljiljana Viducic 2010, 231). Literature Review No doubt, the theory on psychological was established in the 1960 by Argyris (Cyril 2004, 1), it is still highly applicable in today’s context. Rothbard’s (2001, 656) empirical study shows that there is a relationship between psychological contracts and employee engagement. Rothbard (2001, 656) mentioned that attention is the psychological presence and the time spent by the employee contemplating about his responsibilities at work, while absorption is concerned with the affection of employee to put emphasis on the responsibilities on duties. It is believed that the psychological contract is generally an appropriate and impactful construct that can aid explain, and inform effective management of, contemporary academic work performance and workplace relations (Grant, Branka and David 2010, 6). The psychological contract can help both employee and employer to gain awareness on contemporary employment relationships; indeed, it has been debated that perceived obligations within the psychological contract are usually more vital to work related attitudes and behaviour than are the official and explicit elements of contractual acknowledgement (Grant, Branka and David 2010, 6-7). Employees trust that the employer has the obligations to facilitate them the following: career advancement, incremental salary, alary based on the current working efficiency, upgrading, safe long-term employment, opportunities to build their career as well as support in case personal problems occur (Mario, Sandra and Dr. Ljiljana 2010, 233). On the other hand, the employees believe that they have the following obligations towards their employer: working overtime, staying loyal, taking initiative to take up new responsibilities at work, providing a beforehand notice when taking another position, be ready for transfer, rejecting support to rivalry, protecting confidential company information, spending a minimum of two years doing the routine (Mario, Sandra and Dr.  Ljiljana 2010, 233). Many studies indicated that personal and psychological factors have significant influence on employees, including biological factors and the work attitudes of employees (Hung-Wen 2010, 92). Hung-Wen (2010, 92) mentioned that Yu suggested work attitude is the level of organizational identification, the levels of involvements in current jobs and overall job satisfaction. Therefore, this research explains job satisfaction and work involvement as its two variables (Hung-Wen 2010, 92). Job Satisfaction Job satisfaction is an assessment of the work and job context by employees (McShane and Travaglione 2007, 116; Spector 1997, 2). Little and Little (2006, 115) deemed job satisfaction as an enjoyable experience or positive emotional condition . They agreed with the research done by Kreitner & Kinicki in 2004 that job satisfaction is associated with job involvement, organizational behaviours and commitment (Little and Little 2006, 115). In an adverse effect, it is also associated with turnover and stress. Similarly, experimental studies on 7,939 business units in 36 organizations find out that job satisfaction concludes employee engagement, and are forecasting organisation progression (Harter, Schmidt and Hayes 2002, 268). The extended studies by Harter, Schmidt and Hayes (2002, 268) states that it is crucial to constantly stress on the degree of employee engagement and contented and happy employees would be very much motivated in the organisation (McShane and Travaglione 2007, 180). Poornima (2009, 35) has given a hypothesis that statistically, there is a strong relationship between age and difference between expectation and fulfillment levels of employees with regard to monetary and non-monetary compensation practices followed by the organizations (Poornima 2009, 35). The result shown that those aged between 25to28 are not responding positively to monetary motivation. Research shown 85% of the young people want progressive management to inspire them and 52% of them think that the managers are not helping in their development (Robin 2007, 34). Kim (2007, 154) agrees with (Henry 2006, 11) that Generation Y is motivated by the chances to grow and develop, thus they welcome comments and feedback. Therefore, Generation Y would expect organisation to enrol them with training and development program, as well as providing them with feedback for improvement. Failing to do so, goal is not achieved, thus motivation of Generation Y decrease. With that, these create job dissatisfaction in Generation Y. Taking consideration of Poomima and Kim’s studies, Generation Y is a group of people who are more intrinsically driven rather than monetarily motivated. Work Involvement In today’s context, organisation should anticipate expectations of their employees through their psychological contracts if they want to gain their loyalty (Mario, Sandra and Dr. Ljiljana 2010, 236). Mario, Sandra and Dr. Ljiljana (2010, 236) agrees to Rousseau that the main difference between new and old psychological contracts lies in the lack of job security. She proves this by quoting an employee of a telecommunication company who says that: â€Å"It used to be that working for the company meant being part of a family (Mario, Sandra and Dr. Ljiljana 2010, 236). As organisation moves towards the modern era, the younger generations are beginning to fill up most of the positions. Tulgan (2009, 3) shared that Generation Y is so far the hardest generation to manage. While organisation expects employee to stay loyal to the company, Generation Y, a group with high expectation and believe in their capability tends to switch jobs to satisfy their hunger for fast career advancement (Tulgan 2009, 3). Another contributing factor to the frequent job switch is the Generation Y’s expectation; they are constantly looking out for jobs that provide training (Sue and David 2008, 368). Sara and Ans (2010, 256) have come up with two hypothesizes. â€Å"The level of careerism will be emphatically related with psychological contract expectations in account of job description, employment development, training, and monetary rewards. The level of careerism will be cynically related with psychological contract expectations in account of social environment, work-life balance, and employment assurance† (Sara and Ans 2010, 256). The first hypothesis does make sense as the three factors mentioned act as a motivator to increase the level of careerism. However, the second hypothesis is countered by the research of Sue and David (2008, 368) which points out that â€Å"although Generation Y has a desire for defined goals and managerial reinforcement in what is to be done, they also crave for autonomy and flexibility in decision making process. Furthermore, despite being autonomous, they are viewed as being emotionally needy and consequently, continuously looking for acknowledgement and commendation. In terms of work, they are power thirst. However, they do look upon work life balance and if given a choice will choose family and friends rather than work†. Evaluation Given the unique characteristics of Generation Y, it is difficult for the organization to determine their psychological contract with the organization, thus making it a challenge for the organization to come up with strategies to motivate and retain these â€Å"potential job switchers†. Demanding for power in workplace, yet craving for work life balances; organizations have to come up with plan to satisfy these employees before they can be aligned and work towards the same goal. Event such as Bring Your Child to Work promotes work life balance yet not disrupting the normal working procedure. Organizations can consider such event to strike a balance for the employees. Employee disengagement is one of the crucial explanations for organization turnover. With this getting more and more common in the organization (Pech and Slade 2006, 22), management should seek to understand the reasons behind the dissatisfaction and explore the psychological contract between them and the employees to reduce the possible unhappiness, thus creating a conducive work environment. Conclusion The concept of psychological contracts is characterised by dynamic features. They are continuously adjusted to new trends in the working environment. A triumphant resolution to the productive handling of employee engagement kicks off with recognition of the uniqueness of each employee. Accessing the factors influencing their needs and perception after presuming that employees are engaged is an fallacious way and is not very much encouraged. Psychological contracts can encompass various areas such as work involvement and job satisfaction. However, psychological contracts involve many other factors. For instance, human resource practices such as employees’ relation and welfare, training and development, and compensation and benefits (Saks 2006, 613). Therefore, effective understanding of psychological contracts would require organisations to contemplate the perception of individual employees towards the influencing variables. Franking speaking, how many organisations are prepared to go for the extra mile for the employees? Even though the organizations may acknowledge the significance of psychological contracts, it is intricate to get to a mutual understanding for both the organisation and employee. Organisations may only see the link between the understandings of psychological contracts in both aspects with beneficiary outcomes as a theoretical model, thus are not convinced that their employees can make it happen. Every employee is unique. They have different needs and perceptions in terms of psychological contracts with the organisation, which may also change over time. This would also mean that the organizations have to take into consideration of the incalculable factors catering to the different employees. Is this cost and time efficient? Management would rather spend the time on the operations and focus on the visible and instant results. Nevertheless, there are organizations that are still prepared to spend their effort working on psychological aspect in employees. Personally, I feel that understanding of psychological contract is essential to organization success. However, it is very much reliant on the distribution of time, effort and loyalty of the organizations to form a successful understanding and alignment of the psychological contracts between themselves and their employees.

Thursday, January 9, 2020

International diploma in computer studies - Free Essay Example

Sample details Pages: 31 Words: 9379 Downloads: 2 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Acknowledgement This is an assignment for Networking Assignment that is an elective subject in international diploma in computer studies (IDCS). Network is very important communicate each other. So, this is very important. I would like to thank to our teacher U Tin Naing Htwe who teaches us Networking. When he teaches this subjective, we know about networking thoroughly and can implement the tasks understanding. So I would like to thank to teacher U Tin Naing Htwe and my classmate who are Phyo, Zar Yar Shi, Myint Myint Aye and ma Yee Mon. They help me for my assignment because I am a new student. MCC class is separate two kind of student which is senior and junior. I am a junior student. Don’t waste time! Our writers will create an original "International diploma in computer studies" essay for you Create order So, at first I dont know what is an assignment? I was thought assignment is difficult for me but now I am having my assignment because of my classmate and my teacher. And thanks for my parents because they help me for assignment and they advices me this IDCS course is good for me. I like this subject and I must try to networking subject. I would like to offer acknowledge to Myanmar Company Ltd (MCC) and National Computer Company, Ltd (NCC) education. Introduction My name is LEI LEI MON.I have student from International Diploma in Computer Studies at MCC computer training Center. It is offered by NCC Education center. There are four subjects which are networking, java, system development and business communication. In my course is finish, we must do the assignment. The purpose of this assignment is the bank for Rural Development is set up as an apex development bank with a mandate for facilitating credit flow for promotion and development of agriculture, small-scale industries, cottage and village industries, handicrafts and other rural crafts. This assignment is for about the new networking advice the bank on cost effective networking solutions. The bank has mostly windows based network and clients. The bank also wants their agents and branches to connect to the banks network securely through VPN. What is networking? Networking involves connecting computers and other electronic devices for the purpose of sharing information and reasons and for communication. Even thought the concept of networking is basic, a great deal of technology is required for one device to connect and communicate with another, and many choices for physical connections and related software are possible. Site to Site Services Access Options: Frame Relay, Private Line, DSL, Metro Ethernet (2Q06), ATM (limited availability) IPSec Access via BellSouth IPSec gateway Optional Services: eMRS Complementary Managed Router Service(soft-bundle)option Internet access with firewall feature Equipment purchase, installation and maintenances services Firewall A firewall provides a strong barrier between your private network and the Internet. You can set firewalls to restrict the number of open ports, what types of packets are passed through and which protocols are allowed through. Some VPN products, such as Ciscos 1700routers, can be upgraded to include firewall capabilities by running the appropriate Cisco IOS on them. You should already have a good firewall in place before you implement a VPN, but a firewall can also be used to terminate the VPN sessions. Common type of firewalls Packet Filtering Circuit Gateways Application Level Proxy Stateful Packet Inspection Internet Connection Firewall Hybrid Firewall Packet Filtering A packet filtering firewall will examine the information contained in the header of a packet of information, trying to well-known bridge into the castle. Information on inspections includes the source address, destination, and applications have been sent to. A packet filtering firewall works at the network level Open Systems Interconnection (OSI definition of the next paragraph) protocol stack, therefore, do not hide the private network topology, and spy behind a firewall. It is important to know that this type of firewall only checks the header information. If the data to send a malicious from a reliable source, this type of firewall is not guaranteed. When a packet filtering process of transmission, it is passed to the destination address. If the packet does not pass, its just down. This type of firewall is vulnerable to IP fraud, a practice that hackers will transfer them to private local area network (LAN); it appears as if from a reliable source, to gain a local area network. OSIs every textbook network infrastructure plus definitions, OSI is a seven-layer structure, standardized level of service and type of interactive exchange of information through the network of computers. It is used to describe the physical connection between the data streams to the network and end-user applications. This model is the best-known and most widely used model to describe networking environments. Circuit Gateway Circuit gateway firewalls work in the transport layer protocol stack. They are fast, transparent, but in fact did not provide protection against attack. Circuit gateway firewall does not check the data package. A great help to this type of firewall is that they make the network invisible behind a firewall, as everything seems to come from inside the firewall from the firewall itself. This is the most used type of firewall. Application Level Proxy The slowest, most awkward is the application layer proxy firewall. This type of firewall on the work in the application layer protocol stack, which enable it to carry more information than packet filtering or circuit gateway firewall. Application-level proxy type of firewall is usually used in the corporate firewall, rather than a single family. To determine whether they are connected to a specific application to request permission, such as Internet access or e-mail. This allows the user to determine which applications will be used for the computer. Also known as proxy servers, they not only data packets on the screen and determine which applications to allow access, but also to provide protection from external sources within the computer by hiding from the outside to see. External sources never have access to computers inside, but all communications to be carried out through a proxy server. This approach in most cases more than the use of ordinary home computer users, it is more suitable for small businesses and enterprise solutions. This is mentioned here because of the popularity of home use peer-peer network to share dedicated Internet connection, such as cable modems. Stateful Packet Inspection The fourth method, we can use the firewall from the so-called stateful packet inspection. This is the so-called state, because it checks the contents of the packet to determine which countries of communication. It ensures that the target computer has admitted the established communication from the source computer. In this way, all communications are by the accept the source computer and are taking place, only to know or believe that from the previous communication link. In addition, stateful packet inspection firewall and more rigorous in their packet inspection. Stateful packet inspection firewall also closed the port until the connection is requested, authorized and acknowledged by the receiving computer. This allows an additional layer of protection of the threat port scan method, hackers used a computer to determine which service or application procedures are available to enter the host. Internet Connection Firewall Windows XP Windows XP provides Internet security posed by a new Internet Connection Firewall (ICF). ICF use of an active packet filtering, which means that the firewall ports are open, as long as necessary, to enable you to access your services interested in the type of technology prevents hackers from scanning your computers ports and resources. If you are an Internet conference organized by the company, ICF allows you to open holes in the firewall, so that traffic specific ports. This is the so-called port mapping. Hybrid Firewall A firewall is a hybrid combination of the two above-mentioned firewall. The first commercial firewall, 12-month stamp, is a mixed use development of the application gateway and packet filtering firewall. This type of firewall is the universal implementation of packet filtering, application gateway into the fast-opening of the new service access and private networks. Personal firewall software applications are usually the gateway firewall. The exception is products such as routers, like Linksys router, it contains a packet filtering firewall in them. The most important thing is to remember is that the firewall should be only part of the security system, private network or computer. Modern firewalls cannot protect the internal network or system from attacks, viruses, and previously unknown attacks, due to firewall technology is generally catch up and protection of known threats technologies. In order for your system (s) is absolutely safe continuous updates and other security methods will be implemented. Wire and Wireless Wire Wire use to interconnect devices. Network cables carry signals between computers, allowing them to communicate with one another. Type of wire Coaxial cable Twisted-pair cable, in unshielded and shielded varieties Fiber-optic cable Wireless Wireless network is defined as any type of computer network, wireless, and usually associated with telecommunications network interconnection between nodes in the implementation of non-use of wires. Wireless telecommunications networks generally implemented some type of remote information transmission system uses electromagnetic waves, such as radio waves, on the carrier to implement this project, usually occurs in the physical layer or layer of network. Type of wireless Wireless PAN Wireless MAN Wireless WAN Mobile devices network SUBJECT: Network Security 1.1) Feature of Windows and Linux Comparison between Microsoft Windows or Linux computer operating system is a common topic of discussion among users. While Linux is the most prominent free software operating system (although some components, such as its own, only the compiled binary drivers, is currently provided by the hardware maker, Windows on the most popular ever installation conditions of their own personal computer desktop operating system () is included in most Linux distributions) is. Both personal computer operating systems market only, not user-based competition, the market rivals in the server and embedded systems. The following reflects the comparison between three different families based on the Windows operating system, each with a different code base and design. These families are (1)Windows and Windows for Workgroups 3.1(based on DOS),Windows 95 and Windows 98 and ME, the old version is on longer for sale today(2) In the family, including Windows 2000, XP in, Vista, the 7, and Server 2003 and 2008. This run all Microsoft supported desktop and server computers today; (3) in the Windows Embedded family, including the two scaled-down versions of other Windows versions and specialized operating systems, such as the Windows CE-. In such relatively concentrated mainly in the New Territories family. Linux is available in many types of CPUs: IA 32 (i386 and later PC processor) is, x86 64 (64-bit PC processor and Intel Mac with most computers), Itanium-and MIPS, PowerPC for, ARMs include. However, only one of the first three, Windows NT kernel version of the current focus. CPU types for diversity, Linux is todays routers, set-top box, PDA and mobile phones as well as support for server and desktop applications detected. Is, Windows, POS terminals DOS beginning on the embedded market is a long history. Today is running under Windows CE megabytes of kernel memory, it is just one target no longer held in the computer [1] Microsoft will, Windows CE operating system on the core, AutoPC is, Windows Mobile, surname such as portable media center is based on many embedded platforms, many industrial and embedded systems. Power Windows and Dreamcast games to choose the CE. Microsoft Windows is a desktop PC market is about 90 percent of desktop market share and dominates in 2007, all servers (while not necessarily use). [About sales accounted for 66 percent required to edit] server revenue share in 2007 Q4 as, Microsoft Windows 36.3% and 12.7 percent in Linux [2] June 2009, Linux has The most powerful supercomputer in the world at 88.6% of the power [3] in December 2008, Linux hosting companies on the Internets most reliable power supply is 15, Windows than any of [4]. Linux and Microsoft Windows philosophy, cost, reliability, versatility and ease of use, to improve understanding of each region are different from the weak. Comparisons of the two operating systems tend to reflect their origins, historical user base and distribution model. To Van, MS Windows viruses, the major disadvantages general awareness and sensitivity on a regular basis often weak, the bulk of the Linux desktop box usability the market [citation needed out of the poor people], including the quotation as a huge market share, a malicious code, and can kill the lack of security features. [5] Advocates of free software, Linux is allowed to argue about the strength of the key users of freedom: To run the program free to [Linuxs] to study , it change and to enjoy the freedom to redistribute copies [and] to improve the program and release your improvements [6] Windows Embedded devices are often configured without disk storage and as the cause, The system does not allow the end may be set to close the extension of the user. Ciscos VPN-optimized routers provide scalability, routing, security and QoS (rvice their quality). According to Ciscos IOS (Internetwork Operating System) software, there is a through the central site VPN aggregation router, applicable in all situations, from the small-office/home-office (SOHO) access to the needs of large enterprises. 1.3) There are many common ways to install and run Ubuntu Linux system. You can run Ubuntu As the only operating system (single boot). In addition to other operating systems (dual boot). In your existing operating system (virtualization). See the installation options in a virtual environment Virtual Machines. From your CD-ROM drive, using the Live CD on. In addition to Windows, the use of the window boot manager, by installing Wubi Acquiring Ubuntu There are many ways to get the Ubuntu installation disk, these detailed GettingUbuntu page. If you plan to download and burn your own installation disc, please refer to BurningIsoHowto. To get Ubuntu, you can order a free CD or buy from a typical CD or DVD from a distributor you can also download and burn images to a CD or DVD. You can download a typical Ubuntu install. Download and install a program requires a blank CD or DVD, and CD or DVD burner can burn CD images. To download Ubuntu: Using the Web browser, navigate to the internet Select the desktop version, and then click Ubuntu 9.04. Select the download location in the vicinity of the menu; choose the location closest to you. Click to start the download. A pop-up window that prompts you to run or save the file. In Internet Explorer, click Run, to automatically open a CD burning tool or click the installation file to save the file to disk. In Mozilla Firefox, select Open and open the CD burning tool to install the file or choose to save the file to save the file to disk. After downloading the Ubuntu installation CD image, you need to burn it to CD or DVD. See above ISO disk image burning a detailed description of BurningIsoHowto. To burn the installation disc into the CD or DVD: Place a recordable CD or to your CD / DVD drive DVD. Load application, be able to burn. ISO image file to a CD or DVD Use your CD and DVD writer, the disk image copied to a blank CD or DVD. Ubuntu LAMP server Install the following Versions Ubuntu 9.10 (Karmic) Apache 2.2.12 Mysql 5.1.37 PHP 5.2.10 1.4) Cost associated with the performance, security, support, and maintenance of the Ubuntu What is Ubuntu? A complete desktop Linux operating system Ubuntu, a free community and professional support available. Communities struggling right enshrined in the Ubuntu Manifesto is built on the idea: software thats free software tool that people should be able to use their local language and despite any disabilities, and those people need freedom and justice must be able to meet their. I want to see how their software cannot be changed to. Ubuntus always free, will be free, Enterprise Edition for the additional costs we work best in such conditions, all free to use. Ubuntu, can be used very woobuntuhayeo translations and accessibility infrastructure that the free software community, including providing the best possible people. Stable and regular release cycle for Ubuntu is shipping a new release every 6 months will be shipped. You or the current development release you can use the current stable release. 18 months releases are supported. Ubuntus entirely open-source software development, is committed to the principles, we improve people pass it is recommended to use open source software. Ubuntu is suitable for use on desktops and servers. Current Ubuntu release, AMD64 at (hammer) and power (Apple iBook and Power book, G4 and the G5) architectures (Korea IBM-compatible PC) and is supported on Intel x86. Wu struggling software, more than 1,000 pieces of the Linux kernel version 2.6 and GNOME 2.16 start, and word processing and spreadsheet applications to access applications, web server software, email software, programming languages and tools and the Internet from any standard desktop Cover the application as well as a few games. Dell has cut the price of 50 U.S. dollars to personal computers pre-installed Ubuntu Linux operating system instead of Windows Vista. For example, laptop computers Inspiron 1420 (14.1-inch display, 80GB hard drive, 1GB of DDR2 memory) loaded with Ubuntu Linux now priced at 774, while the same laptop with Vista Home Basic Edition cost $ 824. A computer with Ubuntu pre-installed is only applicable to the United States. Prior to this, constant complaints, the users Idea Storm Web site, Ubuntu computer prices tend to the same Windows Vista-based computer. However, to save 50 U.S. dollars an Ubuntu computer is not enough to satisfy some Linux enthusiasts, who said, Dell can still do more. I think this is just Dells air. I fully agree with the first, but now the situation is clear, I would like to see it fall flat, Mike Dells face, complained surimi. I did not expect a price drop 200 U.S. dollars. I look forward to something, though along the line of 50 ~ 75. Dell decided to start providin g pre-installed Linux PC, after earlier this year launched Idea Storm Web sites recommendations. Just 11 days of the launch of IdeaStorm Web site, more than 83,000 users had requested that Dell offers Linux pre-installed on personal computers. DUX is ideal for data acquisition unit for real-time monitoring and control. Motherboard uses real-time speed and power USB port and is designed to work perfectly under Linux. This means that it is easy to program and works on embedded systems and desk top computers. The driver is part of the framework COMEDY, so it will work directly with Labview. Driver and firmware under the GPL. Encounter problems with data collection in Windows Vista? USBDUX and Ubuntu using the CD to collect data on the speed and reliability of Linux, and then return to Windows to use your favorite analysis software package all on your computer. Performance Currently the update 4 Linux 2.6.18 kernel based Optimized multicourse Maximum flexibility to continue to hardware support The development and performance tools, including System Tap SRIOV such as I / O performance and virtualization technologies, advanced Both physical and virtual system that support large SMP IPv4/IPv6 pieces offload and buffer management Dynamic per-conversion I queue / O, scheduler Kernel buffer to improve the adhesive power, I / O operations on the buffer Security During installation, the encryption of the users home directory can be set up. During installation, Ubuntu 9.10 encrypted home directory, now offers the option to set up. Skills are required eCryptfs, the home directory is located at the top of the stack, the encrypted file system as part came a few hours woobuntureului. However, the distribution of the desktop version of the users themselves previously had set up on the command line, and now, during the installation, all you need is a simple mouse click. From an existing installation, however, encrypted home directory from the command line to add new users in system management tool that also failed to provide relevant options can be enabled. Although still a standard Ubuntu 9.10 install a firewall a firewall is installed, start the UFS is incomplete, but during installation Developer version 9.10 does not include other security screw enhance: cups print server and the number of such applications, the log stated document viewers and various network tools, as well as the guest session (upper right corner of the menu) for a guest user preferences, temporary work is protected now by default AppArmor profile. Check the permissions of the process for AppArmor Profile: or where the process and can read and write files, whether the network has access to what, and so forth. For example, they have malicious code embedded in PDF files created specifically for immunization. While Firefox 3.5 includes a profile, it is not enabled by default. AppArmor also have some time, but only as part version 9.10 woobuntuneunui to leverage the security of large-scale expansion. In addition, the application profiles apparmor profiles can be added with the package. Maintenance In order to ensure that order is important that users are exposed to any frequency distribution, have access to the latest and greatest system and application software. However, it is all business for Interested in reducing the cost of power and flexibility of Linux, the period until the release. Update, maintain and even more important. Many hundreds of companies, there are thousands of systems or computer. Before, there are updates or new releases have to spend a lot of time testing a substantial business infrastructure can be deployed on the system to think about rolling them all into the computer system. After the test one time, a lot of time updating the physical act of deploying the system, in terms of money literally MIS, IT personnel converts. By default, each new release of Ubuntu security updates after the date of the release of 18 after being issued a month. On that day, but the existing security updates available, it is not guaranteed, new updates for it Release will be p rovided. Ubuntu commercial users long address, long-term requirements of the mark. Shuttle worth and Canonical, Ltd., and founder of Ubuntu Linux, which sponsored and funded the formation. Ubuntu Foundation in mid 2005. Ubuntu Foundation, part of the core Ubuntu community workers. Member, and successful, Ubuntu in order to guarantee the continuity of development and release process. Ubuntu is one of the Foundations commitments to further aspect of maintenance and updates. Ubuntu version 6.06, when this, Ubuntu Foundation is, Ubuntu version 6.06 is on the desktop for three years, five years on the server, the standard 18, the backbone support for last month commitment is two-fold support to benefit from then announced the first release of Ubuntu Linux is Ubuntu. Acronyms LTS, release numbers for long-term support has been added to highlight the fact. Development of hardware and open source, Ubuntu and given the pace of commitment and long-term maintenance of the regular release sche dule, Ubuntu users are always safe, they can help to ensure that the maximum stability and The latest version of the software depends. Also, Ubuntu has promised a corporate update and support is essential for the successful commercial adopt. Software and Hardware-Choices for VPN In the selection of software and hardware, there are many things to enter. VPN software for general-purpose configuration file server should be very cheap. In addition, the server must be a complete knowledge-based network. Security and vigilance should be used to check the unauthorized access. What is the choice of VPN software and VPN hardware and what things can be entered? More Articles cover choice of VPN software Client-server VPN server Hardware and VPN client software VPN and the choice depend on the type of VPN users. You need to select the VPN software requirements for many of the problems Whether the VPN software configuration a common file server cheaper? May be the correct protocol and application configuration, in my current system, to connect to the VPN? I should rely on routers and other dedicated hardware? To reduce costs is a plus; you already have an operating system, support for VPN. Most operating systems running on Windows software, the necessary capacity, configuration, and run a VPN. Each network is a unique and its own users and permissions set to make a VPN with your product evaluation of the infrastructure needs to make a choice. There are two types of network architecture, point-pairs, etc., or client-server. Peer-peer network to provide resources on the network and computing capacity of computers. As a network capacity needs, personal computers into the network between the nodes increases. This increases the robustness of the system and prevents failures. Client-Servers Client-server network architecture is one of the computers is to ask the supply of machines and the server machine. This two computers over a network connection or LAN or WAN. The client can deal with some or all of the application process. Server to maintain a database and processing client requests from the database to extract or update his database. To provide additional processing if the server is an application server. Server can be an ordinary personal computer host. In the LAN server performs various tasks. Of their file servers, printers, servers, mail servers, X computing servers, dedicated servers, database-specific server, the system starts and general purpose server computing File Server Management Working Group on the applications and data files, this may be the group shares. File server requires a network connection, and many slot large-capacities, fast hard disk subsystem. Calculation of the server application logic does not handle. It requires a lot of memory, high-performance features. Database server technology, the most typical use of client-server. In this mode, the server accepts requests for data from its search data in the database and the results passed back. Server requires depends on the size of the database, the number of users, network type, and with the speed of the database must be updated. Communication Server available to other LAN gateways, networks and computers. It can be used as an e-mail servers and Internet servers. It requires multiple slots, as well as a high-speed processors, network protocol translation The client-server system is mainly used in commercial applications, such as Financial and administrative procedures World Wide Web servers Video and document servers Online transaction processing Batch processing In the client-server applications to do most of the relationship between the client and the model is a master-slave configuration. The Internet has evolved in large part on the client server model. The user is still the client who is running the browser and server using the multi-tier architecture of the interconnected network of servers and database servers; we provide information in the form of HTML pages. VPN Server VPN server software and the VPN do not require Windows-based workstation or server operating system software, to add VPN functionality. As for other operating systems software to meet specific VPN function. Morton Bay PoPToP software can be converted into common PC based on any computer on the server. Many companies recognize that in building their own networks and other privileges and tasks of the architecture, the weakest link in security is a human who is not a complete knowledge of system security. Full knowledge of Web-based server (Intranet and Extranet) is needed. Use of existing user and group tasks and permissions. This simplifies management. Safety should be the worms, and other servers on the network attack system has many of the major factors The continuing need for vigilance because it is in the network and the access point at any time of attack a lot of compromises, almost the entire network. The routine checks the log file, you need to know your system from unauthorized access If you have a large number of customers, then a dedicated single-system VPN service is good or the companys other services on the network will slow down. Scalability is limited as compared to the extra hardware solutions. Windows NT Server 4.0 can only support 256 concurrent VPN tunnels See the purchase of additional software, if the VPN solution is a web-based server supports the operating system. VPN Client VPN client software is for small branch offices and home users. Many VPN clients available in the market. These depend on the machine configuration and the protocols they use. VPN client software is already part of many operating systems can also be made use of as a service pack. So that the network connection protocol can use VPN authentication and encryption to provide all you need to do. In the Point to Point Protocol (PPP) Point certification on the use of PPTP and L2TP. Point to Point Encryption Protocol (Microsoft Point to Point Encryption) is used for IPSec encryption for PPTP and L2TP use. Usually the client remote access VPNs. High-density and dial-up with the RADIUS (Remote Authentication Dial in User Service Integration), is by some software. A number of other software vendors to provide client-side Safe Nets VPN Client Software Electoral Affairs Commission (Extranet Access Client) Captivity Ciscos VPN client software for Linux, Win 95/98/98SE/NT/2K/ME/XP. The VPN 1 Check Point Secure Client Aurorean Client from Enterasys MovianVPN Software The Apple system software Net lock and OS / 2 systems, the basic firewall products for these In Joy. VPN hardware VPN hardware is dependent on the connection and installation sites. Low-cost VPN hardware at the client. Persistent organic pollutants (point-of-presence) is a high scalability, performance and integration, are expensive, usually more than 200 thousand U.S. dollars, and. Multi-port routers usually have a custom ASIC (application specific integrated circuit) and techniques to deal with enterprise business needs. These ASIC that can handle a large number of client-side loads, redundancy and load balancing. In this part of the equipment incorporates a higher safety standard (3DES) encryption and additional network protocols. Cisco VPN concentrator is a good example. And you may ask what the VPN concentrator is? Cisco VPN is based on wide-area network hardware is basically the company needs a large number of multiple connections. The VPN concentrator is on all over the Intranet or Internet connection and firewall routers work. The terminal (client devices) is sure to use the equipment and software is compatible with POP. These are more diversified and other Internet applications, enhanced and specialized gateway VPN router. Some terminals are complicated, and can be used as persistent organic pollutants equipment. Cisco, 3Com, Symantec, Linksys and other suppliers of equipment a combination of firewall, network address translation and VPN capabilities. Many of the hardware support and a web browser interface of the software, easy to use and hardware VPN client configuration.POP based equipment vendors and their product is described The commitment is to the VPN service provider for Internet business opportunities. They provide VPN services, remote access client types. The ISP basically is to provide you with a connection to let you different throughput. Several companies are providing facilities to set up and VPN connections VPN is to become a professional services and enterprise options, which is not earlier than to provide them. Database server Database server supply the server side of client server applications, and often the data That goes along with them to network clients. A database server, for instance, not only supplies query-processing and data-analysis functions, but also acts as a repository for the huge amounts of data often stored in a database. Application server differ from basic file and print servers by providing processing services as well as handling requests for file or print services. In file and print services, the client does its own file handling and print processing. Generally, clients must run specialized client-side applications (or plug-ins to other applications) to communicate with an application server. For these applications, typically the client side formulates requests and ships them to the application server, which handles the entire requests background recessing and those delivers the results back to the client side. The client side then formats and displays these results to the user. Micro soft SQL Server delivers complex client/server application support that run-on Windows Server 2000/2003, Net Ware, and many flavors of UNIX, including Linux. A popular public-license database server called MySQL is available for most versions of Windows, Linux, and NetWare, among other operating systems. Firewall A firewall provides a strong barrier between your private network and the Internet. You can set firewalls to restrict the number of open ports, what types of packets are passed through and which protocols are allowed through. Some VPN products, such as Ciscos 1700routers, can be upgraded to include firewall capabilities by running the appropriate Cisco IOS on them. You should already have a good firewall in place before you implement a VPN, but a firewall can also be used to terminate the VPN sessions. VPN Tunnel VPN Tunneling is a network technology that encapsulates packets at the same level or below. One type of packet is encapsulated within the datagram (packet in TCP/IP or UDP containing source and destination address) of a different protocol. Since multiple protocols are pushed through a given network it is said to tunnel. Multiple Protocols that support encryption and authentication make up a Virtual Private Network. Tunneling is used to transport a network protocol through a network; which it normally does not support. A VPN tunnel software has a management protocol that creates maintains and terminates a tunnel. After the VPN tunnel is established data can be sent. How does tunneling work? A client or server uses the data transfer protocol to prepare the data transfer. Data is transferred through the VPN tunnel using a datagram based protocol. When a tunnel session is created both end points must agree to various parameters such as address assignment, encryption or compression parameters. PPTP-Point to point tunneling protocol/L2TP-Layer 2 Tunneling protocol encapsulates private network traffic in packets to be transmitted over public networks (TCP/IP). The tunnel thus does three things It creates and maintains a virtual link. Encrypts and decrypts data to reduce snooping by others It guarantees the authenticity of the sender and receiver ISP An ISP (Internet Service Provider) is a personal and other companys access to the Internet and other related services, including web site construction, the virtual host. Internet service providers have access to equipment and communication lines must have is that on the Internet there are the geographical regional services. The larger Internet service providers have their own high-speed, so they are less dependent on the telecommunication providers that can provide better services to their customers. One of the biggest national and regional Internet service provider AT T World Net, IBMs global network, microwave communication Netcom, UUNET companies, and PSINet. Internet service providers also include regional providers such as New England and San Francisco Bay Area NEARNet Barnet. They also include thousands of local suppliers. In addition, Internet users can access through online service providers (OSP), such as America Online and CompuServe. The larger Internet service providers to connect with each other through business associations, etc. (ISP exchange of MCI Communications Corporation Operations Center) or a similar center. That to make arrangements for the exchange of traffic is known as right and other agreements. There are several very comprehensive lists of suppliers world-wide on the web. Internet service providers are sometimes referred to as an IAP (Internet access provider). ISP is sometimes used as independent service providers differentiate service providers abbreviation is an independent, separate company from the telephone company. ADSL Asymmetric Digital Subscriber Line (ADSL) a digital telecommunication technology that uses different speeds for downloading and uploading data. ADSL is ideal for home internet users because the bulk of traffic in this connection travels in the download direction. VPN- Virtual private Networking Virtual Network (VPN) of the private networks are used more and more since 1997, allows businesses to connect a separate local area network (LAN), and the establishment of wide area network (WAN), created with suppliers, or to provide secure remote access to extranet. A VPN is secure, with two or more private communications equipment in the tunnel over public networks (such as the Internet). These VPN devices can be VPN software running on the computer or special equipment, such as a VPN-capable router. It makes your home computer to connect to your office network or allow in different places, two home computers connected to each via the Internet. Even if the VPN, the data on the Internet as a public network transmission, it is safe, because the strong encryption. If someone listening to the VPN communications, they will not understand, because all data is encrypted. In addition, virtual private network is very complicated method of monitoring to ensure that will never change, while data transmitted through the public network packet traffic. Data encryption and authentication are very CPU-intensive. Clients and Servers VPN server is a hardware or software, can act as a gateway for the whole network or a computer. It is generally forever and VPN client to connect to listen to it. VPN client is the most common form of software, but can also be hardware. The client to start a please to the server and logs. Then, the client computer can communicate with the servers network. They are in the same virtual network. Many broadband routers from your LAN can pass in one or more of the VPN session to Internet. Each router to deal with this difference. VPN Software Virtual Private Network server software is rare. This level of Windows Server operating system Windows 2000 Servers there VPN server built in, I know that if there is no software products for the home or small business, so you can create a VPN server price. VPNs client-side software more common. When your computer loads, the software allows you to create a secure VPN tunnel across the Internet and in accordance with VPN server in front of another network. VPN Languages There are two languages or agreement, VPN statement. Microsoft to use PPTP or Point to Point Tunneling Protocol ** and most other people use IPSec Internet Protocol Security. Most broadband routers can forward the PPTP port 1723 IPSec traffic, but more complex. If you do not explicitly support the IPSec router through, then even if you will be in the demilitarized zone of the computer may not work correctly. PPTP has a good encryption and also has a certification, in order to verify the user name and password. IPSec encryption is a simple model is more secure, but does not include the verification process. The third standard, L2TP, and IPSec authentication and built-in. VPN Hardware (Routers with VPN Servers) Until recently, VPN servers hardware is very expensive. As home networks become more complex, the family-level VPN increases in demand. As of the end of 2001, home networking industry in response to adding some broadband routers, VPN servers. These products are often priced less than 300 dollars (us), some 170 U.S. dollars as cheap. VPN functionality is very processor-intensive and in most broadband routers is a bit slow, their processors. Broadband Router VPN server is often limited because they are the throughput of the microprocessor. Most of around 0.6 Mbps or 600Kbps maximum VPN throughput. SUBJECT: Network Security What is an ISP (Internet Service Provider)? An ISP (Internet Service Provider) is a personal and other companys access to the Internet and other related services, including web site construction, the virtual host. Internet service providers have access to equipment and communication lines must have is that on the Internet there is the geographical regional service. The larger Internet service providers have their own high-speed, so they are less dependent on the telecommunication providers that can provide better services to their customers. One of the biggest national and regional Internet service provider AT T World Net, IBMs global network, microwave communication Netcom, UUNET companies, and PSINet. Internet service providers also include regional providers such as New England and San Francisco Bay Area NEARNet Barnet. They also include thousands of local suppliers. In addition, Internet users can access through online service providers (OSP), such as America Online and CompuServe. The larger Internet service providers to connect with each other through business associations, etc. (ISP exchange of MCI Communications Corporation Operations Center) or a similar center. That to make arrangements for the exchange of traffic is known as right and other agreements. There are several very comprehensive lists of suppliers world-wide on the web. Internet service providers are sometimes referred to as an IAP (Internet access provider). ISP is sometimes used as independent service providers differentiate service providers abbreviation is an independent, separate company from the telephone company. The easiest way to find and determine whether youre ISP offers free service. Provide a list of all of the following services / are supported by this agreement. Other services and support, which implied that what is outlined in this document, or will be available outside. Hardware configuration of four (4) in / out of the Institutional Revolutionary Partys bimodal high density polyethylene device tree. 3000 DID Number 4 (4) provided through the trunk In the elevator 50 3 911 location of phone service and blue light Update PS / Ali University Police Department (UPDs) 53 (53) for the 911 emergency number 100 megabit Internet service provider (ISP) network of tunnels, residential buildings and related businesses. Burst speed, 200 megabits. Campus Connection from home village, but remain behind the firewall university campus in the village of optical fiber is placed in a dedicated run from ISP Description of services Hardware one (4) equipment telephone campus between is carrier (SBC) inbound village with / outbound PRI is circuit four providing possible configurations one. This apparatus west Joe 1.2 providing connections to villages campuses only Hall. University Computing and Communications (UCAT) Private Switch / Automatic Location Identification (the PS / ALI) of the 50 UPD (53) in an emergency to a permanent position is in an elevator, blue light emergency position Install the update information to maintain a record of three. These locations, emergency housing, permanent change, except that the UPD is not specified in the indicated location. Update, update on a quarterly basis, special UPD have been determined to be an emergency and to move the location of existing / additional / must be changed. UCAT 2, the bank is delivered through four PRI trunks; Joe West for 1.2 to provide a number of distributions in the hole, the user MPOE, and 3000 DID exit the housing delivery staff. ISP service provides a maximum of 200MB. IP address space 130.65.210 130.65.218 (existing 9 networks) 130.65.240 130.65.251 (12 total new network) will be assigned. 130.65.252 will be reserved for the expansion of the network. Network 130.65.168.0/130.65.209.0 24 range /24 will be retained to provide continuity of existing housing in the range of business services. The end of the campus core router to connect universities outside the firewall housing. Free access to the ISP, to provide a new Internet. Kyanpasufaiauoru connection at both ends within the housing management. ISP, the university does not guarantee a connection to secure a place on the network connection. Including the placement of a separate document of guidelines to met end user needs to be done by the university to provide access to housing. Differentiated levels of service are; Improved profitability: EUnet service differentiation, which is expected to gain new customers. Expanding on the same network, and was hoping to be able to support subscribers yet Call center, processing, without adding additional staff to the customer, infrastructure, service requests. In order to improve the overall customer experience: Experience can be optimized for each user. Also includes the online network, allowing users to easily service requirements, the necessary. Take advantage of the configuration file to change the tariffs and services, the time limit for road Promotional offers, providing feedback to marketing and support team. To provide testing services for customers in the future: Customers can EUnet core competitor; the company is expected to test a broadband connection to attract new users. In the integration of existing back-office systems: It also requires management costs. Location information and billing system integration solutions. Cost of Repair Service Fee for all non-covered mobile / Add / Change / Maintenance Services $ 72.00 per hour. Conclusion Diplomatic Conference on the rights and the ISP are not responsible for copyright, a clear layout, the user can access or use. The Council shall be seven, if you want to delete to delete the language to create a great ambiguity of the mechanism of the above, the supplier of the authors rights have been violated to use. Providers have agreed to communicate, To provide communications facilities, an important victory in the amount of understanding of ourselves. Berne Protocol and the liabilities of the actual situation of the access provider, we recommend that if you have a limited understanding of the best ISP can be to give priority to the rights of authors of the historical limitations. The many emerging complexities of the National Assembly and the courts to re-appear in the session. Can easily be subject to legal restrictions, and no one way transmitted over the Internet. ISP to be able to access a Web page to provide, post, email, chat rooms and use, to provide users with an interactive environment for the evolution of the host. Internet service providers user equipment supply network, providing a wide range of applications. In order to promote the role of ISP in a variety of applications depends on the application, user and ISP. All forms can be copied to the authors, vendors do not have to establish a limited liability, fundamental rights, expand the blanket could change the Internet. Some in Hollywood in the 21st Century Theater to the ISP, you can view all of charging an entrance fee. But it is to understand us; this is death and Internet experience. Compromise, the U.S. House of Representatives in May, was established in 1996, it is intolerable for the ISP d oes not cause the debt, and you can prove that the right words in order to protect the copyright owner. In the ISP, balanced international agreements, contribute to the formation of the ISP space legislation process rights and responsibilities of the National Assembly. Now, ISP is time to start working at the national level, legislation like that. Trojan horse A program or utility, it seems to be false, such as the screen saver or a useful tool. However, once installed, it is in the background, such as allowing other users access to your computer or from your computer send information to another computers functionality. Whats a Trojan horse virus? A is a Trojan horse virus; e-mail attachments are usually released. If the user opens, will scour any personal and financial information on your hard drive, such as your social security, account and password. Once you have the information collection, sent to a thiefs database. There are several different types of Trojan horses. These include: Remote Access Trojans (RAT), backdoor Trojans (backdoors), IRC Trojan (IRCbots) Trojan horses and key loggers. Many Trojan horses, including many types. For example, a Trojan can be to install key loggers and backdoors. Stadium will be combined with a backdoor Trojan horse and RAT is usually created by zombie networks are a collection of infected computers. Protection from Trojan Horses Most Trojans are transmitted through the Internet services, including e-mail, web site online, file-sharing systems, and instant messages. Therefore, any computer connected to the Internet is running the risk of a Trojan horse virus. Avoid open to all executable (. Exe) file will be a definite fire way to avoid being a Trojan horse virus. Unfortunately, the executable file is essential to run the program and the majority of computer users can not simply avoid all. Exe file. For from the Trojans and other malicious software, there are potentially dangerous executable files protection should scan anti-virus software. As its name implies, a Trojan horse can be sneaky, users usually, unknowingly download a malicious Trojan horse. When this happens, anti-virus software can detect and remove these Trojans attempt to launch an unsuspecting users computer viruses, worms and other malicious software. Top anti-virus solutions include: McAfee software, Norton Software, Computer Associates and AVG. Recovering from a Trojan horse or Virus Michael Durkota and Will Dormann it can happen to anyone. Taking into account viruses and Trojan horses on the Internet at any time traversing the huge number, but surprisingly this will not happen to everyone. May decide later you can do to better protect them, but this does not help your current predicament you. Once you know your computer to install a Trojan horse or virus infection (or if your machine to show unexpected behavior, you suspect something is wrong), how do you do? If you have any specific malicious programs from infecting your computer, you can visit a number of anti-virus Web sites, download removal tool. Opportunities, but you cannot determine the specific procedures. Unfortunately, your other choice is limited, but the following steps can help save your computer and documents. Call IT support if you have an IT support department at your disposal, immediately notify them and in accordance with their instructions. Disconnected depending on the Trojan or virus on your computer you enter the Internet, intruders can access your personal information and could even use your computer to attack other computers. You can turn off your Internet connection to stop this activity. The best way to do this is to physically disconnect your cable or telephone lines, but you can also simply disable your network connection. Backup at this point is a good idea to take the time to back up files of important documents. If possible, compile your photos, documents, Internet Favorites, and all other, and burn them to CD or DVD, or save them to the other external storage devices. This is very important to note that these files cannot be trusted because they are still likely to be infected. (In fact, this is a good practice on a regular basis the backup files, so that if they are infected, you might have a non-infected setting can be resumed.) Scan your machine because your computer (including the operating system) may be infected with malicious programs, it is the most secure scanning live CD (or rescue of the CD, rather than the previously installed anti-virus program) machine. Many anti-virus products offer this functionality. Another method is to use Web-based virus removal services, a number of anti-virus software vendors (and try to online virus scan search). Or you could just try to Microsofts Web-based microprocessor-based protection scan. The next best course of action is the installation of an uncontaminated source, such as the CD ROM on the anti-virus program. If you do not have one, there are many to choose from, but they should provide the necessary tools. After you install the software, complete scan of your computer. The initial scan is expected to identify malicious one (group). Ideally, anti-virus program, even willing to remove from the computer of malicious files, according to your suggestions or instru ctions. If the success of anti-virus software to locate and delete the malicious file be sure to follow the steps 7, preventive measures to prevent re-infection. If, unfortunately, anti-virus software cannot find or remove malicious programs, you must follow the steps 5 and 6. If the previous steps to re-install fail to clean your computer, the most effective option is to eliminate the operating system or format the hard disk and reinstall the operating system. Although this corrective action will also lead to all programs and documents the loss, it is the only way to ensure that your computer is free from backdoors and intruder changes. Many computer makers offer a rescue partition or disk (twist), will make plant recovery system. Check your computers user manual to determine whether one of them is how to provide and run it. Prior to re-install, so that all programs and settings of your statement, so that you can return your computer to its original state. It is vital that you re-install anti-virus software and applying any patches may be available. Consultation , and then connect a new computer for further assistance, the Internet. Restore your files if you have a backup in step 3, you can now restore your files. Pre-placed in the files in the directory on your computer, you should scan their anti-virus software checks for known viruses. Protect your computer. In order to prevent future infections, you should take the following measures: Do not open unsolicited e-mail attachments. à ¢Ã¢â€š ¬Ã‚ ¢ Do not follow unsolicited links. à ¢Ã¢â€š ¬Ã‚ ¢ Maintain updated anti-virus software. à ¢Ã¢â€š ¬Ã‚ ¢ Use Internet firewalls. à ¢Ã¢â€š ¬Ã‚ ¢ Secure web browser. à ¢Ã¢â€š ¬Ã‚ ¢ Keep your system patched. Worm First developed by Xerox Palo Alto Research Center, John Shock and Jon Hepp in 1978, the worm is a destructive software program containing the code to a computer or network access to a computer or network capacity, and once the root causes of a computer or network hazards, delete, modify, distribute, or otherwise manipulate the data. To write more than a short time, the worm is a disc type, can be written, and then read the time. See CD-ROM ? for more information. Who recently installed an updated version of a program, or re-install a procedure that requires Internet access may experience with Symantecs Norton antivirus software, the users problems, constantly opening up, asked whether the Internet should be allowed or blocked. This issue occurs because Norton increase the competence in the same program multiple instances. To resolve this problem, follow these steps. Right-Norton in the task bar, then click on the icon click Norton Anti-virus option Option-click the Norton Antivirus Internet Worm Protection. Next, click Program Control Find the control program in the program, leading to your problem, highlighting the program, and remove from the list, click OK to any other copies. When you are prompted to re-allow the program to allow or deny the program, you should not be prompted. Virus A software program, first written in 1982, who was 15-year-old high school student Rich Skrenta, Known as the elk cloned spread of this virus to monitor the floppy disk drive and copies itself to any floppy disk is inserted into the computer in the other computers. Once they are infected can infect all floppy disks inserted into each infected per infected floppy disk and then inserted into the computer on other computers. One is infected will also be displayed in the first 50 to start the computer for each poem. Fred Cohen in 1983, created in 1984 after the research paper of the term virus as a computer program, you can influence by modifying the way, but other computer programs, to include a (possibly evolved) copy of itself. Today, the computer virus is a software program, script or macro is designed to be infected, destroy, modify, or cause the computer or software programs other issues. Users can protect themselves and remove any viruses on your computer by installing anti-virus protection program, which aims to detect, protect and remove any computer viruses. List of Virus Antivirus, Boot sector virus, CMOS virus, Companion virus, Executable virus, Hoax, Intruder, Logic bomb, Macro virus, MBR virus, Multipart virus, Nonresident virus, Overwrite virus, Polymorphic virus, Resident virus, Stealth virus, Trojan horse, Vaccine, Security definitions, Worm. 3.2) Network security policy for companies Data protection framework, backup programs, virus protection, policy, and disaster recovery. Auditing policies, explained the safety requirements, or violations, verification, consequences of the act way. Access policy, specifying how and when to allow users to access network resources. Policy should be that there are two on-site and remote accesses the network. Internet use policies, explain what right or inappropriate Internet resources is. Certification policy, describes how to identify their users to access network resources. Login name, password and authentication methods should be described in the Convention. acceptable use policy, to explain what is the purpose of network resources can be used Privacy Policy describes the employees, customers and business partners can be expected that the monitoring and reporting network. REFERENCE https://www.redhat.com/rhel/desktop/ https://www.h-online.com/open/features/What-s-new-in-Ubuntu-9-10-846772.html https://tech.blorge.com/Structure:%20/2007/07/04/dell-cuts-price-of-ubuntu-linux-pcs/ https://www.vpntools.com/vpntools_articles/vpn-software.htm https://www.banquecentrale.gov.sy/about/VPN-eg.htm https://www.ip-adress.com/isp/ https://www.computerhope.com/jargon/t/trojhors.htm https://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm https://articles.winferno.com/antivirus/trojan-horse/ https://www.us-cert.gov/reading_room/trojan-recovery.pdf https://www.computerhope.com/jargon/t/trojhors.htm https://www.computerhope.com/issues/ch000656.htm https://www.computerhope.com/jargon/v/virus.htm

Wednesday, January 1, 2020

Satire in A Modest Proposal by Jonathan Swift - 745 Words

You can’t make fun of what isn’t real. When considering what lines can be crossed with satire, many people are most sensitive about protecting feelings; the common consensus seems to be that satirists should not overstep their boundaries by addressing touchy subjects and making fun of sensitive issues. While breaking hearts may not garner positive responses, it is important to understand that as a medium, satire is meant to offend one’s sensibilities. It serves as a platform to spark discussion through scathing and insolent hyperbole. It assumes that whatever outrageous portrayals are published push the reader towards enlightenment with their severity. So, when does satire cross the line? Satirical writing uses humor and rhetoric to bring†¦show more content†¦Had Swift written an academic paper of policy recommendations, no one would have bothered to read that boring, but politically correct, piece of writing. Using this severe yet effective technique we call satire, Swift was able to make an impact. His included just enough of the outrageous factor so that people of Swift’s time would not be pitch-forking his porch, but rather trying to absorb his insights. Not only is the success of the piece due to its humor, but it is also solid because it is rooted in truth. Had Swift gotten carried away, and made accusations of Irish society that barely exist, he would not have connected with his audience. His readers may have accepted his work, but its meaning would have been lost on them; they would not have been able to grasp exaggeratory humor if they could not find its basis. This, therefore, would have invalidated his pi ece, and it would have failed to fulfill the purpose of satire. However, because Swift focused on satirizing common realities that were relatable and indisputably true, â€Å"A Modest Proposal† resonated with the Irish community of the time. In modern times, popular satire seems to be about more trivial subject matter, but is nevertheless just as effective as works of Swift’s time. We can make fun of John McCain’s age, Bill Clinton’s love for women, and Hillary’s pantsuits; such jokes have appeared on magazine covers countless times. However, when it comes toShow MoreRelatedUsing Satire in A Modest Proposal† by Jonathan Swift760 Words   |  4 Pagesâ€Å"A Modest Proposal† by Jonathan Swift, is an essay that uses satire. Merriam-Webster defines satire as: a way of using humor to show that someone or something is foolish, weak, bad, etc.: humor that shows the weaknesses or bad qualities of a person, government, society, etc. â€Å"Satire may make the reader laugh at, or feel disgust for, the person or thing satirized. Impishly or sardonically, it criticizes someone or something, using wit and clever wording—and sometimes makes outrageous assertions orRead MoreJuvenelian S atire in A Modest Proposal by Jonathan Swift Essay1052 Words   |  5 Pagesgrievances or concerns can fall upon deaf ears and change can be slow or non-existent. However, Jonathan Swift in his pamphlet A Modest Proposal, uses clever, targeted, and ironic criticism to bring the social state of Ireland to the attention of indolent aristocrats. He accomplishes such criticism through satire, specifically Juvenalian satire. Swift’s A Modest Proposal stands as an example of the type of satire that plays upon the audience’s emotion by creating anger concerning the indifference of theRead More Satire and the Deployment of Irony in A Modest Proposal by Jonathan Swift2769 Words   |  12 PagesSatire and the Deployment of Irony in A Modest Proposal by Jonathan Swift Therefore let no man talk to me of other expedients: of taxing our absentees at 5s. a pound: of using neither clothes, nor household furniture, except what is of our own growth and manufacture: of utterly rejecting the materials and instruments that promote foreign luxury: of curing the expensiveness of pride, vanity, idleness, and gaming in our women: of introducing a vein of parsimony, prudence and temperance: ofRead MoreExploring the Concept of Satire in A Modest Proposal by Jonathan Swift, and Top of the Food Chain by T. Coraghessan Boyle781 Words   |  3 Pagesâ€Å"A Modest Proposal† by Jonathan Swift, and â€Å"Top of the Food Chain† by T. Coraghessan Boyle, both are short stories that explore the concept of satire. Satire can be defined as a kind of writing that ridicules human weakness, vice, of folly in order to bring about social reform. It is a kind of writing to bring about change to society. Even though both are short stories, they easily get the fa ults of society across to its readers. In â€Å"A Modest Proposal,† Swift is offering an outrageous solutionRead MoreAnalysis of A Modest Proposal873 Words   |  4 Pages Jonathan Swift, the writer of the satirical essay A Modest Proposal, grew up and lived in Ireland during times of famine and economic struggles (Conditions). Growing up with a single mother and no father, Swift knew what hard times and struggles were like (Jonathan Swift: Biography). His essay proposes an easy solution to the economic problems going on in Ireland for both the wealthy ruling classes and the poorer classes, although his intentions and the meaning behind his words are not what wouldRead More Self Representation and the Self-Defeating Speaker in Jonathan Swift1735 Words   |  7 PagesBecause Swift constructs a speaker who is meant to be seen as himself in â€Å"Verses on the Death of Dr. Swift, D.S.P.D.†, his approach to the satire changes, taking on a more playful approach. The poem is more personal than political, and is more comedic in the sense that he satirizing himself as well as other people groups. The self-defeating rhetorical approach is embodied in this poem in the way that he puts himself down and exposes his own follies throughout the poem. While this is no doubt somewhatRead MoreA Modest Proposal For Preventing The Children Of Poor People1458 Words   |  6 PagesSatire is a method used by multitudes of authors and other artists for a plethora of different reasons. The ways that this method of literature is used is varied, and it is always interesting and somewhat difficult to find out exactly why these texts are written. A specific author who is known for utilizing satire in his works of literature is Jonathan Swift, whose hard-hitting essay â€Å"A Modest Proposal For Preventing the Children of Poor People in Ireland, from Being a Burden on Their Parents orRead MoreEssay on A Modest Proposal: Satire at Its Best643 Words   |  3 PagesA Modest Proposal: Satire at Its Best Jonathan Swifts 1729 essay, A Modest Proposal, was a true example of satire at its best. Many readers at the time rejected the essay because they failed to understand the irony. It is presently one of the most well known works of satire and is a classic example of the technique most commonly used today. The entire essay from the title down to the last sentence were meant to be taken ironically, which is a rare form, but very effective when trying gettingRead MoreA Modest Proposal1096 Words   |  5 PagesAssignment 1: Swift’s â€Å"A Modest Proposal† Dr. Anthony McCormack Strayer University World Culture II Gladys A. Reyes July 25, 2015 In the satire â€Å"A Modest Proposal’, Jonathan Swift expresses his feelings of frustration with regard to the aggravation and political issues in Ireland. He describes being frustrated with the indifference of Ireland politicians, the wealthy, the English tyranny, and the degradation and poor conditions in which many poor, Irish women and children have been forcedRead MoreLiterary Analysis : Jonathan Swift1425 Words   |  6 PagesComp. II Oct. 27, 2015 Literary analysis The author I decided to write about is Jonathan Swift for he had a keen sense for effective sarcasm. As Jonathan Swift said â€Å"The proper words in the proper places are the true definition of style.† Though he was known in different ways, he was mostly popularized through his gift in writing, particularly his satire, or his use of humor and irony, essays. Through out swift life, there has been plenty of events where I believe shape the way he was, hence his