Thursday, January 30, 2020

The Internet history Essay Example for Free

The Internet history Essay The Internet is a network of networks joining many computers together hence providing means for transportation of data and messages across distances and an infrastructure for the use of E-mail, bulletin boards, file archives, hypertext documents, databases and other resources. (Roberts, 1967) The history of the internet began way back in 1973 when the U. S. Defense Advanced Research Projects Agency (DARPA) initiated a research program to investigate the techniques and technologies for interlinking packet networks of various kinds. The main aim of the research was to develop communication protocols which would allow computers that have been networked to communicate transparently across different multiple linked packet networks. This project was called Internetting and the system of networks which emerged from this research done was called the Internet. Hence the protocols which were developed over this research project are known as the TCP/IP Protocol Suite that is the Transmission Control Protocol (TCP) and Internet Protocol (IP). (Dingel, Dutta, Odlyzko, and Sato, 2003). In 1980 to 1981 two other networking projects BITNET (Because Its Time Network) and CSNET were initiated. BITNET adopted the IBM RSCS protocol suite and featured a direct leased line connection between participating sites. The original BITNET connections linked IBM mainframes in university data centers and this rapidly changed as protocol implementations became available for other machines. BITNET has been multi disciplinary in nature with users in all academic areas that also provided a number of unique services to its users. BITNET has established a backbone which uses the TCP/IP protocols with RSCS-based applications running above TCP protocols. By 1985, Internet was already well established as a technology supporting a broad community of researchers and developers, and was beginning to be used by other communities for daily computer communications. Electronic mail was being used broadly across several communities, often with different systems, but interconnection between different mail systems was demonstrating the utility of broad based electronic communications between people. The Internet technology was being experimentally validated and widely used among a subset of computer science researchers, other networks and networking technologies were being pursued. The usefulness of computer networking was demonstrated by DARPA and Department of Defense contractors. (Licklider and Clark, 1962) With the exception of BITNET and USENET, these early networks were intended for closed communities of scholars and hence little pressure for the individual networks to be compatible. In addition there were alternate technologies were being pursued in the commercial sector including XNS from Xerox, DECNet, and IBMs SNA. It remained for the UK’s National Research and Education Network called JANET and U. S. NSFNET programs to explicitly announce their intent to serve the entire higher education community. In 1985 the NSFNET program was started to support wide area networking. The wide area networking infrastructure supports the general academic and research community with the need to develop a strategy that establish such infrastructure. CSNET (Computer Science Network) was initially funded by the National Science Foundation to provide networking for university, industry and government computer science research groups. (Kleinrock, 1964) The CSNET used the Phonenet MMDF protocol for telephone based electronic mail relaying and also pioneered the first use of TCP/IP using commercial public data networks. The CSNET name server provided an early example of a white pages directory service that is still in use at numerous sites. CSNET had approximately two hundred participating sites and international connections to approximately more than fifteen countries at its peak. (Kleinrock, 1976) BITNET and CSNET merged to form the Corporation for Research and Educational Networking (CREN) in 1987. By 1991, CSNET service was discontinued having fulfilled its important early role in the provision of academic networking service throughout many academic and government organizations. The U. S.National Science Foundation developed NSFNET (National Science Foundation Network) in 1986 today provides a major backbone communication service for the Internet. The NSFNET has 45 megabit per second facilities that carries 12 billion packets per month between the networks it links. Also, the National Aeronautics and Space Administration, the U. S. Department of Energy and National Science Foundation contributed additional backbone facilities that became heavily involved in internet research and started development of a successor to Advanced Research Projects Agency Network (ARPANET). These branches developed the first Wide Area Networks based on TCP/IP Protocol suite. (Coffman and Odlyzko, 2002) Between 1986 and 1988 the Corporation for Research and Educational Networking (CERN) began installation and operation of TCP/IP to interconnect its major internal computer systems and workstations. They continued to operate a limited self-developed system CERNET internally and several incompatible network protocols externally. There was considerable resistance in Europe towards more widespread use of TCP/IP but many commercial network providers in the U. S. and Europe are begun to offer Internet backbone and access support on a competitive basis to any interested parties. By 1989, Australian universities joined the push towards using IP protocols to unify their networking infrastructures and thus the AARNet was formed by the Australian Vice-Chancellors Committee and provided a dedicated IP based network for Australia. During the evolution of internet particularly after 1989, it began to integrate support for other protocol suites into its network backbone. The emphasis in the present internet system is on multiprotocol interworking particularly with the integration of the Open Systems Interconnection (OSI) protocols into the architecture. The public domain and commercial implementations of 100 protocols of TCP/IP protocol suite became in existence for both domains. In the early 1990s the OSI protocol implementations also became available and by 1991 the Internet had grown to over five thousand networks in more than three dozen countries and serving over seven thousand host computers used by over four million people. (Coffman and Odlyzko, 1998) A great deal of support for the Internet community has come from the U. S. Federal Government since the Internet was originally part of a federally funded research program and subsequently it has become a major part of the U. S. research infrastructure. In over fifteen year of history, the Internet has functioned as a tool for collaboration among cooperating parties. Some certain key functions have been critical for its operation and by which is the specification of the protocols which the components of the system operate. These were originally developed in the Defense Advanced Research Projects Agency research program mentioned, but in the last five years the work has been undertaken on a wider basis with support from Government agencies in many countries, industry and the academic community. The Internet Activities Board (IAB) was created in 1983 to guide the evolution of the TCP/IP Protocol Suite and to provide research advice to the Internet community. The two primary components that make up the internet activities board are the Internet Engineering Task Force and the Internet Research Task Force. The primary responsibility for further evolution of the TCP/IP protocol suite is its standardization with the concurrence of the Internet Activities Board and the integration of other protocols into Internet operation. The Internet Research Task Force continues to organize and explore advanced concepts in networking under the guidance of the Internet Activities Board and with support from various government agencies. A current trend with major implications for the future is the growth of high speed connections in the internet. The internet networks has now gone wireless and has grown rapidly in the past few years such as the use of wi-fi hot spots where one can connect while they are away from the home or office and access the internet. The networks have come along way from using cable to wireless networks hence results to wireless internet access through hot spots. In conclusion the internet has gone wireless now and there is a high demand and usage for internet from the past history. This wireless trend has begun to affect web designers is the growth of smaller devices to connect to the Internet. The Small tablets, pocket Personal Computers, smart phones and even Global Positioning System devices are now capable of tapping into the web and many web pages are now designed to work on that scale. (Cerf and Kahn, 1974). Reference: Cerf, V. Kahn, R. (1974): A protocol for packet network interconnection- IEEE Trans. Comm. Tech. , Vol 5, pp. 598-643 Coffman, K. and Odlyzko, M. (1998): The size and growth rate of the Internet, First Monday 3(10) pp 23-30 Coffman, G. Odlyzko, M. (2002): Growth of the Internet, In Optical Fiber Telecommunications IV B- Systems and Impairments, Academic Press, pp.17-56 Dingel W. , Dutta, K. Odlyzko, M. and Sato, I. (2003): Internet traffic growth- Sources and implications, Optical Transmission Systems and Equipment for WDM Networking II, Vol. 5247, pp. 5-14 Kleinrock, L. (1964): Communication Nets-Stochastic Message Flow and Delay, New York, McGraw-Hill, pp 79-98 Kleinrock, L. (1976): Queueing Systems- Computer Applications, Vol II, New York, John Wiley and Sons, pp 55-98 Licklider, J. and Clark, W. (1962): On-Line Man Computer Communication, pp 43-47 Roberts L (1967): Multiple Computer Networks Intercomputer Communication. ACM Gatlinburg Conf, pp 38-78.

Wednesday, January 22, 2020

Story of Saint Hilarion Castle and Queen Regaena :: Byzantine Cyprus

Story of St. Hilarion Castle and Queen Regaena â€Å"Welcome to St. Hilarion, step forward into Queen Regaena’s chamber to receive your pay for your hard work and dedication!† As I step through the doorway, there is the alluring Queen Regaena just inside the open window of her chamber. I cross the room, and I unexpectedly feel the guards’ presence close in behind me. Suddenly, they grab me and force me through the open window. As the guards push me from the precipice outside the window, â€Å"Thank you again,† are the last words I hear, as I fall to my death in the valley below. The fairy tale-looking castle of St. Hilarion was built by the Byzantine queen, Regaena, the end of the 11th century. Queen Regaena was the most beautiful lady in the land of Cyprus, alas; she was also the most heartless and cruel. She was a greedy woman and desired to have the most beautiful and elaborate castle in all of Cyprus. Queen Regaena insisted on overseeing the construction of the castle herself. No detail was to be overlooked. In planning such a large and magnificent castle, Queen Regaena knew that she would need a large workforce. She gathered a large number of sturdy men from near and far and forced them to build her castle. She required the men to form lines, standing side by side, and pass the materials from man to man until they reached their assigned destination. This was difficult work since most of the materials had to be transported from the valley to the summit of the mountain. But goal was to complete the castle in Regaena’s lifetime so she could enjoy it. Finally, the glorious castle was completed and she named it St. Hilarion Castle. Its unsurpassed grandeur impressed all who beheld it. Queen Regaena should have been joyful at the completion of St. Hilarion, however, she was worried. Over the years, Queen Regaena had amassed a large fortune of gold and wealth in her family treasury. Her greatest fear was that the workers who constructed the castle would remember the hidden location of the royal treasure room. She sat in a chamber in the western wing of the castle and thought of a plan to prevent possible robbery. This particular chamber had a window which opened onto an enormous precipice and had a breathtaking view of the valley far below. Sitting at this window, she devised an evil plan to protect her treasure.

Tuesday, January 14, 2020

Did School Helped in Covering Up the Crime

In my assessment of the facts, I believe that Eastern Michigan University did not intentionally covered-up the death of Laura Dickinson. Though the Clery Act requires schools to report any crimes and other threats to safety to students, it ignores such law because it lacked clear decision as to what to do with the incident (Goldman). Aside from that, it is beyond doubt that the school failed in initiating investigation on the incident. The tragic incident may also have distracted the school administrator as to what really happened to Laura until the body cannot be revealed to the students. Apart from that, the school may have feared that announcing the death of Laura may disturb their investigation and may create fear among students that they cannot control. The incident may have been perceived by the school as a threat to the peace within the school. Furthermore, the incident may have happened the first time and it is not prepared and lacked the proper guidelines in responding to such incident. It would also be unfair to conclude that the incident was covered- up because the school did not hid the body. If it was the school’s intention to cover-up the incident, it could have done anything that would disallow anyone from discovering it. Besides, the school made a statement after ten days. Thereafter, informed Laura’s parents after ten weeks. Ten weeks may be considered to be unreasonable for the school to finally decide in revealing the truth but it may be considered only as a negligence and indecisiveness on their part. The school may have feared losing its reputation once the incident is fully made known in public and may have been confused about the privacy of the people concerned. Aside from failing to report the incident, there are no other circumstances that would strongly determine that the school tried to hide the incident from the students and the public as well. Furthermore, the school may have been ignorant about the consequences of its act. Hence, the school did not intentionally covered-up the incident.

Sunday, January 5, 2020

Market Analysis Market Failure - 1246 Words

Market failure: Market failure is the market cannot efficiently allocate goods and services. Only completely competition market mechanism is the most efficient market mechanism, in addition to this, others are all included in market failure. And in actuality, because of various of factors, it cannot obtain the completely competition market mechanism and produce the loss of efficiency (MacKenzie, 2002). Merit goods: Merit goods are the government feels that people will under-consume, and which ought to be subsidized or provided free at the point of use so that consumption does not depend primarily on the ability to pay for the good or service (Musgrave, 2002). For examples, healthcare is the example of merit good. Governments provide merit†¦show more content†¦Imperfect competition refers to a competitive market, there are many sellers but they sell different goods on imperfect market competition scene. As the name suggests, the competitive market, in essence is not perfect (Mackenzie, 2002). Governments have to master the control of imperfect competition, because there are always some buyers have big and inevitable ability, it can affect and disrupt the market price. These buyers will lead to monopoly. If a monopoly behavior occurs, it will lead to big trouble. So the government needs to control monopoly (Mankiw, 2012). Externalities: An externality is a consequence of an economic activity experienced by unrelated third parties; it can be either positive or negative (Mankiw, 2012). For example, pollution emitted is a negative externality. The government have to make the external reasons, including changing incentives, and external effects for people to consider their behaviors. The government can make externally imposed a tax on producers’ equilibrium quantity to decrease the market supply. Role of government are expected to let the negative externality into directly linked to economic activity, such as fines and forced to increase equipment. In today s society is in rapid development trend, in the final analysis is the further deepening of high-tech industries. The problem between environment andShow MoreRelatedMarket Analysis : Market Failure1728 Words   |  7 PagesMarket Failure Markets are the institutions where the exchange of goods and services among individuals collective agents occurs. The exchange of these goods and services utilizes money as the medium through which equivalence of worth and value is given to the goods and services (Keech and Munger 4). This leads to the formation of prices given for the goods and services. Additionally, markets may be categorized in accordance with the commodities and services traded in them where these categories entailRead MoreThe Key Ideas Of Market Failure1387 Words   |  6 Pages EXECUTIVE SUMMARY The key ideas of market failure is the non-appearance of specific goods and services, competitive markets delivery the efficient quantity of all goods and services – that is the amount which best meets people’s requirements and favourites, given scarce resources. Market failure refers definitely to the causes of the failure, which is problems with the techniques through which the market works, not the results of the failure to deliver a certain outcome. The public sectorRead MoreWhy Are Environmental Failures Considered to Be an Example of Market Failure?652 Words   |  3 Pages(a) Why are environmental problems considered to be an example of market failure? Environmental problems are considered to be an example of market failure because environmental problems not only compound poverty and low standards of living, but the problems of common access resources or weak regulations result in massive negative externalities and a significant threat to sustainability. Market failure is defined as when community surplus is not maximized due to problems preventing resources fromRead MoreTax On Smoking Essay1079 Words   |  5 Pagesexternalities, the spill-over effects onto third parties that are not given compensation for those issues, of smoking would be corrected solely by a tax on them. The reason why government intervention is required within the cigarette market is because it is a market failure – there is an inefficient allocation of resources causing both too much production and too much consumption of the product. The following evaluation will identify my reasons why a tax is likely to be ineffective. Above, my supplyRead MoreThe Implementation Of A Fat Tax1158 Words   |  5 Pagescurrently 24.9% and is the highest in Europe (Nhs.uk 2015). The extent of the UK confectionery market size, which is expected to grow to  £6.64 billion (bn) by 2019 (www.foodmanufacture.co.uk 2015) is a major contributing factor to the obesity rate and can be considered a market failure due to the associated negative externalities and its nature as a demerit good. Consequently, this causes market failure as it is over provided and readily available, creating deadweight welfare loss (DWL) . This essayRead MoreThe Externalities of Smoking1470 Words   |  6 Pagesconsumption externalities of smoking and apply this analysis of externalities to the policy of ban on smoking in public places. The next part of this paper explains the externalities of smoking. The third part examines the policy of territorial restriction on smoking. In the final part, we conclude and discuss some shortcomings of this study. Externalities of Smoking In theory, in a market that with perfect information and no externalities, the market can distribute resources efficiently without anyRead MoreGovernment and Market Failure Essay1687 Words   |  7 Pages In micro-economics market failure is characterized by resource misallocation and subsequent Pareto inefficiency. Just as the invisible hand falters, so is the case that the unregulated markets are incapable of solving all economic problems. In laissez-faire economy, market models mainly monopolistic, perfect competition and oligopoly are expected to efficiently allocate resources for the â€Å"welfare benefit† of the society. However individualistic and selfish private interests divert the public benefitsRead MoreFracking Operations : The Chief Executive Officer Of Eqt Corporation994 Words   |  4 Pagesefficient allocation of resources, a tenant of the free market. By supplying enough to meet demand, keeping the well operational will allow consumers to pay a price close to natural price. As the supply and demand model states, this is the most efficient use of their capital which leads to a fair outcome for them. However, while these three stakeholder groups benefit, local residents will suffer. The continued fracking leads to a market failure in the form of a negative externality. Local residentsRead MoreTragedy of the Commons: Overfishing the World’s Oceans Essay1699 Words   |  7 Pagesuncompensated costs that sustained, unregulated fishing directs on the welfare of society, is an example of a market failure. This market failure exists because the market price for Bluefin Tuna undervalues the full social cost of unrestricted consumption of this once plentiful fish. When negative environmental externalities exist, the private equilibrium price and quantity, as determined by free market supply and demand, is not the same as the social equilibrium. Since social costs are not priced intoRead MoreRegulation of Financial Accounting and Reporting: the Pro-Regulation Perspective1237 Words   |  5 Pagesinformation asymmetry arises between them. Without regulation, even though managem ent might disclose relevant accounting information voluntarily in order to get funding, the degree of credibility and completeness of information is unclear. According to the analysis of Lang and Lundholm, the accounting disclosures specifically for firms that make equity offerings has a significant increase within the six months before the offering occurs particularly in those categories the firm has discretion (cited in Healy