Wednesday, July 31, 2019

Classification of Friends Essay

EEAnyone who has spent time with friends will notice that each one has a special personality all of their own. Friends, have different traits that make up their personalities. A sense of humor, great advice, and honesty are all things that come to mind when you think about a friend. Friends are important to have because they are a backbone when things get tough in life and are always there to love and support. However, anyone who has spent time with friends will notice that each one has a special personality with respect to their honesty, loyalty, and care. There are three major types of friends, which are acquaintances, social friends, and best friends. The first type of friend is simply an acquaintance. This means that you basically only know their name. Not even remembering what they look like. You usually meet these type of friends in school, at work, on the bus, in the gym, or anywhere else you might be. You normally would not mind having a cup of coffee with them, but if anything else came up, you would have no problem parting company. We see many people in the work. Sometimes we speak them compulsorily and we don’t remember even their face. While we are on the bus, we come across some people who get on the bus regulars like us. Therefore we call them as an acquaintance. Someone you know socially or through the business world would be called an acquaintance if you don’t know them well personally. An acquaintance can remain a personal or business contact for you or can become a friend at some point. It depends on the relationship and the people involved. You may have some acquaintances you see over and over throughout your life that you never really get to know. However, they are still good people to know because they can connect you to potential friends. This group includes people who one talks to out of awkward obligation. Observed in their natural habitats of classrooms, bus seats, and the general public acquaintances are random encounters. A person often speaks to this species out of necessity, loneliness, or boredom. For instance, when a person is alone in the bus station with nothing to do, they see a person reading a magazine and decide to make conversation about that magazine. This is not done to bother the other person, and usually both people don’t care but it’s a tool to make a person feel less alone. This  sect of friends does not evolve past a rand om encounter or conversation. Acquaintances include people who one exploits for their own personal gain. The second category of friends is a social partner. One you often meet at social occasions, or one who may accompany you to social gatherings, but with whom you don’t have a personal relationship. This is because they are closer than acquaintances, but nowhere near as close as a true friend. Social partners are usually acquaintances who evolve into â€Å"guest friends† through increased extracurricular activities. You know their name, a little of what they like or dislike, a little of their family history, and usually have several things in common. As the saying goes, â€Å"Birds of a feather flock together,† so too the social partners have to have several things in common with you. No one is going to want to spend any more time than necessary with somebody completely opposite and aggravating to him. Social friends are closer than acquaintances, but nowhere near as close as a true friend. You know much more about each other than you would as mere acquaintances, but much less than if you were personal friends. The last type of friend is the â€Å"best friend.† Normally, you know them the longest and you probably grew up together as children. He or she knows everything about you. Likewise, you know everything about him or her. They are basically like family. You would have no problem if they spent the night at your house. You know each other’s habits and can always tell when there is something wrong. You would not hesitate to share your deepest feelings or thoughts with them. A best friend has no problem correcting you when you are wrong, or being stern with you when you are out of line. They will see you through when others see that you are through. He/she will always be there for you. They are not perfect, but at least they will always look out for you and never do anything intentionally to hurt you. They are there to find national solutions to the many unexpected problems that life presents for us. â€Å"Best friends† are very important to us, because we share with them something which are secrets things that have not be known by anybody. They are very generous people. For example, when we have not enough money, they lend us. When we fall into bad condition, they cheer us up. They support us. In conclusion; we always meet people and classify them in terms of their personalities. There are three types of friends. The first type of friends is simply an acquaintance. The second is the social friend. Finally the best friends. We will always encounter those types of friends in our lives. Every friend has a different type of character. Some friends are helpful while some friends are caring. No matter what traits they have as long as we interest and comfort each other. Friends caneither make or break us.

Tuesday, July 30, 2019

Kohlbergs Theory Essay

PSYCHOLOGY 112 Table of contents: * Introduction * Definition of Kohlberg’s Theory * Advantage in Kohlberg’s Theory * Disadvantage in Kohlberg’s Theory * Opinion * Recommendation Introduction Lawrence Kohlberg’s stages of moral development constitute an adaptation of a psychological theory originally conceived by the Swiss psychologist Jean Piaget. The theory holds that moral reasoning, the basis for ethical behavior, has six identifiable developmental stages, each more adequate at responding to moral dilemmas than its predecessor. Kohlberg determined that the process of moral development was principally concerned with justice, and that it continued throughout the individual’s lifetime, a notion that spawned dialogue on the philosophical implications of such research. For his studies, Kohlberg relied on stories such as the Heinz dilemma, and was interested in how individuals would justify their actions if placed in similar moral dilemmas. He then analyzed the form of moral reasoning displayed, rather than its conclusion, and classified it as belonging to one of six distinct stages Kohlberg’s six stages can be more generally grouped into three levels of two stages each: pre-conventional, conventional and post-conventional. Following Piaget’s constructivist requirements for a stage model, as described in his theory of cognitive development, it is extremely rare to regress in stages—to lose the use of higher stage abilities. Stages cannot be skipped; each provides a new and necessary perspective, more comprehensive and differentiated than its predecessors but integrated with them. Kohlberg’s Theory The stage of Moral Development/Moral Reasoning 1. Pre-conventional level 2. Conventional level 3. Post-conventional level ..Psychologist, studied the reasoning ability & recognizing where a child is at according to stages can help identify how child may feel about illness ,moral reasoning & cognitive stages of development. LEVEL| STAGE/YEARS| CHARACTERISTICS| Pre conventional| Stage 1(2 to 3 y/o)Stage 2(4 to 7 y/o)| Obedience and punishment orientation(How can I avoid punishment?) A child tell him the right thing because he was told to do so to avoid punishment.–Self-interest orientation(Paying for a benefit)Child caries out actions to satisfy his own needs rather than the society’s.The child does something for another if he gets something in return.| Conventional| Stage 3(7/10 y/o)Stage 4(10/12 y/o)| Interpersonal accord and conformity(The good boy/good girl attitude)A child follows rules because of a need to be good person in own eyes & in the eyes of the others†¦Authority and social-order maintaining orientation(Law and order morality)A child follows rules of authority figures as well as parents to keep the system working.| Post conventional| Stage 5(older than 12y/o)Stage 6(older than 12 y/o)| Social contract orientation(Utilitarian Law Making Perspective)A child follow standards of society for the good of people†¦Universal ethical principles(Principled conscience)A child follows internalized standards of conduct.| Advantages of the Kohlberg’s theory The ability to empirically test the individual for where they are in their moral development, along with offering a basic structure for creating â€Å"just communities† applicable both within and outside student affairs. Moreover, Kohlberg’s model offers insight as to why an individual may be seeking out justice based on what stage they are in. 2. Kohlberg’s theory essentially provides a roadmap for moral thinking that otherwise did not exist. 3. It inadvertently offers benchmarks for where one might be in their moral development based on their life situation. 4. Offering a structure for â€Å"just  communities.† It was Kohlberg’s hope that he would employ his theory to create communities that were collaborative, held each other accountable, and had philosophical and educational discussions to further both the individual and the group in their moral development (Kohlberg, 1971, 1972). It offers a venue for individuals to discuss a number of hypoth etical or moral dilemmas while simultaneously furthering development through cognitive dissonance. Disadvantages in Kohlberg’s theory Gender differences that affect moral reasoning; cultural differences in regards to the Western cultures versus the non-Western cultures; the model being a hard stage model; the focus of justice over care and finally the use of hypothetical decision making over real life dilemmas in the assessments. 2. Gender differences in moral reasoning. Carol Gilligan (1982/1983) was strongly opposed to Kohlberg’s model mainly on the basis of gender. As stated, Kohlberg originally based his theory on a study of young male individuals excluding women. Gilligan (1982/1983) argued that Kohlberg’s theory incorporated a gender bias directly into the theory as well as the assessment tools. Moreover, she argued Kohlberg ignored a women’s moral orientation to a response of care. Some studies have shown that looking at responses to the Rest’s Defining Issues Test (DIT) (Rest, 1986a) and Moral Judgment Interview (MJI) (Colby, et al, 1987), men tend to be more justice oriented and women more care oriented, and especially so when they take on the traditional gender roles (Rest, 1986b; Walker, 1984). This is concerning since Kohlberg’s theory is truly justice oriented. It may be more difficult to get an accurate answer about where a woman is in moral development in regards to Kohlberg’s stage model than a male. 3. Cultural and Religious. Religion can play a major factor in an individual’s personal and moral development. Both Rest (1986) and Dirks (1988) found that a number that religion was a factor in moral decision making. Rest (1986) found that those coming from a liberal perspective tended to score higher in moral development than others. Dirks (1988) found that those with an evangelical belief system are less likely to enter into the post conventional stage. In terms of cultural differences there is likely a difference in moral reasoning in Western cultures versus non Western cultures. The value systems  often differ vastly and as such may not be able to fit in to one particular stage in Kohlberg’s theory. Western cultures tend to be more indivi dualistic (Miller & Bersoff, 1992). While this problem may seem minute, the validity of a theory must be tested across gender and culture. In this regard, Kohlberg’s theory is not as applicable to other cultures because it is based off a values system that is very much Americanized. Ironically, a theory that seeks to promote universality is not as universal as it should be. Opinion Kohlberg’s Theory covers the moral development stages of an individual and I think this theory is a huge help for a person, especially those who have children. Kohlberg’s theory may serve as guide on how a parent would treat their child’s behaviour. Parents would understand why their child is behaving in such manner and they can make disciplinary action or decision on how to correct or improve unpleasant behaviour. And guide them in developing their sense of morality. And make them an honest and morally mature person. By knowing this theory we can also examine ourselves. Reflect and think of situation we encountered in our life and how we reacted to it. By doing so, we will know what level of morality we fit in. I think morality depends on a person’s point of view. We can only say it’s wrong if it’s against the law but the morality issue of the person really depends on what his conscience tell him. Recommendation Lawrence Kohlberg theory of Moral Development gives a detailed explanation on how a child develops morally. This theory is remarkable because we now have an overview about morality and we now have guidance if we are on the right track or not. We can now assess our level of morality. And we can now choose what level we want to be. Report by: Mr.Dennies Dela Cruz Ms.Iris Vi P.De Jesus BSC â€Å"Morality is the ability to see an issue from points of view other than just your own.† — Lawrence Kohlberg—

Measuring Crime Essay

There are two different instruments used in reporting crime. There are also major crimes reporting program used in the United States. These major crime reporting programs do have a purpose and does give statistical information on crime in the United States. There are a difference between crime rates, arrest rates, clearance rates, and recidivism rates. The information reported about crime rates can be misleading and give inaccurate information about the crime rate in the United States. Crime and recidivism statistics can both give some important about crime in the United States. Instruments used to measure crime There are different ways that crime is reported in the United States. The media reports crime and influence society perception of crime (Schmalleger, 2011). This sometimes causes public opinion on crime unrealistic (Schmalleger, 2011). Statistic data provides a better view on the amount of crime occurring than what is reported by the news media. The statistic reports are not as accurate as society would want, but it still gives a better understanding of the amount of crimes, types of crimes and also the frequency of those crimes than the news media. People who are the victims of a crime are the ones who report the crime and allow the crimes to be placed in a crime database (Schmalleger, 2011). Major crime reporting programs The Uniform Crime Reporting (UCR) and the National Crime Victimization Survey (NCVS) are the two major reporting of crime programs used in reporting crime in the United States (Schmalleger, 2011). Crime is computed by adding the major crimes reported to the police. The police report these crimes to the F.B.I who publishes the findings in the UCR. The UCR provides an annual report of incidents and rate of the reported crime that occurs throughout the United States (Schmalleger, 2011). The UCR program created a crime index to create a comparison over time. The index contains seven major offenses. These offenses are robbery, murder, forcible rape, aggravated assault, burglary, larceny, and motor vehicle theft gives the result of crime based on the population (Schmalleger, 2011). The UCR also reports victimless crimes to the F.B.I. The NCVS is designed to report an estimate occurrence of all crimes in the United States (Schmalleger, 2011). The NCVS shows the amount of different victimized crimes not reported to the law enforcement. NCVS provides information about crimes collected from individuals and households, who have suffered from crimes whether the crimes have been reported or not to authorities (Schmalleger, 2011). Both UCR and NCVS serve the same purpose. This purpose is to report and keep track of the crime reported in the United States each year to law enforcement agencies (Schmalleger, 2011). It is a way of keeping crime statistics so law enforcement agencies can develop ways to manage crime in different areas. These reports also provide the areas where crime rates are higher than other and what type of crimes are high in a certain area. Crime rates, arrest rates, clearance rates, and recidivism rates Crime rates and arrest rates are difficult for a law enforcement agency to produce to the high volume of calls received. Some examples of calls that do not require an arrest include lost pets, individuals needing medical assistance, and noise complaints. Each agency must make an organized effort to make contact with the individuals making the calls with high and low priority due to the unseen or unreported information at the caller’s location. The law enforcement community has also created an organization devoted to crime reports known as the Police Executive Research Forum (PERF) data is based on law enforcement agencies (Schmalleger, F. 2011, p. 3). Clearance rates are defined as cases that have been solved. Many times if an arrest was made then the case has been cleared. Some case are never cleared one example, if an offender commits a murder and he or she is found dead or flees the country before an arrest is made the data does not go into the cleared category. Recidivism rates are directly related to the quality of life after an offender is released from prison. Many offenders repeat crime related offenses due to the addiction of drugs. At times serious pathological offenders create a threat to the community therefore recidivism rates are often used in determining the punishment required for the offender. Myth v. Reality Crime rates can be deceiving according to information form (Criminal Justice Video, 2013). Crime rates are based on different factors including the type of crime, the type of offender, also the place a crime is committed. In late 1990’s property crimes had decreased, today property crimes are suspected to rise due to a slow economy. Another factor leading to the deception of crime rates is based on the type of offender; including the increase of juvenile crime. Also affecting the crime rate according to Criminal Justice Video, (2013) are change in policies and mandatory laws that take effect. Crime rates relate to arrest rates in the fact that both are based on the unit of the population; per 100,000 of the population, Schmalleger, F. (2011). The crime index is a tool used to determine the amount of crime in an area; the index is effective however, it does not provide accurate numbers of crime committed. Updated Uniform Crime Reporting, (UCR) programs can help support the number of crimes committed also helps determine the types of crime. One solution for correlation between crime rates, arrest rates, and clearance rates can be to keep data updated. Updated data is the reporting of all arrests, and criminal behaviors also dropped charges. If data is continually up dated a system can be used to compare information on specific crimes helping to determine different aspects of crimes and arrests. Crime and recidivism statistics Crime rates did increased since the early 1970’s in many major states as the baby boomers became young adults. Most crime are being committed by today’s young males because of the higher population, the best way to eliminate crime is the eliminate poverty, because poverty breeds crime. Crime is very high in African –Americans due to they are unemployed or being a single parent and doing what he/she has to do to survive or provide for their families. The crimes that are committed by the young adults may have been seen as a child while they were growing up or maybe that is what they were taught to do. It is estimated that sociopaths who are prone to commit crimes, because they are incapable of feeling remorse or empathize with other’s pain, comprise about 3-4% of the male population, and between 33% and 80% of chronic criminals offenders. Some females may shoplift to support their drug habit, and this means that everyone is a victim especially their family members. Conclusion Although there may be changes of crime statistics but not changes in the crime rate, crime can be measured in numerous ways because of all of the numerous ways crime can be measured. The National Crime Victimization Survey and Uniform Crime Reports are both reliable systems but still leave the â€Å"dark figure of crime† because of the crimes that go unreported. Reference Criminal Justice Video, (2013). Myth v. Reality. Pearson Custom Publishing Retrieved from: http://media.pearsoncmg.com/pcp/pcp_94869_mutchnick_cj_uop/chapter1/ch1_mvr/index.html Schmalleger, F. (2011). Criminal justice today: An introductory text for the 21st century (11th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.

Monday, July 29, 2019

4.The paradox of adolescence is that it can be at once a time of storm Essay

4.The paradox of adolescence is that it can be at once a time of storm and stress and a time of exuberant growth (Arnett, 1999). Discuss - Essay Example Traditionally society marked the signs of puberty in an individual as the mark of his or her passing into adulthood. As Shakespeare remarks in his very famous drama ‘As You Like It’, Here we find according to traditional norms Shakespeare moving from childhood directly to that of ‘the lover’ or adulthood. There is no mention of adolescence in his ballad, as this during those days this phase in the life in an individual was not given much importance. However, this very age group has now turned into a major subject of study, owing to the number of arising problems seen in individuals belonging to this age group. The importance attached to the study of adolescents, some historians propose, is a very recent invention of the late nineteenth century. As Kett (2003) remarked â€Å"adolescence†¦essentially a conception of behavior imposed on youth, rather than an empirical assessment of the way in which young people actually behaved. The architects of adolescence used biology and psychology†¦to justify the promotion among young people of norms of behavior that were freighted with middle class values† (cited in Liechty, 2003). However, moder n day psychologists lay a lot of stress on these formative years and counsel for a proper upbringing, filled with love and care, so that the growing child is able to balance the â€Å"storm and stress† as suggested by Hall (1904), going on inside his mind and body. It is true that not all adolescents have psychological problems with the sudden changes that take charge of their mind and body. On the other hand it is also true, that this ‘storm and stress’ is seen more in adolescence than in any other age groups. This article will delve into the mind frames of adolescents and try to explore how some individuals handle the changes well, while others fumble. It will also explain the theories that take on adolescence and give

Sunday, July 28, 2019

Written Landscapes PowerPoint Presentation Example | Topics and Well Written Essays - 250 words

Written Landscapes - PowerPoint Presentation Example The main issue to be addressed is the correlation between changes in landscape’s literary representations and the underlying cultural transformations of human civilizations. The importance of landscape in the ancient mythological narratives cannot be understated. This is because myths’ key concepts inherently relied on the association of specific sacral space with relevant landscape features such as mountains, seas, forests. In the Greek myths, Richard Buxton observes that the very depiction of the world’s creation in Hesiod is directly related to the emergence of landscapes necessary for all life to thrive. 1 By virtually abounds with references to sacred places that are conceptualized particular (and very much real) landscapes to be revered and visited Indian mythology is similar to the Greek mythology. In particular, sacred mountains like Himalaya and rivers such as Ganges played an instrumental role in the organization of Indian sacred landscape. Moreover, as one may see Similarly, the Near Eastern myths appear to reflect the preoccupation of ancient people with the connection between landscape and the sacred. The Epic of Gilgamesh is notable especially due to its emphasis on the notion of ‘cultivating’. The previously from the rich legacy of Indian epics, ancient Indians paid great attention to the connection between their landscapes and divine characters of their myths. 2 ‘Uncivilized’, or more precisely the ‘monstrous’ landscape by the divine or divinely inspired hero was not notable. The same motif can be found in the myths of Heracles and in his struggle against malevolent creatures of nature as well as in Beowulf, with this epic poem’s contrast between the bright palaces of human kings and dark marshes and deep seas, where the creatures of darkness dwell. 3 This contrast seems to be present in the number of other mythologies. In contrast to the epic poems and heroic myths on lyric poetry, the

Saturday, July 27, 2019

The Causes and Impact of the Mfecane in South Africa Essay

The Causes and Impact of the Mfecane in South Africa - Essay Example It is evidently clear from the discussion that Mfecane took place as a result of nation-building that was aggressively done by the Zulu lead by Shaka and the Ndebele of Mzilikazi. Mfecane is sometimes referred to as the war of wondering and it accompanied the rise of the Zulu people. The war was highly concentrated at Drakensberg Mountains, along the river Limpopo, and between the Kalahari Desert. This paper illustrates that there were geographical barriers that made people unable to expand towards the west-eastern part, contributing to a rise in population hence people engaged in war in order to secure land. Indian Ocean waters and the Drakensberg Mountains were the key geographical features that complicated the lives of people living in this region. Mfecane was caused by the war between the tribes of Mthethwa and Ndwandwe who were expanding their territories at the expenses of their neighbors who were weak. These led to warfare that became frequent and severe as people fought for l and. The increased inequality that was witnessed between communities and environmental crisis led to competition for natural resources and trade on South Africa leading to violent struggles for survival. There was a shortage of land and many people at that time migrated to that area because it was fertile and convenient for farming activities. The high population growth caused a lot of population pressure lead to various tribal expansions, which led to the emergence of unity amongst the Bantus that occupied that place. During the 18th century, there was the presence of the Portuguese at the east coast of Delagoa who participated in long-distance trade. There was a rise in the desire to control the trade amongst people who were in the region and as a result, the Nguni tribe launched attacks to other communities with an aim of controlling the trade. The Portuguese, on the other hand, wanted to carry out the trade with groups that were organized and had powerful leaders. The creation o f Zulu state displaced hundreds of people who fled in different directions in order to establish themselves. The Zulu nation was rapidly rising during that time, and its effect was the presence of the intensification of Mfecane war by the Shaka even though Mfecane war began way before Shaka was officially inaugurated as the chief of the Zulu. Shaka’s leadership later intensified the war because of his zealous interest in wars, and he was able to defeat other tribes. The idea of having a growing domain of terror was touted by speculators who wanted imperial military backing in order to secure future land. Cape Whites were expanded at the end of the 1st century because the whites wanted more land at the eastern side, and their expansion created a shortage of land while the population was increasing hence worsening the land issue. The three powerful groups that emerged and rose up at that time fighting each other; Zwide group was responsible for sparking the war with its rivals Sobhuza, and later Ndwandwe joined the war. Most communities had at that time spread at the countryside and moved across the frontier, dividing themselves to settle in concentrated places. Americans introduced corn through the Portuguese in Mozambique, and this significantly contributed to the communities’ settlement in the region. This is because corn ensured there was plenty of food as compared to indigenous grasses thus it was able to sustain a larger population. At the end of 18th century, the possibility of people moving from the region became limited, and the shortage of land was experienced.  Most Bantu farmers in the region had reached the margins of arable land that was at the edge of Kalahari Desert; it was also difficult to access water from this region.

Friday, July 26, 2019

Micro economics assignment Fuel Essay Example | Topics and Well Written Essays - 1500 words

Micro economics assignment Fuel - Essay Example The graph shown on the left shows the above mentioned change in demand of corn. Previously, the demand for corn stood at D1 because it was almost solely used for food consumption. However, the demand for bio-fuel has added to this demand and an addition of D2 has resulted in an overall demand of D1+D2 for corn. Along with showing the total demand for corn, the graph also shows the rise in price of the product which is corn in this case. The previous demand of D1 had a lower price but due to the increased demand, an upward pressure on price has forced the price to rise to PC*. In a market economy, if the increased demand is not addressed by added production and hence increased supply, then the prices rise because the market forces come into play and determine the market prices which are at a higher point (AmosWEB n.d.). The graph here shows that the supply has been unchanged due to which the increased demand has resulted in a rise in the prices of corn. ii) The price of a product usua lly tends to go up if the increase in demand is not met by an increase in the supply in the same ratio. However, when the demand rises and the prices start to go up, then it tempts others to invest in improving the production methods by introducing new technology or new producers enter into the market. When this happens, the supply of the industry rises and the supply curve of the industry shifts outwards which results in the fall in prices (AmosWEB, Supply and Demand Increase n.d.). The supply of product that is under consideration cannot be increased simply because it is an agricultural product and therefore numerous limitations such as the availability of agricultural land suitable for the growth of crops. In this case when the product is an agricultural product, then the options left to increase the yield of crops is to improve the agricultural and conversion technologies. During harvesting, the conversion process usually results in wastage of product. Therefore if there is an i mprovement in the conversion technology, then there will be less wastage and increased supply. Similarly, if the seed quality can be improved, then it will result in an improved yield. Both of these steps will lead to a rise in the supply of corn and as a result of an outward shift in the supply curve, the price will fall. Here in the graph on the right, the supply curve has shifted outwards as a result of increase in supply. In our context, the increased supply is the improved yield of corn. The increase in corn has resulted in the readjustment of the equilibrium point and the price at this point has gone down. Therefore, an increased demand can be handled by a simultaneous increase in supply to keep the price under control. iii) After raising the concerns that the earth is facing the possibility of environment and resource depletion, there were calls of innovating and moving towards environment friendly energy solutions. These calls were answered by the introduction of bio-fuels w hich are partly renewable and emit less dangerous gases. Due to this, many have shifted their consumption to the bio-fuels and it has emerged as a dominant and growing force in the oil industry throughout the world. (Analytica n.d.) The bio-fuels have added to the competition in the oil industry and manufacturer companies now face a greater challenge with

Thursday, July 25, 2019

Technology and Healthcare Essay Example | Topics and Well Written Essays - 1000 words

Technology and Healthcare - Essay Example The potential of IT industry in the healthcare sector is huge and the opportunity is increasing with every passing year. To get involved in the healthcare industry, the amount invested by the venture capitalist has increased three times from 2010 to 2013, from $ 343million to $955 million. (Lee, 2013). There are 5 distinct ways by which the technology is associated with the health care industry. These include: Using data to offer a better diagnosis and treatment of the patient by the doctors and physician; Helping doctors to communicate with the patient in a better way; Technology able to help doctors to communicate between one another to consult about the treatment of any serious cases; Connecting doctors with the patient anytime from anywhere; Helping patients to stay healthy with the help of various mobile and technological applications. (Lee, 2013). One of the best examples of use of IT in healthcare is development of â€Å"Omnifluent Health, a translation program for doctors and others in the medical field.†(Lee, 2013) In USA, almost 47 million people do not speak or understand English, so this application I a great medium for them to communicate with doctors. New York City startup Sherpaa started a service of medical consultations online and over the phone for the people of USA. â€Å"Fitbit is one such kind of device which tracks daily sleep and activity and uses social networking and gaming to motivate its users.

Wednesday, July 24, 2019

University of new haven, soccer, moving to another town, upbeat Essay

University of new haven, soccer, moving to another town, upbeat program that helps the community ,playing the piano, going to polish school every saturday for s - Essay Example ersity of New Haven) It is considered the 2nd largest private provider of Protective Services Education which offers a unique combination of forensic science with criminal justice. At least 121 credits are required for a student to earn the BS degree in criminal justice. The most rewarding professions, a graduate of this course can look forward to, are employment in any of the following prestigious institutions: the FBI, the DEA, ATF, the Secret Service, and the U.S. Dept. of the Treasury Border Patrol Military Police, CID IRS, CID, and the CIA. UNH actually â€Å"sponsors 17 variety sports (8 men’s, 9 women’s) which compete at the NCAA Division II level in the prestigious Northeast-10 Conference† (Official Website of University of New Haven). At UNH, the administrators have explicitly emphasized the importance of a holistic approach to the development of the athlete’s life. Opportunities are continuously provided for â€Å"academic achievement, learning in high-level athletic competition and development of positive societal attitude in service to the community†. (Official Website of University of New Haven) The existence of a Polish School dates back to the heirs of Poland wanting to keep their culture, tradition, and heritage intact. The basic teachings include learning the language, literature, geography, history of Poland; as well as the traditional Polish folk dances, songs and catechetical lessons. (Walnut Creek United Methodist Church). The regular session in a Polish school is approximately 21 Saturdays within the school year. The program usually encourage the participation of the parents in activities which would With the onset of the internet age, playing the piano is really as easy as ABC. There are a variety of online keyboard lessons and even free online instructions. Lessons vary depending on the level of the student’s expertise – from beginners to advance. (Free On-Line Piano Lessons Copyright@Gregory D. Ramsey 1996 –

Major Motivational Theories Research Paper Example | Topics and Well Written Essays - 1000 words

Major Motivational Theories - Research Paper Example This is because one needs highly motivated employees to get the work done. Well motivated employees are those who are keen to do excellent jobs because they feel that they have to. Their goal is to do their job, and that’s what managers need. Intrinsic motivation is the type of motivation that is driven by interest. The interest of the person itself is the drive to make the work his goal. The people who are intrinsically motivated jump on the task to improve their skills. The other type of motivation is the extrinsic kind. The interest of the person to complete the goal if he is extrinsically motivated is usually the things he might get after the goal is achieved, like rewards or punishment. For example, grades and winning are extrinsic motivational factors while studying something because one is indeed interested in that particular area is intrinsic There are many motivation theories that are practiced to have motivated employees. Three of them are discussed in this paper. Th ese theories are: Maslow’s Hierarchy of Needs, Herzberg’s Two Factor Theory, and McGregor’s X/Y theory. Maslow’s Hierarchy of Needs is perhaps the most popular and the most basic motivational theory. It was first discussed in Maslow’s 1943 study called A Theory of Human Motivation. It discusses the levels of human needs and how it is important in understanding these needs in order to manipulate the conditions of one’s employees for them to be good employees. It is often represented by a pyramid, with the needs starting from the bottom and ending at the tip with self actualization. The primary needs of a person are at the bottom of the pyramid, and that’s the physiological need. Then it progresses to safety, love, esteem and self-actualization. According to the hierarchy, one cannot achieve self-actualization if he did not fulfill the previous rung of the pyramid. This means that one should fulfill the physiological need, then the safe ty need, then the love need and then the esteem need in order to achieve self-actualization. Criticism of the theory is largely based on the postulate that the ranking of the â€Å"needs† aren’t really that accurate. Critics argue that food, shelter and other â€Å"physiological† needs are naturally instinctual and should not be included in the pyramid theory. They also say that the needs of a person referred to in this pyramid are largely for the American man. However, this information on motivation is quite important to managers as they would know what their people need, especially in an intercultural atmosphere. Since values and traditions differ, their needs as humans would definitely put a common thread on them, making them easier to motivate based on those commonalities. And even if the criticisms say something common on them, they are not as powerful. The second theory is the Herzberg’s two factor theory. According to this theory, there are two kin ds of motivations: the one that causes satisfaction and the one the causes dissatisfaction. It is also called-hygiene motivation. It is also called content theory motivation. He interviewed 200 accountants and engineers for this who were then asked to recall when they felt good or bad at their offices. From this, he concluded that the motivation of the employees lies on the hygiene factors and motivation factors. Hygiene factors are those things which are needed by

Tuesday, July 23, 2019

Common Assignment - Individual Leadership Growth Reflection Essay

Common Assignment - Individual Leadership Growth Reflection - Essay Example This type of awareness is important to leader’s self management ability. Self management must include flexibility to adapt to new situations and emotional self control, ambiguity and complexity. Authentic leaders also embrace honesty, transparency and integrity and earn colleagues’ trust with consistent behavior. This paper will discuss individual leadership growth reflection and also look at and discuss in detail the transformational leadership theory and how this theory impacts my individual development and growth as an effective leader. Finally it shall address various individual leadership development strategies that can cushion me as a leader in my workplace. Transformational leadership As a transformational leader, I must be socially competent in the ways that I carry out myself before others. The display of understanding, empathy and emotions of others, and being concerned with their welfare is core to managing individual’s relationships. As far as organiz ations are concerned, transformational leaders must be perceptive in reading the culture and climate of an institution, alert on how and why decisions are made and keeping pulse of institutional politics. In maintaining good relationships, transformational leaders inspire others with vision, persuasively influence them and advocates for necessary positive change. They come up with skillful approach on conflict management and resolution; develop colleagues as leaders, forms partnership and alliances as well as the capacity to build effective teams and work closely with others in an institution. Various techniques are of aid in self-reflection of myself as a leader, observation off myself and others, meditation and inspirational reading and writing. A good number of organizations have embraced transformational leadership process which serves as an effective, organized and continuing framework for development, self reflection and improvement. In my occupancy as an elementary and middle school principal, many experiences have played a major role in shaping and developing my leadership skills. My reflections on these challenges may also be helpful in program design. In one of my experiences as the leader of the middle school, I was given the task of shutting down an existing elementary school, supervising renovations to the infrastructure and organizing a new middle school which was also being put up as a technology project site for the region. An advisory committee was prepared to lead in development of the project with members from various communities and organizations within the province. My experiences during the five years of active participation with this project prompted me to re-asses discernments of the role of the principal, the effectiveness required of educational leaders and the nature of competent staff development. The aspects of this transformational leadership experience which positively affected my professional growth included: our recurrently sch eduled advisory committee meeting with different stakeholders which boosted the transformational process that we tried to transfer to the school’s daily operation; being part of action research concerning our project which was led by professor from Regina University; being an active participant in mentoring relationship with both the

Monday, July 22, 2019

Public transport Essay Example for Free

Public transport Essay Public transport can be described as a shared service of passenger transportation readily available for public use. Modes of public transport in many modern cities include trains and trams, buses, trolley buses, ferries and rapid transit. Public transport is necessary to economic and social development, with easy movement of people, goods and services. Increased number of motor vehicles in the modern cities carries both economic and social costs evidenced by increased air pollution. Air of poor quality can serious affect the health of the public and can result to premature deaths. Public transport is said to be the key of reducing air pollution in the urban cities in the following ways: reduced emission of carbon monoxide, reduced emission of nitrogen oxide and carbon dioxide emission, reduced emission of the volatile organic compounds and minimized fossil fuel consumption. Studies have shown that private vehicles, which are mainly petrol-powered, emit carbon monoxide, lead, benzene and lead which are detrimental to the air in our cities (European Environment Agency 2010). Still, due to the large number of this private vehicles, they are bound to emit this pollutants in high amounts compared to public transport. It is clear that, in order to reduce the air pollution and especially the concentration of carbon monoxide in our cities, there is need for people to rely much on public transport rather than the private vehicles. Nitrogen oxide and carbon dioxide emitted on the environment. Study conducted by the American enterprise institute and Brookings institution in 2002 showed out that the quantity of nitrogen oxide and carbon dioxide emitted by the private vehicles was about double the amount emitted by the public transport for every mile traveled by a passenger (European Environment Agency 2010). Use of public transport can reduce carbon footprint of an individual. Another study in the year 2005 showed that the use of public means rather than the private means could have reduced the carbon dioxide emission in the United States by 3. 9 million of metric tones. So it is much possible that, reducing air pollution in our cities can be achieved by depending more on the public transport. On other organic volatile compounds, the same study showed that the private vehicles could emit 92 percent more organic volatile compounds than the public vehicles as compared to mile traveled by each passenger. Efforts of reducing air pollution in our cities should focus on how to minimize usage of private vehicles in transport and also encourage use of the public means in transport. The same studies by the same two institutes showed out that in United States, public transport only used half of the fuel which was required to fuel the private vehicles. The more fossil fuel is used, the more emission of pollutant air is likely to emit in the environment, so in order to reduce the air pollution in our cities, there is need to encourage use of public transport. Public transport is very vital in our cities especially in achieving the global war on reducing air pollution which can result to global warming. Efforts need to be put in place to ensure that people use much the public means in most of their traveling because it will reduce air pollution in our cities as well as reducing the urban congestion of vehicles and also reduce the overdependence of energy imports. Bibliography European Environment Agency, 2010, Sources of Air pollution, Viewed July 27, 2010 http://www. eea. europa. eu/publications/2599XXX/page010. html

Sunday, July 21, 2019

Jean Piagets Theory of Cognitive Development

Jean Piagets Theory of Cognitive Development Jean Piaget, best known for his work in developmental psychology, was born in Neuchà ¢tel, Switzerland, on August 9, 1896. As a child, Piaget found his mother to be neurotic which led him to an interest in psychology. As the oldest child, Piaget was very independent and at the age of ten he published his first scientific paper on the albino sparrow allegedly to convince the librarian he was not a child. In Piagets adolescence his mother urged him to study religion which he found to be childish. Instead, he decided to devote his time to discovering the biological explanation of knowledgethrough the study of philosophy and the application of logic. This failed Piaget in his quest for answers, and he turned his focus to psychology. In 1918, Piaget graduated with his Doctorate in Science from the University of Neuchà ¢tel. While teaching at the Sorbonne in Paris, he met Alfred Binet and began working with him evaluating childrens intelligence tests. Piaget was not concerned with the ri ght or wrong answers of the child, but was instead fascinated that certain errors occurred at predictable ages and began focusing on how children reasoned. In 1923, he married Valentine Chà ¢tenay and had three children with her. Piagets children immediately became the focus of intense observation and research and resulted in three more books (http://www.nndb.com/people/359/000094077/, 2010). Jean Piaget designed a model explaining how humans make sense of the world around them through collecting and organizing information from experiences with people, objects, and ideas. This was called the Theory of Cognitive Development. Piaget identified four factors; maturation, action on your environment, learning from others or social transmission, and searching for a balance or equilibrium that influence the way thinking and knowledge are developed. He also theorized that all species inherit the tendencies to organize thoughts and behaviors while adapting to his/her environment. Organization of thoughts and actions that allow a person to mentally think about events or objects are called schemes. Adaption of knowledge and thinking processes involves assimilation or incorporating new information into existing schemes, as well as changing existing schemes to respond to a new situation or accommodating. Piaget also believed that as young people develop they pass through four stages. T he first stage of cognitive development, which occurs between the ages of birth to two years, is called the Sensorimotor stage. In this stage, the child uses his/her five senses and motor abilities to comprehend the world around them. The child also distinguishes his/her self from objects and begins to act intentionally towards a goal. Object permanence is also achieved at this stage. The second stage is called the Preoperational stage and occurs between the ages of two to seven years. In this stage, the child begins to develop the ability to form and use symbols as well as think operations through logically in one direction. Egocentrism also dominates the childs thinking and language during this time. The third stage of cognitive development is between the ages of seven to eleven years is called the Concrete-Operational stage. The characteristics of this stage are the ability to solve concrete tangible problems logically, the ability to demonstrate conservation, the mastery of grou ping objects into categories based on characteristics, reversible thinking, and sequentially arranging objects according to weight, size and volume. The final stage of cognitive development, called Formal Operations, occurs from eleven years through adulthood. In this final stage, the adolescent becomes extremely focused on analyzing their own attitudes and beliefs while not denying that others may have different perceptions. The ability of an adolescent to think hypothetically, considering all possible combinations and choices, while reasoning deductively are other characteristics of this stage as well (Woolfolk, 2008). In Piagets Four Stages of Cognitive Development, the Preoperational stage would be the most noteworthy to me since this is the age range I will be teaching in elementary school. It is necessary to teach children in an active discovery learning environment, encouraging them to question, explore, manipulate, and search out answers on their own. This theory teaches me that as an educator, I must also be an observer in my classroom. I must carefully assess my students current stage of development, cognitive level, as well as strength and weaknesses, while tailoring a set of tasks and curriculum that is specific to each childs needs. Piagets theory is also beneficial to me because it teaches me that I will need to focus on the learning process of my students, rather than the end product. This theory also tells me that intelligence grows through assimilation and accommodation; therefore, I must provide many opportunities for my student to experience both. This theory can help me better understand my kindergarten students because I will be knowledgeable to their skill acquisition at certain ages. It will also guide my teaching strategies as well as help me design lesson plans and activities based on my preoperational students ability levels, while not causing frustration. According to Piaget, the characteristic of egocentrism is often seen in preoperational children. To combat this, I would provide my students with opportunities to work in groups, so they can learn from each other, participate, and be productive at their own pace. A basic understanding of Piagets theory could tremendously benefit parents, by knowing when to introduce new skills to his/her child in order to maximize understanding and success. I would recommend that parents observe his/her child, to make sure that what they are teaching is appropriate for their childs present stage of learning. Avoid stressing standardized learning such as committing rules and facts to memory and instead choosing constructive hands-on experimentation. I would also advise parents to allow active learning through game playing, exploring, and drawing. When giving directions to their child, I would suggest keeping things short and simple. To help a child getting ready for school in the morning, I would recommend having a clock with hands in his/her room. The child does not have a sense of time at this age. The parent should tell the child that when this hand points to this number, have your clothes on and be ready. I would also suggest for parents to talk to his/her child about their experiences and constantly engage them with questions about what they are seeing, hearing, smelling, touching, or tasting. As a teacher with students in the preoperational stage, I must remember that my students may or may not reach each of Piagets stages at the predetermined age assigned since each child develops individually. It is essential to provide students with as many opportunities as possible to experience new things. This will help them continuously build on his/her foundation of language and learning. Learning at the preoperational stage, takes place by the student constructing new schemas through knowledge discovered in hands-on learning. Lesson plans should include hands-on activities, field trips, and learning games with props or visual aids. Hands-on environments should be set up in your classroom with different stations to learn math, science, social studies, etc. To teach math, I would use colored chips or even pennies for counting, adding and subtracting. To teach science, I could use a magnifying glass to see how objects such as pictures of snowflakes are the same or different from eac h other. When taking field trips to places such as science museums or the zoo, I would constantly ask questions about what my students are experiencing. To assess the skills that my students are acquiring, I could use portfolios, group presentations, and demonstrations that would let my students explain his/her learning process to me. REFERENCES: NNDB: Tracking the entire world. (2010, February 9). Retrieved February 10, 2010, from http://www.nndb.com/people/359/000094077/. Woolfolk, A. (2008) Educational psychology: Active learning edition. Personal, moral, and social development (pp. 36-45).

Internet Protocol Version 4 Analysis

Internet Protocol Version 4 Analysis Chapter 2: Literature Review 2.1 Introduction Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a single medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future [1]. The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met [2]. This is important when multimedia applications have to provide users with real-time interaction. Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protocol has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF [3] to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices [4]. Like all the development and new inventio ns, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng. 2.2 OSI 7 Layer Computer networks are complex dynamic systems and difficult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers [5]. Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization. Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing. Network Layer. The layer enables any party in the network to communicate with each other. Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets. Session Layer. This layer is responsible for dialogue control and changing. Presentation Layer. The main task of this layer is to represent data in a way convenient for the user. Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer. 2.3 Network Layer As was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP). 2.3.1 Internet Protocol IP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below [5]. In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-oriented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult [5] for further information on this type of service. Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission. 2.4 Internet Protocol Version 4 As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space [7]. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier [5]. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example: 192.168.2.5. Traditionally [6], IP addresses are presented by classfull addressing. 5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use [7]. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource. 2.4.1 Header Header is a part of the IP packet[5]. There is a number of fields in an IPv4 header. Below are the some explanations for each field. 2.4.2.1 Version This field (4-bit long) is used to determine the version of IP datagram that is considered. For IPv4 it is set to 4. 2.4.2.12 Internet Header Length (IHL) The Internet Header Length is the length of the header. 2.4.2.3 Type of Service Theoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used. 2.4.2.4 Total Length Total is the length of data in the fragment plus the header. 2.4.2.5 Identification This field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match. 2.4.2.6 Offset Offset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field. 2.4.2.7 Time to Live TTL measures the time duration of the datagram presence in a network. This guarantees that no datagram exists forever in the network. 2.4.2.8 Protocol This field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible. 2.4.2.9 Header Checksum The checksum is used to detect transmission errors. However, this field was removed in IPv6. 2.4.2.10 Source Address. This field specifies the source address. 2.4.2.11 Destination Address The destination address (4 octets long) is specified in this field. No attacks related to this field are known. 2.4.2.12 Options The field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are: security, source routing, and route recording. 2.4.2.13 Padding The field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits. 2.5 Internet Protocol Version 6 IPv6 is a new version that is specified in RFC2460 [5] to overcome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats: Omit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. Double colon Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address. The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) [9]. Thus, the IPv6 addresses should be 8 bytes long. 2.5.1 IPv6Header Some of  IPv4 header fields excluded in IPv6, and some of  them has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are: the basic IPng header and IPng extension headers. 2.5.2.1 Version This field (4-bit long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period. 2.5.2.2 Flow Label This field is 20 bits long and, as yet, there is no specific functionality assigned to it. 2.5.2.3 Payload Length Only IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included). 2.5.2.4 Next Header Next Header field replaces the Protocol field in the IPv4 header. 2.5.2.5 Hops limit This field is a hop count that decrements. This field redefines the Time to Life field present in IPv4. 2.5.2.6 Source Address The source address is indicated by this field (16 octets long). No attacks related to this field have been experienced. 2.5.2.7 Destination Address This field (16 octets long) specifies the destination address. No attacks related to this field are known. IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field [8]. Based on the [27] experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives. Table 1: Packet breakdown and overhead incurred by header information 2.6 Streaming Overview In recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic. The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download. Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS [10] from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic. 2.7 Downloading Versus Streaming Application Basically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers. In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have de adlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. [12] 2.8 Standard/Protocols for Streaming A good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol. The multimedia streaming protocol is based on IP network and â€Å"User Datagram Protocol† (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination [16]. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc; UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Inte rnet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay which is the result of the transmission of lost packets. Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) [10]. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) [13]. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP pa ckets [11]. According to the standard [14], the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol. The Real-time Streaming Protocol (RTSP) [25] is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response [13]. The Requirement for Multimedia Application Various multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications [17]. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) [15]. The thr ee types for this application requirement will be discuss in next section. 2.10.1 Interactive and Noninteractive Applications An interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications is: People-to-people application such as IP telephony, interactive voice/video, videoconferencing People-to-machine application such as Video-on-demand (VOD), streaming audio/video Machine-to-machine application: Automatic machine control The time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements de lay also has a strict delay jitter requirements [15]. 2.10.2 Tolerance and Intolerance Tolerance and intolerance also one of the key that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output [15]. 2.10.3 Adaptive and Nonadaptive Characteristics Adaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are rate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user [15]. 2.10.4 Application Criticality Mission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For example: Air Traffic Control Towers (ATCTs): The Traffic controller is responsible to guide the pilot for direction, takeoff and landing process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system. E Banking system: The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction. 2.10.6 Examples of Application Requirements Video applications can be classified into two groups: interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec. Video codec Bandwidth Requirement Uncompressed HDTV 1.5 Gbps HDTV 360 Mbps Standard definition TV (SDTV) 270Mbps Compressed MPEG2 25-60 Mbps Broadcast quality HDTV 19.4 Mbps MPEG 2 SDTV 6 Mbps MPEG 1 1.5 Mbps MPEG 4 5 kbps 4 Mbps H.323 (h.263) 28 kbps 1 Mbps Table 2 : Video Codec Bandwidth Requirement [15] 2.11 Packet Delay Delay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2. Range in Millisecond (ms) Description 0 150 Acceptable for most user application. 150 400 Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. > 400 Unacceptable for general. However in certain cases this limit exceeds. Table 3: Standard for delay limit for voice In the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho Internet Protocol Version 4 Analysis Internet Protocol Version 4 Analysis Chapter 2: Literature Review 2.1 Introduction Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a single medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future [1]. The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met [2]. This is important when multimedia applications have to provide users with real-time interaction. Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protocol has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF [3] to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices [4]. Like all the development and new inventio ns, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng. 2.2 OSI 7 Layer Computer networks are complex dynamic systems and difficult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers [5]. Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization. Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing. Network Layer. The layer enables any party in the network to communicate with each other. Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets. Session Layer. This layer is responsible for dialogue control and changing. Presentation Layer. The main task of this layer is to represent data in a way convenient for the user. Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer. 2.3 Network Layer As was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP). 2.3.1 Internet Protocol IP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below [5]. In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-oriented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult [5] for further information on this type of service. Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission. 2.4 Internet Protocol Version 4 As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space [7]. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier [5]. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example: 192.168.2.5. Traditionally [6], IP addresses are presented by classfull addressing. 5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use [7]. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource. 2.4.1 Header Header is a part of the IP packet[5]. There is a number of fields in an IPv4 header. Below are the some explanations for each field. 2.4.2.1 Version This field (4-bit long) is used to determine the version of IP datagram that is considered. For IPv4 it is set to 4. 2.4.2.12 Internet Header Length (IHL) The Internet Header Length is the length of the header. 2.4.2.3 Type of Service Theoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used. 2.4.2.4 Total Length Total is the length of data in the fragment plus the header. 2.4.2.5 Identification This field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match. 2.4.2.6 Offset Offset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field. 2.4.2.7 Time to Live TTL measures the time duration of the datagram presence in a network. This guarantees that no datagram exists forever in the network. 2.4.2.8 Protocol This field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible. 2.4.2.9 Header Checksum The checksum is used to detect transmission errors. However, this field was removed in IPv6. 2.4.2.10 Source Address. This field specifies the source address. 2.4.2.11 Destination Address The destination address (4 octets long) is specified in this field. No attacks related to this field are known. 2.4.2.12 Options The field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are: security, source routing, and route recording. 2.4.2.13 Padding The field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits. 2.5 Internet Protocol Version 6 IPv6 is a new version that is specified in RFC2460 [5] to overcome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats: Omit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. Double colon Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address. The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) [9]. Thus, the IPv6 addresses should be 8 bytes long. 2.5.1 IPv6Header Some of  IPv4 header fields excluded in IPv6, and some of  them has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are: the basic IPng header and IPng extension headers. 2.5.2.1 Version This field (4-bit long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period. 2.5.2.2 Flow Label This field is 20 bits long and, as yet, there is no specific functionality assigned to it. 2.5.2.3 Payload Length Only IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included). 2.5.2.4 Next Header Next Header field replaces the Protocol field in the IPv4 header. 2.5.2.5 Hops limit This field is a hop count that decrements. This field redefines the Time to Life field present in IPv4. 2.5.2.6 Source Address The source address is indicated by this field (16 octets long). No attacks related to this field have been experienced. 2.5.2.7 Destination Address This field (16 octets long) specifies the destination address. No attacks related to this field are known. IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field [8]. Based on the [27] experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives. Table 1: Packet breakdown and overhead incurred by header information 2.6 Streaming Overview In recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic. The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download. Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS [10] from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic. 2.7 Downloading Versus Streaming Application Basically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers. In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have de adlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. [12] 2.8 Standard/Protocols for Streaming A good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol. The multimedia streaming protocol is based on IP network and â€Å"User Datagram Protocol† (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination [16]. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc; UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Inte rnet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay which is the result of the transmission of lost packets. Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) [10]. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) [13]. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP pa ckets [11]. According to the standard [14], the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol. The Real-time Streaming Protocol (RTSP) [25] is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response [13]. The Requirement for Multimedia Application Various multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications [17]. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) [15]. The thr ee types for this application requirement will be discuss in next section. 2.10.1 Interactive and Noninteractive Applications An interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications is: People-to-people application such as IP telephony, interactive voice/video, videoconferencing People-to-machine application such as Video-on-demand (VOD), streaming audio/video Machine-to-machine application: Automatic machine control The time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements de lay also has a strict delay jitter requirements [15]. 2.10.2 Tolerance and Intolerance Tolerance and intolerance also one of the key that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output [15]. 2.10.3 Adaptive and Nonadaptive Characteristics Adaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are rate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user [15]. 2.10.4 Application Criticality Mission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For example: Air Traffic Control Towers (ATCTs): The Traffic controller is responsible to guide the pilot for direction, takeoff and landing process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system. E Banking system: The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction. 2.10.6 Examples of Application Requirements Video applications can be classified into two groups: interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec. Video codec Bandwidth Requirement Uncompressed HDTV 1.5 Gbps HDTV 360 Mbps Standard definition TV (SDTV) 270Mbps Compressed MPEG2 25-60 Mbps Broadcast quality HDTV 19.4 Mbps MPEG 2 SDTV 6 Mbps MPEG 1 1.5 Mbps MPEG 4 5 kbps 4 Mbps H.323 (h.263) 28 kbps 1 Mbps Table 2 : Video Codec Bandwidth Requirement [15] 2.11 Packet Delay Delay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2. Range in Millisecond (ms) Description 0 150 Acceptable for most user application. 150 400 Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. > 400 Unacceptable for general. However in certain cases this limit exceeds. Table 3: Standard for delay limit for voice In the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho