.

Tuesday, May 26, 2020

Transcendental Meditation Alternative Therapy for...

Transcendental Meditation: Alternative Therapy for Alcohol Abuse Proponents of the Transcendental Meditation program initiated by Maharishi Mahesh Yogi have expressed their ideas in various web sites on the World Wide Web, through pages such as The Transcendental Meditation Program at http://www.tm.org and the Scientific Research on Transcendental Meditation and TM-Sidhi program of the Maharishi University of Management at http://www.miu.edu/TM_Research. In these sites positive messages are conveyed about the benefits of meditation to its practitioner within the physiological, psychological, sociological, intellectual, and interpersonal realms. Within these sites, the web-browser is presented with an abundance of information relating†¦show more content†¦Over time, proponents purport, the mental orderliness and physical calm achieved through the technique result in higher overall levels of both physical and psychological health. Included within the web sites are lists of documented scientific research which advocates of the Transcendental Meditation technique use to support their claims. In providing concrete references to such scientific studies, proponents of TM present the information in a persuasive manner which may seem to substantiate their claims to potential practitioners. In this report, research involving the use of Transcendental Meditation as an alternative therapy for alcoholism and the prevention of alcoholism will be highlighted. TM as an Alternative Therapy for Alcoholism Numerous studies have been conducted which focus on the benefits of regular practice of TM as an lternative therapy for the treatment of alcoholism. Within these studies the general findings convey lower rates of alcohol consumption and higher rates of total abstinence from alcoholic beverages for individuals who who regularly practice TM as compared to individuals comprising the control groups. Moreover, the findings suggest that the length of time in which one has employed the technique (whether as treatment for alcoholism directly or for unrelated reasons) is proportional to the success rates in the treatment of alcoholism and theShow MoreRelatedThe Power Of The Mind : Mindfulness Meditation1574 Words   |  7 PagesNichols Travis Health 101 4-20-2017 The Power of the Mind: Mindfulness Meditation Mind over matter, the idea that our minds have the power to overcome physical problems. One of the most ancient techniques that points to this concept is called mindfulness meditation. This ancient practice is now being researched by todays psychologist and neuro scientist for its benefits to our wellness. My research topic will explain how meditation impacts our health. If our minds have the power to heal ourselves throughRead MoreMy Critique Of Yoga And The Clinical World Of Counseling1633 Words   |  7 Pagesexplains that a yoga practice will help the recovery process on two fronts. A yoga practice will help the physical body by helping it rid itself of the physical impurities that have built up over time through the ingestion of substances such as alcohol and various illicit narcotics can debilitate a body and cause the receptors of the body to call for these substances that create the cravings and if not supplied to body create painful withdrawals. These cravings and withdrawals can be very hurtfulRead MoreEssay Overall Fitness2231 Words   |  9 PagesI am a non-smoker; I rarely if ever drink alcohol. There is no history of any heart problems or symptoms pertaining to any heart disease. Some additional health issues I currently face are joint problems, concerns about the safety of exercise and pains in my lower leg due to an injury I sustained in my teenage years. The health risk factors I currently face are pretty minor. I am only 35 yrs. of age with no prior history of drug and alcohol abuse, and no close relatives who suffered fromRead MoreThe Marketing Research of Brainquiry33782 Words   |  136 Pagespsychologists who are registered in this registration record are allowed to lead this (by the law protected) title. The expertise of the registered occupation practitioners is with this for everybody recognizable. VBAG: An institution for alternative treatment in the Netherlands. Some of the insurance company s compensate the costs if the psychologist is registered by VBAG. ROEP: some insurers compensate the costs only if the psychologist is a qualified first line psychologist whom isRead MoreDeveloping Management Skills404131 Words   |  1617 PagesHow Creative Are You ? 169 Innovative Attitude Scale 171 Creative Style Assessment 172 SKILL LEARNING 174 Problem Solving, Creativity, and Innovation 174 Steps in Analytical Problem Solving 174 Defining the Problem 174 Generating Alternatives 176 Evaluating Alternatives 176 Implementing the Solution 177 Limitations of the Analytical Problem-Solving Model 178 Impediments to Creative Problem Solving 178 Multiple Approaches to Creativity 179 Conceptual Blocks 183 Percy Spencer’s Magnetron 185 Spence

Sunday, May 17, 2020

Television Is A Common Part Of Contemporary Society

The television is also a very important aspect of popular culture that affects the American Identity. Watching television is such a common part of contemporary society, that most Americans adopted it as a part of their daily routine and watch television for at least an hour a day. Stanley Crouch, a poet, music and cultural critic, writes that whenever people pretentiously and proudly announce, â€Å"I don’t watch television,† they should follow it up with â€Å"I don’t look at America either† (Masciotra 79). Television has become a part of many people’s lives. When the mass population watches the same TV shows, movies, etc. they can all relate to each other, and thus unite them as an American. We look to TV shows to see how other people like us act†¦show more content†¦People who don’t know the common trends of fictional or real characters in movies can feel alienated when referenced in reality. The internet has also been a key factor of popular culture that affects the American identity. Through different social media applications and websites, the internet has broken down communication barriers between different cultures in a way that was nearly impossible in the past. The internet has also changed how Americans go through their daily lives. In the past people had to meet in person to meet with each other and communicate. However, today people communicate with each other through the variety of social media applications on their phones. Dating applications on devices have changed how people build relationships. Nowadays, most people meet their spouses and friends through the internet. Since America is very multicultural the internet has helped these cultures to share and communicate with each other and create a more informed and understanding relationship between different cultures. While America has been multicultural for so long it does have a history of racism but the i nternet has helped break down some of these walls. Another way of how the social media affects the American identity is through the food advertisements online. When people order food online they also see food from other cultures, expand their knowledge about cultural cuisine and become more diverse. Since people do not want to actually have to get

Friday, May 15, 2020

The Role of Reading Fluency Tables in Comprehension

Listening to a student read, even for a minute, can be one of the ways a teacher determines a students ability to comprehend text through fluency. Improving reading fluency has been identified by the National Reading Panel as one of the five critical components of reading. A student’s oral reading fluency score is measured by the number of words in a  text that a student reads correctly in a minute. Measuring a students fluency is easy. The teacher listens to a student read independently for one minute in order to hear how well a  student reads accurately, quickly, and with expression (prosody). When a student can read aloud with these three qualities, the student is demonstrating to the listener a level of fluency, that there is a bridge or connection between his or her ability to recognize words and the ability  to comprehend  the text: â€Å"Fluency is defined as reasonably accurate reading with suitable expression that leads to accurate and deep comprehension and motivation to read† (Hasbrouck and Glaser, 2012). In other words, a student who is a fluent reader  can focus on what the text means because he or she does not have to concentrate on decoding the words. A fluent reader can monitor and adjust his or her reading and notice when comprehension breaks down.   Fluency Testing A fluency test is simple to administer. All you need is a selection of text and a stopwatch.   An initial test for fluency is a screening where passages are selected from a text at the students grade level that the student has not pre-read, called a cold read.  If the student is not reading at grade level, then the instructor should select passages at a lower level in order to diagnose weaknesses.   The student is asked to read aloud for one minute. As the student reads, the teacher notes errors in reading. A student’s fluency level can be calculated following these three steps: The instructor determines how many words the reader actually attempted during the 1-minute reading sample. Total # of words read ____.Next, the instructor counts up the number of errors made by the reader. Total # of errors ___.The instructor deducts the number of errors from the total words attempted, the examiner arrives at the number of correctly read words per minute (WCPM). Fluency formula: Total # of words read __- (subtract) errors______words (WCPM) read correctly For example, if the student read 52 words and had 8 errors in one minute, the student had 44 WCPM. By deducting the errors (8) from total words attempted (52), the score for the student would be 44 correct words in one minute. This 44 WCPM number serves as an estimate of reading fluency, combining the students speed and accuracy in reading. All educators should be aware that an oral reading fluency score is not the same measure as a student’s reading level. To determine what that fluency score means in relation to grade level, teachers should use a grade level fluency score chart. Fluency data charts   There are a number of reading fluency charts such as the one developed from the research of Albert Josiah Harris and Edward R. Sipay  (1990) which set fluency rates that were organized by grade level bands with words per minute scores. For example, the table shows the recommendations for fluency bands for three different grade levels: grade 1, grade 5, and grade 8.   Harris and Sipay Fluency Chart Grade Words per minute Band Grade 1 60-90 WPM Grade 5 170-195 WPM Grade 8 235-270 WPM Harris and  Sipays  research guided them to make recommendations in their book  How to Increase Reading Ability: A Guide to Developmental Remedial Methods  as to the general speed for reading a text  such as a book from the  Magic Tree House Series  (Osborne). For example, a book from this series is leveled at M (grade 3) with 6000 words.   A student who could read 100 WCPM fluently could finish  A Magic Tree House  book in one hour while a student who could read at 200 WCPM fluently could complete reading the book in 30 minutes. The fluency chart most referenced today was developed by researchers Jan Hasbrouck and Gerald Tindal in 2006. They wrote about their findings in the International Reading Association Journal in the article â€Å"Oral Reading Fluency Norms: A Valuable Assessment Tool for Reading Teachers.† The major point in their article was on the connection between fluency and comprehension: â€Å"Fluency measures such as words correct per minute has been shown, in both theoretical and empirical research, to serve as an accurate and powerful indicator of overall reading competence, especially in its strong correlation with comprehension. In coming to this conclusion, Hasbrouck and Tindal completed an extensive study of oral reading fluency using data obtained from over 3,500 students in 15 schools in seven cities located in Wisconsin, Minnesota, and New York.† According to Hasbrouck and Tindal, the review of student data  allowed them to organize the results in average performance and percentile bands for fall, winter, and spring for grades 1 through grade 8. The scores on the chart are considered  normative  data scores because of the large sampling.   The results of their study were published in a technical report entitled, â€Å"Oral Reading Fluency: 90 Years of Measurement,† which is available on the  website for Behavioral Research and Teaching, University of Oregon. Contained in this study are their grade level fluency score tables  designed  to help instructors to assess the oral reading fluency of their students relative to their peers. How to read a fluency table Only three-grade level data selections from their research are in a table below. The table below shows fluency scores for grade 1 when students are first tested on fluency, for grade 5 as a midpoint fluency measure, and for grade 8 after students have been practicing fluency for years. Grade Percentile Fall WCPM* Winter WCPM* Spring WCPM* Avg Weekly Improvement* First 90 - 81 111 1.9 First 50 - 23 53 1.9 First 10 - 6 15 .6 Fifth 90 110 127 139 0.9 Fifth 50 110 127 139 0.9 Fifth 10 61 74 83 0.7 Eighth 90 185 199 199 0.4 Eighth 50 133 151 151 0.6 Eighth 10 77 97 97 0.6 *WCPMwords correct per minute The first column of the table shows the grade level. The second column of the table shows the percentile.  Teachers should remember that in fluency testing, percentile is different from  percentage. The percentile on this table is a measurement is based on a grade level peer group of 100 students. Therefore, a 90th percentile does not mean the student answered 90% of the questions correctly; a fluency score is not like a grade. Instead, a 90th percentile  score for a student means that there are nine (9) grade level peers who have performed better.   Another way to look at the rating is to understand that a student who is in the 90th percentile performs better than 89th percentile of his grade level peers or that the student is in the top 10% of his peer group. Similarly, a student in the 50th percentile means the student performs better than 50 of his or her peers with 49% of his or her peers performing higher, while a student performing at the low 10th percentile for fluency has still performed better than 9 of his or her grade level peers. An average fluency score is between 25th percentile to 75th percentile Therefore, a student with a   fluency score of 50th percentile is perfectly average, squarely in the middle of the average band. The third, fourth, and fifth columns on the chart indicate into which percentile a students score is rated at different times of the school year. These scores are based on normative data. The last column, average weekly improvement, shows the average words per week growth that student should  develop to stay on grade level. The average weekly improvement can be calculated by subtracting the fall score from the spring score and dividing the difference by 32 or the number of weeks between the fall and spring assessments. In grade 1, there is no fall assessment, and so the average weekly improvement is calculated by subtracting the winter score from the spring score and then dividing the difference by 16 which is the number of weeks between the winter and spring assessments. Using the fluency data   Hasbrouck and Tindal   recommended that: â€Å"Students scoring 10 or more words below the 50th percentile using the average score of two unpracticed readings from grade-level materials need a fluency-building program. Teachers can also use the table to set long-term fluency goals for struggling readers.† For example, a beginning fifth grade student with a reading rate of 145 WCPM should be assessed using fifth grade level texts. However, a beginning grade 5 student with a reading rate of 55 WCPM will need to be assessed with materials from grade 3 in order to determine what additional instructional support would be needed to increase his or her reading rate. Instructors should use progress monitoring with any student who may be reading six to 12 months below grade level every two to three weeks to determine if additional instruction is needed. For students who are reading more than one year below grade level, this kind of progress monitoring should be done frequently. If the student is receiving intervention services through special education or English Learner support, continued monitoring will provide the teacher the information on whether the intervention is working or not.   Practicing fluency For progress monitoring on fluency, passages are selected at a students individually determined goal level. For example, if the instructional level of a 7th grade student is at the 3rd grade level, the teacher may conduct the progress monitoring assessments by using passages at the 4th grade level. To provide students the opportunity to practice, fluency instruction should be with a text that a student can read at an independent level.   Independent reading level is one of three reading levels described below: Independent level is relatively easy for the student to read with 95% word accuracy.Instructional level is challenging but manageable for the reader with 90% word accuracy.Frustration level means the text is too difficult for the student to read which results in less than 90% word accuracy. Students will better practice on speed and expression by reading at an independent level text. Instructional or frustration level texts will require students to decode. Reading comprehension is the combination of numerous skills that are performed instantaneously, and fluency is one of these skills. While practicing fluency requires time, a test for a students fluency takes only one minute and perhaps two minutes to read a fluency table and to record the results. These few minutes with a fluency table can be one of the best tools a teacher can use to monitor how well a student understands what he or she is reading.

Wednesday, May 6, 2020

General Education And Special Education - 930 Words

Co-Teaching Expectations Division of Labor General education and special education teacher are require to work together as a team to ensure the students in the inclusive classroom setting is learning with the accurate accommodation and tools to fit their needs. The general education and special education teacher work together to create a lesson plan to which it targets all areas of learning for all students in the inclusive classroom setting. Both teachers should sit together to discuss their concerns for their students and contact the parents together to allow the parents to understand it is a team working as a unit. Space Furniture As both teachers should have a desk to complete work, the desk should be on opposite ends of the classroom for instance, one in the back of the classroom and one in the front as each teacher should be the eyes for each other. The classroom desk should allow room for both teachers to move around freely along with a table for small group learning and/or one-on-one help. In certain situation a table may cause the room to become too small, grouping a group of five student’s desks together will allow the inclusive teachers to conduct small group lesson for the students to complete together, which will allow the general and special education teacher to work with a group of students who need additional help. Classroom Routines Discipline At the beginning of each marking period, both the general and special education teacher should discussShow MoreRelatedThe Model Of Intervention For Special Or General Education Settings1159 Words   |  5 Pageslearning; the latter involves the Response to Intervention model. These results is a key component when determining students’ placement in Special or General Education settings. Educational laws have emphasized an increased focus on assessment of all student comparatively to assess where every student is academically. This flux of students in Special Education has led to a disproportion and overrepresentation of cultural groups. This lead to assessment measures to focus on that particular cultureRead MoreGeneral And Special Education Teachers Face Today1260 Words   |  6 PagesThere are many issues that general and special education teachers face today. The goal of both of these types of teachers should be that they try their best to make their students succeed. Teac hing can be very difficult and people that are passionate about it should do it. However, many general and special education teachers face many challenges throughout their teaching careers that make teaching difficult for them. One issue that teachers lack today is lack of proper coaching from school staffRead MoreGeneral And Special Education Teachers Face Today1260 Words   |  6 PagesThere are many issues that general and special education teachers face today. The goal of both of these types of teachers should be that they try their best to make their students succeed. Teaching can be very difficult and people that are passionate about it should do it. However, many general and special education teachers face many challenges throughout their teaching careers that make teaching difficult for them. One issue that teachers lack today is lack of proper coaching from school staffRead MoreInclusion Of Students With Mental Disabilities1551 Words   |  7 Pagesseparated in special education classrooms. For parents and educators alike, the topic of inclusive teaching is a hotly contested one. The arguments boil down into three categories: the effect on general education students, the effect on special education students, and the effect on teachers. Those that argue against inclusive teaching say that the presence of special education students in a general education classroom poses a threat to the learning environment of general education students. TheyRead MoreEducation Is An Integral Part Of Our Lives1420 Words   |  6 PagesEducation is an integral part of our lives. We all seek education in one form or another, and at different levels. The importance of education cannot be stressed enough. Education is knowledge gained and knowledge is power. Education gives us a knowledge of the world around us and changes it into something better. The influence of special education focuses on individualized directions and teaching. Special education has gone from just identifying individuals with disabilities and showing themRead MoreStudents With Disabilities And Their Education1305 Words   |  6 Pageshow to effectively include students with disabilities in general education classes. There are a lot of concerns of whether or n ot full inclusion is appropriate for all students, how you address certain concerns, how to communicate and involve parents and a lot of other things. Everyone has their own personal views and why they feel the way they do. The controversy will always remain on the topic of students with disabilities and their education. I am slowly starting to form an opinion on whetherRead MoreAn Interview On Children With Disabilities1666 Words   |  7 Pagesclassroom. Mrs. Pope is a Special Education Coordinator for the Judson Independent School District; whom teaches at Millers Point Elementary. She provided extraordinary information on LRE. LRE in general is stated in â€Å"In Special education and the law: A guide for practitioners†, â€Å"to the maximum extent feasible, students with disabilities must be educated with peers who are not disabled† (Osborne, A., Russo, C., 2014, p. 29). â€Å"The Individuals with Disabilities Education Improvement Act (IDEA 2004)Read MoreThe Individuals With Disabilities Education Act1535 Words   |  7 PagesDISABILITIES EDUCATION ACT (IDEA) IDEA is the main law addressing the education of children and adolescents with disabilities. It ensures all individuals with disabilities between the ages of 3−21 the right to a free, appropriate public education (FAPE), regardless of the nature or severity of the disability. Schools must therefore provide services to meet the particular educational needs arising from a disabling condition that cannot be met in the general educational program. THE NATURE OF SPECIAL EDUCATIONRead MoreSchool Districts Are Financially Struggling And Looking For Ways For Saving Money961 Words   |  4 Pagesto save money. One of the methods that they have implemented is to decrease the number of students in Special Education classes by using inclusion, also called mainstreaming, by having the students included in general education classes. A districts Average Per Pupil Expenditure (APPE) can vary significantly for Special Education. The services are defined in each student’s Individual Education Plan (IEP). Whereas one student’s IEP might mandate a single service, another may require several servicesRead MoreAchieving Six National Education Goals990 Words   |  4 Pages According to President Bush, he made an announcement on April 18, 1991 that he wanted to achieve six national education goals by the year 2000. There are six objectives: 1. Make sure every student is ready to learn on the first day of school. 2. 90% graduation rate 3. Making sure that each has the skill for all core subjects. 4. Make sure that a student have achieved in the math and science 5. To ensure that every adult is well-trained and possess the abilities to contend with an environmental economy

The Impact Of Nursing Care On Health Care Quality

The Impact of Nursing Care on Health Care Quality Tasha N. Herndon Duquesne University GPNG 525 Organizational and Clinical Leadership in Nursing and Healthcare Carolyn Griffin October 31, 2015 The Impact of Nursing Care on Health Care quality Nurses are the primary caregivers in all health care settings. Nursing care is an essential part of patient care and delivered in many diverse settings. The quantity of nurses and their vital role in caregiving are compelling motives for determining their impact to patients’ experiences and outcomes. The degree of patient’s satisfaction with nursing care is an important indicator of the quality of care delivered in health care environments (Atallah, Hamdan-Mansour, Al-Sayed, Aboshaiqah, 2013). The impact of nursing care on health care quality cannot be overlooked. In the paragraphs that follow to gain and offer a better understanding of the health care quality model, this author will: give a personal interpretation of health care quality, discuss health care trends in the United States and what makes an organization a high or low performing agency, describe how the main goal of the Institute of Medicine (IOM) affects nursing care, and address nursing responsibility to health care quality according to the American Nurses’ Association (ANA) Code of Ethics. Significance of Health Care Quality Model The term quality in health care is somewhat subjective and can be defined in many ways. Quality means diverse things toShow MoreRelatedProfessional Development of Nursing Professionals824 Words   |  4 PagesDevelopment of Nursing Professionals The Robert Wood Johnson Foundation and the Institute of Medicine, (IOM) introduced a two year contract in 2008 (IOM, 2010). The basis of the contract is recommendations, which will impact the future of nursing care, and include changes in â€Å"public and institutional policies at the national, state, and local levels† (Future, 2010). This essay will provide a basic understanding of the IOM’s contract, including the impact on nursing education, nursing practice inRead MoreImpact of the IOM Report on Nursing Education1456 Words   |  6 PagesThe impact of the IOM report on nursing education According to the IOM report, the nursing profession is undergoing fundamental changes within the underlying operations of the field. A new regulatory environment coupled with increased scrutiny of the profession will dramatically impact the nursing profession. As the report indicates nurses, in the near future, will have job requirements that are business oriented. Nurses will need to have a better understanding of quality management methods inRead MoreThe Impact of Innovative Health Technologies in Nursing and Health Care997 Words   |  4 PagesTechnology in Nursing and Health Care: The continuous transformation of the health care field through the introduction of new technology tools has contributed to the need for nurses to stay current with new trends and keep track of what is on the horizon. However, these rapid technological changes and advancements in the health care field have seemingly precluded any probability of anticipating the future. As a result, nurses and other health care professionals can prepare for the future by remainingRead MoreImpact of 2010 Iom Report on Nursing Essay1059 Words   |  5 PagesImpact of the 2010 IOM Report on Nursing Grand Canyon University: NRS 430V In 2010, the Affordable Care Act (ACA) was signed into law by the United States government and is the largest health care reform since Medicare and Medicaid were established in 1965. With this new legislation, there will be a huge transformation of the health care system we know today. The Institute of Medicine (IOM) is an organization that is independent of government and provides unbiased advice used in makingRead MoreImpact of the Iom Report1178 Words   |  5 PagesImpact of the IOM Report: Nursing Education, Primary Care, Nurse Leaders No matter which perspective the view is from, most everyone would agree that millions of nurses worldwide are involved in a profession that is constantly changing and changing at a very quick pace (Robert Wood Johnson Foundation, 2011). This transformation is due to a number of factors like demographic changes, the shortage of health care professionals, economic downfalls on the health care system, and evolving technologyRead MoreFuture of Nursing1315 Words   |  6 PagesFuture of Nursing July 14, 2013 The Future of Nursing According to the Institute of Medicine (IOM), the nursing profession is the largest population in the nation s health care workforce with over three million members. Because of this, nurses have a fundamental role in the transformation of the nation s rapidly changing health care environment. To achieve this role, the IOM addressed several key recommendations to serve as a guide to the direction of the future of nursing (InstituteRead MoreThe Future Of Nursing : Leading Change1047 Words   |  5 PagesThe Future of Nursing: Leading Change, Advancing Health Institute of Medicine was tasked with submitting a report consisting recommendations and a blue print for the future of nursing. â€Å"The Future of Nursing: Leading Change, Advancing Health† was published at the time when Affordable Care Act(ACA) was signed by the President in March 2010. With this 32million more Americans will be provided with insurance in future. To accommodate the new demand while keeping a high quality health care is a challengeRead MoreEssay about The Future of Nursing751 Words   |  4 PagesRunning head: THE FUTURE OF NURSING The Future of Nursing: Leading Change, Advancing Health Victoria G. Tapia Grand Canyon University: NRS 430V March 25, 2012 The Future of Nursing: Leading Change, Advancing Health On October 5, 2010, the Institute of Medicine (IOM) released its recommendations in Nursing in the United States, â€Å"The Future of Nursing: Leading Change, Advancing Health.† For two years a committee named Robert Wood Johnson Foundation (RWJF) worked to study facts, researchRead MoreNursing Shortage: Causes, Concerns, and Impacts1839 Words   |  7 Pagesï » ¿Nursing Shortage: As many people in the United States are increasingly desperate for an employment opportunity, the nursing field or profession continues to have a huge need for staff. According to studies by employment services, the nursing profession is regularly ranked as one of the hot hiring sectors of the coming decade. Nonetheless, the supply of staff in this field seems not to catch up with the demand for nurses despite of the increased rate of unemployment. The need for more nursesRead MoreLooking Into Our Nursing Future and the Impact the Iom Report Has on It1378 Words   |  6 PagesINTO OUR NURSING FUTURE AND THE IMPACT THE Looking Into our Nursing Future and the Impact the IOM Report Has on it Professional Dynamics NRS-430V Looking Into our Nursing Future and the Impact the IOM Report Has on it Since the passing of the 2010, Health Care Legislation Laws, the Patient Protection and Affordable Care Act and the Health Care and Education Affordability Reconciliation Act, were instilled to increase the percentages of Americans having quality, affordable health care insurance

Morally Right and Morally Wrong

Question: Discuss whats best we will likely begin discussing morally right and morally wrong. So, to get a better handle on morally right and morally wrong, we should probably discuss the different ways we can use the term good. Answer: Morally right is defined as the conscience of the individuals and the term morally wrong is basically dealt with societys moral values (Boesch, 2012). For example, layoff can be regarded as a morally wrong act as it goes against the moral values of the society. Therefore, the term good can be used in different ways. For some people, the action that takes place due to morally right activity is considered as good and to some others the activity that takes place due to morally wrong activity is considered as good. Thus, it can be said that good can be used for both the right and wrong aspects but it varies with the perception of every individual (Howell, 2012). For example, layoff is a morally right action for the management of an organization, but it is a morally wrong action from the view point of the employees. References Boesch, E. E. (2012).Symbolic action theory and cultural psychology. Springer Science Business Media. Howell, D. C. (2012).Statistical methods for psychology. Cengage Learning.

Tuesday, May 5, 2020

Internetworking with TCP/IP Free Assignment Sample

Questions: Task 1 Explain with the aid of diagrams the TCP/IP Protocol Architecture. Discuss the function of the protocols within each layer. Evaluate the application of TCP/IP to internet based applications. Task 2 Explain the principles of IP addressing based on IPv4 and discuss the key practical issues in implementing IP addressing within public and private networks. With the aid of a network diagram explain how IP addresses are assigned to a network. With the help of a network monitoring tool (Wireshark), analyses the IP traffic.(provide evidence i.e. screenshots) Task 3 A local business TCS Ltd. is considering implementing IPv6 Protocol throughout the organization. Present a report for the Operational Director highlighting and discussing the key issues in migrating from IPv4 to IPv6 addressing. The report should: Discuss the benefits and drawbacks in such migration Explain and evaluate the alternative transition mechanisms Analyze and evaluate the improvement in quality of service (QoS) and security Task 4 TCS Ltd. is also considering the provisioning of voice over IP (VoIP) and mobile IP (MIP) for its employees. It is anticipated this will both reduce operational costs and increase network efficiency. Make a business case for such implementation. The Business Case should; Explain the underlying concepts of VoIP and MIP Analyze and evaluate mobile IP networks, particularly examining routing and security issues Analyze and evaluate the VoIP and MIP in the Enterprise networks. Answers: Task 1 TCP/IP architecture model was initially designed as DARPA model by the US government agency by that name. There were four layers in the DARPA model. Those were, application layer, transport layer, Internet layer and network interface layer. Each of those layer used to correspond to one or more layers in the OSI model with seven layers. In the TCP/IP protocol architecture, there are four layers or sets of protocols, similar to the DARPA model. TCP/IP protocol architecture works as protocol stack. Each layer of TCP/IP protocol stack, has its own set of functionalities and provides a set of services to the next layer. The descriptions of these layers are, (Blank, TCP/IP Foundations, 2006) Network Interface layer Network interface layer or network access layer is the lowest layer in the TCP/IP protocol stack. It places TCP/IP packets on the network and receives the same from the network. TCP/IP protocol stack is independent of different network access methods, medium, frame formats etc. Thus it supports different types of networks, different types of LAN technologies like token ring, Ethernet etc., different types of WAN technologies like frame relay, X.25 etc. This layer is independent from different network technologies. It gives the TCP/IP protocol stack the ability to adapt any new networking technology, for example, ATM or Asynchronous Transfers Mode networks. (Blank, TCP/IP JumpStart, 2006) Internet Layer Internet layer sits on the top of network interface layer in the TCP/IP protocol stack. Internet layer is responsible for packaging, addressing and routing of packets. There are some core protocols in this later. These protocols are important for internetworking. The protocols are IP or Internet Protocol, ARP or Address Resolution Protocol, ICMP or Internet Control Message Protocol, IGMP or Internet group management protocol. Each of these protocols performs different types of responsibilities and collectively all these are the responsibilities of internet layer. (Comer, 2006) Internet protocol is responsible for routing packets. Thus functions like routing, IP addressing, packet fragmentation and reassembly are provided by this layer. Address resolution protocol provides services like IP to MAC address translation etc. The main function is to provide address resolution services to the network layer. Internet control message protocol provides different types of diagnosis and error handling services that may occur from erroneous packet delivery. Internet group management protocol manages groups of IP multi-casting. Transport Layer Transport layer provided host to host service on the top of internet layer. It consumes services from the internet layer and provide service to the application layer that is on the top of it. Mainly it provides services related to transmission of data packets successfully over the internet. There are two protocols in this layer. Those are TCP or Transmission Control Protocol and UDP or User Datagram Protocol. (Alani, 2014) Transmission Control Protocol is responsible for providing a connection- oriented, one to one and reliable communication service. It arranges the sequences of packets, acknowledges the packet transmissions, and provides recovery of packets lost during transmission. On the other hand, user datagram protocol is a connectionless, one to many (may be one to one), unreliable service for communication over the internet. Generally, UDP is used to transfer smaller amount of data or data where security or data loss is not a big issue. TCP provides secure and better service than UDP, but there is some additional overhead of TCP services, when some application does not want to have these overhead and still want to have a data transmission, then it selects UDP instead of TCP. (Blank, TCP/IP JumpStart, 2006) Application Layer Application layer is the topmost layer on the TCP/IP protocol stack. It directly interacts with the applications on a computer or system. It provides abilities to the applications to consume services from other layers of the TCP/IP protocol stack. Application layer has a bunch of protocol and new protocols evolve frequently. (Reynders Wright, 2003) Some of the widely used application layer protocols and the services provided by those protocols are, HTTP or HyperText Transfer Protocol, has the responsibility of exchanging user information through developing web pages for World Wide Web. FTP or File Transfer Protocol is responsible for transferring file between two hosts. SMTP or Simple Mail Transfer Protocol is responsible for transferring mails and attachments. Telnet is responsible for emulation or terminal. It let a user log in to some remote network host. DNS or Domain name service helps in resolving the IP address and host names. RIP or Routing Information Protocol helps in routing and exchanging routing information across an IP network SNMP or Simple Network Management Protocol helps in managing different networking devices and manages the same. It helps in collecting and exchanging management information for devices like bridges, routers, intelligent hubs etc. Some examples of application layer interfaces for TCP/ IP protocol stacks may be NetBIOS, Windows Sockets etc. In Windows operating system environment, Windows Socket helps in having a standard API. NetBIOS helps in managing sessions, name resolutions, datagram related protocol services. The illustration of TCP/ IP protocol stacks along will different sets of protocols for each of the layers, has been given as, There are different types of networks used for different organizations, the networks differ in structures, services, interfaces, technologies. Connecting all these networks to have an interconnected network or Internet required some uniformity and platform independent protocols. OSI model was built to abstract the diverse nature of the network. OSI model provides enough abstractions to hide the complexities of networking and internetworking and gives enough scope to the programmer to build specific programs to each layer. Then programs from different layers of OSI model then work with one another. There were several flaws in OSI model. There were no details about the protocols or how to implement the functions of each layer. On the contrary, TCP/IP model gives details about the protocols from each layer. A programmer can implement those protocols from different layers and the job is done. (Held, 2002) OSI model has total 7 layers. Those layers are categorized into two category of layers as given in the following picture. The layers in the OSI model as, Application layer. Presentation layer, Session layer. Transport layer, Network layer, Data Link layer, Physical layer. First three layers belong to the application layer category and rest of the layers belong to the data flow category. On the other hand, there are four layers on the TCP/IP model. Those are application layer, transport layer, internet layer, and network access interface layer. These four layers covers the seven layers of OSI mode. The layers on the TCP/IP model are again divided into two categories. Application and transport layers are categorized as protocols layers and rest two belongs to networks layers. The comparison between OSI model and TCP/IP model are summarized as,(Alani, 2014) Open System Interconnection (OSI) Model TCP /IP Model This is more focused on architectural aspects of a network model and provides an idealistic view. It is more focused on the implementation aspects and provides some realistic view. OSI model is developed by a horizontal approach. It is developed based on a horizontal approach. The basic assertion behind the OSI model is that operation of distributed applications is laid upon a strict hierarchy of layers and standardisation. The basic assertion of TCP/IP model is that any application is composed of a set of functions over an end to end distributed communication service. There is a pool of application service elements or ASEs a distributed application selects an element from such pool and performs functions that is specific to the end to end service. Abstraction is the fundamental characteristic here. Every application assumes that services from lower layer will be available at any point of time. The session layer controls the sessions, presentation layer controls the representation of data etc. and the application layer communicated with the application on the host system. In OSI model, all these are different layers. Some examples of functions of OSI application layer are, VT, FTAM ,MHS, CMIP, DS etc. In the TCP/IP model, application, session and transport layers of the OSI model have been clubbed into application layer of TCP/IP model. Some example of protocols from application layer of TCP/IP model are, FTP. HTTP, DNS. Telnet etc. (Alani, 2014) The transport layer of OSI is responsible to deliver information from source system to destination system. The transport layer communicates from source to destination, performs flow control, error checking etc. The network layer provides connection oriented and connectionless services. The internet layer on the TCP/IP provides only connectionless service. Data link layer prepares the streaming of data, handles flow control, error control. Whereas data is transmitted through the physical media as a raw bit stream. The later part is handled by physical layer. Here data transmission is handled by network access layer only. Services provided by data link and physical layers in the OSI model are provided by the network access layer in the TCP/IP model. While implementation of the OSI model, the emphasis is on reliability of data transfer. The reliability is handled as an individual cases of end to end delivery. Detection and handling of errors is performed in each layer using checksums. Detection and handling of errors is done by the transport layer only. OSI model is most of the time a theory based description of an ideal network model, whereas TCP/IP model is a model that is being used in practice for long time. Task 2 IPv4 or Internet Protocol version 4 is a widespread and currently used internet addressing scheme. A network connects different types of devices as hosts. An internet is an interconnection of different types of networks across the globe. It is necessary to uniquely address each of the host connected to the internet. For that purpose internet address or IP addresses are used. There are different schemes of IP addressing. IPv4 is a 32 bit IP addressing scheme. With 32 bits, possibly there will be 232 unique IP addresses. IPv4 addressing uses a class-full addressing. Implementation of IP addresses in private and public networks has some challenges. One is, there is scarcity of addresses that can serve need of the networks and devices. Thus, there are two types of addressing used in private and public network. The addressing scheme used within a private network is not visible from the public network. Masquerading, NAT etc. are used to implement it. However, it increases overhead on routers. (Comer, 2006) On the other hand, there are two types of IP addresses, static and dynamic. ISPs use a pool of available IP addresses, when some client logs on to their network and request some IP address, then the ISP allocates one IP address from the address pool. The IP address is valid for that client for that session only. When the client logs off, the address will be de-allocated and will go back to the address pool. This scheme is known as dynamic IP address. Where the IP address is not tied to some device. The same client may get different IP address when it logs in again. And the same IP address may be allocated to other client next time. On the other hand, there are other types of IP addresses that are tied to a particular device. These are called static IP addresses. (Held, 2002) NAT or Network Address Translation is used to bridge the gap between private and public network. A NAT table is kept on the router. There may be at least two attribute for each entry of the NAT table, the IP addresses of a device in the private network and the IP address of the destination of the packet. The router checks the NAT table, replaces the source address as the public address of the network and forwards the packet to the destination. When it receives some packet from the Internet or other network, then it checks the NAT table again and forwards the packet to the destination. For public networks, there is no existence of the private network, they communicate with the public IP address of the network. There are RIR or Regional Internet Registry that are organizations for handling registration and allocation of IP addresses in different parts of the world. There are 5 RIRs currently for different regions of the world. Following picture illustrates the RIRs and operating domains. Each of the RIR has 16 millions of IP addresses to allocate. In IPv4 scheme, the whole address space is divided into 5 categories those are, Class Address Range of first Octet Network and Host octets Class A 1 to 126 N.H.H.H Class B 128 to 191 N.N.H.H Class C 192 to 223 N.N.N.H. Class D NA Reserved for Multi casting Class E NA Reserved for Research and Future use. There are several disadvantages of IPv4 addressing scheme. The blocks dont have equal number of networks or hosts. For example, there is huge numer of hosts possible for a Class A IP address but in reality no class A IP address contains that many hosts. On the other hand very few hosts are possible for a Class C IP address. So, there is a mismatch between the requirement and availability. Here comes the major disadvantage of IPv4 addressing schemes. There are unused IP addresses but those cant be allocated. The available IP addresses are depleting and has failed to cater the requirement of growth of internet. (Reynders Wright, 2003) As a result IPv6 has been developed. Task 3: Report Introduction The aim of this report is to discuss and highlight the key issues in implementation of IPv6 protocol for the organization TCS Ltd. In the rest of the parts of the report the discussion will focus on different aspects of implementing IPv6 in the organization, the benefits and drawback of the implementation, explanation and evaluation of other alternative transition mechanisms, analysis and evaluation of possible improvement in QoS or Quality of Service and security. IPv6 IPv6 or Internet Protocol version 6 is the latest and updated version of the communication protocol IP in the TCP/IP model. It helps in identification and location of a host system in the internet uniquely and routing traffic from source to destination on the Internet. IPv6 has been developed by IETF or Internet Engineering Task Force. One of the major issue with IPv4 is rapid depletion of the available IP addresses and poor distribution of the same. To deal with this problem IPv6 has come into the picture. It is slowly replacing IPv4. IPv6 is a 128 bit addressing protocol and holds almost 2128 unique addresses into its address space. IPv6 is not interoperable with IPv4. Thus one is needed to be replace by other. There are various transition mechanisms from going to IPv6 from IPv4. (Hagen, 2014) A 128 bits IPv6 address is broken down into 8 groups of four hexadecimal digits in each group. Each of the group is separated by a colon. There are compression methods available to shrink or expand representation of an address. Benefits and Drawbacks of Implementation of IPv6 One of the major benefits of IPv6 is the larger address space and classless distribution of addresses. The address allocation methods of IPv6 facilitates route aggregation and limits extensions of routing table. It support multicasting in a simpler and extended way. There are several optimizations for delivery of services. It enhances mobility, configuration and security of the devices. So, other benefits of IPv6 for an organization are, (Johnson, Perkins, Arkko, 2004) It provides better and more effective routing. The routing tables are reduced in sizes. A hierarchical approach in management of routing table can be taken. The ISPs can aggregate their networks into a single prefix. Fragmentation is done by the source in the IPv6 network, the routers are not responsible for it. Thus overall overhead from routing is reduced and routing has become more efficient. Processing of packets in IPv6 networks is better and simpler. Thus more efficient. There is no calculation of packet level checksum and no calculation of checksum at every hop. The link layer protocols and technologies handles this part. Ipv6 supports multicasting. It allows packet flows that are bandwidth intensive, to more than one destination at the same time. Thus the network bandwidth is saved. The hosts that are not bound to process broadcast packets. There is a additional data field in the IPv6 header, called Flow Label. This data field helps in identifying data packets belonging to the same data flow. Configuration of a network for the organization will be automated if it is built on Ipv6. The prefix of all local links to a router will be advertised. A host will be able to generate its own IP address. The MAC address of the host will be appended to the prefix sent by the router. Then it will be converted into some 64 bit EUI or Extended Universal Identifier format. The prefix is another 64 bit, thus the whole address will be 128 bit. There is no need to use NAT or Network Address Translation anymore. At the IP layer, the end to end connectivity will be provides. New services can be added. The peer to peer networks are easily manageable. VoIP, QoS etc. will be more effective. Security is another issue in any type of networks. IPv6 supports IPSec and provides CIA principles of confidentiality, integrity and authentication. ICMP packets for IPv6 are backed up with more security implementations of IPSec and the risks of malware attacks through these packets has been reduced. Apart from the benefits there are few drawbacks of IPv6. Those are, Still IPv6 is not widely accepted and those are not interoperable with IPv4. There is lack of smooth transition schemes to transit from IPv4 to IPv6. Alternative Transition mechanisms Some alternative transition mechanisms to transit to IPv6 from IPv4 are, Host to host Encapsulation In this method, the encapsulation is done at the source and the destination encapsulates it. A private IPv4 network without any information about the IPv6 protocol, is used to transfer the datagrams from the source to the destination. In the following picture, the illustration has been shown, including two hosts with dual IPv4 and IPv6 stacks. These stacks are used for encapsulations. IPv6 datagrams are sent as IPv4 packets. On the destination end, the hosts are updated to IPv6 protocol and will be able to de-capsulate the packets. (John J. Amoss, 2007) This transition mechanism does not require to change the existing IPv4 network, rather it use encapsulation to transit to the IPv6 network. Tunneling from router to router In this mechanism, a tunneling method connecting routers of the organization will be used along with the encapsulation schemes. On the originating host, the edge router will be placed. Another edge router on the destination host will be responsible for the de-capsulation. (Raicu Zeadally, 2003) There will be a tunnel between the edge routers at two ends. Again there will be two protocol stacks of IPv4/ IPv6 at two ends. These stacks will be supported by the hosts at both ends. Again, the source will encapsulate the packets, that will flow through the tunnel and the destination will de-capsulate the packets. Following picture illustrates the idea. The dual stacks at the both ends are needed to be supported by the edge routers. QoS and Security IPv6 provides better QoS and Security compared to the same in IPv4. IPv6 protocol helps in identifying payload that are time sensitive or not. A network can have two types of these packets. It helps in reducing the time in retransmission. IPv6 helps in setting priorities for data transmissions that provide low latency. Applications can select from the priority list as per requirement. A source of significant delay in packet transmission is fragmentation of packets. In IPv6 fragmentation is handled in different way. There is a negotiation between the source and the destination devices about the maximum size of the payload and other parameters are adjusted accordingly. It reduces latency and fragmentation significantly thus helps in better utilization of the network resources. There is QoS implementations on each of the networking device. On the other hand, security of IPv6 protocol is more stringent than the same in the IPv4 protocol. IPSec is an important part of the security mechanisms in IPv6. End to end security is ensured in IPv6. (Li, Jinmei, Shima, 2010) Conclusion In this report IPv6 and different aspects of IPv6 implementation have been discussed. There is a brief description of IPv6 along with discussion on benefits and drawbacks of IPv6, transition mechanisms, QoS and security etc. have been also discussed. Task 4: Report Introduction The aim of this report is to provide information of VoIP and MIP as requested by the TCS Ltd. The organization wants to implement these protocols and technologies for their employees. The organization wants to focus on the reduction of operational cost and modifying efficiency of network. VoIP or Voice over Internet Protocol VoIP or Voice over IP is a technology that helps a group of people to deliver voice and multimedia based communication over IP based networks like Internet. It is also called IP telephony. It supports services like voice communication, SMS, fax etc. over the Internet unlike traditional telephony system, it does not use circuit switching. Rather internet telephony or VoIP uses packet switching networks and packetization of data. An example of VoIP is Skype. (Porter, 2006) There are underlying technologies like session control, signaling control, setting up the call, tearing down the call etc. There are special medial delivery protocols to encode audio, video etc. as digital and streaming data. VoIP can be used by computers, laptops, smart phones etc. SMS service is available over WiFi or 3G connections. (Goode, 2002) Quality of Service or QoS of VoIP has several issues. VoIP is implemented over the Ip networks. IP networks are best effort networks and there may be loss of data, untimely deliver, latency related problem etc. VoIP will use time sensitive communication data. There is no provision of identifying and handling time sensitive data. Network traffic is handled by a first come first serve basis. There is no way to control fixed delays etc. The end points of a VoIP communication path may have to wait for the completion of the transmission of packets from one end to other, then one end will be able to send more data. Security is another consideration of VoIP. There are risks of DoS attacks, stealing of information, eavesdropping etc. There are other technical consideration related to security. For example, VoIP traffic also passes through the firewalls, NATs etc. so, there are chances that communication may get blocked. Encryption is always not supported by VoIP. (Wallingford, 2005) Some of the security measurements and protocols available for the VoIP are, SRTP or Secure Real time Transport Protocol. Also there are implementation of IPSec for the point to point communications. Mobile Internet Protocol MIP or Mobile IP is based on the idea of mobile computing and mobility of devices in a network. It helps a mobile device to keep its IP address same while moving around networks. A mobile node is allowed to have two types of address a care of address and a home address. The care of address changes whenever it moves to some other network, on the other hand the home address is remained same. Thus the computing activities based on the IP addresses are not hampered even there is a change in the network. (Raab, 2007) There are several security and QoS considerations. Most of the times mobile nodes use wireless connectivity options. These links are highly susceptible to vulnerabilities and information security risks. The risks may be active replay attacks, eavesdropping etc. These vulnerabilities cannot be eliminated. But use of encryption etc. can help. Tunneling used in MIP has some serious vulnerability. Thus authentication is always needed here. It also used ARP in case of tunneling. But it is hard to implement authentication for ARP. Thus, there will be some inherent vulnerability. (James, 2008) Conclusion In this report VoIP and MIP has been discussed. There is discussion on what are VoIP, MIP along with security, QoS issues and how enterprise networks are using those. References Ahmed, A., Madani, H., Siddiqui, T. (2010). VoIP Performance Management and Optimization. Cisco Press. Ahson, S. A., Ilyas, M. (2008). VoIP Handbook. CRC Press. Alani, M. M. (2014). Guide to OSI and TCP/IP Models. Springer. Blank, A. G. (2006). TCP/IP Foundations. John Wiley Sons. Blank, A. G. (2006). TCP/IP JumpStart. John Wiley Sons. Comer, D. (2006). Internetworking with TCP/IP: Principles, protocols, and architecture. Prentice Hall. Goode, B. (2002). Voice over internet protocol (VoIP). IEEE. Goralski, W. (2009). The Illustrated Network. Morgan Kaufmann. Graziani, R. (2012). IPv6 Fundamentals. Cisco Press. Hagen, S. (2014). IPv6 Essentials. O'Reilly Media, Inc. Held, G. (2002). The ABCs of TCP/IP. CRC Press. James, S. (2008). Mobile Ip: The Internet Unplugged. Pearson . John J. Amoss, D. M. (2007). Handbook of IPv4 to IPv6 Transition. CRC Press. Johnson, D., Perkins, C., Arkko, J. (2004). Mobility support in IPv6. Karas, J., Peschke, R. (2002). TCP/IP Tutorial and Technical Overview. Prentice Hall PTR. Kozierok, C. M. (2005). The TCP/IP Guide. No Starch Press. Li, Q., Jinmei, T., Shima, K. (2010). IPv6 Core Protocols Implementation. Morgan Kaufmann. Loshin, P. (2004). IPv6. Morgan Kaufmann. Mondal, A. S. (2012). Mobile IP. Springer . Norris, M. (2001). Mobile IP Technology for M-business. Artech House. Perkins, C. E. (2005). Mobile IP. Pearson . Porter, T. (2006). Practical VoIP Security. Syngress. Raab, S. (2007). Mobile Ip Technology And Applications. Pearson . Raicu, I., Zeadally, S. (2003). Evaluating IPv4 to IPv6 Transition Mechanisms. IEEE. Reynders, D., Wright, E. (2003). Practical TCP/IP and Ethernet Networking. Newnes. Thermos, P., Takanen, A. (2007). Securing VoIP Networks. Pearson . Wallingford, T. (2005). Switching to VoIP. O'Reilly Media, Inc.