Sunday, March 31, 2019

Introduction To Communalism In India

Introduction To Communalism In IndiaCommunalism is a pervasive phenomenon in the public life of India and mutual riots argon the ugliest ex crunchion (Krishna, 1985). Communal riots dedicate become an integral billet of commonism in India. An event can be classified as a communal riot on twain grounds. Firstly, if there is force play. Secondly, if dickens or to a greater extent commun exclusivelyy identified groups bear distributively other or the members of the other group, at some full stop during the violence (Varshney, 2002). The reason behind such communal riots can be superficial and trivial though deep within there atomic number 18 semi policy-making reasons behind such events (Varshney, 2002). India is non new to communal riots the primary recorded riots were in the year 1714, 1715, 1716 and 1750 in Ahmedabad (Rajeshwari, 2004). Bipin Chandra in his obtain Communalism in Modern India writes that the maximum communal riots in India took place during 1923-26. Communal riots in India be not spontaneous and argon rargonly due to any(prenominal) religious animosity. They usu al geniusy arise due to differenceing political interests, which argon often linked to economic interests (Rajeshwari, 2004). During the 1960s till the late 1980s, the local anaesthetic anaesthetic political and economic factors melt downed a significant design in instigating the riots in major parts of India (Engineer, 2002). Howalways, since then the emergence of Hindtuva politics, it has been the major incur of communal riots (Engineer, 2002).The role of give-and- call for media in report cardage of communal riots in India is a major landing field of concern. Everything is reported in the media, so are communal riots. The role of the watchword media has grown in recent years, by chance be shell of the rudimentaryity of the news media in communal violence and conflicts (Wolfsfeld, 2007). Even the intimately periodic of observers wont deny the increa sing significance of news media beneath such crisis situations. The influence of the news media in quietness processes is more subtle, in part because what is not reported in the media is in some ways more important than what is reported.This paper would look at the way Indian media cover and reported the two bonnie ab kayoed dread(a) incidents of communal violence in India the 1984 Sikh riots in New Delhi and the 2002 Gujarat (Godhra) riots. On both occasions the media move criticisms. The paper would discuss if the media has been objective in covering both riots and excessively as to what should be medias role in insurance reportage of such afterlife communal riots in India, if any.The Changing Face of News MediaThe global media domain of a function is changing with each passing second. New communications technologies such as camera enab pencil lead r come to the foreile phones and laptop computers are adult journalists an opportunity to come across and disseminate information with normal ease. This digitization of the news industry has led to compression of time and space and thus enabled us to see news and fancys of conflicts as and when they happen. The images broadcasted in our living rooms are not and informing the global audience of the horrific happenings just now might to a fault instigate further violence in an existing violent situation. As a event, the medias reporting of a conflict situation has become as central to the unfolding of the conflict itself. With the evolution in technology the totalitarianism of distance might put one across reduced but heterogeneous unfathomed realities and factors still affect the reporting of conflicts. This is proved by a believe through with(p) by Virgil Hawkings, who explains that the conflict in Africa which has been in the post-Cold war creative activity responsible for nearly 90% of the cosmoss war terminals suffered a get by media black egress. Similarly, the reporting of the smokeive war in the Democratic Republic of the Congo (DRC), which resulted in over one cardinal deaths in the year 2000, was to the highest degree insignificant (Hawkins, 2008).Since the media has a powerful ability to reach large number of demesne. It ignites the effect building process and impacts the political decisions and audience answers in the night club. This eventually shapes the physical body of prevalent crises and conflicts (Ballantine, 2003).The Media, Religion and PoliticsWith the planes hitting the Twin Towers on 11 September, 2001 the relationship in the midst of media and religious belief changed forever. Karim (2003) suggested that religion would become an important proposition for the media and the way media covers events would be influenced by the religious undertones. It is arguable if the world and its religions have changed or not, but the media coverage of the same surely has.Within India, religion has a large impact on the personal lives of milli ons of quite a little. The country practices almost every other religion k straightwayn to the world and this is one of the most important facets of the country, so is politics. The politicians play on the religious issues every now and then, and media is used as the platform. The politicians communicate with the common mass through the mass media. The way in which we know and come up ab bulge out our politicians is through the media. It is the media that serves as the main transfer of communication between the politicians and the public. Religion is one of the subjects in India which the politicians intelligently use to their advantage.Academic literature has covered the representation of conflict in religion as healthful as media and religion but not a good deal has been researched on media, religion and conflict situations in mount with each other, e finickyly within an environment like India. It would be grueling-fought to under single-foot the relationship between relig ion, its construction, presentation and conflict situations covered in the media, without some reference to the broader political context within which it pull in ones hornss place, because in a land like India, religion is certainly driven by political motives. In order to understand the role media plays and should play during communal clashes in India, let us analyze the two worst communal riots India has ever seen the 1984 Sikh riots and the 2002 Gujarat riots.The 1984 Sikh Riots in New Delhi4.1 The EventsOn 31st of October 1984, the Indian Prime see, Indira Gandhi was assassinated by two of her Sikh bodyguards. What followed was a complete mayhem and it led to a lethal anti-Sikh riots in India. Sikh homes were consistently singled out in the capital and brutally destroyed (Tatla, 2006). The Sikhs were hounded, tyres were put near their neck, and petrol doused on their faces and bodies set ablaze to brutal death (Mohanka, 2005). more(prenominal) than 3,000 Sikhs were shovel ined in New Delhi itself. Two hundred Gurudwaras, the place where Sikhs worship, were burnt put through and many Sikh owned shops were looted. 1The situation worsened when the pertly elected Prime government minister Rajiv Gandhi, the son of Indira Gandhi was quoted, When a big steer falls, the ground beneath is sure to rumble. This gave a sense as if Rajiv Gandhi was giving a boost to the killers who were assassinating hundreds of Sikhs in the streets of New Delhi (Mohanka, 2005).Mrs. Gandhis assassinators were avenging Operation Bluestar. In the June of 1984, Mrs. Gandhi, cute to flush out a some(prenominal) terrorists, led by Jamail Singh Bhindranwale, who were hiding in the precincts of the Golden tabernacle, the holiest enshrine for Sikhs in India. On the 3rd of June, 1984 a 36 hour curfew was imposed in the Sikh dominated commonwealth of Punjab. each methods of communication and travel were suspended. Electricity supplies were interrupted, a total black out was crea ted and Punjab was cut off from India and rest of the world (Brar, 1992).On the night of fifth of June, the Indian Army under the command of Major Gen. Kuldeep Singh Brar stormed into the Golden Temple. By the morning of the 7th of June the Indian Army had full control of the temple. The hawkish leaders were killed in the two day battle but on with it a large number of pilgrims, civilians and children were overly killed (Ahmed, 1996).The Sikh lodge were agitated. Their holiest shrine was turned into a bloody battlefield and innocent lives were lost. Saran Singh, a retired bureaucrat and a famous member of the Sikh fellowship in India quotes It was desecration to send troops inside, open fire and in the process kill innocent devotees gathered to observe the martyrdom (Mohanka, 2005).From June to September 1984 most members of the Sikh community nursed a festering wound alone to jabber out in Indira Gandhis assassination.4.2 The Indian Medias coverage of Operation Bluestar and the Sikh RiotsMedia by its spirit plays an extremely important role for any socio-political situation regardless of the boundary it holds (Mohanka, 2005). The medias role in the riots of 1984 is an interesting case. Scholars believe that media can play a role in focussing on a cause much in advance it takes an ugly turn. In the case of Punjab in 1984, the local media was not supportive of the Sikh causes. Moreover, since of beginning of the problems in Punjab, the regimen had a strict control on the media and imposed a heavy censorship. Since emancipation until the invasion of cable picture in India, the electronic media has served as the backtalk of the disposal (Das, 2009). Similar was the role of the electronic media in Punjab during the riots. The Government had such tight control over the media that the exotic correspondents trying to capture the horrific events were not even allowed in the local land. The Indian Government acted as a strict visible gatekeeper and mad e it impossible to extol journalist visas for foreign correspondents. The events of the 1984 riots thus suffered not only from biased media coverage but also selective coverage which projected one sided selected panorama (Das, 2009). The media blackout during the Operation Bluestar is a prime slip of the same.The day before the actual invasion by the Indian Army, the Government ordered all press out of the state and restricted press coverage in Punjab. The press was allowed only a week later on special organised guided tours. The aftermath was later described by the press, as involving a diminished gang of criminals disliked by the mass of Sikhs and Indians. The press described the militants as petty political agitators, rather than leaders of a movement for a greater Punjab autonomy, as believed by a majority of Sikhs. Similarly, during the reportage of the 1984 riots there were discrepancy between the press release of data and images and the actual severity of the violent si tuation that prevailed in the streets of New Delhi (Das, 2009). This exercise of selective information in the Indian media only contributed to the ambiguous image of Sikhs throughout the nation and failed to bring out their plight in the light. During the Sikh Movement the Government of India had passed the National Security Act (1980), the Punjab Disturbed Areas decree (1983), The Armed Forces Special Powers Act (1983) and the Terrorists Affected Areas (Special Courts Act of 1984). These acts provided the police and array with sweeping powers. They could charge and curtail to the right to life under circumstantial situations. The advent of the media during the crisis had been partisan to take into account all types of multidimensional problem, historical, political, socio-economic and ideological. The media only focussed on special restricted information and ignored a careful examination of all the issues and processes that had led to the mayhem, the riots. During 1984, Indian leaders were gratis(p) to make up non-existent stories and broadcast through Government controlled radio and video recording system channels. Since there was a major restriction on the foreign press, all foreign news correspondents were left with no choice but to take the twister news of the local government controlled media.The United States of America, The House of Representatives had a plenty point on the same. It saidAs a result the outside world receives a biased one side view of what goes on in Punjab because the Indian Government has control over most of the domestic media. This contributes to the stereotype that all Sikhs are extremist radicals who are terrorising the predominantly Hindi nation and that is just not the fact. If the Indian Government has cipher to hide it should remove the news blackout and permit outsiders into Punjab. The free come of information is essential to the prevention of rights and liberties in a democratic society and India claims to be t he worlds largest democracy. So, they should act as the worlds largest democracy. This is the anchoration for a democratic nation and is not too much to ask of India to respect the rights of all its people and not just the Hindi majority. It is not right for any government to deny 16 million of its own people the basic political and civil rights. India has a moral obligation to protect the Sikh communityThe field newspapers reporting on the Sikhs made no distinction between a regional political party, a handful of militants, and the entire Sikh community. Even the senior editors and columnists of the national newspapers considered all Sikhs accountable for the assassination of Indira Gandhi and provided no sympathy to the community during the riots. Through the critical years of political crisis in Punjab before the horrific riots, the national dailies had not help resolve the issue. The time of India, one of the leading national dailies and The Hindustan times did more to inci te hatred between Hindus and Sikhs than perhaps any other national incline linguistic communication newspaper (Das, 2009).The media was a part of the misinformation carried out in the public. The best example of the same would be when a national newspaper carried out an condition reporting that huge quantities of heroin and drugs had been recovered within the Golden Temple complex and the same had been used by the militants to illegally fund their operations. Since, the foreign press was verboten in Punjab they picked up the allegory based on the 14th June Press Trust of India (PTI) news report from the government sources. This news was carried out in the major international newspapers. One week into the incident, the government retracted the official report on the grounds that the drugs had been recovered from the India-Pakistan casting and not the Golden Temple complex. This retraction by the government was not picked up by most international news agencies and the damage do ne by the initial report falsely remained amongst the mass. 3Many scholars believed that the Indian media forgot to prioritize issues and failed to act upon them. Senior Indian journalist, Manoj Mitta along with H. S. Phoolka in the book When a Tree Shook Delhi writes that the media focussed on the assassination of Indira Gandhi and did not care enough about the Sikh murders during the riots. Mitta saysThe media by and large went by the official line on the carnage. It focused on the happenings at juvenile Murti Bhawan, where Indira Gandhis body lay in state and where from people around the world had come to pay respect. So photographers were flocking to that place and the killings that were simultaneously going on in the capital did not get recorded at all. Its freakish but true.Not all were pleased by the Indian medias coverage of the riots.The 2002 Gujarat RiotsThe EventsOn the 27th of February 2002, the Ahmedabad bound Sabarmati emit drawstring reached a small town in Gujara t named Godhra (Yeolekar, 2002). Instead of the usual stoppage for 5 transactions the build up stopped for 25 minutes and then moved out of the platform. Before the train could run at its normal speed, the alarm compass was pulled to stop the train at Signal Falia, a Moslem dwell locality. No one clearly knows what really happened but after few minutes the compartment S-6 was on flames. 58 passengers including 26 women and 12 children were burnt to death (Yeolekar, 2002). Among the passengers were the Kar Sevaks travelling from Ayodhya. There have been different theories believing that Muslims were behind this furious act.If this wasnt barbaric enough, what followed in the days to come shook the entire lay nation of India. During the next three days, from the twenty-eighth of February to 2nd of March, 2002 Muslims were butchered, massacred and burnt alive. disclose of the 24 districts in Gujarat, 16 were entangled by organized mob attacks in which over 2,000 Muslims were kil led, 200 mosques and religious and cultural monuments were sent to rumbles (Sawant et al, 2002). The Muslim community of Gujarat suffered an enormous economic blow with an overall loss of Rs 35 billion.5.2 The Indian Medias Coverage of the Riots5.2.1 The Television CoverageFor the first time in the history of communal clashes in India, violence was carried live on television (Ninan 2002) as the television cameras brought across the horrific images to viewers home in Gujarat and elsewhere. There was no live coverage of the attacks against the Sikhs back in 1984 or the Babri Masjid fiasco in 1992. Those were the era of target media and television was moderate to Doordarshan, a state owned channel. It was only in 1996 when, Rupert Murdoch ventured into India with the head network and STAR News happened Indias first 24 hour news channel 4. This addition to the television spectrum of India added a new visual dimension to politics, violence and public sphere in India. In 2005, the te levision newscape had turned big(a) with a large number of players entering the market some(prenominal) 24 hour news channels were launched. This led to intense competitive shuffling of journalism, which was evident during the Gujarat riots. There were a large consortium of journalists and television crews from motley channels on the streets in Gujarat, each trying to outdo each other. When the Gujarat violence happened, the private television in India had been broadcasting for about 8 years and was easily accessible by 40 million amongst the 81.6 million Indians who owned television sets (5 notes). This option offered by the private television gave the Indian viewers unprecedented access to independent broadcasting.When the first pictures of Gujarat riots were telecast on Indian screens on 27 February, the three major news networks in India Star News, Aaj Tak and Zee News did not follow the signposts formulated by the Press Council of India, a quasi-judicial watchdog organiz ation (Mehta, 2006). The guidelines mentioned not to reveal the individuation of victims or attackers in the news reports but all the news networks carried hue and cry publicizes about the killing of the Kar Sevaks 6. The guidelines were against the mentioning of victims or attackers as Hindus or Muslims because they feared it could inflame passions and lead to revenge attacks. The television news networks with its striking visual images made this guideline redundant. age covering the riots in Gujarat, the television journalists openly identified the victims and the attackers. Varadarajan argues for the appellative of communities. He states that not naming the communities increases a sense of suspicion and apprehension amongst the ordinary citizens not only in the riot affected area but throughout the nation. Then people tend to assume that the victims are their own patch attackers are the other (Varadarajan, 1999).Famous Indian journalists, Rajdeep Sardesai and Barkha Dutt of STAR News justified their stand of naming the communities. Barkha Dutt stated, Naming the community under siege in Gujarat was moot of the story. In fact it was the story, revealing as it did a prejudice administrative and political system that was happy to just stand by and watch. (Mehta, 2006).The bold and independent media coverage by the television media during the riots invited flak from the political actors in powers who were shown in bad light. Criticizing the Bharatiya Janata Party (BJP) and the Hindutva approach in the riots got STAR News and English newspapers like The Times of India and Indian Express bad press (Sonwalkar, 2006).The BJP was in power in the state of Gujarat and at the centre in New Delhi. After the initial violence, when the news coverage of the attacks against the Muslims in Gujarat started to reflect badly on the state and central government, the leaders came down heavily on the journalists and media personnel. The Prime Minister, Atal Bihari Vajpayee a ddressed the nation a day after the attacks, regretting the disgraceful violence. He later on added that the news media were presenting an exaggerated account of the situation in Gujarat (The Times of India 2002a micro chip book).The BJP and the state government under Narendra Modi singled out STAR News and banned cable operators from showing the channel in the state. The viewers in Ahmedabad, one of the worst affected regions in the riots, were left with blank television screens, unmindful(predicate) from the reality happening on the streets (Mehta, 2006). Cable operators received calls from local officials in Ahmedabad and other cities to completely black out STAR News, Zee News, CNN and Aaj Tak (The Times of India 2002a). Dossiers and hitlists on journalists were reportedly prepared while the channels which dared to reveal the true statement and were critical of the Chief Minister and his plan of actions were not invited to the press conferences and and so were denied the ba sic right to information by the state itself (Sardesai 2004).The main illness of the BJP and its allies were that the news media did not cover and criticize those who were responsible for the Godhra train tragedy in which 58 Kar Sevaks were victims. This however remains untrue as the every news channels and major newspaper had covered the Godhra train tragedy exclusively, but the follow ups did not remain as the story of the day because the Union Budget followed on 28 February. The budget coverage was pushed aside when the mass killings and large scale retaliation against Muslims started in various parts of the state (Sonwalkar, 2006).another(prenominal) criticism was that, the national media inflamed communal passions by providing graphic television coverage of the dreadful events. The journalists and the news nonrecreational came out against the criticism and said that the level of violence would have been much worse if only the news media brought out the real picture by the gra phic images.The BJP and its allies also christened the media as Marxist-Mullah combine and the Secular Taliban for criticising the attacks against the Muslims. Members of the Editors golf-club of India visited the affected regions in Gujarat and were told by a group of Hindutva supporters that the Hindu community has been defamed with the coverage only being from the Muslim perspective They only find out to Muslims and ignore the Hindus (Patel et al, 2002).Sardesai explains the predicament faced by journalists in covering the riots(If ) any reporter, whether bell ringer of television, sees large-scale violence being committed, is the journalist to ignore the hard reality and merely present the facts as seen through the government binoculars? If the Chief Minister says that the situation is extraditeing to normal even while reports are streaming in of continuing violence in several parts of the state, are not the lies to be exposed? And if the government insists that the the St ates is out on the street when the fact is that the army has been kept on stand-by and is waiting for transport trucks, whose version is to be broadcast?(Sardesai, 2002)5.2.2 The Press CoverageIf the graphic coverage by the television channels hit the headlines and created criticisms, the nature of the press coverage also came under the hammer. The coverage by the print media makes an interesting chew over. There were two different approaches followed by the local and the national media. The local section of the press, including the Gujarati dailies Sandesh and Gujarat Samachar, covered the events from a pro-Hindutva stand and justified the killings of hundreds of Muslims. While the national media, including The Times of India and the Indian Express, were overtly critical of the channelized attacks against the Muslims (Sonwalkar, 2006).The team of Editors hostelry of India met several journalists, correspondents, editors, Chief Minister Narendra Modi and others to conclude that t he English-language national press play an exemplary role in coverage of the riots. BJPs allegations of media playing an aggravating role in coverage of the riots have been dismissed by many scholars. Patel argues that the allegation was specious, self-serving and must be dismissed (Patel et al. 2002). The Editors Guild of Indias team find thatOur finding is that the prompt and extensive portrayal by the national media of the much(prenominal) horrors visited on innocent people in the wake of the Godhra carnage was a saving grace. The exposure of the supine is not complicit attitude of the State and apparent(a) outpourings of communal hatred, stirred the conscience of the nation, compelled remedial action, howsoever defensively and belatedlyHowever, the role of the sections of the Gujarat media, specially the Gujarat Samachar and more notably Sandesh, was rabble-rousing, irresponsible and blatantly violative of all authorized norms of media ethics. This cannot be lightly passe d over. (Patel et al, 2002)Gujarat Samachar is the largest selling daily in Gujarat with a circulation of nearly 810,000 followed by Sandesh with 705,000 (Sonwalkar, 2006). These two newspapers have a large readership and dominate the print market in Gujarat. A study by PUCL in 2002 anchor that there were several instances of distorted and false reporting in these two newspapers and also the circulation of Sandesh rose by 150,000 due to its pro-Hindutva stand. The coverage epitome found that when Muslims were at fault, their names were clearly mentioned and the perpetrators identified. However, when the Muslims were the victims of murders, loots, arsons, and other heinous crimes the attackers were unnamed. The study thinkNo sources were quoted for headlines, even when they were simply lifted from speeches by Vishwa Hindu Parishad (one of the Hindutva polical parties in the state). Headlines were also misleading, and often followed up by reports that did not substantiate, and even negated the headlines completelyThe anti-minority stand was obvious in the slant in news reporting.(PUCL, 2002).Sandesh was extremely provocative in its reporting. PUCL states Sandeshs usage of headlines was to provoke, communalize and terrorise people (PUCL 2002). On the 28th of Februrary, Sandesh carried a headline saying, 70 Hindus Burnt Alive in Godhra. Another report on the front page read, Avenge Blood with Blood, which was a quote from a statement made by one of the Vishwa Hindu Parishad leaders, but the newspaper used the words as a headline without mentioning the leader (Sonwalkar, 2006).On the 6th of March, the headline read, Hindus Beware Haj Pilgrims return with a Deadly Conspiracy, when the fact remains that hundreds of Haj pilgrims were terrified by the happenings in the state and had retuned under police protection. PUCL emphasized in its study that most news in Sandesh post-Godhra violence began with the sentence, In continuing whorl of communal rioting that broke out as a reaction to the demonic/barbaric, etc Godhra incident. The comminatory adjectives used in describing the Godhra incident were strikingly move out when covering the post Godhra Muslim annihilation (PUCL 2002).One of the reports mentioned that the breasts of two Hindu women had been chopped off by Muslim mobs during the crisis. This report turned out be false and the editor countered by saying that the information had been provided by the police. The papers editor told that it was against the policy of the newspaper to carry out corrections and clarifications for previously make knowned articles (Patel et al, 2002). The Press Council of India later censured the newspaper for the fault (Prerna 2003). Gujarat Samachar also heightened the tension through its pro-Hindutva stand in coverage of the events.Gujarat Chief Minister Narendra Modi openly praised Sandesh for its work, which was publishing false and rumoured reports with a pronounced pro-Hindutva and an anti-Muslim stan ce. In a letter to the newspapers editor, Modi writesThe newspapers of the state played a decisive role as a link between the people and the government. You have served humanity in a big way. It is the state governments primary duty to restore peace and security. It is noteworthy that the newspapers of Gujarat gave their full support to the state government in confinement this operose task.I am grateful to you.(Varadarajan, 2002 286)The one regional newspaper that stood out amidst the Hindutva ideology was the Gujarat Today, notably started by few liberal Muslims in the state. The report suggested Gujarat Today regularly carried out positive news items highlighting mutualness of the communities affect (PUCL 2002). The two English-language national newspapers in India, The Times of India and the Indian Express were critical of the state government in their articles. However, these two newspapers also publish editions from Gujarat and a clear divide was evident between the two Engl ish-language dailies and the two regional editions (Sonwalkar, 2006). While the English-language version was sharp in its criticisms of Chief Minister Narendra Modi and his policies, the two Gujarati dailies propagated the need of Hindutva. Desai, an Ahmedabad-based correspondent of the Indian Express writesToday, all the people who once used to look at me with respect question me and poke fun me. They do this because I represented a publication whose medium is English and because I reported human misery in its right perspective.A conversance said All of you from the English language media have tarnished the image of Gujarat. Today, the common man in Gujarat hates the English language media. Even a section of the English language media hates the English language media.(Desai 2004 228)(Need to conclude)The Role of the Media During Communal Riots An digestThe result of multiple and complex interests of regions, states and/or various types of groups within them leads to economic, m ixer and political conflicts. Such conflicts are difficult to handle and requires negotiations between the parties involved and in this amorphous age of media the governments are finding extremely difficult to handle such situations (Terzis, 2008). Despite the increased importance of communication, very few governments can speak about successful communication during conflicts because they fail to take into consideration the perception of the conflict in the minds of the common mass, the scientific analysis of the causable factors, the agendas of the parties involved and the changing nature of the conflict itself (Ballantine, 2003).The role of mass media in covering and resolving conflicts, especially those involving religious differences that leads to frequent communal riots in India, is extremely crucial. We are in the age where the basic principles of reportage of facts are sacred, comment free, get both sides of the story, double check your facts before writing, are not enough in reporting communal riots. There are enough challenges faced by a journalist and media personnel in such a situation. The guidelines for a reporter in covering communal riots should be to lookout for detailed background information, not continue with the stereotyping of communities, find residents who deal with both the communities, talk to victims from both sides, corroborate victims as well as polices accounts, discover the role of the police, the politicians and the media and highlight stories where communities have helped each other.If we hit the books the way Indian media covered the 1984 Sikh riots, we

Saturday, March 30, 2019

Tim Berners Lee: The Inventor Of The Internet

Tim Berners leeward The Inventor Of The meshworkMany passel hold up had a important impact on the ground of population media that radically changed how the world glide bys in coiffureion. unmatchable(a) warning of whatever unitary and only(a) who has done just that would be Tim Berners-Lee, who is best cognise for his innovation The innovation all-encompassing Web. Tim Berners-Lee has impacted the world of mass media in several ways. First, Tim Berners-Lee invented the World Wide Web. Second, since the World Wide Web was invented, it has radically changed the way that the people communicate. Third, the net profit has revolutionized how the press forces schooling to the people. Finally, while the lucre has its advantages, it has had alot to a greater extent than its treat of controversy.First, Tim Berners-Lee invented the World Wide Web. The story behind the aim of the internet is an interesting one. It all began around 1980 while Tim Berners-Lee was working as a software engineer at the European Laboratory for division Physics in Geneva, Switzerland besides known as CERN. He cute to figure out a new way to harmoniumize his notes in a brain-like way, but while improving upon the abilities of that occasionally memory-constrained organ and came up with a new way of doing it building a software schedule called Enquire (TIME). Using the ideas that he theatrical roled to build Enquire and former(a)(a) ideas that were up-to-date at the sentence, he take a leakd another way of finding files on his calculating machine by creating a grammatical case of hypertext notebook that allows the text in a document to be linked to other files on the computer. He so thought about accessing materials on other computers. He then thought about opening his computer to not unaccompanied his coworkers at CERN, but to the scientific companionship every(prenominal)where. By using this quality of ne iirking purpose by connecting individual computers together on a network, it would mean no primordialized dodging. This would mean that the new network would go for no shake up with scalability, which means that it could grow to infinity. Tim Berners-Lee then built a coding system that was easy to learn and spend to build sack up pages. It is called HyperText Mark-up Language, also nearly known as hypertext markup language. It has become the most wildly utilise expression that web developers or even normal people implement to manufacture web pages and sites. He then created e new set of protocols that allowed these HTML documents to be connected across the profits called HyperText Transfer Protocol, also come up known as HTTP. Soon after that, Tim Berners-Lee wrote the code for the freshman web browser, which allowed droprs around the world to access web pages on the internet. Once the World Wide Web debuted in 1991, the world of mass media changed forever as it brought smart set and clarity to the chaos that was cy berspace. The World Wide Web (the information-sharing warning built for the internet that is the way accessing and sharing information on the internet) and mesh (the massive network of computers) consumed growth at exponential order (The Difference). At one point, the number of internet users was doubling every 53 days (TIME). Clearly, Tim Berners-Lees inventions made a huge impact on the mass media industry.Second, since the World Wide Web was invented, it has radically changed the way that the people communicate. Since the Internet was first brought online, galore(postnominal) social networking sites induce radically changed how people, businesses and organizations communicate. One of those websites is Facebook. With Facebook, anyone could create a profile on the site and not tho chain mail their thoughts on their wall for friends to see and comment on, but also use instant messaging to talk to friends in sure-time and even destiny photos and pictorial matters mingled with friends or even everyone on Facebook. Facebook has evolved the way that people communicate in several ways. One example is how easy it is for anyone to click the attention deficit disorder Friend and reconnect with old friends. some other example is how the sheer number of people using Facebook affects the mass media, numbering in the hundreds of millions, possibly soon to be in the billions. Because of how many people use Facebook, the chances are good that anyone wanting(p) to find old friends would find them on Facebook. Businesses who want to advertize would use Facebook because their ads would reach a very large amount of people. Organizations who create community pages or radicals for a specific cause could also speak to a very large amount of people. some other great example is how Facebook is real time and very easy to update. Since Facebook is real time, people could keep their profiles current from anywhere with just second bases of work at a time, even from res tless(prenominal) devices such(prenominal) as cell phones. This also allows people to share events as they happen deep down seconds (Welcome)(NEWS). Clearly, Tim Berners-Lees invention allowed the social networking sites to form and they evolved the way that people communicate. The globular nature of the Internet and the World Wide Web only helps to let sites like this expand on a huge scale.Third, the internet has revolutionized how the press gets information to the people. For hundreds of years, the newspaper has been the best known and well used source of information on current events. However, in recent years, its popularity has declined. Nowadays, 61% of citizens in the western world get their news from the Internet, pard to 17% who get their news from the newspaper. This could be for several reasons. One reason would be that people could access up-to-minute news on the internet at any time from any location if they want to because of the nature of the internet and the evolu tion of mobile devices that have the capability to access it. There is no need to go to a newsstand or store to buy a newspaper to occupy news that might be out of date. Another reason is that publication a story on the internet is also much easier and less expensive than publishing it on printed media. Internet news could also have photos and video supporting the text on a new agencys website. Another reason would also be that the news is available to many more people due to the worldwide nature of the internet (What are)(Newspapers). Another mainstream format that the internet is quickly replacing would be television. Internet television and drift video are supplying news in about the same format as television with full motion video. Internet video is also easier to set up and less expensive to put a video online or watch it (Internet). Clearly, Tim Berners-Lees inventions revolutionized how the press gets information to the people.Finally, while the Internet has its advantage s, it has had alot more than its share of controversy. Since Tim Berners-Lee invented the internet, it has caused many controversies in the world. One key example of a signifi evictt bug out in many countries that the internet has provided is the use of censorship to filter obscene materials and the worldwide nature of the network. Some countries, such as China have responded with a strict internet censorship scheme that regulates what types of content the people may read or write. In fact, the censorship scheme has been apt(p) the nickname The Great Firewall of China in popular culture because it blocks thousands of websites that the Chinese government feels are a panic to the country and society. It also affects the ability of the press to report current events freely and without restriction. This was especially a huge issue during the Beijing Olympics, where at that place were many foreign journalists on site. Another key issue that the internet has caused is the issue of pri vacy. One major breach of privacy that involves the internet would be Google road View. Google Street View is part of Google Maps and it allows anyone to view an area as if they were stand up on a street. Google uses specially modified vehicles with cameras that take pictures in every direction as the car drives along. These pictures are then uploaded to Google Maps and allow users to use them in addition to maps to look at an area. This has caused major privacy problems because on that point are several occasions when the vehicle takes photos of people on close property that do not wish to be photographed for various reasons. eyepatch Google does offer users the option of reporting individual images to request their removal from the web, that that would be after the fact and the image could have be saved by anyone prior to removal (15 Biggest). Clearly, Tim Berners-Lee has made a significant impact on the world of mass media because while his inventions created many advantages to how media is delivered to the people, it also creates massive controversies in the process.Tim Berners-Lee has had a significant impact on the world of mass media that radically changed how the world communicates information. His innovations that caused these changes are the World Wide Web and the Internet. Tim Berners-Lee has impacted the world of mass media in several ways. First, Tim Berners-Lee invented the World Wide Web. Second, since the World Wide Web was invented, it has radically changed the way that the people communicate. Third, the internet has revolutionized how the press gets information to the people. Finally, while the World Wide Web and the Internet has its advantages, it has had alot more than its share of controversy. Clearly, Tim Berners-Lee has impacted the world of mass media in many ways, positive and negative.Gauchers Disease Types, Symptoms and TreatmentsGauchers Disease Types, Symptoms and TreatmentsNew Treatment Plans Give confide to Patients with Ga uchers DiseaseKatherine VanGauchers disorder occurs within individuals because they lose the enzyme glucocerebrosidase in the body, which is responsible for breaking down copiousty substances called glucocerebroside. Consequently, large amounts of productive substances are able to build up and stay in the liver, spleen, lungs, jampack marrow and brain because of the damaged and lack of glucocerebrosidase. Hence, the disorder is also called glucocerebrosidase deficiency. either age conference can be diagnosed with this disease, but studies scan that there is a higher percentage of the disease in Eastern and fundamental European Jewish people. There are many types of Gauchers disease. The first form is called non-neuronopathic Gauchers disease because it does not target and damage the central nervous system. The symptoms areThinning of bonesExtreme bone disoblige and bone fracturesEnlarged liverEnlarged spleen execrable amounts of sun-loving red blood cellsExcessive fatig ueVulnerability to bruisingLow amounts of blood blood plateletsYellow spots in the eyesRegular nosebleedsThe second type of Gauchers disease is neuronopathic and it can be life-threatening because it reparation the central nervous system. Babies after three months of birth can be diagnosed with this form of Gauchers disease. Its symptoms are similar to the non-neuronopathic form, but it also includes wizard problems, including dementiaSevere inflexibilitySeizuresThe last form of Gauchers disease is called perinatal lethal and it is the most severe type. In fact, most infants with perinatal lethal die after a few days of birth. The symptoms listed at a lower placeExtensive swelling due to changeful accumulationDry and leprose skinSerious neurological problemsGauchers disease develops as a result of athleticss in the GBA gene. The GBA gene is responsible for making glucocerebrosidase enzymes, which simplifies glucocerebroside molecules into sugars and smaller fat molecules. How ever, mutations in the GBA gene impact the ability of the enzymes to function properly. Consequently, the large amounts of fatty substances cause organ failure. Patients can be diagnosed with Gauchers disease because of an hereditary pattern pattern called autosomal recessive. The parents must be carriers of a Gauchers genetic mutation in order for the children to have Gauchers disease. Nevertheless, there is only a 25 percent chance that their child will be diagnosed with the disease.In order to let out and track the progression of Gauchers disease within uncomplainings, a series of diagnosis and running games are used. Enzyme analysis uses blood screen outs to identify a patients levels of glucocerebrosidase. If Gauchers disease was active in the patient, there are low levels of glucocerebrosidase in the blood. On the other hand, carriers have enzyme levels between the affected and unaffected people who are not carriers. Another test is called the genetic mutation analysis an d it tries to find mutations in the genes harmonize with Gauchers disease. However, not all of the genetic mutations involved in Gauchers disease have been identified thus this test is used to help classify which type of Gauchers disease patients have. In order to measure the progression of the disease, dual postcode X-ray absorptiometry (DXA), and magnetized resonance imaging (MRI) can also be used. DXA uses low energy X-rays to measure bone density, while MRI uses charismatic fields and radio waves to create images of organs. MRI can show organ enlargement, such as the spleen or liver. In addition, doctors perform prenatal testing in pregnant women that are carriers of Gauchers disease to test if Gauchers disease is active in the fetus. Doctors will analyze the amniotic fluid or tissues from the placenta to complete the prenatal testing.Gauchers disease cannot be cured it is only controlled or make outd. The type of interference given to patients varies depending on the type and stiffness of Gauchers disease and condition of patients. One manipulation given is the enzyme backup man therapy, where fill-in enzymes in liquid substances are injected into the veins of patients every two-weeks. This type of treatment is effective within individuals with non-neuronopathic Gauchers disease. Nevertheless, people may regularly experience an allergic reaction to the enzyme treatment. Another treatment method available is the bone-marrow transplantation. This is a surgical procedure that is used for severe cases of Gauchers disease, where damaged blood-forming cells are removed(p) and replaced. However, this medical treatment is not as common as the enzyme replacement therapy because it has more threats and hazards. Lastly, medication can also be used to manage Gauchers disease. The oral medication miglustat (Zavesca) is an effective drug that minimizes the build-up of the fatty substances in non-neuronopathic Gauchers disease. Nevertheless, the medication ca n cause side set up in the digestive system, such as diarrhea and, weight loss. Furthermore, the drug can also interfere with sperm production. In ladies, birth control is well-advised while using miglustat and for three months after they stop using the drug.In December 2001, Genzyme, a Sanofi Company completed a study to compare the effectiveness of a drug, Cerezyme, in two different sexually transmitted disease amounts in their patients with Gauchers disease. Both males and females ages 18 and older were eligible for study. Nevertheless, only patients with type 1, non-neuronopathic Gauchers disease were allowed to participate. There were multiple research centers that participated in the lab, including 18 in the United States, one in Canada, six in Europe, and one in Brazil. During the study, 90 participants were haphazardized and placed into two groups. The first group of people authentic their monthly dose of Cerezyme in two infusions one infusion per two weeks (Q2). The s econd group of individuals received their monthly dosage in one infusion every month (Q4). The progression of the effects of the drug on the Gauchers disease was monitored by measuring the haemoglobin determine and platelet count of patients. Magnetic resonance imaging and computer tomography were also used to explore any improvements in the patients liver and spleen conditions. Moreover, researchers tried to identify if the change in dosage reduced the symptoms of patients, such as fatigue, vulnerability to bruising and chickenhearted spots in the eyes.Genzyme believed that patients who received one infusion every 2 weeks would show a more positive reaction towards their non-neuronopathic Gauchers disease because there was a longer period of time in between the monthly dosage sessions of Q4. Hence, this could cause a deficiency of all the replaced glucocerebrosidase at the end of the month. Conversely, Q2 would be more stabilized because the enzyme glucocerebroside would be repl aced every two weeks. In theory, by the end of each month, only half of the enzyme glucocerebroside would be deficient. Similarly, the findings of the lab, displayed in table one, showed that 80.8% of the participants of Q2 Cerezyme showed clinical achievement, whereas there was only 63.2% of clinical success within individuals using Q4 Cerezyme. Hence, Q2 was a better drug frequency in terms of safety and efficacy.Q2 CerezymeQ4 Cerezyme total of Participants Analyzed2657 human activity of participants with Clinical mastery2136Proportion of participants with Clinical Success80.8%63.2%Table 1 Number of Participants with Clinical Success after the shutting of the Clinical TrialThe map above portrays the number of participants that showed improvements in their Gauchers disease in comparison to their condition before the clinical trial. For example, some participants noticed a reduction of symptoms, such as extreme tiredness, bruising, scandalmongering spots in the eyes, and nosebl eeds. As well, there were some improvements in haemoglobin values, platelet count, and liver and spleen conditions.A similar lab was conducted to test the efficacy of two dosage amounts in an enzyme replacement therapy on February 1, 2007. The global specialty biopharmaceutical company, Shire, wanted to test VPRIV, a hydrolytic lysosomal glucocerebrosidase-specific enzyme, that was used in long-run enzyme replacement therapy for patients with type 1 Gauchers disease. The controlled variable of the study were the 45 and 60 U/kg dosages of VPRIV, also known as velaglucerase alfa (GA-GCB), given to patients with type one Gauchers disease. Shire also used random trials to divide the participants into two groups that received the dosage every other week. Nevertheless, one group received 45 U/kg and the other group received 60 U/kg of VPRIV. Ages two and older of two genders were allowed to participate in the study. The duration of treatment for each patient was 12 months, where the fi rst patient enrolled into the study on January 11, 2007, and the last patient participated in the research project on April 8, 2008. The progression of the effects of the drug on Gauchers disease was monitored by measuring the hemoglobin values and platelet count of patients. Magnetic resonance imaging and computer tomography were also used to explore any improvements of the patients liver and spleen conditions.Shire believed that 60 U/kg of VPRIV was a better treatment towards the non-neuronopathic Gauchers disease, assuming that VPRIV was safe and efficient, because there were more artificial enzymes. The data collected in table two supported their hypothesis as the intermediate change of baseline of Gauchers disease was better in the twelve participants that used 60 U/kg of VPRIV every other week. A baseline is the initial amount of a substance where the last amount is compared to. A baseline is also referred to as the reference point. The chart supports Shires hypothesis as the spleen and liver volumes of VPRIV 45 U/kg patients decreased and hemoglobin and platelet concentrations increased towards a more normalized size or amount. Nevertheless, the research is still continuing and the data released is not fully up to date.VPRIV 45 U/kg, Every different WeekVPRIV 60 U/kg, Every Other WeekNumber of Participants Analyzed1312Average Change of Baseline of spleen Volume (units Percent body weight)-1.87-1.92Average Change of Baseline of coloured Volume (units Percent body weight)-0.30-0.84Average Change of Baseline of hemoglobin Concentration (units g/dL)2.4292.438Average Change of Baseline of Platelet Counts (units x109/L)40.9250.88Table 2 Change of Baseline of Gauchers Disease in Participants After 12 Month TreatmentThe chart above portrays the average change of baseline of spleen volume, liver volume, hemoglobin concentration and platelet counts for two groups of patients those who received 45 U/kg of VPRIV, and other who received 60 U/kg of VPRIV every other week. Negative values bear witness a decrease in size, whereas positive values indicate an increase in size. The data was collected by using magnetic resonance imaging and analyzing participates blood tests.Overall, studies cut across to occur in order to find more effective treatments for individuals suffering from Gauchers disease. The severity of this disease may vary from patients, but in general, the disease is very destructive as it can lead to deaths in young age groups. Gauchers disease attacks important organs in the body, such as the liver, spinal anesthesia cord, heart and brain, and prevents the organs from functioning properly. Nevertheless, the disease only occurs due to genetic science and the positive research projects conducted on Gauchers disease will continue to bring hope in humans.Referenceshttp//www.convertunits.com/info/dlhttp//www.nlm.nih.gov/medlineplus/ency/article/003647.htmhttp//www.cancer.ca/en/cancer-information/cancer-type/childhood-cancer-in formation/supportive-care/symptom-and-side-effect-management/low-platelet-count/?region=nuhttp//www.lilly.com/products/patient-safety/providers-role/Pages/adverse-event.aspxhttp//www.drugs.com/monograph/cerezyme.htmlhttp//www.mayoclinic.org/diseases-conditions/gauchers-disease/basics/coping-support/con-20031396http//ghr.nlm.nih.gov/condition/gaucher-diseasehttp//www.shirecanada.com/en/default.aspxhttp//www.vpriv.com/about-vpriv/http//clinicaltrials.gov/ct2/show/results/NCT00430625?term=gaucher+diseaserank=13sect=X012http//clinicaltrials.gov/ct2/show/NCT00364858?term=Gaucher%27s+Diseaserank=3

Organisational Culture and Structure on Business Performance

shapingal Culture and Structure on Business PerformanceThe succeeder of a credit line depends on its worry. With come to the fore worry it is non possible to strike or manage a line of credit or anything else. In go through to managing creasees and associated behavior the field of attention behaviour has originated. Management behaviour is near making decisions. It seconds people and businesses to concentrate on their goals and business objectives (Baligh 2006). at once around each(prenominal) businesses be involved in the drill of management behaviour that provide be discussed here in this paper with the consid datetion of its polar aspects.The paper provide include an analysis of the effects of social plaque and resist on business cognitive operation. Addition bothy, it leave besides include a parole of swops that learn deceasered in management in operate 40 eld and that may occur in next 40 years. In the end, the nominatement set unavoidable by an idiosyncratic to go bad at management level result besides be discussed.Organisational building and culture be signifi passeltly think to each separate and thrust effects on business operation. For understanding the effects of culture and structure on business performance it is essential to understand organisational culture, structure and business performance (Ryall Craig 2003).Organisational structure is a formal formation of work roles and authorities relations that bump how associates and managers work together with one oppositewise. It is a pattern of relationships among diametrical organisational positions. With the help of structure it poses easy to define the process of management (Clayton Fisher n.d.). It in equal manner assists with a framework of order and command that directs mangers in planning, organizing, directing and lordly different organisational activities.Organisational culture refers to the values divided up by organisation managers an d associates. It includes sh ard assumptions, beliefs, values, norms and language patterns (Ryall Craig 2003). In improver to structure and culture business performance is the cleverness of a buckram to luck into its goals by making an legal use of its resources. entirely these aspects atomic number 18 interrelated to each other and also include several factors that affect exclusive performance in the oeuvre (Orna 1999).Structure and culture are the key elements in an organisations success. If an organisation operates by concentrating on these aspects, it becomes easy to attract consumers and increasing competition. Whether a firm is dainty or large in its size, its tellingness depends on how it is structure (Daft 2009). This organisational structure gets break ined under the influence of the culture that in turn influences a firms energy to implement changes in effect.If a firm is able to maintain an trenchant culture, it becomes able to give out well-planned organ isational structure that makes it easy for business managers to implement changes and attain success. organisational structure exercises within an organizational culture, alone it is interrelated (Ryall Craig 2003). Organizational culture pertains to a broader view that includes number of small organisational issues and aspects (Harris Hartman 2001).On the other hand, organisational structure refers to the infrastructure, and the number of methods and practices employed within that infrastructure (Clayton Fisher n.d.). exclusively the methods and practices assist an organisations culture to operate with the competence and consistency.In modern era organisations are evaluated on the basis of their culture and structure that need to be managed littlely. Structure is an integral part of an organisation culture as it mainly deal with the establishment of culture that in turn motivates employees to work efficaciously in the direction of organisational goals (Orna 1999). If a firm is non able to ruffle its structure with culture it would not become able to encourage its employees to memorize initiatives and implement changes successfully that are hypercritical for its effective performance (Baligh 2006).Organisation culture involves several issues equivalent how management works, which particular obligations supervisors have and how a complaint or issues can be passed through different organisational levels. All these issues related to culture are directly associated to how a firms organisational structure works. In addition to this, there are also several other issues related to culture that can only be dod through an effective organisational structure (Clayton Fisher n.d.). For effective performance of business it is vital to resolve these issue as otherwise it would not be possible to attain determined profit goals and objectives.Another significant way to describe the interrelatedness between structure and culture and their effect on business per formance is to identify that how structure works. Organisational structure allows formation of different interrelated groups that are allowed to operate smoothly with specific role and authorities (Orna 1999). This framework or teams allows effective communication and coordination that builds a healthy culture and motivates employees to work in the direction of organisation goals attainment (Jumpponen, Ikvalko Pihkala 2008).Structure defines the roles and responsibilities of every singular and their interrelation to serve customers. This clear roles and responsibilities increases effective communication and coordination between organisation tasks and jobs that facilitates in developing a positive culture in which everyone works with connective and participation (Clayton Fisher n.d.). All these aspects significantly help managers in attaining organisation mission and vision.Changes occurred in Management over the last 40 long timeAccording to old level employees who are about to retire, it is believed that over the last 40 years several changes have occurred in management and this could be interpreted with the help of evolution of different organisational and motivational theories used by organisations. Previously in regard to management, organisations used to adopt scientific and bureaucratic approach that in bewilder has been replaced by system theory and incident approaches (Luthans 1998).Previously all organisations used to motivate its employees on the basis of Maslow-Need hierarchy that in cede is replaced by McClelland theory and several other theories. out front 40 years, all employees were only responsible for handling their specific tasks nevertheless instantlyadays detail has changed a lot as in present employees are responsible for planning, organizing, staffing, occupying and controlling (McKenna 2000). In old times, it was not essential to play multi-purpose role that in present has become critical for effective management.In past, a l intimately all organizations used to Webers concept of bureaucratic structures but the change magnitude complexity of multinational organizations has now created the requirement of a new structures like functional, project management, matrix and virtual (Luthans 1998). In addition to structure, several other new aspects have emerged in regard to management like different strategy levels, system approach to decision-making, socialization, departmentation, and different leadership theories etc (Harris Hartman 2001).All these concepts were not there in past for managing businesses but now scenario has changed completely as every business has its own specific unavoidably and requirements and all of them select different management approaches according to their suitability (Jumpponen, Ikvalko Pihkala 2008). In past almost all firms or businesses used to operate with experiential or case approach but now it is not the situation as firms operate with different approaches as competi tion has change magnitude a lot and it has become difficult to attract customers.In regard to increased competition, the companies are making use of different management approaches. Some present firms are using system approach that considers organisations to be open system whereas some of them are making use of operational approach that endeavours to develop the science and theory of management by drawing upon the concepts, cognition, techniques from other palm (Luthans 1998).In between these two approaches there are several other approaches that were used throughout last 40 years. In this way, it can be said that the business purlieu has changed significantly from the time when present senior level managers started working (McKenna 2000). All present senior level managers bill that they have seen several changes in the process of management but all these changes are based on the divergeing situations, trends and emerging technologies (Harris Hartman 2001).Changes likely to oc cur in Management in coming 40 YearsIn regard to the discussion of the changes occurred in management in last 40 years, it can be stated that it is also likely to change in next 40 years. In present almost every aspects of business and its management are changing that will also continue to alter in coming years. An case-by-case who is about to start his career in present 21st century is uncovered with significant challenges and is likely to pose several other key changes (Pappas 2006).In present employees are require to play several roles like interpersonal, information and decision making roles but in coming time employees will be required to operate in virtual environment. Presently employees are making use of ripe(p) systems, discussion, meetings to collect information and perform their duties but in futurity they could do all these things in a virtual environment (Luthans 1998).As well, employees who are about to start their professional career will also lodge changes in their roles, levels of management, communication, business strategy, approaches to management and tools used to manage business related aspects (Jumpponen, Ikvalko Pihkala 2008). The pattern of communication and business management followed till now will substantially changes in coming 40 years.From last half ten-spot the electronic mail has emerged as a key element of embodied communication but in coming years it will also change. In coming years, the management of communication will also change in regard to the change in organisational structures and cultures (Harris Hartman 2001). The employees will be exposed to make use of powerful information-management and collaboration tools that are likely to emerge.With these tools, employees will become able to link associated messages and track message flows more expeditiously (Pappas 2006). As well, it is also believed that the automatic language translation will recall foot hold and interconnected messaging will curb unripe emplo yees and managers with a facility to check e-mail, mobile messaging, voice mail, and fax elevator car from an only inbox (Fast precedent 25 Trends That Will Change the Way You Do Business 2003).In regard to the changes in communication and business management, it can be said that in coming 40 years most of the employees will depend more on computers rather than their own evaluations or perceptions. More and more softwares will be employed for different jobs and roles that will increase human being capabilities (McKenna 2000). In next 40 years, it is likely that the firms and its employees will growingly make use of artificial intelligence to solve different business problems and the pattern of doing work will also change as everyone will be allowed to operate in a virtual environment (Fast Forward 25 Trends That Will Change the Way You Do Business 2003).Skills bent grass Required to Work at Management levelWorking at management level is not as easy as it seems because it involve s different skill sets and an ability to involve in team work and group. Nowadays managers are responsible for different roles that cannot be fulfilled if they operate on their own without communicating and coordinating with others. A manager is responsible for perform five functions that are planning, organizing, staffing, leading and controlling (Drucker 2007). In addition to this, a manager is also required to interact with many people both within the organisation and outside the organisation and hence perform interpersonal roles (Montana Charnov 2000).For effective interactions and management it is vital to have an ability to communicate, understand, listen, interpret, convince and lead others. If an individual have all these skills and abilities then he can effectively interact with organisations internal as well as out-of-door customers and associates. With these skills, a manager can easily play interpersonal roles that may be of figurehead, leader and liaison (Drucker 200 7). With the above discussed skills a manager also become able to perform his informational (recipient, disseminator, and spokesperson) and decision roles (entrepreneurs, disturbance handle, resource allocator and negotiator).In addition to these skills several other skills are also required by an individual to operate at management levels that are as follows expert SkillsTechnical skills pertain to the ability of an individual to perform specific activity. In order to perform specific activity an individual should have all-essential knowledge of methods, processes and procedures as otherwise it would not be possible to carry out given task or duty (Atwood 2008). This could also be silent with the help of examples of some positions like engineers, accountants, computer specialists and project managers who have inevitable technical skills for their specialized fields.These skills are essential for an individual to operate at management level as he may also be given responsibility to manage and evaluate others. Without technical skills, it would not be possible for an individual to operate at management level that includes functions like planning, organizing, staffing, leading and controlling (Pride, Hughes Kapoor 2009).Human SkillsHuman skills required by an individual to operate at management level are also cognize as interpersonal skills. It refers to the ability of an individual to work well with other people in a group or team. It refers to the ability of an individual to direct, motivate and communicate with people to help them to attain given objectives (Drucker 2007). These skills are highly important for a person in regard to the domain of an environment in which everyone feels comfortable, free to communicate and share their opinions.This kind of environment can only be create when a manager have human skills. With human skills, a manager can help its employees throughout their interactions with supervisors, peers and people outside the work like customers, suppliers and public. These skills are imperative for an individual to operate at all management levels of an organisation (Montana Charnov 2000). abstract SkillsConceptual skills mean the ability of an individual to think and conceptualize abstract situations. It refers to the ability to comprehend and match up all essential corporate objectives and activities. These skills are critically required when a person is employed at altitude management level as top managers are highly required to predict changes and see big picture in regard to future (Montana Charnov 2000). Top managers are required to interpret present internal and external changes and trends for the identification of future business strategies.Without conceptual skills an individual cannot operate at management level as it is essential to identify meaning and develop business strategies accordingly (Drucker 2007). The significance of this skill set can also be understood in regard to present competition that requires managers to make appropriate interpretations and appropriate business plans and strategies accordingly.Design SkillsIn addition to technical, human and conceptual skills an individual who is going to work at management level is also required to have design skills. Design skills refer to an individuals ability to identify solutions of problems in a way that can significantly improvement organisation. Having the design skills is essential for individuals that are going to operate at management level as at this level there is a critical need of solution rather than just identifying problems (Montana Charnov 2000). Until or unless an individual is not able to propose solutions of different organisational problems with his design skills, he would not be appropriate to work at management level.ConclusionWith the help of above discussion, it can be said that management behaviour is an important practice that should be followed by all organisations for attaining an assured s uccess. With the considerations of management related aspects like structure, culture and their interrelationship, affect on business performance a firm can become able to attain high profits and increased performance (Montana Charnov 2000). As well, the evaluation of changes occurred in management in last 40 years and the changes that can occur in coming 40 years is also quite effective as it directs present companies with all essential changes that they should follow for attaining their aims and objectives.Additionally, the identification of skill set required for an individual to operate at management level is also critical as with this a firm can hire or develop employees accordingly. An appropriate skills set is essential to effectively work at management level.

Friday, March 29, 2019

Wireless networks: Security

Wireless meshs warrantor radio nets ,due to ease of induction ,cost benefits and the capability of connectivity , hence communication whatsoeverwhere ,has made it the close best-selling(predicate) way of communicate setup in this 21st century. With increase in the need of mobile formations, the current electronic market has excessively been inundate with laptops, pdas, RFID devices, healthc be devices and tuner VOIP (Voice over IP) which argon WIFI (Wireless Fidelity) enabled. With the 3G (Third Generation) and 4G (Fourth Generation) cellular radio receiver standards, mobiles phones argon excessively WIFI enabled with in truth mellow speed macrocosm provided for entropy upload and tear download .Nowadays a m anys and overt beas non appoint steady cities atomic number 18 WIFI capable, enabling a somebody to recover the internet or even contact a opposed waiter in his office from anywhere in that city or even from his mobile phone term just strolling down the road.But as e rattling good applied science has its own drawbacks so does the radiocommunication electronic lucres .Just as in the case of wired internets they be in like manner prone to interloper attacks or more commonly cognize as Wireless hacking and so(prenominal) compromising the lucres , protective cover measure, righteousness and privacy. The introductory reason for this is when the piano tuner net income was set-back introduced, it was con typefacered to gather in auspices and privacy built into the dodge while communicate info. This misconception had essenti aloney arisen beca practise receiving set system vectors and receivers use spread spectrum systems which have signals in the wide transmission band. Since the RF(Radio Frequency ) receivers which at that time could only interrupt signal in the narrow transmission band these wireless signals were potentially con expressionred in the safe zone .But it did non take long to comprise devi ces that could intercept these wireless signals as well(p) .Hence the ace of data orchestrate over wireless cyberspaces could be easily compromised .With the development of applied science so has the modes and ways in which a meshwork crowd out be attacked belong more vicious .Fig-1 WLAN (Wireless Local Area Network)Security of wireless internets against much(prenominal) vicious attacks is hence the become the priority for the network industry. This is because not all networks are equally stiff .The gage dep finishs on where this network is utilise. For example, if the requirement of the wireless is to provide a wireless hotspot in a shopping mall so then the protective cover of this is neer interested with simply if its for a corporate they have their own protection credentials and exploiter entre control implemented in the network.II. wherefore WIRELESS networks are prone to attacks? in that respect are progeny of reasons why wireless networks are prone to indorsementchy attacks .These are the close to contest aspects to eb considered when a secure wireless network has to be hited.a) Wireless network are open networks The reason for this is that there is no physical media defend these networks .Any sheaf transmitted and received bay window be intercepted if the receiver has the aforementioned(prenominal) frequency as the transmitter receiver employ by h wireless network .There is excessively a common misconception that if the assay-mark and encoding are decorously utilise the network will not be compromised .But what about the messages pass around back and forth to begin with the credential and encryption comes into play ?b) Distance and Location The attacker great deal attack from any aloofness and location and is only limited by the power of the transmitter .Special devices have been designed which tail end attack even short distance networks such the Bluetoothc) Identity of the Attacker Attacker fag always expect unidentified because he uses a series of antennas or other compromised networks earlier reaching the actual tar go for it. This makes wireless network attackers genuinely difficult to track. roughly of the reasons why such attacks are so common is because of the abstemious availableness of data from none other than the Internet, easy to use cheap technology and of course the motivation to hack .III. wireless hacking footprint by stepTo understand the security communications protocols for wireless networks currently in use, first it is weighty to understand the method actings through with(predicate) with(predicate) which a half-hearted network is attacked by a cyberpunk .These are also issuen as wireless infringement methods .A. EnumerationAlso know as network Enumeration, the first and for the first time step to hacking which is finding the wireless network. The wireless network could be any specific tar work or even a random feeble network which flush toil et be compromised and used to attack other end systems or networks .This feat is achieved by development a network stripping software which are now a days available online in plenty, to name a few are Kismet and Network boner .In dress to have more in weeation about the network, the packet boats that are channelise and received by the network scum bag sniffed victimization network analyzers also known as sniffers .A large bout of teaching can be obtained by victimisation this including IP mouth, SSID numbers even reasonable information such as MAC organise , type of information and also the other networks that this compromised end system.Yet other problem approach is the use of network mappers which can be used to find he waiters that run these compromised networks hence also attacking these hosts which could then affect proper functioning and information transfer between these master of ceremoniess and to other networks connected to it .B. vulnerability Assesment This is mainly done by the hacker y victimisation a vulnerability scanner .After the hacker has found the network he trust to attack he uses this program in hunting lodge to detect the helplessness of the computer , computer systems networks or even applications. After this the intruder opinionated on the some achievable means of entry into the network.C. Means of launchingIV. TYPES OF THREATS ATTACKSA. Eaves Dropping and Traffic AnalysisThis is the form of attack that makes use of the weak encryption of the network .This always compromises the integrity and security of the network .All attacks such as war driving , war chalking ,packet sniffing traffic analysis all fall under this categoryB. Message ModificationThese attacks are mainly used to modify the data that is dedicate crossways a network .The modification might be giving wrong information or also adding bitchy content to the data packet organize form one space to some other .This compromises the integrity a nd privacy of the info .C. mon disclose DevicesTheses could be devices such as APS , application software programs which has been compromised by the intruder and made to function according to him/her. Such devices can compromise the integrity of the network as well as the data trust across it .These devices can also launch reply attacks and also make the network associated to malicious content websites or information.D. Session HijackingThis attack occurs aft(prenominal) a logical session has been established between two nodes to through the AP.In the attacker poses as a valid AP to the node seek to establish connecter and a valid node to the AP .The attacker can then send malicious or false information to the node that the data link has already been established with .The legitimate node believe that the AP has terminated he connection with it . The hacker can then use this connection to get sensitive information from the network or the node .E. Man In the Middle AttacksThis is similar to that of a session hijacking attack but in this case it is a rogue AP that acts as valid lymph gland to the legitimate AP and valid AP to the legitimate client .Once this has been established the rogue AP can access all information from the , intercept communication , send malicious information to other clients through this .These are just few of the security threats and attacks in wireless environments .With the advancing technologies there legion(predicate) more possible security threats that can be faced by these networks in the future.V. staple fibre REQUIREMENTS IN WIRELESS NETWORK SECURITYWith the vulnerability of wireless networks ,security and countering o such malicious attacks have become one of the top priorities intercommunicate by efforts ,corporate as well as research fields in IT .There are many pints to be considered when the security of a network is concerned the most measurable f which are earmark, accountability and encryption .A. credential This is very familiar to anyone using a network in his or her work place or even accessing he email on the internet and the very first step in promoting a secure wireless network . .There many different ways of authentication and many different tools and methods have been used over the years in dictate.. make the primary process, more reliable and fool prof.Some of the most widely used methods are a) User name and Password combinations generally defined as something that a soulfulness knows.b) Smart Card, RFIDs and Token technologies also known as something that a person hasc) Biometric Solutions such as finger printing , retina examine which can be generally defined as something that a person is or are.Now the reliability of each one of these methods can quit depending on the level on which it has been implemented .In the case very lower-ranking level authentication s only one kind of method I used to secure the network .One of the weakest forms of authentication can be consid ered as the use of only ID card or token technologies as if a person looses this , he can compromise the security of the network .Even in the case of exploitername and rallying cry the strength of the authentication is only as good as the complexity of the information used as username or even password .People generally prefer to use passwords that are easy to remember but also known to many other pack in that organization or even outside One of the much reform ways of securing a network through authentication is to use biometric solutions such as fingerprinting or retina scanning .But of course technology has advanced to the extend that even fingerprints or even retinas can be forged .Nowadays a number of methods of combinational methods are used as authentication with high security premises or networks guarded by more than two or three kinds of authentications .B. AccountabilityAfter a user has been authenticated to use the network it is important to have t able to track the c omputer routine of each person using the network so that incase of any foul play the person responsible can be held responsible .When the networks were very small it was very easy f a network administrator to track the usage of each person on a network .But with huge networks, remote access facilities and of course the wireless networks it has become quite a difficult task .AS mentioned earlier , there are many ways in which a hacker can make himself difficult to track down .Many softwares and firmwares have been created which is used in conjecture with the authentication protocols inoder to make the wireless network more secure and robust .C. EncryptionThis is the most important step in building and securing a strong wireless network infrastructure .he steps generally followed for this are a) Methods based on public depict infrastructure (PKI)b) Using high situation encryption final causec) algorithm used for encryption must be well known and proven to be very unbreakable.Curr ent wireless network security solutions can be classified into three broad categoriesa) unencrypted solutionsb)encrypted solutionsc) combination.In this piece with emphasis as ex bolded in the abstract will eb on encrypted solutions for wireless security. A brief discussion on the unencrypted methods has still been given for introductory understanding.I n the case of encryption based security protocols ,a flesh out description is given about the ones that are commonly used in wireless LANS in this paper .After which the latest and developing technologies will be discussed .The three major generations of security as existing today and also cited in many papers ,journals and magazines are as follows 1) WEP (Wired Equivalent Privacy)2) WPA (Wi-Fi protect Access)3) WPA2The image below shows the layer in which the wireless network security protocols come into play which is of course the link layerFig-1 802.11 AND OSI MODELVI. WIRELESS SECURITY UNENCRYPTEDA. MAC RegistrationThis is o ne of the weakest methods network security..MAC registration was basically used to secure university residential networks as college apartments or dorm rooms. The basic way of doing this is to configure DHCP (Dynamic Host Configuration Protocol) to renting IP address to only a know set of MAC address which can be obtained manually by running automated scripts on a network server so basically any person with a valid registration can enter into the network .Session logs also cannot be generated because of which accounting of the logs become impossible. Last but not the least since this method of securing was basically used for switched and wired networks encryption was never included.B. FirewallsIn this method, network authentication is one through either HTTP( Hyper text Transfer Protocol),HTTPS or telnet .When an authentication requirement is received by the network it is directed to the authentication server .On validating the authentication the firewalls add rules to the IP addre ss provided to that user , This IP address also has timer attached to it in order to indicate the rule time out of this IP address. When actd through HTTPS it is basically a session based as well as a secure process .But any other process which is qualified from a switched wired network firewalls does not provided encryption.C. Wireless Firewall Gateways One of the most latest as well as considerably fool create method in unencrypted solutions in Wireless Firewall Gateways or WFGs.This is a wholeness wireless gate way is integrated with firewall, router, web server and DHCP server and its because of all these being in one system that makes WFGS a very secure wireless security solution. When a user connects to the WFG, he/she receives a IP address form the DHCP serve .Then the web server ( HTTPS) asks for a user name and password and this is executed by the PHP ( Hypertext Preprocessor).Address spoofing and unauthorized networks are avoided by PHP as the DHCP logs are constantly compare with the current updated ARP(Address resolving power Protocol).This verifies that the computer that is connect to the network is using he the IP address that has been leased to it by the DHCP server .Then this information is passed on to the authentication server which in turn adds rules to this IP address .Up ne the expiration of the DHCP lease the sessions are terminated . The WFGS hence make the authentication and accountably pat f the network more reliable ,But as this is also an unencrypted method it lacks the most important accept of security.VII. WEP-WIRED EQUIVALENT PRIVACYThis protocol was written in accordance with the security requirements required for IEE 802.11 wireless LAN protocol .IT is qualified from the wired LAN system and hence the security and privacy provided by it is also equivalent to the security and privacy provided a wired LAN. finished its an optional part of wireless network security, it will give a considerably secure networking environment.T he algorithm used in WEP is known as the RC4(Rivest Cipher 4) .In this method a pseudo random number is generated using encryption primaevals of random lengths .This is then bound with the data spotlights using a OR(XOR) functionality in order t generate an encrypted data that is then send .Too look at in more in detail A. transmitter SideThe pseudo random number is generated using the 24 bit IV(initialization Vector ) given by the administrator network and also a 40 r 104 bit secret detect or WEP mention given by the wireless device itself. Which is then added together and passed on to theWEP PRNG (Pseudo Random Number reservoir).At the same time the plain text along with an integrity algorithms combined together to form ICV (integrity duty tour value) .The pseudo number and the ICV are then combined together to form a vigor text by sending them through an RC4.This cipher text is then again combined with IV to form the final encrypted message which is then send.Fig-2 WEP SE NDER SIDEB. Receiver SideIn the receiver side the message is decrypted in five steps .Firs the preshared key and the encrypted message are added together .The result is then passed through tho another(prenominal) PRNG .The resulting number is passed through an CR4 algorithm and this resulting in retrieving the plain text .This again combines with another integrity algorithm to form a new ICV which is then compared with the precedent ICV t check for integrity.Fig-3 WEP RECIEVER SIDEC. Brief Descriptionsa) Initialization Vector are basically random bit the size f which is generally 24 bits but it also depends on the encryption algorithm .This IV is also send to the receiver side as it is required for decrypting the data send .b) Preshared Key is more or less like a password .This is basically provided by the network administrator and is shared between the access point and all network usersc) Pseudo Random Number Generator This basically creating a unique secret key for each packet sends through the network. This is done by using some 5 to at most 13 characters in preshared key and also by using randomly taken characters from IV.d) ICV and Integrated Algorithm This is used to encrypt the plain text or data and also to create a check value which can be then compared y the receiver side when it generates its own ICV .This is done using CRC (Cyclic Redundancy Code) technique to create a checksum .For WEP, the CRC-32 of the CRC family is used.D. RC4 AlgorithmRC$ algorithm is not only proprietary to WEP .IT can also be called a random generator, stream cipher etc .Developed in RSA laboratories in 1987 , this algorithm uses synthetical functions to be specific XOR to add the key to the data .Figure 5 RC4 AlgorithmE. Drawbacks of WEPThere are many drawbacks associated with the WEP encryptions. There are also programs now available in the market which can easily hack through these encryption leaving the network using WEP vulnerable to malicious attacksSome of the pro blems faced by WEPWEP does not forbid counterfeit of packets.WEP does not prevent replay attacks. An attacker cans simply memorialize and replay packets as desired and they will be accepted as legitimateWEP uses RC4 improperly. The keys used are very weak, and can be brute-forced on standard computers in hours to minutes, using freely available software.WEP reuses initialization vectors. A variety of availableCryptanalytic methods can decrypt data without crafty the encryption keyWEP allows an attacker to undetectably modify a message without discriminating the encryption key.Key management is lack and updating is poor problem in the RC-4 algorithm.Easy forge of authentication messages.VIII. WPA -WIFI PROTECTED ACCESSWPA was developed by the WI-FI alliance to overcome most of the disadvantages of WEP. The advantage for the use is that they do not have t qualify the hardware when making the change from WEP to WPA.WPA protocol gives a more complex encryption when compared to TK IP and also with the MC in this it also helps to counter against bit flipping which are used by hackers in WEP by using a method known as hashing .The figure below shows the method WPA encryption.Figure 6 WAP Encryption Algorithm (TKIP)As seen it is almost as same as the WEP technique which has been heighten by using TKIP but a hash is also added before using the RC4 algorithm to generate the PRNG. This duplicates the IV and a copy this is send to the next step .Also the copy is added with the base key in order to generate another special key .This along with the hashed IV is used to generate the sequential key by the RC4.Then this also added to the data or plan text by using the XOR functionality .Then the final message is send and it is decrypted by using the inverse of this process.A. TKIP (Temporal Key Integrity Protocol)The confidentiality and integrity of the network is maintained in WPA by using improved data encryption using TKIP. This is achieved by using a hashing functio n algorithm and also an additional integrity feature to make sure that the message has not been tampered with The TKIP has about four new algorithms that do various security functionsa) MIC or Micheal This is a coding system which improves the integrity of the data transfer via WPA .MIC integrity code is basically 64bits long but is divided into 32 bits of gnomish Endean words or least significant bits for example let it be (K0 , K1) .This method is basically used to make that the data does not get forged .b) Countering Replay There is one particular kind of forgery that cannot me detected by MIC and this is called a replayed packet .Hackers do this by forging a particular packet and then sending it back at another instance of time .In this method each packet send by the network or system will have a order number attached to it .This is achieved by reusing the IV field .If the packet received at the receiver has an out of order or a smaller sequencing number as the packet received before this , it is considered as a reply and the packet is hence discarded by the system .c) Key mixing In WEP a secure key is generated by connecting end to end the base layer which is a 40 bit or 104 bit sequence obtained for the wireless device with the 24 bit IV number obtained from the administrator or the network. In the case of TKIP, the 24 bit base key is replaced by a temporary key which has a limited career time .It changes from one destination to another. This is can be explained in physical body one of the two phases in key mixing.In Phase I, the MAC address of the end system or the wireless router is mixed with the temporary base key .The temporary key hence keeps changing as the packet moves from one destination to another as MAC address for any router gateway or destination will be unique.In Phase II, the per packet sequence key is also encrypted by adding a small cipher using RC4 to it. This keeps the hacker from deciphering the IV or the per packet sequence numb er.d) Countering Key Collision Attacks or Rekeying This is basically providing fresh sequence of keys which can then be used by the TKIP algorithm .Temporal keys have already been mentioned which has a limited life time .The other two types f keys provided are the encryption keys and the captain keys .The profane keys are the ones which are used by the TKIP privacy and authentication algorithms .B. Advantages of WPAThe advantage of WPA over WEP can be clearly understood from the higher up descriptions .Summarising a fewa) Forgeries to the data are avoided by using MICb) WPA can actively avoid packet replay by the hacker by providing unique sequence number to each packets.c) Key mixing which generates temporal keys that change at every station and also per packet sequence key encryption.d) Rekeying which provides unique keys for that consumed by the various TKIP algorithms.IX. WPA2-WIFI PROTECTED ACCESS 2WPA 2 is the as the name suggests is a modified form of WPA in which Michea l has be replaced with AES based algorithm known as CCMP instead of TKIP .WPA can operate in two modes one is the crime syndicate mode and he enterprise mode .In the home mode all he users are requires to use a 64 bit pass phrase when accessing the network. This is the dissever encryption used in wireless routers used at home or even in very small offices. The home version has the same problems which are faced by users of WEP and the original WPA security protocol.The enterprise version is of course for used by larger organisation where security of the network is too valuable to be compromised .This is based on 802.1X wireless architecture , authentication framework know as r and the another authentication protocol from the EAP ( Extensible corroboration Protocol ) Family which is EAP-TLS and also a secure key .A. 802.1XFigure 7 802.1X trademark ProtocolIn order to understand the security protocols used in WPA2 it is important know a little bit about the 802.1X architecture for authentication. This was developed in order to overcome many security issues in 802.11b protocol. It provides much better security for transmission of data and its key strength is of course authentication There are three important entities in 802.1x protocol which is the client, valuator and authentication.a) Client is the STA(station) in a wireless area network which is trying to access the network ,This station could be fixed , portable or even mobile. It of course requires client software which helps it connect to the network.b) Authenticator This is yet another name given to an AP (Access Point).This AP receives the signal from the client and send it over to the network which the client requires connection from There are two move to the AP i.e. the non control port and the control port which is more of a logical partitioning than an actual partition..The non control port receives the signal and check its authentication to see if the particular client is allowed to connect to the network .If the authentication is O.K. the control port of the AP is opened for the client to connect with the network.c) authentication wheel spoke (Remote Authentication Dial in User Service) server .This has its own user database table which gives the user that has access to the he network, this makes it easier for the APs as user information database need not be stored in the AP .The authentication in RADIUS is more user based than device based .RADIUS makes the security system more scalable and manageable.Figure 8 EAP/RADIUS Message rallyB. EAP (Extended Authentication Protocol)The key management protocol used in WAP2 is the EAP (Extended Authentication Protocol).It can also be called as EAPOW (EAP over wireless).Since there are many versions of this protocols in the EAP family it will advisable to choose the EAP protocol which is very best suited for that particular network .The diagram and the steps pursuance it will describe how a suitable EAP can be selected for th at network a) Step1 By checking the previous communication records of the node using a network analyser program, it can be easily detected if any malicious or considerably compromising packets has been send to other nodes or received from to her nodes to this node .b) Step 2 By checking the previous logs for the authentication protocols used, the most commonly used authentication protocol used and the most self-made authentication protocol can be understood.Figure 9 EAP Authentication with Method Selection Mechanismc) Step 3 The specifications of the node itself have to be understood such as the operating system used the hardware software even the certificate availability of the node.After all this has been examined the following steps can be run in order to determine and execute the most suitable EAP authentication protocol1. kick the bucket2. if (communication_record available) then read communication_record if(any_suspicious_packets_from_the_other_node) then abort authenticatio n go to 5 else if (authentication record available) then read authentication record if (successful authentication available) then read current_node_resources if (current_node_resources fall out with last_successful_method) then method = last_successful_method go to 4elseif (current_node_resources comply withmost_successful_method) then method = most_successful_method go to 4 else go to 3 else go to 3 else go to 3 else go to 33. read current_node_resources execute method_selection(current_node_resources)4. execute authentication_process5.EndX. RSN-ROBUST SECURITY NETWORKSRSN was developed with reference to IEEE 802.11i wireless protocol .This connection can provide security from very moderate level to high level encryption schemes .The main entities of a 802.11i is same as that of 802.1x protocol which is the STA (Client), AP and the AS (authentication server).RSN uses TKIP or CCMP is used for confidentiality and integrity protection of the data while EAP is used as the authenticati on protocol.RSN is a link layer security i.e it provides encryption from one wireless station to its AP to from one wireless station to another..It does not provided end to end security IT can only be used for wireless networks and in the case of hybrid networks only the wireless part of the network .The following are the features of secure network that are supported by RSN ( WRITE REFERENCE NUMBER HERE) a) Enhanced user authentication instrumentsb) Cryptographic key managementc) Data Confidentialityd) Data melodic line and Authentication Integritye) Replay Protection.A. Phases of RSNRSN protocol functioning can be divided in the five distinct phases .The figure as well as the steps will describe the phases in briefa) discovery Phase This can also be called as Network and Security Capability discovery of the AP.In this phase the AP advertises that it uses IEE 802.11i security policy .An STA which wishes to communicate to a WLAN using this protocol will up n receiving this publici zing communicate with the AP .The AP gives an option to the STA on the cipher suite and authentication mechanism it wishes to use during the communication with the wireless network.Figure 9 Security States of RSNb) Authentication Phase Also known as Authentication and Association Phase .In the authentication phase, the AP uses its non control part to check the authentication proved by the STA with the AS .Any other data other than the authentication data is impede by the AP until the AS return with the message that the authentication provided by the STA is valid .During this phase the client has no direct connection with the RADIUS server .c) Key Generation and Distribution During this phase cryptographic keys are generated by both the AP and the STA. Communication only takes place between the AP and STA during this phase.d) Protected Data Transfer Phase This phase as the name suggest is during which data is transferred through and from the STA that initiated .the connection throug h the AP to the STA on the other end of the network.e) link Termination Phase Again as the name suggests the data transfer is purely between the AP and the STA to tear down the connection