Thursday, November 28, 2019

A True Nature of the Effects of Child Abuse and Neglect in a Society

A True Nature of the Effects of Child Abuse and Neglect in a Society Discussion on the Assignment Additional Page The solutions to the problems defined in the project have to be properly organized and based on credible information and the results of the observations. Child abuse is the concept that touches upon millions of families (Cloitre, Cohen, Koenen, 2011).Advertising We will write a custom research paper sample on A True Nature of the Effects of Child Abuse and Neglect in a Society specifically for you for only $16.05 $11/page Learn More Some children face sexual abuse problems, many children have psychological problems because of parental neglect, and there are also the children, who have the problems based on physical abuse (Lemoncelli, 2012). The outcomes of child abuse usually depend on a variety of factors like the age of a child, the type of relation between a child and a perpetrator, and, of course, the type of maltreatment (Child Welfare Information Gateway, 2013). This is why the chosen problem, a variety of child abuse effects, seems to be the most crucial in the project. In general, the evaluation of the behavior of the children suffered from abuse and their parental neglect shows that the effects may be long-term and short-term (Sousa, Herrenkohl, Moylan, Tajima, Klika, Herrenkohl, Russo, 2011). Parents are not always able to understand how dangerous their maltreatment can be in regards to the future of their children. Parents cannot ask for professional help as they are afraid of some criminal consequences, this is why the outcomes of their inabilities lead to a considerable rising of the financial costs of child abuse (Fang, Brown, Florence, Mercy, 2012).Advertising Looking for research paper on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Professional help and therapy are obligatory for children, who become the victims of maltreatment and abuse within a short period of time. Unfortunately, the investigations prove that the effects of child abuse appear with time and have to be treated on a special level (Cloitre, Cohen, Koenen, 2011). Problem Solution The existing variety of the effects and the inabilities to identify them properly and in time is the problem that has to be solved during current research on the child abuse effects and the reasons of parental neglect. There are several ideas of how the chosen problem should be evaluated, and several methods that can be used to solve the problem that may be implemented with the already known investigations (Fang et al., 2012; Moylan et al., 2010). As it has been already stated, the effects of child abuse and parental neglect is a social issue, this is why it has to be solved within a particular society. The problem solution process should begin with an identification of a community within the frames of which it is possible to organize a project. It is necessary to prove that child abuse is a vital problem, and the question of parental neglect and maltreatment is open and needs more answers and explanations. It is not enough to use the already known statistics and base the project on the fact that more than half a million American children are the victims of their parents’ maltreatment (Centers for Disease Control and Prevention, 2014). The up-to-date material may be based on the real-life examples and evidence. The solution of the problem under consideration should be based on the following steps:Advertising We will write a custom research paper sample on A True Nature of the Effects of Child Abuse and Neglect in a Society specifically for you for only $16.05 $11/page Learn More The identification of the reasons of child abuse and parental neglect; The classification of the child abuse effects and their possible extend; The preventive methods that can be used for each type of abuse; The description of a diagnosis and the identification of treatment for children, who suffer from abuse; Th e ideas of how to involve more people to protect children, who are not able to cope with the challenges of abuse and neglect. Social Implications Social implications of the chosen problem are crucial indeed. First, the project serves as a powerful proof that child abuse is a problem for discussion. Second, it should be proved that a society, as a whole, is the body that takes responsibility for its children. If children suffer from the inabilities to overcome abuse and neglect, the society should think about the most effective methods to improve the situation. Finally, the development of special programs and the creation of special organizations directed to the treatment of abused children should be promoted. For example, there is the National Child Traumatic Stress Network that aims at identifying the standards of care for abused children (Child Welfare Information Gateway, 2013). There are also many organizations that use hypnosis with children survived traumas because of their p arents’ maltreatment (Degun-Mather, 2006). All these methods are effective and help to define the nature of child abuse (Iwaniec, 2006), but they have less in common with the necessity to prevent the cases of child abuse and improve parent-children relations. The current project should help to define the effects of child abuse and think about the prevention of maltreatment taking into consideration the evaluation of child’s condition, health, and the effects of abuse.Advertising Looking for research paper on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Fang et al. (2012) identify short-term and long-term health care costs, Sousa et al. (2011) work with the social problems, and Moylan et al. (2010) focus on the problems with behavior. Each investigation is a specific answer to the question why child abuse should be prevented. However, the researchers do not give suggestions but state the facts. These are the main limitations of such projects, and social implications of the project under analysis teach that it is possible to change the situation in case certain measurements to be taken. Capstone Reflection The problems people face during their childhood are characterized by a number of considerable marks. Children cannot even guess that parental neglect may define their future qualities and abilities. Some children cannot even recognize a case of child abuse and do not find it necessary to address some experts for help (Stalker McArthur, 2012). The identification of such problems and inabilities serve as the basis for the project a bout child abuse and its effects. Children may suffer from emotional, physical, sexual, and other types of abuse (Cloitre, 2011), and each type of abuse has its own effects on a child. This is why it is not only necessary but crucially important to know how to help children, who survived abuse, and treat them properly in regards to the effects of child abuse (Child Welfare Information Gateway, 2013). The capstone project under analysis is an opportunity to understand better parents and their decisions to treat their children poorly, learn the effects that can be observed after the cases of child abuse, and know how to prevent maltreatment if it is possible. The projects by Degun-Mather (2006) about the benefits of hypnosis, Fang et al. (2012) about the economic challenges caused by child abuse, and Moylan et al. (2010) about the peculiarities of domestic violence explain how it is better to identify the effects of child abuse and the possible impact of society on children and their parents. Reference List Centers for Disease Control and Prevention. (2014). Child Maltreatment: Consequences. Retrieved from https://www.cdc.gov/ Child Welfare Information Gateway. (2013). Long-term consequences of child abuse and neglect. Web. Cloitre, M., Cohen, L.R., Koenen, K.C. (2011). Treating survivors of childhood abuse: Psychotherapy for the interrupted life. New York, NY: Guilford Press. Degun-Mather, M. (2006). Hypnosis, dissociation and survivors of child abuse: Understanding and treatment. West Sussex, England: John Wiley Sons. Fang, X., Brown, D.S., Florence, C.S., Mercy, J.A. (2012). The economic burden of child maltreatment in the United States and implications for prevention. Child Abuse Neglect, 36(2), 156-165. Gloud, F., Clarke, J., Heim, C., Harvey, P.D., Majer, M., Nemeroff, C.B. (2012). The effects of child abuse and neglect on cognitive functioning in adulthood. Journal of Psychiatric Research, 46(4), 500-506. Iwaniec, D. (2006). The emotionally abused an d neglected child: Identification, assessment and intervention. West Sussex, England: John Wiley Sons. Lemoncelli, J.J. (2012). Healing from childhood abuse: Understanding the effects, taking control to recover. Santa Barbara, CA: ABC-CLIO. Moylan, C.A., Herrenkohl, T.I., Sousa, C., Tajima, E.A., Herrenkohl, R.C., Russo, M.J. (2010). The effects of child abuse and exposure to domestic violence on adolescent internalising and externalising behaviour problems. Journal of Family Violence, 25(1), 53-63. Sousa, C., Herrenkohl, T.I., Moylan, C.A., Tajima, E.A., Klika, J.B., Herrenkohl, R.C., Russo,. M.J. (2011). Longitudinal study on the effects of child abuse and children’s exposure to domestic violence, parent-child attachments, and antisocial behavior in adolescence. Journal of Interpersonal Violence, 26(1), 111-136. Stalker, K McArthur, K. (2012). Child abuse, child protection and disabled children: A review of recent research. Child Abuse Review, 21(1), 24-40.

Monday, November 25, 2019

Jasper Jones as a Bildungsroman Essays

Jasper Jones as a Bildungsroman Essays Jasper Jones as a Bildungsroman Paper Jasper Jones as a Bildungsroman Paper Jasper Jones, a novel set in the mid-1960’s, is the story of an adolescent boy, Charlie Bucktin. It illustrates that making choices is a significant part of human behaviour. Individuals have to live with the consequences of their decisions. Studying this novel written by Craig Silvery in 2009, broadens an understanding of the process of choices and draws conclusions about the factors involved in coming of age. In other words, Jasper Jones is a bildungsroman. The main protagonist Charlie is best described as a wallflower, the improbable hero who seems to shy away from conflict and perceives the world on the basis of words written by the likes of Harper Lee and Mark Twain. Silvey’s extremely careful composition of Charlie aids and enables us to perceive the story on a highly un-biased, open-minded and impartial basis. Within the first chapter, Charlie is placed in an unfamiliar situation, challenging and awakening his initial thoughts on what is right and wrong, thoughts like â€Å"We have drowned her.† â€Å"We are monsters†. The youthful, sheltered boy who commits this act alongside the infamous Jasper Jones and begins his journey with an undying sense of doubt, but we soon see how Charlie perceives Jasper, his fellow accomplice; â€Å"I think he’s the most honest person in this town†. This bold bond, formed in secrecy, exposes young Charlie to ever-looming maturity, a window into a world that leaves the truth bare and reveals the faults that lie within the streets of Corrigan. Charlie has yet to experience this in its full force but Jasper’s presence prompts the rise of inquisitive questions in his mind. A cry for help from the town’s half-caste misfit triggers the Charlie’s development into adulthood. We the reader get to see the gradual evolution of moral understanding that he endures as he observes the world the adults. This quote from just after the night he sees Laura Wishart’s body, â€Å"This night has pickpocketed m

Thursday, November 21, 2019

The IASB at a Crossroads Assignment Example | Topics and Well Written Essays - 250 words

The IASB at a Crossroads - Assignment Example IFRS ensures high quality standards in financial reporting of financial statements globally by promoting transparency, accountability and integrity in financial reporting. High quality financial reports enable the making of effective decisions IFRS decreases the cost of capital and provides institutional investors with the ability to make well-informed decisions by comparing investment portfolio. Companies trading in the stock market are required to comply with IFRS. IFRS helps to reduce information asymmetry and reduces transaction costs thus reducing the cost of capital. This helps attract Foreign Direct Investments. IFRS also promotes better management control systems. Despite the benefits adoption of IFRS faces quite a number of challenges. There is lack of public awareness on the use of IFRS and its benefits to regulatory authorities and investors. This is because of lack of information on IFRS. There is chronic shortage of competent professionals in some countries especially developing countries to implement IFRS. Most of these countries still use previous accounting practices which IFRS is phasing out. The IASB is ambiguous in its requirement on the adoption of IFRS globally. For instance, the less developed countries would simply adopt the standards without putting in appropriate legislative measures. A few industry players would adopt IFRS and yet the country would be registered as an adopter of IFRS. The IASB can promote updating of academic curricula in universities and training institutions across the world in order to raise public awareness on the use of IFRS and raise competent professionals who can implement IFRS. IASB can continuously publish pronouncements and embark on capacity building programs on IFRS to provide more information to investors and regulatory

Wednesday, November 20, 2019

Containment policies Essay Example | Topics and Well Written Essays - 1000 words

Containment policies - Essay Example The Divine et al. (28) outlined that it prevented the actions of Soviet Union of spreading of communism ideology and doctrines across Europe, China, Korea, and Vietnam. This policy was utilized to justify the US engagement in the Vietnamese war and Korean War. Containment policy was a component of cold war and was formulated by George Kennan after the Second World War between the years 1940 to 1950’s. The US viewed communism as threat as it controlled the private life and the thoughts of its citizen (145). However, the policy lost its influence in the year 1953 after the demise Stalin. Originally, the policy was applied in 1947 by Turkey and Greece after being promised of military support, technical assistance and economic support by the American government and other non-communist nations (156-161). An analysis of three examples of the containment policy in both Europe and Asia As cited by Divine et al. (176-189) amongst the three examples of containment policies in both Europ e and Asia included: the Korean War, NATO formation, and mutually assured destruction. First, the rise of communism in the Asian continent is the last place the Soviet Union thought it would introduce communism. The Korean War is a manifestation of how the containment policy

Monday, November 18, 2019

The increasing relevance of appearance in society Essay

The increasing relevance of appearance in society - Essay Example It was mainly injured soldiers who went under the knife for reconstruction surgery (American Society of Plastic Surgeons 2011). However, since the late 1980s, the number of patients who desired cosmetic surgery began to spike; today, cosmetic surgery patients make up most plastic surgery patients. Dr. David Hargraves stated that the majority of his work now centers on aesthetic or cosmetic surgery, whereas before the 1980s he mainly performed surgeries for burns victims (Elliott 16). So, why has there been an increase in the number of patients looking for aesthetic surgery? The answer is that society has become more appearance-oriented, and many factors have contributed to this shift of thought. We can clearly see that society has moved towards a focus appearances when we consider how beauty standards have affected our lives. These days, there is a certain beauty standard that people are likely to pursue. To start with, people try to meet this standard for social reasons. Henderson-K ing and Brooks (134) state that a motivation for enhancing one’s attractiveness through cosmetic surgery is to develop one’s social status. It is a basic human desire to want to look more attractive to others, including one’s partner; this results in feeling a need to undergo cosmetic surgery (Henderson-King and Brooks 134). ... This pressure drives a person to feel dissatisfied with their body. As a result, having a negative image about their body contributes to their thinking about reshaping their bodies through surgery (Park, DiRaddo, and Calogero 110). Also, Henderson-King and Brooks (135) argue that â€Å"one mechanism through which the internalization of standards of attractiveness is likely to happen is through the influence of close others, such as mothers, fathers, and friends.† A person’s concern about being attractive is formed by their close acquaintances, as their family and friends keep transmitting messages to them through appearance-focused behavior and attitudes (Henderson-King and Brooks 135). Basically, this behavior is likely to lead to someone to feeling insecure and less confident, and this intrapersonal reason, as well as the social reason, promotes someone to change their appearance through cosmetic surgery. Among several beauty standards, the most widespread one is know n as ‘white beauty’. Across the globe, many people believe that white equals beauty. In addition, many people have a perception that white skin will result in a better economic and social status (Hunter 153). Due to these beliefs, many immigrants to the United States, such as Asians, Europeans, and African-American women, are now turning to cosmetic surgery to meet this recognized standard of beauty. This has come to be known as ‘ethnic plastic surgery’. The fact that the number of cosmetic surgeries performed from 2000 to 2008 in the United States for African-Americans increased by 145 percent and for Asians by 290 percent proves that ethnic plastic surgery has become

Friday, November 15, 2019

Nat Traversal For Video Streaming Applications Information Technology Essay

Nat Traversal For Video Streaming Applications Information Technology Essay Video streaming is considering one of the famous technologies which is used today. It provides the ability to playback video files remotely through computer networks. The demand for this technology is rapidly increasing due to wide spread of Internet and increasing of the network bandwidth[1] While HTTP protocol uses one TCP port at the transport layer, RTP can use many ports. RTP can use UDPs or TCPs ports at the transport layer depending on how much the packet path is suffered from packet loss [2]. In low packets loss environment, the use of RTP over UDP protocol is preferable, since in media streaming, the small ratio of packets loss better than packets delay. Hence, the higher reliability of the TCP is not desired[3]. UDP/RTP has also the multicasting feature and has the ability to deal with real time communication due to its features in bandwidth, jitter, reliability and end nodes processing. RTP/TCP can cause the video streaming to suffer from discontinuity because the need to retransmission and reordering the packets, whereas RTP/UDP can suffer from dropping the packets by some filters (firewalls) in the Internet Service Provider (ISPs). Some ISPs drop UDP packets because they are connectionless hence unfair against TCP traffic. They also need high processing power and memory to ensure security [4]. But the main issue that can occur is when using the RTP with the Network Address Translation (NAT). NAT drops any RTP/UDP or RTP/TCP packets that are initialized from the outside (Internet) when incoming to the end-systems (behind the NAT). The NAT is a technology that permits many computers on the same network to share a public Internet Protocol (IP) address for accessing the Internet. The main reason behind the wide spread of using the NAT is the limited number of the available IPv4 addresses [5]. The use of RTP/UDP or RTP/TCP video streaming is started with a TCP connection that is established by a request from the client to the server, after initial negotiation using the RTSP protocol on the same established TCP channel, the server starts video streaming through UDP or TCP ports initialized from the server not through the original RTSP/TCP channel [2]. The NAT permits to pass the outgoing connections requests from a host behind the NAT into the outside network (like Internet) [6], however it does not permit to pass any connection request from the outside network (like Internet) to any host behind the NAT [7]. This is because the translation table entry is constructed only when a client (behind the NAT) initializes a request to connect to a host on the outside network (Internet) [8], [9]. If the initialized request came from a host on the outside network of the NAT into the inside network, the NAT cannot identify the destination host for this request and the connection between the outside host and the inside one cannot be occur [8], [10]. Regarding to the RTP/UDP video streaming, the NAT will not allow the UDP video streaming channels to pass to the client behind the NAT, since the RTP/UDP channels are initially established from the server (on the Internet). Considering the RTP weakness points, the HTTP protocol, is the preferable choice for video streaming. However, HTTP protocol also has known weakness points: the user can suffer from quality reduction and playback discontinuity due to the probing behaviour of TCP protocol. This can also cause an oscillating throughput and slow recovery of the packet rate. In contrast, the UDP protocol provides a mean to keep the desired sending rate constant. It also keeps streaming smooth and eliminates the TCP related processing. This paper presents a novel method to utilize the benefits of both TCP and UDP. The proposed method enables NAT traversal by converting each RTP/UDP and RTCP/UDP packet into fake TCP packet just before being sent (at data link layer) by adding a fabricated TCP header before each UDP video streaming packet and making the necessary modifications to the length and checksums fields. These fabricated TCP packets will pass the NAT, since they will be transmitted on the channel (IP, TCP port) that firstly initialized (RTSP/TCP channel) by the client behind the NAT. In this paper, this channel is called the active channel. The receiver, on the other side has to restore the original UDP packet before being processed by the corresponding transport layer. The restoration is based on a specific signature. In order to restore the packets, every fabricated TCP packet has to have a known signature. Depending on that signature, the receiver will restore the original packet. All of the previous changes are performed at the data link layer. The rest of this paper is organized as follows: section II, looks at some related work. In section III, the proposed methodology and algorithm are presented. In section IV, the experiments of the implemented proposed method and its discussions are described. In section V, the evaluation of the proposed method and comparisons between the proposed method and the existing technologies are presented. The paper is concluded is section VI. Related work Limited to our knowledge, no many similar works are presented. However, [4] present a method to overcome the RTP/UDP issues by putting a proxy server between the client and the streaming server (at the global network). The proxy receives a HTTP request (TCP) from the client and translates it to a RTSP/RTP request to the server (TCP+UDP). The proxy has two different connections (one for the client and the other for the streaming serve). The main function of the proxy is to translate the HTTP streaming protocol into RTSP/RTP streaming protocol. This can overcome the NAT problem due to that the HTTP request (TCP) is initialized by the client and the reply will pass through the same TCP port. However a third device is needed. In addition it is still using the constraints of the TCP between the proxy and the client (e.g. retransmission and reordering à ¢Ã¢â€š ¬Ã‚ ¦etc) (in addition to the increase of traffic to the network). Another issue is that there are too many operations in order to convert a complete application protocol into another one. Beside, this method loses the real time property that is needed for end to end communication because all the packets mush be forwarded at the proxy server. Proposed Methodology In this work, both the client and the server are assumed to convert all the RTP/UDP streaming packets into fabricated TCP packets that can be sent to the other side using the active channel. This fabrication process which is implemented for Windows Operating System (OS) requires a full control of the incoming/outgoing packets. However, there is the issue of source code of the TCP/IP (non open source for Windows OS) is not readily accessible and Windows does not allow the manipulation of the packets in any TCP/IP protocol suite from level above the TCP/IP driver layer. To overcome the inaccessibility issue, a hooking technique is used in order to control the (frame/packet) at the point that links between the protocol driver and the NIC card(s), which is represented by the Network Driver Interface Specification (NDIS). Hooking is a technique that can convert the calling of one operating system function into a new one that in turn calls the original one. The new function can do extra job before moving the execution to the original. This can be done without the need for the source code of the original [11]. The proposed modules is implemented and run in windows user mode. When the module can hook the NDIS, it can monitor, control, add, and modify the NDIS incoming/outgoing packets easily. The NDIS-Hooking driver inserts itself between TCP/IP and all of the adapters that bind with it as shown in figure (1). Figure 1. NDIS hooking driver with relation to user mode When TCP/IP sends a packet, it reaches the NDIS-Hooking driver (as a frame) before sending to the adapter. Likewise, packets that are to be indicated (received) on TCP/IP will go to the NDIS-Hooking driver first. The fabricated TCP header is inserted/deleted in the data link frame, this means that the original RTP/UDP protocol is used without modification. Nonetheless the fabricated packets can still bypass the NAT as authenticated ones. Figure 2. Proposed frame structure As these extra bytes (fabricated TCP header) will add when the packet is in the data link layer, this may cause the packet to exceed the Maximum Transfer Unit (MTU) of the network. Since, no packet must exceed the Maximum Transfer Unit (MTU) of the network [12], [13], therefore, the senders MTU must be decreased by length of the fabricated TCP header length (20 bytes). The whole proposed system is composed of two main modules. The first module resides on the streaming client while the second resides on the streaming server. Figure (3) shows the video streaming network topology. Figure 3. Video streaming network topology Each module consists of the following components: A component (hooking function in Fig. 1) that makes the access to the frame at the data link layer. This component accesses the frames in data link layer which is in the kernel mode and moves it into the user mode and vice versa. A component that finds the required frame based on its content. This component extracts the specified packets from the frames which have to be changed (fabricated/restored) depending on sending direction (income/outcome). A component that makes the required modifications (fabricating/restoring) to the predetermined packets. This component changes the predetermined packets depending the sending direction (send/receive). In sending, the component changes the RTP/UDP packet into fabricated TCP packet. In receiving, the component restores the fabricated TCP packet into its original RTP/UDP content. This component also re-computes length and checksums. Client Side Module As mentioned earlier, the module has to access the kernel (at data link layer). This is done by accessing the NDIS driver. The module listens until a packet event has occurred. There are two possible scenarios: Incoming packet: If the packet is coming from the streaming server, then the program will look for the TCP that contains an RTSP packet. If this RTSP packet contains both the clients and servers streaming ports, then record this connections information into an array. This is happened normally at the setup phase of the RTSP connection. Later (when the RTP packet used), the client will check every TCP packet if it contains a specified signature. If this signature is raised (in the TCP header), this mean that this TCP packet is fabricated and it contains the original RTP/UDP packet. The program will remove the TCP header and recomputed the UDP and IP checksums. All these steps are done before sending the packet to the rest of TCP/IP protocol stack Outgoing packet: If the packet is outgoing to the streaming server and the outgoing packet was a RTP/UDP packet, then insert a new fabricated TCP header before the UDP header. This fabricated TCP header contains the TCP connection information taken from the appropriate record from an array containing all streaming connections details. This TCP header also contains a specified signature that has to been recognized from the streaming server in order to return the packet back to its original RTP/UDP packet. This operation also needs to recompute the checksums. All these steps are done before sending the packet to the adapter. Figure 4 shows the flowchart of client side module. Figure 4. Flowchart of the client side module Server Side Module In server side module, steps similar to the client are also implemented. The difference is that the system gets the RTSP connections details from the outgoing TCP packet instead of incoming TCP packet in the client. Figure (5) shows the flowchart of the main steps of the server module. Figure 5. Flowchart of the server side module Experiments and discussions Experiments Setup In this experiment, we use three PCs running windows XP. Two PCs with one LAN card (client and the server). The other PC (working as a NAT) contains two LAN cards. RedMug streaming server commercial software is used on the server site. The VLC media player (version 1.0.5) is used on the client side. The VLC media player is set to use the RTSP protocol by giving a URL of one movie on the streaming server. The proposed method (client and server modules) is implemented in VC++.Net Framework and it is running in windows OS environment in user mode. A windows device driver (Windows Packet Filter Kit winpkfilter 3.0 from NT Kernel Resources, http://www.ntkernel.com) is used for the hooking purpose. Experimental Results and Discussion In the first experiment (before using the proposed method), the client tries to access the movie on the streaming server using the above system configuration. The connections establishment and the video streaming negotiations between the client and the server are established normally. However, the connection fails at the stage of data streaming transformation (see Fig. 6). Figure 6. Connection breakdown when data streaming transforming began (server side) The reason for the success of the initialization of the client-server connection and all the negotiations needed to transfer the video streaming are that the connection request is a TCP and the initialization is coming from the client (behind the NAT) and the video streaming negotiations are done by the RTSP that uses the active channel. However, the client could not receive the video streaming data since the NAT dropped the RTP/UDP video streaming packets. The client then sends a teardown command to inform the server that the negotiation is over. The client starts one additional negotiation tries before it close the connection. In the second experiment, we used the proposed clients and server modules. After running, the two modules start monitoring the data link frames. The client monitors the outgoing streaming request while the server monitors the incoming streaming request. When the client request a video streaming from the server, The connections establishment and the video streaming negotiations between the client and the server are established normally and the client starts to display the video streaming data as shown if figure (7A and 7B). FEATURE HTTP RTP/TCP RTP/UDP PROPOSED METHOD Directional Bidirectional Bidirectional Uniary Uniary Playback hiccups Yes Yes No No Quality Reductions Yes Yes No No Oscillating throughput Yes Yes No No Slow recovery Yes Yes No No ISP firewall Traverse Traverse Blocked Traverse NAT traversal Yes No No Yes End-to-End Delay Long Long Short Short Window buffer and reordering Yes Yes No No Streaming method Downloading or progressive Streaming Streaming Streaming Figure 7A. Connection still active when the data streaming are transforming (server side) Figure 8B. Video streaming is displayed in the client (behind the NAT) When negotiation is captured, the host records the connection details: IP, TCP port and the streaming UDP ports. The host will insert the fabricated TCP header (after the UDP header) in the video streaming packet before sending it. The reason for the success of transforming the streaming data is that the sending host converts each streaming UDP packet into a fabricated TCP packet that bypasses the NAT because it uses the active channel. The receiving host in turn restores the fabricated TCP packet into the UDP streaming data at the data link layer before sending it to the upper layer. Evaluation A comparison between our proposed method and the existing technologies is presented in Table 1. The proposed method has several advantages over the existing technologies, although the new packet size is 20 bytes larger than the normal RTP/UDP packet, but less compared with the HTTP. This has a little impact on the network performance. The proposed method can traverse the video streaming over all types of NAT. It can also traverse the firewall that blocks the UDP ports that RTP may use, common with home Internet gateway. Streaming might fail at times even if the gateway has a built-in RTSP NAT. Reference [4] utilizes the two streaming protocols separately by using a third device (proxy) between the client and server (every side with whole streaming protocol advantages and disadvantages), the proposed method utilizes the benefits of the RTP and HTTP protocols without using any extra device. Table I. CURRENT AND PROPOSED METHOD COMPARISON Conclusion The two main transport layer protocols: TCP and UDP can be used in streaming but with the whole advantages and disadvantages of using that protocol. In this paper, a new method is presented and implemented that can merge some advantages of both protocols. It enables the client and server to use UDP advantages in each side for streaming. Both client and server gains scalability by not having to deal with some TCP processing feature (e.g. Acknowledgement and window buffering à ¢Ã¢â€š ¬Ã‚ ¦etc). In the other hand, utilize the benefit of the TCP advantages to traverse the NAT and the firewall. In other words, the stream is not discarded and traverses the NAT and the firewall. The experimental results show that the new method achieves the firewall traversal and Nat traversal even with the most difficult NAT (symmetric NAT).

Wednesday, November 13, 2019

Stella Ting-Tommeys Toward a Theory of Conflict and Culture Essay

Stella Ting-Tommey's "Toward a Theory of Conflict and Culture" Introduction This research report is based on the article "Toward a Theory of Conflict and Culture" taken from the book Communication, Culture, and Organizational Processes. In this article, Stella Ting-Toomey talks about culture and conflict and its relation to low- and high-context cultures. Summary Ting-Toomey starts the article by addressing conflict. Conflict is part of human nature. It stems from many things. An example of a possible conflict could stem from differences in culture. She lists several other examples of possible conflict. She breaks the article up into three sections to better understand the idea of conflict versus culture. The first section deals with defining culture and conflict. Ting-Toomey defines conflict as "a form of interpersonal or intrapersonal tension between two or more parties based on goals, needs, desires, values, beliefs, and/or attitudes"(Ting-Toomey 72). She defines culture as "a patterned system of symbols and meanings"(Ting-Toomey 72). Conflict is an important par...